Attacks/Breaches

11/30/2010
12:27 PM
50%
50%

WikiLeaks Under Hack Attack

DDOS hit comes days after the Web site slipped highly sensitive government information to media outlets.

WikiLeaks was under cyber-attack Tuesday, several days after the rogue Web site released classified U.S. government documents to major newspapers around the world. According to a posting on its site, WikiLeaks was hit with a distributed denial of service (DDOS) strike of unknown origin. "DDOS attack now exceeding 10 Gigabits a second," said a WikiLeaks representative, in a message on Twitter.

Speculation about the source of the attack ranged from the U.S. government, to foreign regimes embarrassed by the information WikiLeaks disclosed to The New York Times, Der Spiegel, Le Monde, and other major newspapers.

None of the speculation, however, has been confirmed.

Among other things, the documents revealed serious concerns within the U.S. diplomatic community about the resolve and trustworthiness of several key allies, including Afghanistan and Pakistan, in the war on terror.

They also disclosed Saudi Arabia's wish for a U.S. military strike against Iran, and painted unflattering pictures of Western leaders like German Chancellor Angela Merkel and Italian Prime Minister Silvio Berlusconi.

In the wake of the leak, the White House ordered a security clampdown.

The administration is telling agency heads to develop stricter criteria for determining which federal employees are given access to secured computer systems and networks that store classified data.

"Our national defense requires that sensitive information be maintained in confidence to protect our citizens, our democratic institutions, and our homeland," said Office of Management and Budget director Jacob Lew, in a letter to agency heads. "Any failure by agencies to safeguard classified information pursuant to relevant laws, including but not limited to Executive Order 13526 … is unacceptable and will not be tolerated," wrote Lew. President Obama signed Executive Order 13526 on Dec. 29, 2009.

It mandates that federal agencies undertake a broad series of steps to protect information.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Containerized Apps: An 8-Point Security Checklist
Jai Vijayan, Freelance writer,  6/14/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-0291
PUBLISHED: 2018-06-20
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of SNMP protocol ...
CVE-2018-0292
PUBLISHED: 2018-06-20
A vulnerability in the Internet Group Management Protocol (IGMP) Snooping feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in ...
CVE-2018-0293
PUBLISHED: 2018-06-20
A vulnerability in role-based access control (RBAC) for Cisco NX-OS Software could allow an authenticated, remote attacker to execute CLI commands that should be restricted for a nonadministrative user. The attacker would have to possess valid user credentials for the device. The vulnerability is du...
CVE-2018-0294
PUBLISHED: 2018-06-20
A vulnerability in the write-erase feature of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to configure an unauthorized administrator account for an affected device. The vulnerability exists because the affected software does not properly delete sensitive...
CVE-2018-0295
PUBLISHED: 2018-06-20
A vulnerability in the Border Gateway Protocol (BGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the device unexpectedly reloading. The vulnerability is due to incomplete input validation of the BGP update...