04:18 PM
Connect Directly

White House Confirms Spear-Phishing Attack

The White House Military Office was hit by a spear-phishing attack, but the White House says no classified systems were impacted

The White House has confirmed that a spear-phishing attack struck an unclassified network in its environment, but says the affected system was identified and isolated.

The revelation came following a report Sunday by The Washington Free Beacon, a conservative online newspaper. According to the report, hackers broke into a system used by the White House Military Office, which provides military support for White House functions and includes units such as the Presidential Airlift Group and the White House Communications Agency. The attack reportedly occurred last month.

Sources cited in the report lay the blame for the attack on the doorstep of Chinese hackers, stating that it was likely the work of a Chinese cyberunit known as the 4th Department of General Staff of the People's Liberation Army, or 4PLA.

This incident is hardly the first time attackers from China have been accused of targeting U.S. government systems. In March, Gen. Keith Alexander, head of the U.S. Cyber Command, told the U.S. Senate Armed Services Committee that Chinese espionage was behind the March 2011 cyberattack against RSA, EMC's security division.

A White House official downplayed the recent attack in a statement to Dark Reading, however, noting that sensitive systems were not impacted.

"These types of attacks are not infrequent, and we have mitigation measures in place," the official says. "In this instance, the attack was identified, the system was isolated, and there is no indication whatsoever that any exfiltration of data took place. Moreover, there was never any impact or attempted breach of any classified system."

While the situation sounds scary, it should be viewed as business as usual for the most part, says Alex Cox, principal security researcher for the RSA FirstWatch Threat Research team.

"Government/defense, along with banking, is one of the most highly targeted verticals, and we see attacks like these on a daily basis across the industry," Cox explains. "The important part is that they are aware of them. The ones they miss are the ones to worry about, for obvious reasons."

The incident does, however, underscore the susceptibility of employees, even at the highest level of government, to targeting attacks, says Aaron Higbee, co-founder and CTO of PhishMe.

"In this case, we would like to think the White House Military Office has the most up-to-date hardware and antivirus software available to protect the nation's most critical information," he says. "But as we have seen time and time again, these attacks use the social engineering tactics of fear, curiosity, and urgency to lure users to open attachments, click URLs, or provide sensitive data to criminals -- truly, they are geared to help criminals establish an undetected presence within the White House network."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.