Risk
11/18/2010
02:37 PM
Connect Directly
RSS
E-Mail
50%
50%

U.S. Warns Of 'Huge' Cyber Threats

Departments of Defense and Homeland Security are monitoring Stuxnet worm and China, among other critical infrastructure risks.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters

Officials from the Departments of Defense (DoD) and Homeland Security (DHS) this week warned that the prospect of a cyber attack remains imminent even as their agencies continue to monitor threats to U.S. critical infrastructure.

Speaking at The Wall Street Journal's CEO Council, Secretary of Defense Robert M. Gates said the future threat of a cyber attack is "huge," while there is a "considerable current threat."

"That's just the reality we all face," he said according to a transcript of his comments.

He said the DoD thinks it has adequately secured the .mil domain but is working to protect U.S. partners in the defense industrial industry so they are shielded.

Gates added that the DoD's recent agreement with the National Security Agency to work together more closely on cybersecurity also should help the federal government protect its websites from intrusion.

His comments came only a day before a report by a congressional commission unveiled that China Telecom diverted traffic for 18 minutes in April from U.S. government sites -- including those from the .mil and .gov domains -- away from normal traffic routing and through servers in China.

While the annual report by the U.S.-China Economic and Security Review Commission said it could not determine what China was doing with the traffic, a report by Northrop Grumman prepared for the same commission last year said that China is likely using the Internet to spy on the U.S. government in preparation for a future cyber attack.

If China isn't enough to worry about, there is also Stuxnet, a complex computer worm, which was discovered in July when it was believed to be targeting Iranian power plants.

The Senate Committee on Homeland Security and Governmental Affairs convened Thursday to discuss how to protect U.S. critical infrastructure in light of Stuxnet.

Testifying before the committee, Sean McGuirk, acting director of the National Cybersecurity and Communications Integration Center at the DHS, said that federal officials have considerable concern about Stuxnet because of the unique nature of the threat it poses.

Stuxnet, unlike other computer worms, is highly complex, containing more than 4,000 functions, which is comparable to the code in some commercial software, he said, according to a transcript of his testimony.

The worm also is difficult to detect because it "uses a variety of previously seen individual cyber attack techniques, tactics, and procedures, automates them, and hides its presence so that the operator and the system have no reason to suspect that any malicious activity is occurring," McGuirk said.

DHS officials also are concerned that the underlying Stuxnet code could be adapted to target a broad range of control systems -- such as the electricity grid and power plants -- in "any number of critical infrastructure sectors," he added.

To combat Stuxnet, the DHS has been analyzing and reporting on the worm since its detection and has briefed dozens of government and industry organizations, as well as advised the control systems industry about how to detect and mitigate an attack.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5694
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allow remote attackers to execute arbitrary SQL commands via the (1) agentPhNo, (2) controlPhNo, (3) agentURLPath, (4) agentControlKey, or (5) platformDD1 parameter to frameworkgui/attach2Agents.p...

CVE-2012-5695
Published: 2014-10-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS m...

CVE-2012-5696
Published: 2014-10-20
Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 does not properly restrict access to frameworkgui/config, which allows remote attackers to obtain the plaintext database password via a direct request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.