Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Navy Nuclear Carrier Sysadmin Busted For Hacking Databases
Newest First  |  Oldest First  |  Threaded View
Charlie Babcock
Charlie Babcock,
User Rank: Ninja
5/13/2014 | 6:58:16 PM
Rank amateurs
I'm glad were catching the rank amateurs, who boast of their exploits on Twitter. That's helpful to investigators. I wonder how we're doing against the true professionals.
Robert McDougal
Robert McDougal,
User Rank: Ninja
5/12/2014 | 11:54:59 AM
Re: Lack of PII security
Many organizations do not employ (citing cost or low risk) internal IDS/IPS.  I would be surprised if the Navy was any different.  Unfortunately, it will take many more of these insider events before companies take the issue more seriously.
electronbee
electronbee,
User Rank: Apprentice
5/9/2014 | 2:04:28 PM
Lack of PII security
The real reason for this was their sense of invincibility and not properly securing the network. Where is the IDS/IPS and the access control for the databases? Hello?
jwaters974
jwaters974,
User Rank: Apprentice
5/9/2014 | 1:06:57 PM
Re: Insider Threat
It seems the gravity of the crime and the potential sentences do not match up.

A clearly bad "risk : reward ratio" must exist to discourage this behavior. Five year sentences are reduced for good behavior but the bribes for info and hacking could well be worth it - considering the deep pockets of our adversaries... both state and non state actors.

Hacking military assets is the most serious crime anyone in the military could do- certainly more perilous to the services than an individual throwing down their rifle and deserting in battle. (Not participating in battle out of fear vs. swinging an advantage to the enemy by exposing personnel and information, sharing classified access with MINORS who don't know sqat about national security and its consequences all because you are bored).

Playing "black hat" on an aircraft carrier - potentially compromising the safety of the crew (and in the wrong scenario - possibly many other military and civillian personnel) and billions of dollars of taxpayers assets

- in this cloaked world of secretive and ongoing wars (physical and cyber), we are always at war - and so this crime seems worthy of capital punishment. As is the case for desertion in battle.

I'm just saying......

 

 
Randy Naramore
Randy Naramore,
User Rank: Ninja
5/8/2014 | 3:45:44 PM
Insider Threat
Insider threats are always the hardest to defend, your employees have to be able to do the job they are hired to do but so often they are the ones who post the biggest risk.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2339
PUBLISHED: 2022-07-07
With this SSRF vulnerability, an attacker can reach internal addresses to make a request as the server and read it's contents. This attack can lead to leak of sensitive information.
CVE-2022-20752
PUBLISHED: 2022-07-06
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to perform a timing attack. This vulnerability is due to insufficient pro...
CVE-2022-20768
PUBLISHED: 2022-07-06
A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. This vulnerability is due to the storage of certain unencrypted credentials....
CVE-2022-20791
PUBLISHED: 2022-07-06
A vulnerability in the database user privileges of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an auth...
CVE-2022-20800
PUBLISHED: 2022-07-06
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity ...