Old Worm Digs New Dirt At Pentagon 26
ColdWetDog writes "Remember the Agent.BTZ worm that caused significant problems at military installations back in 2008? Now, three years after what the Pentagon called the most significant breach of US military networks ever, new versions of the malware blamed for the attack are still roiling US networks."
Re: (Score:1)
Re: (Score:1)
*sigh*
I'm surprised that no one has reminded you already, that the very first viruses were targeted at Unix. Mac, being a Unix like, is subject to attack, as well. The thing about a Mac, or any other Unix like, is that permissions are granted very differently from Windoze. Yeah, I can be infected. But, no, I can't be infected as easily as a Windows user, unless I get stupid and grant permissions for the application to run.
I know, you're just trolling, so I should apologize right now for feeding the trol
malware infiltrated computer systems? (Score:2, Insightful)
"The malware at issue, known as "agent.btz," infiltrated the computer systems of the U.S. Central Command in 2008" link [reuters.com]
Don't you mean someone opened an attachment in Microsoft Exchange or clicked on a URL in Microsoft Internet Explorer, or plugged a USB device into a computer running Microsoft Windows.
Name : Worm:W32/Agent.BTZ
Category: Malware
Type: Worm
Platform: W32 link [f-secure.com]
Proprietary hardware (Score:4, Funny)
The government should go back to running on DEC Alphas and Data General mainframes. Mark Microsoft technology as export-only.
Not Funny (Score:2)
For some of you that do not want to chase that link, It's a Linux Boot CD that uses only local volatile memory so that no untrusted software can exist, after a reboot. The disk has an optional copy of open office and networking software for connecting to secured servers.
Re: (Score:2)
Is this the same Air Force which declared about 2 years ago they were going to standardize on Winders and then proceeded to attempt to bottleneck all security through their service? That's the one?
Re: (Score:2)
Ratcheting the fear for the masses (Score:2, Interesting)
Anyone care to speculate on the end game for this build up of global "cyberwar/cybercrime" activity covered by the press?
Re: (Score:3)
Press gets bored of over-hyping insignificant malware events, as signs of imminent cyber-apocalypse stubbornly fail to materialise, moves on to something more interesting?
Re: (Score:2)
Re: (Score:1)
Perhaps you missed all of the scare mongering about China, Russia, North Korea, Iran, etc. trying to hack America's precious digital streams. Former presidential national security advisor and current cyberwar profiteer Richard Clark just had an editoral in the Washington Post this week warning about the cyberArmageddon that'll be launched from China if the government doesn't hire security companies (such as his own) to help the DoD their networks and, well, everyone else's network. The current rash of syst
Re:Ratcheting the fear for the masses (Score:4, Insightful)
Re: (Score:1)
Re: (Score:2)
Same as any other spying. The end game is to know before hand who will win a battle.
Re: (Score:1)
thermonuclear war?
War vs. standard computing (Score:2)
"It's very persistent and it keeps evolving," the official said. "You're constantly seeing new, better versions of it. So it's a challenge to keep ahead of it."
That's not an old worm. That's new worms based on an old worm. And let's face it; this is the activity of a foreign nation, using highly sophisticated methods including, invariably, human agents who are willing to deliberately introduce the malware into military computing environments. It's not the standard "PREEZE CRICKY HERE!!!!" attacks that ar
NSA Advises Upgrades to Windows 7 (Score:1)
Well, they can eat their fucking radish