Forgot your password?
typodupeerror
The Military Worms Technology

Old Worm Digs New Dirt At Pentagon 26

Posted by Soulskill
from the fool-me-twice dept.
ColdWetDog writes "Remember the Agent.BTZ worm that caused significant problems at military installations back in 2008? Now, three years after what the Pentagon called the most significant breach of US military networks ever, new versions of the malware blamed for the attack are still roiling US networks."
This discussion has been archived. No new comments can be posted.

Old Worm Digs New Dirt At Pentagon

Comments Filter:
  • by Anonymous Coward

    "The malware at issue, known as "agent.btz," infiltrated the computer systems of the U.S. Central Command in 2008" link [reuters.com]

    Don't you mean someone opened an attachment in Microsoft Exchange or clicked on a URL in Microsoft Internet Explorer, or plugged a USB device into a computer running Microsoft Windows.

    Name : Worm:W32/Agent.BTZ

    Category: Malware

    Type: Worm

    Platform: W32 link [f-secure.com]

  • by Trilobyte (19074) on Friday June 17, 2011 @08:41AM (#36473642) Homepage

    The government should go back to running on DEC Alphas and Data General mainframes. Mark Microsoft technology as export-only.

    • If you can't secure your software. You should be running software that is securable. You should talk to the Air Force [dod.mil] I understand they have some.

      For some of you that do not want to chase that link, It's a Linux Boot CD that uses only local volatile memory so that no untrusted software can exist, after a reboot. The disk has an optional copy of open office and networking software for connecting to secured servers.
      • by gtall (79522)

        Is this the same Air Force which declared about 2 years ago they were going to standardize on Winders and then proceeded to attempt to bottleneck all security through their service? That's the one?

      • by RockDoctor (15477)
        Dickless lurkstation?
  • by Anonymous Coward

    Anyone care to speculate on the end game for this build up of global "cyberwar/cybercrime" activity covered by the press?

    • by Tx (96709)

      Press gets bored of over-hyping insignificant malware events, as signs of imminent cyber-apocalypse stubbornly fail to materialise, moves on to something more interesting?

      • I'd like to second that, I see this fading from the public spotlight in a few months and suddenly LulzSec and Anonymous will be backburner news again.
        • by Anonymous Coward

          Perhaps you missed all of the scare mongering about China, Russia, North Korea, Iran, etc. trying to hack America's precious digital streams. Former presidential national security advisor and current cyberwar profiteer Richard Clark just had an editoral in the Washington Post this week warning about the cyberArmageddon that'll be launched from China if the government doesn't hire security companies (such as his own) to help the DoD their networks and, well, everyone else's network. The current rash of syst

    • by Charliemopps (1157495) on Friday June 17, 2011 @09:08AM (#36473918)
      The government grants themselves even more power to circumvent the constitution while passing legislation absolving businesses from any legal mandate to secure themselves from what is clearly an unstoppable army of cyber criminals?
      • Why do you bother putting your milk in the fridge when it is inevitable that it will expire? Same concept.
    • by Jeng (926980)

      Same as any other spying. The end game is to know before hand who will win a battle.

    • by Anonymous Coward

      thermonuclear war?

  • "It's very persistent and it keeps evolving," the official said. "You're constantly seeing new, better versions of it. So it's a challenge to keep ahead of it."

    That's not an old worm. That's new worms based on an old worm. And let's face it; this is the activity of a foreign nation, using highly sophisticated methods including, invariably, human agents who are willing to deliberately introduce the malware into military computing environments. It's not the standard "PREEZE CRICKY HERE!!!!" attacks that ar

  • Any remember this? NSA Advises Upgrade to Windows 7 [slashdot.org]
    Well, they can eat their fucking radish ;)

Your own mileage may vary.

Working...