Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Chinese, Russian hackers probing US power grid: report
by Staff Writers
Washington (AFP) April 8, 2009


China denies hacking into US power grid
China denied Thursday a media report that Chinese and Russian hackers had attempted to plant viruses in the US power grid, while insisting it was the victim of cyber-attacks. The Wall Street Journal, quoting US intelligence officials, Wednesday reported that cyber-spies were hacking into the power systems to seed viruses that could eventually be activated and plunge major cities into chaos. "There's absolutely no substance in this story about China and Russia attacking the US power grid, so I hope the relevant US press can truthfully handle their reports, particularly about China," Chinese foreign ministry spokeswoman Jiang Yu told reporters.

"China is also the victim of cyber-attacks and is willing to enhance its cooperation with the international community." The Wall Street Journal said the cyber-spies last year repeatedly gained access to the US system powering everything from financial institutions to sewerage systems. "The Chinese have attempted to map our infrastructure, such as the electrical grid," the US daily said, quoting an unidentified senior intelligence official. "So have the Russians." While no damage was caused, investigators found time-bomb style viruses sown into the system, it reported. "If we go to war with them, they will try to turn them on," the official was quoted as saying. US Department of Homeland Security spokeswoman Amy Kudwa said she was "not aware of any disruption to the power grid." However, she acknowledged that "cyber-attacks are made all the time."

Conficker worm active, security experts say
The Conficker worm, believed to have burrowed into millions of computers around the world, has sent an encrypted data message to infected machines, according to a computer security firm. Trend Micro said the purpose of the mysterious update, sent to other infected machines using peer-to-peer (P2P) file transfer software, was not immediately clear. Ivan Macalintal, a Trend Micro advanced threats researcher, said Conficker began showing activity on Tuesday, nearly a week after the expected April 1 activation date that had computer security experts on alert around the world. "As expected, the P2P communications of the Downad/Conficker botnet may have just been used to serve an update," Macalintal wrote in a post late Wednesday on the TrendLabs Malware blog.

"The Conficker/Downad P2P communications is now running in full swing!" Macalintal said the worm was connecting to MySpace.com, MSN.com, eBay.com, CNN.com and AOL.com to detect whether a host computer is connected to the Web. After performing the test, it deletes any traces of itself in the infected machine, he said, adding that it is scheduled to stop running the test on May 3. "It runs and deletes all traces, no files, no registries etc," he said. The worm remains present on an infected machine, however, and could be activated at a later date. Trend Micro is monitoring the worm on an infected computer as part of the Conficker Working Group of security experts. A task force assembled by Microsoft has been working to stamp out Conficker, also referred to as DownAdUp, and the software colossus has placed a bounty of 250,000 dollars on the heads of those responsible for the threat.

Chinese and Russian hackers are attempting to seed viruses in the US power grid that could one day plunge major cities into chaos, a report warned Wednesday.

The report in the Wall Street Journal quotes intelligence officials saying that cyber-spies last year repeatedly gained access to the system powering everything from financial institutions to sewage systems.

"The Chinese have attempted to map our infrastructure, such as the electrical grid," the daily said quoting an unidentified senior intelligence official, and "so have the Russians."

While no damage was caused, investigators found time bomb style viruses sown into the system. "If we go to war with them, they will try to turn them on," the official was quoted as saying.

Amy Kudwa, spokeswoman for the Department of Homeland Security, said she was "not aware of any disruption to the power grid."

However, she acknowledged that "cyber attacks are made all the time."

Barack Obama, the most Internet-savvy president in US history, has pledged to expand the use of the Internet across the country. Among the projects is a major overhaul, with increasing reliance on computer networks, of the electric grid.

That adds to pressure to defend against the growing army of cyber assailants.

On Tuesday the Pentagon revealed that more than 100 million dollars had been spent just in the last six months to repair damage from attacks.

Kudwa said that DHS Secretary Janet Napolitano "takes the issue of cyber security very seriously, which is why she has ordered a top-to-bottom review of all our cyber security."

The DHS and private industry "continuously looks for and mitigates those attacks," she said.

But the challenge is spiraling.

"We're spending vast amounts of money trying to improve security, but computer security is a moving target. It's a journey without destination," said John Bumgarner at Cyber Consequences Unit, which advises the government.

Evan Kohlmann, an investigator with Global Terror Alert, said cyber assailants were capable of replicating the accidental power outage briefly shutting down New York in 2003.

That incident resulted from a fault in power lines, but a hacker controlling the grid could inflict similar or even worse disruption.

"That was just the power going off briefly. Imagine if worse things started to happen. If you induced power surges you could cause very, very serious permanent damage," Kohlmann said. "You could cause mass economic damage."

Although terrorist groups might consider such targets, the most skilled and motivated hackers are in China and Russia, analysts say.

"Both (China and Russia) are particularly interested in enlisting their populace. The Chinese government has either allowed to flourish or has encouraged many patriotic hackers and the Russian government too," said Noah Shachtman, an editor at Wired magazine.

Bumgarner, a government special operations veteran and hacking expert, said that many attacks on the grid aim not to cause damage, but to steal information.

"Some could be just to extract data to increase the efficiency of their own systems," he said.

Kohlmann said countries like China and Russia, which are rivals but also partners to the United States, are not interested in causing major damage -- at least now.

"It appears their aim is not to disrupt the systems now, but to ensure that if these states were ever in a position where they have their backs against the wall that they have another option to atomic weapons or whatever."

The more immediate threat is that the hacking expertise gets out from under government control.

"Once you have the genie out of the bottle and people able to do this, soon it won't be a team of people in a government lab," Kohlmann said. "It's really only a matter of time before non-state actors can get in."

Bumgarner said that cyberspace has become a fully fledged front in national security, along with air, land, sea and space.

"The United States' digital footprint touches all across the world, just as theirs touches ours."

earlier related report
Growing threat from cyber attacks: US general
Washington (AFP) April 7 - Cyber attacks pose an increasingly serious and costly threat to US government and commercial networks, a US general warned on Tuesday.

The attacks range from relatively simple attempts by teenagers to highly sophisticated cyber assaults, General John Davis, deputy commander of the joint task force for global operations, told AFP.

Although there were safeguards for military networks, attacks on commercial networks also were cause for concern, Davis said.

"Even the indirect threat is of concern to us because a lot of our systems in the military ride over the commercial infrastructure," he said.

The Pentagon several months ago was faced with "a particular worm that was concerning us that intruded into our military networks," Davis said.

Last year the Defense Department prohibited the use of external computer flash drives to counter a virus threat.

The Defense Department spent more than 100 million dollars in the past six months reparing the damage done by the cyber attacks, said Davis by telephone from a conference in Nebraska.

The money was spent on technology and technicians -- including contractors -- to respond to the cyber attacks, he said.

As an example, he said cleaning up a single affected computer cost between 5,000 to 7,000 dollars.

But Davis said it was crucial to invest in preventing the cyber attacks instead of spending money afterward.

"It would be a much wiser investment of resources to do that in a pro-active manner so we were preventing these things from being able to get into our networks."

Davis welcomed plans presented Monday by Defense Secretary Robert Gates to fund an increase in cyber experts with stepped-up training efforts.

Under the secretary's recommendations, the Pentagon would aim to train 250 cyber experts a year instead of the current 80 students.

President Barack Obama has put a priority on cyber security and ordered an elaborate review of the issue.

A top US cybersecurity official quit last month, complaining in a resignation letter that US cyber protection efforts were flawed and dominated by the super-secret National Security Agency (NSA).

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Greater Transparency Needed In Development Of US Policy On Cyberattacks
Washington DC (SPX) May 01, 2009
The current policy and legal framework regulating use of cyberattack by the United States is ill-formed, undeveloped, and highly uncertain, says a new report from the National Research Council. The United States should establish clear national policy on the use of cyberattack, while also continuing to develop its technological capabilities in this area. The U.S. policy should be info ... read more


CYBER WARS
Earthshine Reflects Earth's Oceans And Continents From Dark Side Of Moon

Lunar Gardening - A Greenhouse On The Moon By 2014

NASA Moon Mission Brings Divergent Passions Together

Russia picking moon rocket design

CYBER WARS
Opportunity Brushing and Examining an Outcrop

Spirit Sets Distance Record For Five-Wheel Driving

Bright Soil Churned By Spirit's Sol 1861 Drive

Europe, Russia in Mars mission rehearsal

CYBER WARS
Astronaut Tweets Provide Inside Look At Hubble Training

Two-time space tourist returns to Earth

Economic crisis drives the mothers of invention

NASA inspector general resigns

CYBER WARS
China Able To Send Man To Moon Around 2020

China To Launch 15 To 16 Satellites In 2009

Macao Donates 14 Million Yuan To Mainland Space Program

Scholarships Established For Aerospace Research

CYBER WARS
Happy US-Russian crew deny 'divorce in space'

NASA to unveil space station name on Colbert show

Expedition 18 Crew Set To Return Home

Crews Prepare For Expedition 18 Departure

CYBER WARS
Europe sets May 6 for launch of Herschel, Planck telescopes

Russian launcher puts European telecoms satellite in orbit

Herschel And Planck Launch Update

Raytheon Introduces Rapidly Deployable Space Payload Design

CYBER WARS
Hubble Finds Hidden Exoplanet In Archival Data

Finding Twin Earths Is Harder Than We Thought

Starlight, Star Bright

Keck Teaming Up With Kepler To Find Other Earths

CYBER WARS
Key findings From The Fifth European Conference On Space Debris

Space debris: Europe to set up monitor in 'two or three years'

World's largest laser built in California

Northrop Grumman-Built Cryocooler Operational On Ibuki




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement