Gang of hackers infiltrated Navy, other government and AT&T Uverse

A gang of 3 hackers were caught and have now been charged with conspiring to hack government computers.

A Wired story discusses the different hacks that occured:

1.  gang is accused of using SQL-injection hacks and other methods to gain access to various systems including ones belonging to the U.S. National Geospatial Intelligence Agency

the most interesting point is how they went about doing it:

first a member scanned Internet websites for security vulnerabilities on protected computers, and especially to government, military and critical infrastructure sites.

Second they exploited the vulnerability by using SQL injection, and obtained the database schema.

Third, a member then saved the data

Fourth, upload the data to cloud storage websites – placing the data for public to see.

Fifth, they then claimed credit for the hack

Some websites were shutdown in order to fix the problems.

This is the court document on the Wired site.

Useful weblinks

ARIN – American registry for Internet Numbers

Whois database

SANS – (SysAdmin, Audit, Networking, Security) A private company teaching the ins and outs of security

DIG – an excellent utility to check DNS (Domain name service on the net at

Virustotal – An excellent online malware analysis tool (wondering if a file has malware? upload and check.

ISC – Internet Storm Center , a daily update on Security concerns on the net (run by SANS)



More to come…

Cybersecurity Framework by NIST(National Institute of Standards and Technology)

NIST Cybersecurity framework pdf

The Framework Core consists of
five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover.

This Framework is designed to protect critical infrastructure of the United States (utilities, police, fire, and other government functions)

Small business owners can learn some things as to what to do in the primary function of the framework: to Identify your risk and develop organizational understanding to handle this.



It seems that this framework is not very specific, and may be helpful to some companies which have not put the time into making Cybersecurity a priority.

New Internet Explorer vulnerability Microsoft confirms

This is considered  client side vulnerability.

Where the user on their computer can click on a webpage or link using Flash and then the system will be compromised (a malware would kick off and the system will do the master program bidding).

this is a good reason why I use Chrome  and firefox to reduce some exposure liability.

KrebsonSecurity has some more info.