Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

Major Geeks.com- Feel the Geek.. BE the Geek!

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » October 2012 » White House Cyberattack Likely Won't Change Anything

White House Cyberattack Likely Won't Change Anything


Contributed by: Email on 10/01/2012 03:41 PM [ comments Comments ]


So now it's the White House's turn. Having taken a swing at just about every other piece of the U.S. government's network infrastructure, attackers, reportedly based in China, recently targeted a machine on an unclassified network inside the White House Military Office and were able to compromise it through a spear-phishing attack. The attack has drawn a lot of attention, as stories that include the words "White House" and "attack" do, but the notion that this attack may be the one that finally forces the U.S. to address the threat from foreign attacks is misguided.

The White House's networks, like every other network owned by the federal government, is under continuous attack. The machines on those networks, whether classified or unclassified, are viewed as high-value targets and as a way into the broader government infrastructure as a whole. So attackers do what they do, and go after those targets. We don't know how often they succeed, nor do we know how they succeed when they do get in. And so hearing publicly about a successful intrusion on the White House's network is a rare event.

The story of the compromise, first reported by a conservative site called The Washington Free Beacon, reads like the account of so many other intrusions at high-profile organizations in the last few years. A spear-phishing attack, an exploit and a compromised PC. Job done. The folks at RSA can relate to that scenario, as can security officials at a variety of banks, software companies and defense contractors. Boring, sure, but quite successful. This time, the attack on the White House network didn't result in any lost data and the attackers never had access to any classified machines, according to Politico.

These attacks, and other much more sophisticated ones, have been banging up against government networks since there were government networks to break into. Most recently, a lot of the organized, long-term campaigns have been tied to attackers from China, whether they're state-sponsored groups or freelance crews working for a specific client. Security researchers have said there are two main groups of attackers operating in China that are consistently targeting U.S. assets, both in the private sector and the government. Security officials inside the government are well aware of this situation and know where the majority of the attacks are coming from and what the attackers are after. They know what's happening, as do people at the highest level of the administration.

The attackers have gone after military secrets, corporate intellectual property, financial information and anything else that has economic or political value. They've succeeded many times and failed other times, but the attacks continue unabated.

So what's different about the attack on the White House? Nothing.

It stands out because it's the White House and because government officials are talking about it (off the record, of course). But there is little evidence to suggest that this attack could be the one to send politicians and administration officials over the edge to start demanding answers or accountability from China. The problem is that these attacks aren't done as one-offs or on a whim. They're part of a long-term campaign with goals, division of labor and serious financial backing. This is not something that anyone is going to give up at the first sign of diplomatic anger.

It's the equivalent of the years or decades-long espionage operations that have been run by intelligence services for hundreds of years. Technology simply has made the job easier and less dangerous.






« The 10 Dumbest -Tober Themed Event Names · White House Cyberattack Likely Won't Change Anything · National Grid security boss's laptop stolen »




Comments
comments powered by Disqus

MajorGeeks.Com » News » October 2012 » White House Cyberattack Likely Won't Change Anything

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition