All the latest UK technology news, reviews and analysis

Hackers infiltrate US government nuclear network

01 Oct 2012
Garden view of the front of the White House

Some of the US government's most sensitive networks were reportedly infiltrated by hackers, in a worrying development in the escalating ‘cyber war' taking place between nations.

According to US website FreeBeacon, the attack was instigated by Chinese attackers and infiltrated several aspects of its network, including the system used by the White House Military Office for nuclear commands.

A subsequent statement given to appeared to tacitly confirm the attack, although did not make any direct reference to China and played down the extent of the threat to the nation.

"This was a spear phishing attack against an unclassified network," a White House official was reported to have said.

"These types of attacks are not infrequent and we have mitigation measures in place."

The use of a spear phishing attack would have meant a member of the White House staff was tricked into opening an email with a malicious attachment or link.

This would have given the sender of the email access to their machine and the network on which it is hosted.

Director of security research at Trend Micro, Rik Ferguson, told V3 the use of a spear phishing attacked underlined that an organisation's security was only as strong as the people using its systems.

"People continue to represent the weakest link in the security chain and a patient attacker can almost always find enough background information online to make an attack both credible and ultimately, successful," he said.

"As long as the mail can be made credible enough to appeal to its intended target, perhaps referencing colleagues, real events and including a (malicious) attachment that really does contain data of interest to the target then the attack is likely to succeed."

Ferguson also noted that a similar attack on the Oak Ridge Nuclear Laboratory led to a similar breach in 2011.

Cyber warfare and government espionage are increasing all the time as nations look for new ways to gather information on their economic and political rivals.

The US and Israel have been accused of developing the Stuxnet and Flame malware programmes used to impede Iran's nuclear development programme

Furthermore, tensions between the US and China in the realm of cyber spying are already high as the US government has also put a ban on Chinese vendor Huawei from selling in the nation.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Government
What do you think?
blog comments powered by Disqus

IT curriculum poll

With coding now compulsory in schools, how important are digital skills for the next generation of school leavers?

Popular Threads

Powered by Disqus
V3 Security Summit

V3 Security Summit Day 2: Botnet, skills and BYOD intelligence incoming

Keep V3 bookmarked for news updates on all the key security concerns and topics facing businesses

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging


Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Cloud Design/Implementation - AWS/Azure

The Cloud Design/Implementation - AWS/Azure will be required...

Onboarding Specialist - (Financial Services)

Onboarding Specialist - (Financial Services) Onboarding...

Senior SAP Deployment Architect (12-24 Month)

Senior SAP Deployment Architect - World Wide Travel...

Service Desk Analyst

My client are currently seeking a service desk analyst...
To send to more than one email address, simply separate each address with a comma.