The Mil & Aero Blog
Thursday, March 5, 2009
  Hijacked by hackers

Posted by Courtney E. Howard

It can happen to you. You could unwittingly be made a pawn in a cyber-attack, or worse: unknowingly become a cyber attacker. Most any computer -- whether a desktop/laptop PC or server -- can be hijacked by hackers. It could then be used as a weapon.

Saturday night, while I was enjoying the company of friends and some adult beverages, a call came in on a friend's cell. Now, it should be said that he is a brilliant, experienced systems and software engineer, and his partner is none too shabby either. Even so, one of their systems fell victim to hackers. In truth, it is likely more appropriate to call it a pawn, rather than a victim. You see, someone else's system was the real target (and subsequent victim).

No critical or classified information was compromised; rather, hackers took control of multiple systems, of which my friends was one, to perform a DDOS (distributed denial of service) attack on a system in the Pacific rim.

It was not as dramatic as I might make it sound, but it was an awakening. My friend was understandably tight-lipped, so I do not know the specifics around his electronics being hijacked; however, a quick check of the DDOS wiki gives me a general idea about how it happens.

Hackers can invade other people's computers (which I fondly refer to as OPCs). They find a vulnerability and secretly install a code, a script, or a program. The program can also come in through any number of methods, by e-mail, on a thumb drive, via poor password complexity, an even from a Website that can execute script.

The computer acts normally, until the hacker remotely activates the program, say. It then uses the computer/server's Internet connection to send a very large quantity of small packets of information -- tons of those, in fact -- to a target system/destination (or, more specifically, an IP).

The moral of the story? Keep an eye on your system and your information. Keep it all locked down. Keep your firewall on, and your operating system updated. IT personnel in charge of an entire organization’s systems and their information security (especially if that organization is part of or does any business with the Department of Defense) really have their work cut out for them. They have to keep tabs on virtually everyone and everything their colleagues do, and prevent them from surfing questionable Web sites, opening suspicious e-mail attachments, plugging thumb drives or MP3 players with flash memory into computer systems, and much, much more -- well, either that, or invest in a secure RTOS (real-time operating system), such as those you can read about in the pages of Military & Aerospace Electronics. Anyone think a secure RTOS can be compromised? Some believe nothing is safe in this digital age.
Comments: Post a Comment

Subscribe to Post Comments [Atom]

Links to this post:

Create a Link

<< Home
The MAE editorial staff uses the Military Aerospace and Electronics Blog to share ...

November 2007 / December 2007 / January 2008 / February 2008 / March 2008 / April 2008 / May 2008 / June 2008 / July 2008 / August 2008 / September 2008 / October 2008 / November 2008 / December 2008 / January 2009 / February 2009 / March 2009 / April 2009 / May 2009 / June 2009 / July 2009 / August 2009 / September 2009 / October 2009 / November 2009 / December 2009 / January 2010 / February 2010 / March 2010 / April 2010 / May 2010 / June 2010 / July 2010 / August 2010 / September 2010 / October 2010 / November 2010 / December 2010 / January 2011 / February 2011 / March 2011 / April 2011 / May 2011 / June 2011 / July 2011 / August 2011 / September 2011 / October 2011 / November 2011 / December 2011 /

Powered by Blogger

Subscribe to
Posts [Atom]