text
stringlengths
4
429
Foreign Minister and Defence Minister. (Benson,
2011)
4 The Stuxnet worm is a malicious computer program capable of
replicating itself to infect multiple linked computer systems.
PAGE 4 OF 13
COPYRIGHT
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
15 March 2011
Comodo Affiliated Root Authority
26 May 2011
Northrop Grumman
A Comodo affiliated digital certificate Root Authority
(RA) was compromised resulting in the issue of
fraudulent SSL certificates for the popular domains:
mail.google.com, www.google.com, login.yahoo.com,
login.skype.com, addons.mozilla.org, login.live.com
and global trustee. (Comodo, 2011)
Northrop Grumman reportedly shut down remote
access to its network without warning and
conducted an organisation wide password reset,
raising speculation that it had also been targeted
using information stolen from RSA. (Kaplan, 2011)
17 March 2011
RSA
RSA released a public statement advising that they
were recently targeted via socially engineered
emails containing malicious attachments that
exploited a zero day Adobe Flash vulnerability.
Hackers successfully gained access to the network
and exfiltrated information including that related to
s SecurID two
factor authentication products.
The stolen information was later used to enable
targeting of defence contractors. (Coviello, Open
Letter to RSA Customers, 2011)
June 2011
International Monetary Fund
At least one International Monetary Fund (IMF)
computer was compromised in a large and
sophisticated cyber attack that involved significant
reconnaissance and utilised software written
specifically to target the IMF. The compromised
computer was used to access internal systems and
files. The hackers
access could have given them
visibility of sensitive economic and political
information. (Reddy, Gorman, & Perez, 2011; Sanger
& Markoff, 2011) (The Guardian, 2011)
Mid April 2011
Oak Ridge National Laboratory
Oak Ridge National Laboratory was targeted with
socially engineered emails tailored to appear as
though they were from the laboratory
s Human
Resources department. The emails tricked recipients
into downloading malicious software that exploited
a zero day vulnerability in Internet Explorer. The
laboratory shut down all internet access and email
systems from April 15 to April 17 to ensure no data
was exfiltrated before the infection could be cleaned
up. No large scale exfiltration of data is known to
have occurred. (Munger, 2011)
6 April 2011
3 Communications
An L
3 Communications executive notified
employees that the company had been actively
targeted leveraging information stolen from RSA the
month prior. (gHale, 2011) (Poulsen, 2011)
21 May 2011
Lockheed Martin
Lockheed Martin detected a cyber attack on its
computer network. The company
s information
security team took aggressive actions to protect the
systems. No exfiltration of data is known to have
occurred. RSA has publicly stated that information
stolen from it in March was used as an element of
the attack on Lockheed Martin. (Lockheed Martin
Corporation, 2011) (Coviello, Open Letter to RSA
SecurID Customers, 2011)
PAGE 5 OF 13
COPYRIGHT
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
THE CURRENT CYBER THREAT ENVIRONMENT
APTs have targeted governments around the world,
global oil, energy, and petrochemical companies, the
mining sector, financial institutions, military
contractors, the science and technology sector,
dissidents, critical infrastructure and likely many
additional sectors. They have also targeted
technology companies that could enable future
targeting. The Operation Aurora attacks, the Comodo
affiliated RA compromise and the RSA attack set a
precedent for such targeting.
are the most common social engineering technique
used but not the only one. Secondly, it tells us
technology companies need to be better prepared to
protect sensitive information that can be used to
negatively affect the security of their customers and