Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Wednesday July 16 2014, @07:39PM   Printer-friendly
from the blame-canada-^W-china dept.

After years of cyberattacks on the networks of high-profile government targets like the Pentagon, Chinese hackers appear to have turned their attention to far more obscure federal agencies.

Law enforcement and cybersecurity analysts in March detected intrusions on the computer networks of the Government Printing Office and the Government Accountability Office, senior American officials said this week.

The printing office catalogs and publishes information for the White House, Congress and many federal departments and agencies. It also prints passports for the State Department. The accountability office, known as the congressional watchdog, investigates federal spending and the effectiveness of government programs. From the article:

The attacks occurred around the same time Chinese hackers breached the networks of the Office of Personnel Management, which houses the personal information of all federal employees and more detailed information on tens of thousands of employees who have applied for top-secret security clearances.

Some of those networks were so out of date that the hackers seemed confused about how to navigate them, officials said. But the intrusions puzzled American officials because hackers have usually targeted offices that have far more classified information.

It is not clear whether the hackers were operating on behalf of the Chinese government. But the sophisticated nature of the attacks has led some American officials to believe that the government, which often conducts cyberattacks through the military or proxies, played a role.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Thursday July 17 2014, @03:48AM

    by Anonymous Coward on Thursday July 17 2014, @03:48AM (#70100)

    > Would you download or trust a patch downloaded or delivered from/by the NSA? A lot of people/countries wouldn't.

    Well, now that they ruined their reputation, no.

    But it isn't about end-users installing patches from the NSA, but rather them finding holes and instead of hoarding them as zero-days, submitting bug reports to developers. They can certainly do other work too, but there is plenty that doesn't carry a risk of compromise.