Site icon The Punching Bag Post

Massive Cybersecurity Breach, NSA Software Compromised

<p>Looks like Hillary&rsquo&semi;s server isn&rsquo&semi;t the only threat to national security these days&period;&nbsp&semi;A recent discovery suggests the National Security Agency &lpar;NSA&rpar; may have been using compromised software for as many as three years &ndash&semi; potentially exposing sensitive information to foreign spies&period;&nbsp&semi;<&sol;p>&NewLine;<p>NSA software has been blamed for the problem&comma; with experts claiming that a defect originated from an encryption &ldquo&semi;back door&rdquo&semi; hidden within the code&period; This vulnerability was discovered in December when IT company Juniper Networks &lpar;which makes IT products for the government&rpar; reported unauthorized code in its ScreenOS program&period;&nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;There&rsquo&semi;s a lot of very sketchy stuff here&comma;&rdquo&semi; said cryptology expert Matthew Green&period; Green has been working furiously to reverse-engineer the code&period;&nbsp&semi;<&sol;p>&NewLine;<p>Experts agree the code was&nbsp&semi;altered intentionally&period; Juniper acknowledged that this alteration could give hackers the ability to infiltrate NSA files&period;&nbsp&semi;Its like &ldquo&semi;stealing a master key to get into any government building&comma;&rdquo&semi; said one government official&period; &ldquo&semi;It&rsquo&semi;s a very serious problem&comma;&rdquo&semi; added Senator Ron Johnson &lpar;R-WI&rpar;&period; &ldquo&semi;It affects everybody&rsquo&semi;s IT systems&period;&rdquo&semi;&nbsp&semi;<&sol;p>&NewLine;<p>A foreign government is likely behind the software flaw&period; The ability to turn NSA&rsquo&semi;s code into a operable back door would require expert hacking abilities as well as the infrastructure to spy on encrypted traffic&period;&nbsp&semi;&ldquo&semi;Very few people outside of nation states have both of those things&comma;&rdquo&semi; said Green&period;&nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;Once adversaries get into a network&comma; they&rsquo&semi;re often able to move laterally&comma;&rdquo&semi; explained former assistant secretary of Defense Paul Stockton&period; Juniper has relied on this particular software since 2013&comma; meaning our enemies could have had years to steal national security secrets and design future attacks&period;&nbsp&semi;<&sol;p>&NewLine;<p>This threat is particularly frustrating because it could have been avoided&period; Security experts say that hackers were likely aided by a glitch in the encryption algorithm that was planted there by the NSA&period;&nbsp&semi;Some suspect the algorithms contained &ldquo&semi;hidden doors&rdquo&semi; that could be used for surveillance purposes&period; The documents leaked in 2013 by former NSA contractor Edward Snowden confirm these suspicions&period;&nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;That pretty solidly pointed the finger at these algorithms having been tampered with or made vulnerable by the NSA&comma;&rdquo&semi; Green said&period;<&sol;p>&NewLine;<p>Juniper has since announced that it will no longer be relying on the NSA-developed encryption algorithm in question&period; This is a considerable blow to the NSA &ndash&semi; an organization that in recent years has been viewed as a sort of standard-bearer in regards to security technology&period;<&sol;p>&NewLine;<p>Meanwhile&comma; the House Oversight Committee is leading an investigation into the suspicious defect&period; The committee&rsquo&semi;s main concern is that the &ldquo&semi;back door&rdquo&semi; has yet to be locked&period; Government agencies are busy scanning data to see what may have been hacked&comma; but the months-long process is frustrating&period;&nbsp&semi;They are &ldquo&semi;dragging their feet&comma;&rdquo&semi; complained Rep&period; Will Hurd &lpar;R-TX&rpar; of the Oversight Committee&period; &ldquo&semi;If government systems have yet to be fixed&comma; then adversaries could still be stealing sensitive information crucial to national security&comma;&rdquo&semi; he wrote in the <em>Wall Street Journal&period;&nbsp&semi;<&sol;em>&ldquo&semi;The Department of Homeland Security is furiously working to determine the extent to which the federal government used ScreenOS&period; But Congress still doesn&rsquo&semi;t know the basic details of the breach&period;&rdquo&semi;<&sol;p>&NewLine;<p>Other lawmakers haven&rsquo&semi;t even heard about the breach&period;&nbsp&semi;Federal agencies have until February 4th to respond to the Oversight Committee&rsquo&semi;s questions about the software flaw&period; When the response is received&comma; the committee will determine whether or not to hold an open hearing on the issue&period;&nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;This is certainly something that we&rsquo&semi;ve got to be aware of and see what comes to light&comma;&rdquo&semi; said Johnson&period;&nbsp&semi;No matter what Congress does&comma; however&comma; it can&rsquo&semi;t overcome the difficulty of tracking a hacker&period; Expert hackers&nbsp&semi;are skilled enough to &ldquo&semi;hide their tracks and to clean up after themselves&comma;&rdquo&semi; said Stockton&period;&nbsp&semi;This means the software glitch could provide hackers with a virtually undetectable and persistent presence in NSA networks&period;<&sol;p>&NewLine;<p>&nbsp&semi;<&sol;p>&NewLine;<p>&nbsp&semi;<&sol;p>&NewLine;

Exit mobile version