Categories: Cyber warfare

Pentagon confirms that missile defenses are vulnerable to cyber attack

The Director of the Pentagon’s Missile Defense Agency reported to the Congress that missile defenses of the US military are vulnerable to cyber attacks.

The Director of the Pentagon’s Missile Defense Agency reported to the Congress last week that missile defenses deployed by the US Army are vulnerable to cyber attacks. Security experts are aware that every system could be affected by several flaws exploitable in a cyber attack, but we are led to believe that the defense systems in the military are more reliable and robust for obvious reasons.

The Director has confirmed that a cyber attack could disrupt the sophisticated networks of sensors and guidance systems use in missile defenses to target enemy missiles. The first question that everyone has in mind is “How is it possible?”, in military industry the security by design is one of the fundamentals and it is very difficult for common people to imagine a so disconcerting scenario.

During a Senate defense appropriations subcommittee hearing June 11, Sen. Jack Reed, (D-RI) asked MDA Director Vice Adm. James Syring how vulnerable are the communications links between radar, satellites and other sensors to cyber attacks.

“How vulnerable are those external sources to cyber attack so that someone contemplating a launch would first conduct a cyber-interruption of your guidance systems?” Reed asked.

“Sir, we’ve looked at that. I’d like to take that to a classified session,”Syring said.

“It’s a serious concern?”

Reed asked.“Yes, sir,” Syring replied.

Syring’s words are alarming, Earlier, Lt. Gen. David Mann, commander of the Army Space and Missile Defense Command, confirmed the possibility of a cyber attack:

wha“t we’re looking at internally is in terms of cyber and what can we do to make sure that we, first, identify vulnerabilities, but also put in place our ability to put up that shield, that wall” against cyber attacks.” Mann said.

Countries like Russia and China are considered the principal threats for US industries, including Defense. In February US Intelligence officials announced that foreign spying are the No. 2 danger facing the country, cyber espionage conducted by State-sponsored hacking could give to the attacker a strategic advantage also in the hacking of military systems like missile defenses.

Mann also explained that  US Defense is aware that foreign governments are conducting many campaign to find a hole within the security of strategic offensive ballistic missiles.

“We’re looking at that very, very hard, a lot of red-teaming going on,” “And I think you know that there’s a lot of countries out there that are continuously, on a daily basis, trying to access different networks.” Mann added.

To respond cyber threats that are even more sophisticated the US Defense must continuously audit its infrastructures and system to find potential flaw and harden the environment.

Mann added that “we’re continuously looking at our different architectures and what needs to be done to harden them against cyber, because I think that’s — quite frankly, that’s the biggest threat that we have right now to our systems, is the impact of cyber.”

The menace to defense networks is not a new issue, the economic crisis and cuts to the budget for the Defense led experts fearing the Department of Defense’s computer networks may be more exposed to the risk of a major cyber attack.

In 2008, attackers successfully breached the U.S. Central Command in Afghanistan with an infected flash drive as an attack vector, in that circumstance The Pentagon has not disclosed information on the nature and the volume of the stolen data.

In 2011, “In a single intrusion this March, 24,000 files were taken,” former Deputy Defense Secretary William J. Lynn III said in a speech in July 2011.

The above cases are just a few examples of targeted attacks, in the majority of cases bad actors target employees of a defense contractor to collect sensitive information, a consolidated strategy adopted by almost every ATP.

Pierluigi Paganini

(Security Affairs –  missile defenses , US Military)0

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

26 minutes ago

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

58 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

This website uses cookies.