US weapons systems can be ‘easily hacked’

Forums Security News (Security) US weapons systems can be ‘easily hacked’

  • This topic has 1 voice and 0 replies.
Viewing 0 reply threads
  • Author
    Posts
    • #25711
      TelegramGroup IoTForIndia
      Moderator
      • Topic 2519
      • Replies 0
      • posts 2519
        @iotforindiatggroup

        #News(Security) [ via IoTForIndiaGroup ]

        [ Editors comment: So much noise that cheap china devices are faulty. ITS THE EXPCTATION OF SECURTIY IN DAY TO DAY WORK. It does not happen….Human nature Look at IoTWiki:FreshThinking ]


        The Government Accountability Office (GAO) found “mission-critical” cyber-vulnerabilities in nearly all weapons systems tested between 2012 and 2017.

        That includes the newest F-35 jet as well as missile systems.

        In the report, Pentagon officials said they “believed their systems were secure”, NPR reported.

        The committee’s members expressed concerns about how protected weapon systems were against cyber-attacks.

        The report’s main findings were:

        The Pentagon did not change the default passwords on multiple weapons systems – and one changed password was guessed in nine seconds
        a team appointed by the GAO was able to easily gain control of one weapons system and watch in real time as the operators responded to the hackers
        it took another two-person team only one hour to gain initial access to a weapons system and one day to gain full control
        many of the test teams were able to copy, change or delete system data with one team downloading 100 gigabytes of information
        The GAO added that the Pentagon “does not know the full scale of its weapons system vulnerabilities”.

        The Pentagon has not issued a detailed response to the 50-page report but the document quoted officials as saying that some of the security test results “were unrealistic”.

        Ken Munro, an expert at security firm Pen Test Partners, said he was “not at all surprised” by the findings.

        “It takes a long time to develop a weapons system, often based on iterations of much older systems. As a result, the components and software can be based on very old, vulnerable code.

        “Developers often overlook ‘hardening’ the security of systems after they’ve got them operating, with the philosophy, ‘it’s working, so don’t mess with it’.

        “However, that’s no excuse. This report shows some very basic security flaws that could easily have been addressed by changing passwords and keeping software up-to-date.”


        Read More..

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.