1 / 5

By Blake Eifling

Cyber-Attack On Department Of Defense. By Blake Eifling. Suumary. agent.btz Worm. Agent.btz is not a new virus Origin of virus is unclear Worm virus – Virus that self-replicates to other programs and systems. Agent.btz has the ability to spread through shared drives.

kimama
Download Presentation

By Blake Eifling

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber-Attack On Department Of Defense By Blake Eifling

  2. Suumary

  3. agent.btz Worm • Agent.btz is not a new virus • Origin of virus is unclear • Worm virus – Virus that self-replicates to other programs and systems. • Agent.btz has the ability to spread through shared drives. “..when a clean computer attempts to map a drive letter to a shared network resource that has Agent.atz on it and the corresponding autorun.inf file, it will (by default) open autorun.inf file and follow its instruction to load the malware. Once infected, it will do the same with other removable drives connected to it or other computers in the network that attempt to map a drive letter to its shared drive infected with Agent.atz – hence, the replication.” http://www.napera.com/blog/?p=202

  4. Comments/Quotes “ How do we know that it's not retaliation for an attack on Russian computers that originated from US military networks? “ “I'm not sure it matters. Whether US military computers were choosing to load and execute foreign code as a result of a foreign first strike, or a foreign counter-attack, we still have the situation that US military computers are loading and executing untrusted code, and apparently unsandboxed, so that it ended up mattering. No matter why the military computers were attacked, the fact that the attack worked proves incompetence. ” “ This is taking place during the transition between Administrations, so someone at the DoD hierarchy wants to make a show about how they are "protecting America" when everyone in the commercial sector dealt with the agent.btz trojan quietly months ago. “ “ I wouldn't put it past the MIC to exaggerate the risk of electronic attacks in order to manipulate the public. it certainly wouldn't be the first time the public was mislead about our nation's defense in order to funnel tax dollars into unnecessary defense projects. “

  5. Discussion Questions

More Related