Moonlight Maze

Starting in 1998,
U.S. government officials began noticing a pattern of probes into various
government networks, including the Pentagon, NASA, universities, research
institutions and the Department of Energy. Evidently, hackers – believed to be
located in Russia – had compromised these networks and left backdoors through
which they could secretly slip at a later time. The targets of these intrusions
were mostly unclassified but sensitive information such as military hardware
design plans, maps of military bases, and troop arrangements.

Starting in 1998,
U.S. government officials began noticing a pattern of probes into various
government networks, including the Pentagon, NASA, universities, research
institutions and the Department of Energy. Evidently, hackers – believed to be
located in Russia – had compromised these networks and left backdoors through
which they could secretly slip at a later time. The targets of these intrusions
were mostly unclassified but sensitive information such as military hardware
design plans, maps of military bases, and troop arrangements. The probes may
have gone on for as long as three years, making it the longest known sustained cyber-attack
on the U.S. and revealing serious lapses in U.S. cyber defense.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.

Discussion

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.