Home Tech Everyday Tech Hacker Who Cracked US Military Unable to Sell Secrets

Hacker Who Cracked US Military Unable to Sell Secrets

An amateur South American hacker stumbled onto sensitive information about U.S. military assets. However, lack of experience made the hacker quote a ridiculously low sum for the information, while also making him a target of the U.S. security establishment.

Contacting the hacker

Recorded Future’s analyst team, the Insikt Group, had embedded themselves into the dark web forums and had come into contact with a hacker who was offering sensitive U.S. military secrets for about US$150.

The information on offer included the list of airmen who were assigned to a particular Reaper drone unit, a manual that described how to maintain the MQ-9A Reaper drone, a manual about the M1 Abrams tank, and several manuals that detailed ways to suppress explosive devices.

In addition, the hacker also claimed to have hacked into the surveillance cameras of several NASA bases as well as cameras along the U.S.-Mexico border. He also claimed to have footage of a Predator remotely piloted aircraft that flew over the Gulf of Mexico.

Among the items on offer was footage of a Predator remotely piloted aircraft flying over the Gulf of Mexico. (Image: wikimedia / CC0 1.0)
Among the items on offer was footage of a Predator remotely piloted aircraft flying over the Gulf of Mexico. (Image: wikimedia / CC0 1.0)

Inexperienced hacker

According to Insikt, the inexperienced hacker had no clue as to the value of the materials he had in his possession. And this is why he asked for the ridiculously low sum of US$150 for it. The hacker was also willing to provide samples of the materials as proof that it was actually taken from the U.S. military servers.

Andrei Barysevich, a researcher with Recorded Future, got in touch with U.S. officials and warned them about the leak. And since the hacker had not actually downloaded the data, but had only broken into the servers, the U.S. officials were able to prevent a leak by disconnecting the vulnerable servers and cutting off any chances for the hacker to access the information again. Andrei believes that the only reason the hack did not turn out to be a major breach of U.S. military secrets was due to the inexperience of the hacker.

“The fact that a single hacker with moderate technical skills was able to identify several vulnerable military targets and exfiltrate highly sensitive information in a week’s time is a disturbing preview of what a more determined and organized group with superior technical and financial resources could achieve,” he said in an interview with Vice. The U.S. security establishment is currently keeping tabs on the hacker.

Many of the users do not realize the importance of using strong passwords and securing their wireless network, which literally opens the device for attack. (Image via pixabay / CC0 1.0)
Many of the users do not realize the importance of using strong passwords and securing their wireless networks, which literally leaves the device open for attack. (Image via pixabay / CC0 1.0)

The vulnerability

So, what was the vulnerability in U.S. systems that allowed the hacker to break into the servers? The answer lies in a pretty simple flaw in the Netgear routers discovered in 2016. The vulnerability allowed hackers to access any files they wanted as long as the device’s user password was outdated. And despite several attempts by Netgear, the problem persisted.

Senior product security program manager Lisa Napier told The Daily Beast: “Netgear has previously released firmware that fixes this issue… We ensure that remote services are disabled by default, and passwords are required to be configured at device setup.”

It is estimated that almost 4,000 devices are currently vulnerable to the exact same attack launched by the hacker. And a large number of these devices are used by U.S. government employees. Unfortunately, many of the users of these devices do not realize the importance of using strong passwords and securing their wireless network. This literally leaves the device open for attack by even amateur hackers who only need to apply a brute force method to find valuable data so as to exploit it.

Follow us on Twitter or subscribe to our weekly email

Vision Times Staff
Vision Times is a kaleidoscopic view into the most interesting stories on the web. We also have a special talent for China stories — read About Us to find out why. Vision Times. Fascinating stuff.

Most Popular

Why an American Pastor Converted his Church into a ‘Strip Club’

Rob McCoy, a senior pastor at the Godspeak Calvary Chapel, recently garnered attention through a ridiculous and satirical act, turning his church into a...

Plant Evolves to Become Less Visible to Humans

A plant used in traditional Chinese medicine has evolved to become less visible to humans, new research shows. Scientists found that Fritillaria delavayi plants, which live on...

WHO Stops Censoring the Word ‘Taiwan’ Following Internet Backlash

The World Health Organization (WHO) recently activated a filter on its Facebook page that blocked words like "Taiwan" and "China." After netizens criticized the...

How to Dress Warm in Winter

Winter will be hitting America within the next few weeks. The way you dress will inevitably have to change so as to protect your...