Hacker duo says: they hack for sake of US national security

A pair of hackers who has been penetrating U.S. government computer systems across the country said they’re trying to call attention to vulnerabilities in national security.

Analysts, however, say they’re probably nothing more than publicity seekers.

On April 24, the hackers, who call themselves the Deceptive Duo, said they “started their mission” of breaking into both government and private-sector computer systems. In an e-mail interview with Computerworld, they said their purpose was “to expose the lack of security within our government and other critical cyber components.”

They said they have hacked into classified and non-classified systems, including those operated by the office of the Secretary of Defense, the Space and Naval Warfare Systems Command, the Defense Logistics Agency, Sandia National Laboratories, NASA Jet Propulsion Laboratories, Midwest Express Airlines and a number of banks.

“We had access to data and Web servers which included things such as pictures from Operation Restore Hope [expanded peacekeeping operations in Somalia in the early 1990s] to the personal details of Department of Defense employees,” they said.

The hackers said they breached the systems in two ways: They got in through Microsoft Corp.’s SQL servers, which they said have a default password to login. Some system administrators didn’t change the default password when their databases were implemented and their systems went live, the duo said. They also got in through a NetBIOS Brute Force attack, a method in which the hackers repeatedly try to guess passwords to gain entry into a system that could exploit the NetBIOS protocol and allow access to sensitive data.

“Once information was acquired, we targeted an appropriate Web site to post the screenshots at. For instance, we posted the Defense Logistics Agency database on a Web site of the Office of the Secretary of Defense,” the hackers said in their e-mail.

Richard Williamson, a spokesman for the Space and Naval Warfare Systems Command, acknowledged that hackers gained access to the system through SQL because the agency had failed to change the default password and administrator’s user ID.

“We’re embarrassed. We didn’t change it. We made a mistake,” he said.

Williamson said the pair didn’t get access to any classified information. “It was information any taxpayer is entitled to,” he said.

The hackers, who wouldn’t reveal their ages, said they believed breaking into computer systems was the only way to get system administrators to take action to improve security.

“We must take drastic means for them to take this seriously,” they said. “When notifying a system administrator, the situation often times will get brushed away like it was nothing.”

The hackers said they have received e-mails from various system administrators of the penetrated computers and they fully cooperate with them in creating a more secure environment for their systems.

“If we did not, our mission would be incomplete,” they said.

Screenshots of the information obtained by the Deceptive Duo, including bank databases with customers’ personal information and bank account numbers, were posted at a security Web site.

Another database screenshot posted at the same Web site showed names, passport numbers and other personal information apparently gleaned from the U.S. Department of Defense’s Defense Logistics Agency.

Lisa Bailey, a spokeswoman for Milwaukee-based Midwest Express, confirmed the pair hacked into the airline’s computer system but only gained access to customer profiles.

“What they hacked into was not manifest information or anything like that,” she said. “There was no credit card information [taken].”

Eric Hemmendinger, an analyst at Aberdeen Group Inc. in Boston, said that although he didn’t know much about the Deceptive Duo, he believed they were probably “publicity hounds.”

Charles Kolodgy, an analyst at IDC, in Framingham, Mass., agreed. He said he didn’t believe the pair was on a mission to improve security.

“I think there might be a business reason behind this,” he said. “Maybe they’re trying to sell security products. And they probably just have too much time on their hands.”

Jennifer DiSabatino contributed to this report.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Previous article
Next article

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now