Cyber vandals hit DISA sites

In a two-day rampage against U.S. government Web sites, a group of cyber vandals dubbed PoizonB0x, attacked two sites maintained by the Defense Information Systems Agency, the organization tasked with defending military networks.

The attacks, which included the two Defense Department sites and nine U.S. government sites, were conducted May 24 and 25. The group also participated in an apparent multi-group attack on California state sites.

In a terse confirmation of the attack, a DISA spokeswoman replied, "Yes, two Defense Enterprise Computing Center publicly accessible Web sites were defaced. The group claiming responsibility was PoisonB0x." She added that no classified networks were infiltrated and that other than the defacements, no harm was done.

The two DOD Web sites belonged to DECCs in St. Louis and San Diego, according to information provided by, a group of volunteers who maintain a Web site that many information warriors in the military rely on for news and information about hackers. The information was confirmed by DISA.

PoizonB0x defaced nine other government Web sites, including:

The chief information officer of the General Services Administration. NASA's Advanced General Aviation Transport Experiments. The Arcata [Calif.] Fish and Wildlife Office. The U.S. Bankruptcy Court, Eastern District of California. The U.S. District Court, Northern District of Texas. The group also participated in what appeared to be a multi-group effort to deface California state government Web sites. Other groups said to be involved include Hi-Tech Hate and tty0, according to information provided by Attrition.

In each of the PoizonB0x attacks, the defacements consist of solid black backgrounds with large white letters stating that "PoizonB0x Wuz Here."

In response to e-mailed questions, a PoizonB0x representative said it was a "pice of cake," getting into DISA's systems and that they could have taken advantage of three or more other vulnerabilities. PoizonB0x said that DISA apparently was unaware of the penetration and that no harm was done other than the defacements.

"damage? nope, maybe coz i was a lil drunk and lazy, coz i think i could execute some viruses or backdoors there. i could also format all hdds and shutdown the system. and u know, i looked through almost all papers there and i did find them interesting. and, heh, i had an idea to edit some of 'em but i decided to leave the system," the representative said.


  • Workforce
    White House rainbow light shutterstock ID : 1130423963 By zhephotography

    White House rolls out DEIA strategy

    On Tuesday, the Biden administration issued agencies a roadmap to guide their efforts to develop strategic plans for diversity, equity, inclusion and accessibility (DEIA), as required under a as required under a June executive order.

  • Defense
    software (whiteMocca/

    Why DOD is so bad at buying software

    The Defense Department wants to acquire emerging technology faster and more efficiently. But will its latest attempts to streamline its processes be enough?

Stay Connected