Cyber vandals hit DISA sites

In a two-day rampage against U.S. government Web sites, a group of cyber vandals dubbed PoizonB0x, attacked two sites maintained by the Defense Information Systems Agency, the organization tasked with defending military networks.

The attacks, which included the two Defense Department sites and nine U.S. government sites, were conducted May 24 and 25. The group also participated in an apparent multi-group attack on California state sites.

In a terse confirmation of the attack, a DISA spokeswoman replied, "Yes, two Defense Enterprise Computing Center publicly accessible Web sites were defaced. The group claiming responsibility was PoisonB0x." She added that no classified networks were infiltrated and that other than the defacements, no harm was done.

The two DOD Web sites belonged to DECCs in St. Louis and San Diego, according to information provided by Attrition.org, a group of volunteers who maintain a Web site that many information warriors in the military rely on for news and information about hackers. The information was confirmed by DISA.

PoizonB0x defaced nine other government Web sites, including:

The chief information officer of the General Services Administration. NASA's Advanced General Aviation Transport Experiments. The Arcata [Calif.] Fish and Wildlife Office. The U.S. Bankruptcy Court, Eastern District of California. The U.S. District Court, Northern District of Texas. The group also participated in what appeared to be a multi-group effort to deface California state government Web sites. Other groups said to be involved include Hi-Tech Hate and tty0, according to information provided by Attrition.

In each of the PoizonB0x attacks, the defacements consist of solid black backgrounds with large white letters stating that "PoizonB0x Wuz Here."

In response to e-mailed questions, a PoizonB0x representative said it was a "pice of cake," getting into DISA's systems and that they could have taken advantage of three or more other vulnerabilities. PoizonB0x said that DISA apparently was unaware of the penetration and that no harm was done other than the defacements.

"damage? nope, maybe coz i was a lil drunk and lazy, coz i think i could execute some viruses or backdoors there. i could also format all hdds and shutdown the system. and u know, i looked through almost all papers there and i did find them interesting. and, heh, i had an idea to edit some of 'em but i decided to leave the system," the representative said.

Featured

  • Defense
    Soldiers from the Old Guard test the second iteration of the Integrated Visual Augmentation System (IVAS) capability set during an exercise at Fort Belvoir, VA in Fall 2019. Photo by Courtney Bacon

    IVAS and the future of defense acquisition

    The Army’s Integrated Visual Augmentation System has been in the works for years, but the potentially multibillion deal could mark a paradigm shift in how the Defense Department buys and leverages technology.

  • Cybersecurity
    Deputy Secretary of Homeland Security Alejandro Mayorkas  (U.S. Coast Guard photo by Petty Officer 3rd Class Lora Ratliff)

    Mayorkas announces cyber 'sprints' on ransomware, ICS, workforce

    The Homeland Security secretary announced a series of focused efforts to address issues around ransomware, critical infrastructure and the agency's workforce that will all be launched in the coming weeks.

Stay Connected