Hackers target government holes

Global threats such as the Blaster and SQL Slammer worms batter government network defenses as much as those in the commercial arena, but attacks that actually penetrate the network are focused on perceived weaknesses in Web-based applications, according to a Symantec Corp. report.

Based on an analysis of data produced in the last six months of 2003, Symantec officials believe the problem could be due to a greater use of file-sharing applications within government, as opposed to industry.

Globally, there is a bigger mixture of different kinds of attacks, according to Oliver Friedrichs, a senior manager at Symantec. In the last half of 2003, eight of the top 10 attacks on government were related to Web servers or Web-based applications.

"It's the most dominant threat by far," Friedrichs said. "In contrast, threats such as those posed by the Blaster worm and others seem to be adequately blocked by [perimeter] firewall systems."

Using data provided by sensors deployed throughout the government, Symantec officials concluded that TCP ports 6346 and 4662, which are typically used by peer-to-peer file-sharing networks, were targeted much more frequently by attacks against government systems than for other systems around the globe.

That apparently means that attackers believe there are potentially vulnerable Web applications deployed in the government sector, Symantec officials said.

There's been a constant evolution in such Web-based applications and technologies, Friedrichs said, but that also means they are that much more complex "so there's greater potential for more security problems."

That only points out the need to focus even more attention on the security needs of Web-based systems, he said.

Brian Robinson is a freelance journalist based in Portland, Ore. He can be reached at hullite@mindspring.com.

About the Author

Brian Robinson is a freelance writer based in Portland, Ore.

Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.