Cybersecurity

Naval Research Lab hit by zero-day exploit

Photo credit: U.S. Naval Research Laboratory

Capt. Mark Bruington said a recent zero-day attack on the Naval Research Lab's unclassified network "shows that everybody can be a target."

The Naval Research Laboratory was recently hit by an attack exploiting a previously unknown software vulnerability, said Commanding Officer Capt. Mark Bruington. The zero-day attack on NRL's unclassified network "became almost a science experiment unto itself" in that it was a teachable moment for network defenders, Bruington said Dec. 3 at a National Defense Industrial Association event in Washington.

NRL has cleared the vulnerability from its network, Bruington told FCW. He would not say how long that took or when the breach occurred, only that it was recent, and he added that NRL did not receive help from industry to diagnose and resolve the breach.

"It just shows that everybody can be a target, obviously -- especially places of industry and academic institutions," Bruington said during his remarks.

The Navy has been scarred by another breach, in 2013, of the unclassified portion of the massive Navy Marine Corps Intranet. It took months to expel the hackers, whom forensic experts have said were Iranian, from NMCI. Leading the operation was Adm. Michael Rogers, who was then head of the Navy's cyber command and now runs U.S. Cyber Command and the National Security Agency.

The NMCI cleanup effort, dubbed Operation Rolling Tide, has transformed the way the Navy approaches cybersecurity and has had ripple effects on NRL's research. Bruington said the lab is closely attuned to the cyber capabilities sought by Rogers' successor as U.S. Fleet Cyber Command commander, Vice Adm. Jan Tighe.

NRL plugs directly into the network defense and information operations centers of the 10th Fleet, which runs the Navy's cyber command, and responds to queries for new capabilities. For example, if a fleet component is interested in "self-healing" software networks, NRL runs that through modeling, Bruington said.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.