Wednesday, July 11, 2018

With negligent admins , hackers don't have to work hard - A hacker managed to obtain the sensitive documents (U.S. Military Drone Documents) by gaining access to a Netgear router that was using the default FTP login settings for file sharing.


The authentication vulnerability in Netgear routers that hacker exploits to access the sensitive military data was initially discovered two years ago

After gaining access to the network, "the hacker first infiltrated the computer of a captain at 432d Aircraft Maintenance Squadron Reaper AMU OIC, stationed at the Creech AFB in Nevada, and stole a cache of sensitive documents, including Reaper maintenance course books and the list of airmen assigned to Reaper AMU,"

Ironically, a certificate found in the data archive reveals that the captain, whose system was compromised, recently completed the Cyber Awareness Challenge, but he did not set a password for an FTP server hosting sensitive files


https://thehackernews.com/2018/07/dark-web-military-drone_11.html

No comments:

Post a Comment