Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Old Worm Digs New Dirt At Pentagon

Soulskill posted more than 3 years ago | from the fool-me-twice dept.

The Military 26

ColdWetDog writes "Remember the Agent.BTZ worm that caused significant problems at military installations back in 2008? Now, three years after what the Pentagon called the most significant breach of US military networks ever, new versions of the malware blamed for the attack are still roiling US networks."

cancel ×


Sorry! There are no comments related to the filter you selected.


Anonymous Coward | more than 3 years ago | (#36473544)

And that's a puzzle in itself !!


SatanClauz (741416) | more than 3 years ago | (#36473702)

... and the second mouse gets the cheese?

Silly (1, Troll)

For a Free Internet (1594621) | more than 3 years ago | (#36473566)

If they just used MACs non of this would hapen necause theyre are np voroswes on MAC necause it is the greatest created by jenyuses who make th est compouters! Yo!

Re:Silly (0)

Runaway1956 (1322357) | more than 3 years ago | (#36474130)


I'm surprised that no one has reminded you already, that the very first viruses were targeted at Unix. Mac, being a Unix like, is subject to attack, as well. The thing about a Mac, or any other Unix like, is that permissions are granted very differently from Windoze. Yeah, I can be infected. But, no, I can't be infected as easily as a Windows user, unless I get stupid and grant permissions for the application to run.

I know, you're just trolling, so I should apologize right now for feeding the troll.


Re:Silly (0)

Anonymous Coward | more than 3 years ago | (#36475410)

God you're an idiot. It's obvious he/she was joking. But you got to show everyone what a fucking know it all you are

malware infiltrated computer systems? (2, Insightful)

Anonymous Coward | more than 3 years ago | (#36473570)

"The malware at issue, known as "agent.btz," infiltrated the computer systems of the U.S. Central Command in 2008" link []

Don't you mean someone opened an attachment in Microsoft Exchange or clicked on a URL in Microsoft Internet Explorer, or plugged a USB device into a computer running Microsoft Windows.

Name : Worm:W32/Agent.BTZ

Category: Malware

Type: Worm

Platform: W32 link []

Proprietary hardware (4, Funny)

Trilobyte (19074) | more than 3 years ago | (#36473642)

The government should go back to running on DEC Alphas and Data General mainframes. Mark Microsoft technology as export-only.

Not Funny (1)

bobs666 (146801) | more than 3 years ago | (#36474460)

If you can't secure your software. You should be running software that is securable. You should talk to the Air Force [] I understand they have some.

For some of you that do not want to chase that link, It's a Linux Boot CD that uses only local volatile memory so that no untrusted software can exist, after a reboot. The disk has an optional copy of open office and networking software for connecting to secured servers.

Re:Not Funny (1)

gtall (79522) | more than 3 years ago | (#36476526)

Is this the same Air Force which declared about 2 years ago they were going to standardize on Winders and then proceeded to attempt to bottleneck all security through their service? That's the one?

Re:Not Funny (1)

RockDoctor (15477) | more than 3 years ago | (#36508178)

Dickless lurkstation?

Ratcheting the fear for the masses (2, Interesting)

Anonymous Coward | more than 3 years ago | (#36473756)

Anyone care to speculate on the end game for this build up of global "cyberwar/cybercrime" activity covered by the press?

Re:Ratcheting the fear for the masses (2)

Tx (96709) | more than 3 years ago | (#36473798)

Press gets bored of over-hyping insignificant malware events, as signs of imminent cyber-apocalypse stubbornly fail to materialise, moves on to something more interesting?

Re:Ratcheting the fear for the masses (1)

SilentStaid (1474575) | more than 3 years ago | (#36473964)

I'd like to second that, I see this fading from the public spotlight in a few months and suddenly LulzSec and Anonymous will be backburner news again.

Re:Ratcheting the fear for the masses (1)

Anonymous Coward | more than 3 years ago | (#36474418)

Perhaps you missed all of the scare mongering about China, Russia, North Korea, Iran, etc. trying to hack America's precious digital streams. Former presidential national security advisor and current cyberwar profiteer Richard Clark just had an editoral in the Washington Post this week warning about the cyberArmageddon that'll be launched from China if the government doesn't hire security companies (such as his own) to help the DoD their networks and, well, everyone else's network. The current rash of system breakins isn't limited to Lulzsec, or Anonymous.

Re:Ratcheting the fear for the masses (3, Insightful)

Charliemopps (1157495) | more than 3 years ago | (#36473918)

The government grants themselves even more power to circumvent the constitution while passing legislation absolving businesses from any legal mandate to secure themselves from what is clearly an unstoppable army of cyber criminals?

Re:Ratcheting the fear for the masses (1)

Huckabees (1929306) | more than 3 years ago | (#36475094)

Why do you bother putting your milk in the fridge when it is inevitable that it will expire? Same concept.

Re:Ratcheting the fear for the masses (1)

Jeng (926980) | more than 3 years ago | (#36474064)

Same as any other spying. The end game is to know before hand who will win a battle.

Re:Ratcheting the fear for the masses (1)

Anonymous Coward | more than 3 years ago | (#36474462)

thermonuclear war?

Re:Ratcheting the fear for the masses (0)

Anonymous Coward | more than 3 years ago | (#36478474)

How about a nice game of chess?

No (0)

Anonymous Coward | more than 3 years ago | (#36474216)

Remember the Agent.BTZ worm that caused significant problems at military installations back in 2008?


roiling? (0)

Anonymous Coward | more than 3 years ago | (#36475146)

They see me roiling they hating

No Problem (0)

Anonymous Coward | more than 3 years ago | (#36475328)

Since "cyber-attacks" have recently declared "acts of war", the US can simply nuke Russia in response.

Choose your OS well... (0)

Anonymous Coward | more than 3 years ago | (#36475548)

They are probably regretting installing Windows now... haha.

War vs. standard computing (1)

Shoten (260439) | more than 3 years ago | (#36478008)

"It's very persistent and it keeps evolving," the official said. "You're constantly seeing new, better versions of it. So it's a challenge to keep ahead of it."

That's not an old worm. That's new worms based on an old worm. And let's face it; this is the activity of a foreign nation, using highly sophisticated methods including, invariably, human agents who are willing to deliberately introduce the malware into military computing environments. It's not the standard "PREEZE CRICKY HERE!!!!" attacks that are behind this. Why is it surprising that there's an effect? Just as bullets and IEDs cause casualties, cyber attacks cause effects. It's how war works. Don't fall into the ridiculous frame of mind of imagining a world where the enemy cannot reach out and harm you, even in a cyber's never been that way with any form of warfare, and never will be. There's always going to be a newer sword, a sharper arrow, a bigger gun.

NSA Advises Upgrades to Windows 7 (1)

dimethylxanthine (946092) | more than 3 years ago | (#36478018)

Any remember this? NSA Advises Upgrade to Windows 7 []
Well, they can eat their fucking radish ;)

Hey Stupid (0)

Anonymous Coward | more than 3 years ago | (#36485024)

"That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control," Lynn wrote in the journal Foreign Affairs last fall.

Dear War Pigs,

Classified and unclassified networks are supposed to be COMPLETELY segregated networks. This means both physically and logically. Physically segregated not only means that little wires are not suppose to connect between them but also such things as thumb drives, CDs and DVDs. Secure operating systems should only be used on classified networks and this doesn't include Windows.

When there was a Sun they had what was called "Trusted Networks". Using their design this would never happen. At one time you guys used this and things like this never happened on classified networks.

Now from your above statement it is quite clear that the unclassified network and the classified networks must be connected somehow in order to "transferred to servers under foreign control". Even if a computer get infected on a closed network if it doesn't have an out-bound path it can't call home. In other words stupid it can't "transferred to servers under foreign control" without a path. In case you don't understand the word "path" I'm talking about that little wire between the classified switch and the unclassified switch.

So cut the fucking wire stupid and stop allowing random USB keys on site.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>