Back to news

September 14, 2018 | International, C4ISR

Really old computer viruses are still infecting new machines

By:

The biggest cyber threats governments and businesses face may not be the cutting edge hack from China, but a 10-year-old virus that infects a little-used computer.

Some of the most well-known viruses from the past decade are still infecting machines despite their well-documented nature, according to cyber research firms. Some viruses, such as WannaCry and Conficker, are still spreading, Sean Sullivan, a security adviser at F-Secure told Fifth Domain.

“It costs hackers nothing to keep using them,” Sullivan said.

These known vulnerabilities are still effective because older machines do not receive patches for updates, which can then infect an entire network. Hackers often bundle known hacks together because it increases their success rate with no downside, Sullivan said.

“Nothing is going to be 100 percent patched across organizations,” Sullivan, said. He described a network administrator's role as “triage.”

The 2017 WannaCry hack infected users in more than 150 countries and had an economic impact of anywhere from $4 billion to $8 billion. Although progress has been made to patch computers, WannaCry is still a top malware threat for customers, F-Stream said in a September report.

The Conficker hack targeted Windows systems and was first launched in 2008. It is reported to have cost as much as $9 billion in damage.

But much work remains. More than two-billion devices have not been patched to defend against BlueBorne, a Bluetooth vulnerability that allows an attacker to take over devices, according to the cyber protection company Armis. The devices are still vulnerable because they have not been updated or because an update does not exist, according to the company.

“Whether they're brought in by employees and contractors, or by guests using enterprise networks for temporary connectivity, these devices can expose enterprises to significant risks,” wrote Ben Seri, the vice president of research at Armis.

A previous version of this article said that two million devices have not been patched to defend against BlueBorne. It is two billion.

https://www.fifthdomain.com/industry/2018/09/13/really-old-computer-viruses-are-still-infecting-new-machines

On the same subject

  • Rheinmetall Defence Australia seeks industry partners for Royal Australian Navy’s Multi Ammunition Softkill System (MASS)

    November 7, 2023 | International, Land

    Rheinmetall Defence Australia seeks industry partners for Royal Australian Navy’s Multi Ammunition Softkill System (MASS)

    Following extensive trials, MASS was selected on account of its unique capabilities.

  • How COVID-19 Is Affecting The Defense Industrial Base

    November 6, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

    How COVID-19 Is Affecting The Defense Industrial Base

    Jen DiMascio The COVID-19 pandemic has exacerbated some of the risks that have always existed in the defense industrial base. Although government assistance and a robust Pentagon budget have helped offset initial trials, more challenges are looming. One of the biggest risks to the defense industrial base is that some companies serving the military are too heavily leveraged toward the commercial sector or too reliant on international companies, financial analysts told Aviation Week's DefenseChain Conference. “Some of these places are two weeks from bankruptcy,” says Chris Celtruda, managing principal at Destiny Equity Partners, says. Suppliers are beginning to falter because of a combination of factors, including the need to comply with cybersecurity standards, the pressure that prime contractors such as Boeing and Lockheed Martin have applied to them and their reliance on commercial business. A prime example is the recent bankruptcy of Impresa Aerospace, a Wichita-based company that made parts using computer numerical control machines as well as sheet metal parts and assemblies for Boeing and Lockheed military aircraft but was highly dependent on its work for the commercial Boeing 737 MAX. The U.S. federal Paycheck Protection Program helped delay some business failures, but others are inevitable, says Rick Nagel, managing partner of Acorn Growth. “The Impresa bankruptcy is an example of a lot more insolvencies we may see,” he adds. Weakness among niche companies could pose a problem for the Defense Department in the future. “I'm always amazed at how many critical systems have multiple single points of failure on major programs,” he says. At the Pentagon, officials have been working to keep essential suppliers afloat and to keep production moving through its sprawling international industrial base. For the U.S. Army, that has meant initial disruptions to Apache fuselage production in India and to the flow of generators from Mexico. The Pentagon and the State Department helped ease the stoppage, but the incident has caused them to review the full range of risks to its international supply chain. “I think that we can navigate through this, though it's certainly always going to be complex in today's global economy,” says Patrick Mason, deputy program executive officer for U.S. Army Aviation, adding that he is in the position of putting pressure on vendors to reduce cost, particularly to provide savings on multiyear aircraft contracts. One trend emerging along with the pandemic is a movement toward onshoring or reshoring overseas business for reasons of cybersecurity and the protection of the U.S. industrial base. As that happens, and as the commercial aviation market sags, Raanan Horowitz, president and CEO of Elbit Systems of America sees opportunity. “We are trying to position ourselves around some of those discontinuities,” Horowitz says, adding that the company likes going after opportunities that are not necessarily glitzy but hold value. “We are intensifying efforts toward looking at licensing, taking over orphan product lines and positioning ourselves to be part of the long-term solution.” Horowitz says Elbit is investing in U.S. infrastructure to capture new business. Industry officials see broad support for bringing more of the defense supply chain back to the U.S. The shift stems in part from the COVID-19-related economic downturn but also from longstanding concerns about China. In the fiscal 2020 National Defense Authorization Act, Congress passed restrictions on contracting with companies that use Chinese telecommunications equipment. Though companies first look for the best value, the threat posed by Chinese parts that either do not work or could transmit classified information back to China is an ongoing concern, says John Luddy, vice president for national security policy at the Aerospace Industries Association. “The concept of reshoring of supplies to better connect our allies and friends, both from a production standpoint and from an operational functionality and alliance standpoint, I think the volume is getting turned up on that a little bit,” he says. “There's also a strong impetus in Congress to look at exactly how vulnerable we are. That's going to be a more intense discussion in the year to come than it has been.” And that trend toward reshoring could have unintended consequences, warns Steve Grundman, founder and principal of Grundman Advisory. “I'm genuinely concerned that benign moves to secure our supply chain to prevent nefarious supplies and code [coming] into particularly our defense supply chain or commercial aerospace supply chain could slip very easily into protectionism,” Grundman says. “If you want to really put pressure on the defense budget, ask the defense industry to reshore the supply chain. https://aviationweek.com/defense-space/supply-chain/how-covid-19-affecting-defense-industrial-base

  • DoD SBIR/STTR Component BAA Open: Defense Advanced Research Projects Agency (DARPA) HR001121S0007-06

    April 8, 2021 | International, Other Defence

    DoD SBIR/STTR Component BAA Open: Defense Advanced Research Projects Agency (DARPA) HR001121S0007-06

    The DoD Small Business and Technology Partnerships Office announces the opening of the following Broad Agency Announcement (BAA) topic: Defense Advanced Research Projects Agency (DARPA), HR001121S0007 • STTR Topic HR001121S0007-06: “R&D Automated Profit Incentive Determination (RAPID),” published at: https://beta.sam.gov/opp/7478362958224363af5729528cdff22e/view IMPORTANT DATES: • April 8, 2021: BAA opens, begin submitting proposals in DSIP • May 11, 2021: BAA closes, full proposals must be submitted in DSIP no later than 12:00 p.m. ET Full topic information and instructions are available at the link provided above. DSIP Help Desk Contact Info • Email: DoDSBIRSupport@reisystems.com • Hours: Monday – Friday, 9:00 a.m. – 5:00 p.m. ET Thank you for your interest in the DoD SBIR/STTR Program. DoD SBIR/STTR Support Team To sign up and receive upcoming emails, please follow this link: https://secure.campaigner.com/CSB/Public/Form.aspx?fid=667492&ac=g9gk

All news