Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Air Force. Show all posts

Hackers Spread Disinformation to undermine Taiwan’s Military


 

Foreign hackers are increasingly targeting Taiwan by hijacking social media accounts to spread disinformation aimed at undermining the country's military, according to a statement released by the Ministry of Justice Investigation Bureau (MJIB) yesterday.

The hackers, believed to be operating from abroad, are using compromised Internet-connected devices, including surveillance cameras and facial recognition systems, to gain unauthorised access to social media accounts on popular platforms like Dcard and PTT (Professional Technology Temple). By infiltrating these forums, they have been able to post false information that seeks to damage the reputation of Taiwan’s armed forces.

One of the key tactics employed by these cybercriminals is impersonating Taiwanese air force personnel. They have posted misleading content claiming that many military pilots are dissatisfied with their pay and working conditions. Some posts suggest that pilots would rather incur tremendous financial losses than renew their contracts, while others falsely claim that military members are leaving their posts to pursue civilian careers for better work-life balance.

On PTT, an account named “ss900287” further amplified these messages by sharing a link to a photograph that supposedly showed a list of retired military pilots applying for jobs with China Airlines. This, however, is another example of the misinformation being spread to create doubt and discontent among the public regarding Taiwan’s military.

Rise in False Posts Across Social Media

Despite the efforts of the Air Force Command to counteract these false narratives, there has been a noticeable increase in similar disinformation across more than 170 suspicious Facebook groups, including names such as “The Strait Today,” “Commentary by the Commander,” and “You Ban, Me Mad.” These groups are suspected of being part of the coordinated effort to spread misleading content.

Advanced Techniques to Evade Detection

According to the MJIB, the hackers have been able to maintain their disinformation campaign by exploiting vulnerabilities in facial recognition systems, digital cameras, and other networked devices. By stealing personal data and taking over social media accounts, they have managed to pose as legitimate users, making their disinformation appear more credible.

To avoid detection, the hackers have employed sophisticated methods such as data de-identification and rerouting their activities through multiple channels, which has made it difficult to trace their identities and locations. In response, the MJIB has notified social media platforms, requesting that they take action against the groups and users involved in these activities.

The MJIB is advising Taiwanese citizens to gear up the security of their Internet-connected devices. This includes setting strong, unique passwords and regularly updating them to minimise the risk of cyberattacks.

In a related development, fishermen in Penghu County have reported sightings of Chinese fishing boats using fake Taiwanese radar transponder codes in waters near Cimei Township. While these vessels initially appeared to be Taiwanese on radar, visual inspections confirmed their Chinese origin. The Coast Guard Administration has stated that any illegal vessels identified will be expelled from Taiwanese waters.

The reason behind the Chinese fishing boats disguising their transponder codes remains unclear, but it has raised concerns about the potential for further deceptive activities in the region.




Satellite Security Breached: Hackers Pocket $50K for Exploiting US Air Force Defenses

 


An impressive security exercise was conducted during the annual "Hack-A-Sat" competition within the US Air Force during which hackers managed to successfully compromise a satellite in orbit. MHACKeroni, an Italian team that emerged as the winner of the competition, won a prize of $50,000 for the discovery of vulnerabilities within the satellite's network systems which allowed them to reveal the vulnerabilities. 

To identify gaps in the US cyber defense against potential threats from countries like Russia and China, a hacking competition is being held at the DEF CON hacker conference in Las Vegas this week. 

Moonlighter, a small cubesat named after NASA's ionosphere, was developed by NASA's Aerospace Corporation at the request of NASA's Defense Research Laboratory. The small satellite was launched into space along with a cargo payload for the International Space Station on June 5, 2023, atop a SpaceX Falcon 9 rocket.  

An air force satellite, the US Air Force Moonlighter, was the target of a hacker challenge this year in the form of attacks on a real satellite in space. In the program, five teams were selected out of over 700 applications to establish a data link between the satellite and the ground station, while keeping other teams at bay by establishing a strategic hack into the satellite.

A live satellite zooming above Earth was to be hacked as the competition took place for the first time this year. In previous years, simulated satellites were used on the ground to simulate the live satellites they would hack.  

The satellite during the competition only had a few windows open to download files, telemetry, and scripts dependent on where it was located in orbit, so it had a limited number of opportunities to upload or download files. Normally, even the runners of the CTF occasionally cannot establish a connection during the designated contact window because the CTF operates under real-world circumstances. 

In addition, the U.S. Air Force and the U.S. Naval Space Systems Command of the U.S. Navy conduct competitions known as Hack-A-Sat to find vulnerabilities in the satellite systems overhead that can be exploited to enhance satellite system security. 

In this year's challenge, five teams participated, with "macaroni" taking the top honors and taking home the prize this year, representing five Italian cyber research firms. It was announced that $50,000 would be given as the prize for the first-place winner.   

Taking second place was Poland Can Into Space, an organization that carries out cyber-based research. Moreover, the British-American team "JUMP FS :[rcx]" took third place and received a check for $20,000 from the United States Olympic Committee. 

Capt. Kevin Bernert, a member of the U.S. The Space Force revealed at the announcement of the Hack-A-Sat that the organizers were still collecting data from the Moonlighter. Thus, the team assembled in an emergency stairway before moving to the hotel room where they could connect to the Moonlighter and gather data to make sure the final results were accurate.

Although there was a playful atmosphere to the competition, it was an important reminder that satellite hacking poses a serious threat, one that is growing. The consequences of such breaches in geopolitical dynamics can be significant. 

Just hours before the Russian military deployed troops into Ukraine in 2022, the Russian government targeted Viasat, resulting in a major loss of communication during the invasion. Viasat is an American satellite company based in California. In addition to this, classified documents indicate that as part of its warfighting strategy, China is working on acquiring control of enemy satellites as part of its development of technology. 

The leak of classified documents has also revealed that China has been developing technology that is intended to control and manipulate satellites of foreign adversaries and pick up signals from them. It is evident from the successful breach of a satellite belonging to the US Air Force that it is important to identify vulnerabilities and enhance security measures in space in the future. To prevent potential geopolitical issues in the future, it is imperative to address the security of satellite systems to mitigate the risks involved. 

With this annual contest, satellite systems hold several vulnerabilities. It's a means of uncovering these vulnerabilities and enhancing cybersecurity measures to ensure potential threats cannot be exploited. To enhance the security of satellite networks and mitigate the risks associated with hostile cyber attacks, we must identify and address these weaknesses in the US Air Force and other space agencies.

Defense Leak Case Arrests 21-year-old Air Force Guardsman

 


A member of the Massachusetts Air National Guard, Jack Teixeira, 21, has been arrested in the breach of dozens of highly classified documents, including the extent to which the United States can spy on Russia, by the Federal Bureau of Investigation. On Thursday, the FBI arrested him in connection with the leak. 

A brief statement presented by Attorney General Merrick Garland during a speech at the Justice Department said FBI agents took Teixeira into custody Thursday afternoon "without incident." The department has been investigating the case against Teixeira. 

The US attorney's office in Boston, which prosecutes Teixeira, has indicated that he will appear in court on Friday. FBI confirmed it had taken Teixeira into custody. Teixeira was allegedly involved in the breach of classified government and military documents from a residence in North Dighton, Massachusetts. 

As part of the investigation, Teixeira is scheduled to appear before the U.S. District Court for the District of Massachusetts. This is according to the U.S. Attorney General, who declared that the investigation would continue. Media inquiries were refused. 

The arrest of Mr. Garland was alleged to have been related to his illegal removal, retention, and transmission of classified national defense information. This is a reference to the Espionage Act, which is used to prosecute people who commit crimes against sensitive intelligence, including the mishandling or stealing of such information. 

There were a half-dozen FBI agents in North Dighton on Thursday afternoon as reporters from the New York Times gathered near the house to cover the story. Overhead, there was a twin-engine government surveillance plane monitoring what happened to an Airman's daughter. 

Most of the agents arriving at the scene were heavily armed. According to a person familiar with the investigation, law enforcement officials were informed before the search that Airman Teixeira owned a significant collection of weapons. An investigation by the FBI led to the discovery of guns in the house. 

There were several documents posted on social media that included detailed assessments of both allies and adversaries provided in the leaked documents. It was evident from these assessments that Kyiv and Moscow faced challenges in terms of the state of the war in Ukraine as the conflict seems to be stalled in a deadlock. 

There is a report citing several US officials who claim Teixeira is the leader of the group. A huge amount of classified information has ended up for grabs. According to Teixeira's military records, he holds the rank of airman first class. This tells us that he has been in uniform since he joined the Air National Guard in September 2019 and has been in uniform ever since. As a cyber transport systems journeyman, he is assigned as a member of the Air National Guard at Otis Air National Guard Base on Cape Cod. 

A Facebook post published in July by the 102nd Intelligence Wing at the base congratulated Teixeira on becoming an airman first class. It said the promotion was an accomplishment well deserved. 

The U.S. government searched for the leak source to determine what was leaking. It was likely that hundreds of pages of intelligence about Russian efforts in Ukraine as well as Russian spying on United States allies may have been exposed as a result. 

There is video footage of the arrest that shows a young man, believed to be Mr. Teixeira. He is leaving a small town about an hour south of Boston. Armed FBI officers prowl the streets and he walks backward with his arms raised toward them. In addition to being handcuffed, he was also led to a vehicle. 

Police officers blocked the roads during the arrest. According to the Pentagon's press secretary, Air Force Brig. Gen Pat Ryder, at a press briefing on Thursday, declined to confirm the suspect's identity. He told reporters to contact the Justice Department for details since it is a "law enforcement matter" and an investigation that continues. 

Several leaks are occurring at the same time as the Pentagon works "around the clock" with the intelligence community, Ryder told reporters Thursday. Ryder said the Pentagon has "very limited" information about the leaked contents. In the last month, several classified documents from the Defense Department were discovered online. Unfortunately, they said they still have no idea how long the classified documents were online or how many there were in total. 

Researchers revealed details about the U.S. spying on Russia's war efforts in Ukraine and the Classified assessments of Ukraine's fighting power in the conflict. Meanwhile, NBC News reported, "They also released information on intelligence gathering by American allies, such as South Korea and Israel, as well as other allies." 

As some documents surfaced on Telegram and Twitter late last week, the crisis over leaks took center stage in Washington. 

There were briefings given to Defence Secretary Lloyd J. Austin III on April 6 regarding the leak of information. A delegation from the Pentagon has attempted to get some of the posts on Telegram and Twitter that show images of some of the documents being released from the Pentagon deleted but to no avail. 

Lloyd Austin, the Secretary of Defense for Intelligence and Security, announced on Thursday that he will direct the Under Secretary of Defense for Intelligence and Security to review intelligence access to the Department of Defense. After the Air National Guardsman was arrested, there was a follow-up investigation. 


Hackers Now Allowed to Find Flaws in US Fighter Jets and Security System


The Trusted Aircraft Information Download Station could have been shut down entirely due to a host of flaws discovered by hackers who were challenged to detect vulnerabilities in a system of a U.S military fighter jet known as F-15.

It was unprecedented in the history of the tech world that outside researchers were given physical access to such critical machinery, and were asked to detect vulnerabilities. It was a matter of two days for a group of 7 hackers to come up with a number of exploits which included bugs that were identified by the Air Force itself but they couldn't fix it, according to the Washington Post.

Hackers put the system through numerous attacks which included subjecting it to malware and testing with objects like screwdrivers and pliers, reported the DEF CON 27.

In the context of the vulnerabilities exploited by the hackers, Roper Technologies attributed, “decades of neglect of cybersecurity as a key issue in developing its products, as the Air Force prioritized time, cost and efficiency.”

Usually, outsiders were not allowed such access to military equipment which is highly sensitive in nature and their operation; it came as a massive change in how the military and technological world works in synchronization, the gravity of which can be gauged by the fact that hackers physically approached the machine with tools.

As per Roper, American Air Force is of the belief that if it doesn't allow America's best hackers to find every single vulnerability present in their weapons, machinery and fighter jets, then they are at the risk of being exploited by other adversaries like Iran, Russia and North Korea.