Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Air Force Claims Drone Malware Was ‘Nuisance’ Rather Than Serious Threat

    Written by

    Fahmida Y. Rashid
    Published October 14, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The malware that infected the system that controls the United States’ fleet of unmanned aircraft was never a real threat, just a “nuisance,” according to the Air Force.

      Reports emerged last week of a mysterious keylogger that was found on the systems used by Air Force pilots to communicate with the Predator and Reaper drones. The program was persistent and kept returning despite repeated attempts to remove it. While the Air Force does not routinely discuss operational status, the Air Force Space Command issued a statement Oct. 12 to “correct recent reporting.”

      It was previously reported that the virus may have removed data from classified and unclassified networks. Wired.com claimed senior Air Force officials were unaware of the breach until the news reports broke online. The statement contradicted the claim, saying the military had been aware of the infection all along.

      “We felt it important to declassify portions of the information associated with this event to ensure the public understands that the detected and quarantined virus posed no threat to our operational mission and that control of our remotely piloted aircraft was never in question,” said Col. Kathleen Cook, spokesperson for Air Force Space Command.

      The Air Force first detected malware on portable hard drives that were approved for use at Creech Air Force Base in Nevada for transferring information between systems on Sept. 15. The 24th Air Force, stationed at Creech, detected and isolated the software program “using standard tools and processes for monitoring and protecting” the systems, according to the statement.

      The Air Force “began a forensic process” to track the origin of the malware and clean infected systems. However, the statements didn’t mention claims in earlier news reports that Creech’s IT staff reportedly removed the malware from its systems, only to have it return. Nor did the statement say whether the clean-up process had completed.

      The broader concern is how did the infection happen in the first place and how do we prevent it from happening again, according to Cliff Unger, director of public sector initiatives for Belkin. It is not clear from the information available what measures are being taken or not taken, Unger told eWEEK.

      “If the virus came in through a removable drive, it had to come from somewhere else-viruses don’t just magically appear,” Jon-Louis Heimerl, director of strategic security at Solutionary, told eWEEK.

      Detected running on a Windows-based, stand-alone mission-support network, the infected machine was part of the ground control system that supports Remotely Piloted Aircraft (RPA) operations, according to the Air Force. The system is completely separate from the actual flight control system that the Air Force pilots use to fly the drones.

      “The ability of the RPA pilots to safely fly these aircraft remained secure throughout the incident,” the Air Force said.

      The fact that it got on a siloed, isolated and secure system is “of paramount concern,” Unger said. The Air Force is trying to assure the public there’s no risk of data loss, or of a threat, but the fact remains that regardless of what the system does, there needs to be proper hygiene, he said.

      The Air Force also clarified that the malware was not a keylogger, but a “credential stealer” routinely found on computer networks. It is not designed to transmit data or video, nor can it corrupt data, files or programs. An anonymous official told the Associated Press the malware was “routinely used to steal log-in and password data” from online games such as Mafia Wars and gambling sites.

      It doesn’t matter what the malware does; what does matter is that it got on a secured system in the first place, according to Unger.

      “Our tools and processes detect this type of malware as soon as it appears on the system, preventing further reach,” according to the Air Force, adding that it will “continue to strengthen our cyber defenses” with updates to its antivirus software and other methods.

      From an IT standpoint, organizations generally don’t want any rogue software on the system, Unger said, noting that even the most “innocuous” program can take up system resources. It is important to maintain clean cyber-hygiene and keep systems and networks clean, according to Unger.

      “We are fortunate it didn’t have much of an impact,” Unger said.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.