Military personnel targeted in cyberattack

Military personnel targeted in cyberattack

Summary: Military-minded publications owned by publisher Gannett were hacked this month, exposing the names, passwords and e-mail addresses of active and retired military personnel.

SHARE:
TOPICS: Security
10

How do you launch an attack against military personnel without trying to hack into the U.S. armed forces' systems?

Target the publications they read, of course.

Military- and defense-minded publications owned by publisher Gannett were hacked earlier this month, the company admitted yesterday, leaving the names, passwords and e-mail addresses of active and retired military personnel exposed to the attackers.

On June 7, 2011, the Gannett Government Media family of websites suffered a cyber attack that resulted in some users being unable to access parts or all of the websites. We also discovered that the attacker gained unauthorized access to files containing information of some of our users. The information in those files included first and last name, userID, password, email address, the internal number we assigned to the account, and, if provided, ZIP code, duty status, paygrade, and branch of service.

Among those publications targeted: DefenseNews, the Military Times, the Federal Times, the Army Times, the Intelligence, Surveillance and Reconnaissance Journal, the Armed Forces Journal, the Navy Times, the Air Force Times, the Marine Corps Times.

The company says it has hired an "outside computer forensics company" to help it investigate and strengthen its security system.

Topic: Security

Andrew Nusca

About Andrew Nusca

Andrew Nusca is a former writer-editor for ZDNet and contributor to CNET. During his tenure, he was the editor of SmartPlanet, ZDNet's sister site about innovation.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

10 comments
Log in or register to join the discussion
  • I'll take a guess here

    All these sites that are getting hacked lately are all using Microsoft IIS.

    You know, reputations and all are at stake here.
    Will Pharaoh
    • Well there ya go

      Now you're catching on. ;)

      Time to put Redmond swiss cheese to rest.
      blind obedience
      • Balmers/M$ owns every Washington DC political consultant .......

        end of story ......... they say the Brooklyn bridge is up for sale again .....................
        Over and Out
  • RE: Military personnel targeted in cyberattack

    Serves the criminals right!
    Peter.mitchell@...
    • RE: Military personnel targeted in cyberattack

      @Peter.mitchell@... Exactly to which criminals are you referring?
      RabsWife
  • When are people going to learn...

    ...you ENCRYPT passwords. No one but the user has any need to know the password anyway. Why is there even a way to generate clear-text passwords?

    If the company needs to get into the account for whatever reason they can reset the password. That way no one but the user ever knows what the password was.

    Come on guys, this isn't rocket science!
    wolf_z
    • @wolf_z Common sense

      Sometimes isn't so common :)
      OneTwoc21
  • RE: Military personnel targeted in cyberattack

    Computer connections need caller id.
    trm1945
  • easy to protect themselves

    I don't believe when I read any news about mail hack. That's to stupid in PrivateSky time. People just needs to use smart and simple encryption tool for emails. I recommend you take a look at that product https://PrivateSky.me I also seek another useful tool. If you know, please share links with me.
    UmutSelvi
  • RE: Military personnel targeted in cyberattack

    If the company needs to get into the account for whatever reason they can reset the password. That way no one but the user ever knows what the password was.<a href="http://e-apostas.info">apostas desportivas</a>
    marco5811