Sign in with
Sign up | Sign in

Cyber Command Completes First Major Attack Simulation

By - Source: InformationWeek | B 21 comments
Tags :

USCYBERCOM has said that its first major attack simulation exceeded expectations.

The United States Cyber Command hasn't been around for long. In fact, it only reached full operational capability last October. However, things seem to be trundling along quite nicely over as USCYBERCOM, as the command just recently completed its first major attack simulation.

InformationWeek reports that the mock attack, dubbed Cyber Flag, took place over the space of a week at the Air Force Red Flag Facility at Nellis Air Force Base in Nevada. All told, 300 people participated in the simulation (both on site and off), which involved splitting into two teams, the "good guys" and the "bad guys." The bad guys spent their time throwing everything they had at the Cyber Command's networks, attempting infiltration with malware and other nasty tricks. For their part, the good guys did everything they could to defend the network.

Col. Rivers J. Johnson of the command's public affairs office told InformationWeek that while the Cyber Command was not 100 percent successful in fending off all of the attacks, the majority of threats were identified and deflected "in a timely manner."

"There were a variety of scenarios based on what we think an adversary would do in real world events and real world time," he's quoted as saying. "It was a great exercise."

Display 21 Comments.
This thread is closed for comments
Top Comments
  • 26 Hide
    FloKid , December 5, 2011 9:42 PM
    My IP is 127.0.0.1 go at it :) 
  • 22 Hide
    thehelix , December 5, 2011 9:17 PM
    As if they would say it if the simulations would fail.....
  • 15 Hide
    accolite , December 5, 2011 9:53 PM
    FloKidMy IP is 127.0.0.1 go at it


    I'd laugh my ass off if someone there tried it, lo good one.
Other Comments
  • 22 Hide
    thehelix , December 5, 2011 9:17 PM
    As if they would say it if the simulations would fail.....
  • 26 Hide
    FloKid , December 5, 2011 9:42 PM
    My IP is 127.0.0.1 go at it :) 
  • -9 Hide
    NapoleonDK , December 5, 2011 9:50 PM
    For added network security, update your WinRAR and delete System32.
  • 15 Hide
    accolite , December 5, 2011 9:53 PM
    FloKidMy IP is 127.0.0.1 go at it


    I'd laugh my ass off if someone there tried it, lo good one.
  • 12 Hide
    igot1forya , December 5, 2011 9:55 PM
    "We didn't expect someone to set the building on fire"
  • 15 Hide
    xx_pemdas_xx , December 5, 2011 10:00 PM
    FloKidMy IP is 127.0.0.1 go at it


    Wow there was some crazy pictures on your machine!
  • 8 Hide
    xx_pemdas_xx , December 5, 2011 10:02 PM
    xX_PEMDAS_XxWow there was some crazy pictures on your machine!


    Oh wait, no wonder my credit card charges went through the roof..
  • 2 Hide
    razor512 , December 5, 2011 10:11 PM
    Easiest solution, if you detect multiple attacks in real time, take the servers off of the WAN, most real-time attacks cant be stopped in real time while keeping normal operation.

    Also unlike with a simulation where you know what is happening because things are set up. In real life, you generally wont know when the network has been compromised. (many of the best security firms have been hacked, and malicious users having full or nearly full access for months or years).

    If you are attacking a remote server, if your goal is not denial of service, then the moment your attack has been detected, it has failed (unless you already know their complete network map as well as all of the exploitable software running ahead of time and only need to quickly get a single small file)
  • 0 Hide
    Honis , December 5, 2011 10:22 PM
    Did the 150 attackers attack from 150 off site computers or did they attack from 150 PCs controlling 150 different botnets with a couple hundred (or thousand+) computers in each botnet? (Can't really be answered here but I don't think China/Russia/Our current allies are going to be attacking with anything less than a half a million computers willing or unwilling computers.)

    Cyber War I, Uncle Sam needs you to join the attack! Install SamNet on all of your connected devices Today!!!
  • -1 Hide
    lradunovic77 , December 5, 2011 10:34 PM
    SkyNet
  • -1 Hide
    Anonymous , December 5, 2011 10:37 PM
    Skynet is going to become SelfAware.
  • -1 Hide
    memadmax , December 5, 2011 11:39 PM
    *yawn*
    This is like the pitcher and the umpire are father and son....
  • 14 Hide
    cumi2k4 , December 6, 2011 12:12 AM
    I bet when the colonel's away those guys threw an epic battlefield 3 lan party....
  • 2 Hide
    Borisblade7 , December 6, 2011 12:36 AM
    Igot1forya"We didn't expect someone to set the building on fire"

    rofl, thats how you do it kobayashi maru style.
  • -1 Hide
    palladin9479 , December 6, 2011 1:09 AM
    Ok I realize people are just guessing, but having been through a red team visit before, these guys don't play nice. They will find a way in, even if they have to create fake security badges and hack from the inside. And when their finished they create this nice report detailing what they did and how they did it and present it to your commander.

    It's a good experience, albeit extremely stressful.
  • 0 Hide
    pepe2907 , December 6, 2011 1:35 AM
    The little problem with this simulation is that the "attackers" use the schemes of attack known to US Cyber Command and which they suppose will be used. But the question is - will the Chinese hackers use the same schemes? :) 
  • 1 Hide
    eddieroolz , December 6, 2011 10:09 AM
    Seems like a good start.
  • 0 Hide
    alyoshka , December 6, 2011 11:14 AM
    It's a good start to wasting Millions of taxpayers dollars on a Chinese style firewall for the whole country. Doesn't it strike anyone of the uses of this thing? if it works that is.
    I wonder why everyone is so paranoid and live in fear all the time?
    Who the hell would want to take their Military secrets? Wiki already has them all.
    And why would any idiot want to attack the US , die hard style? it was simple enough with the planes..., the banks, and the oil why it'd be pretty simple to coax the president itself again with a multi billion dollar election campaign package.
    Really, and the best part of it is, all the strategic networks ought to be off the internet, just simple LANs and WANs. Reduce stupid spending and provide better housing and employment to your citizens would be a better option.
    Security..... that's a laugh.
    Spending on it..... is like Halliburton contracts.
    And then testing them..... is like 911, fooling the people to believe what is and what is not, when they are all aware of what is the actual state of the states affairs, and I don't mean the Monica Lewinsky affairs.
  • -2 Hide
    alyoshka , December 6, 2011 11:19 AM
    "Col. Rivers J. Johnson of the command's public affairs office told InformationWeek that while the Cyber Command was not 100 percent successful in fending off all of the attacks, the majority of threats were identified and deflected "in a timely manner."

    "There were a variety of scenarios based on what we think an adversary would do in real world events and real world time," he's quoted as saying. "It was a great exercise." "


    The Col. still uses the Win 3.1 Word Processor for all his PR reporting.
    "Majority in a timely manner"..... was that the time before the got into the systems or were getting out of the systems? or was it after they came, they and they..... you royally.
    There can't be real world events in the cyber world..... dumbass. this is not a virtual reality war game.
    "It was a great exercise" only if you learnt what a waste of time it was.
  • 0 Hide
    xx_pemdas_xx , December 6, 2011 2:13 PM
    My secound cousin works for the Dep of defence ( contractor ), The "bad guys" always get in.. even if it means breaking in physical to turn on the computers to hack them. Because the best defense is no connection to the internet. They run different operating systems and different programs, on different networks for every task. So if one system goes down they can still operate with everything else.
Display more comments