Hijacked by hackers

By Courtney Howard

Posted by Courtney E. Howard

It can happen to you. You could unwittingly be made a pawn in a cyber-attack , or worse: unknowingly become a cyber attacker. Most any computer -- whether a desktop/laptop PC or server -- can be hijacked by hackers. It could then be used as a weapon.

Saturday night, while I was enjoying the company of friends and some adult beverages, a call came in on a friend's cell. Now, it should be said that he is a brilliant, experienced systems and software engineer, and his partner is none too shabby either. Even so, one of their systems fell victim to hackers. In truth, it is likely more appropriate to call it a pawn, rather than a victim. You see, someone else's system was the real target (and subsequent victim).

No critical or classified information was compromised; rather, hackers took control of multiple systems, of which my friends was one, to perform a DDOS (distributed denial of service) attack on a system in the Pacific rim.

It was not as dramatic as I might make it sound, but it was an awakening. My friend was understandably tight-lipped, so I do not know the specifics around his electronics being hijacked; however, a quick check of the DDOS wiki gives me a general idea about how it happens.

Hackers can invade other people's computers (which I fondly refer to as OPCs). They find a vulnerability and secretly install a code, a script, or a program. The program can also come in through any number of methods, by e-mail, on a thumb drive, via poor password complexity, an even from a Website that can execute script.

The computer acts normally, until the hacker remotely activates the program, say. It then uses the computer/server's Internet connection to send a very large quantity of small packets of information -- tons of those, in fact -- to a target system/destination (or, more specifically, an IP).

The moral of the story? Keep an eye on your system and your information. Keep it all locked down. Keep your firewall on, and your operating system updated. IT personnel in charge of an entire organization’s systems and their information security (especially if that organization is part of or does any business with the Department of Defense) really have their work cut out for them. They have to keep tabs on virtually everyone and everything their colleagues do, and prevent them from surfing questionable Web sites, opening suspicious e-mail attachments, plugging thumb drives or MP3 players with flash memory into computer systems, and much, much more -- well, either that, or invest in a secure RTOS (real-time operating system) , such as those you can read about in the pages of Military & Aerospace Electronics . Anyone think a secure RTOS can be compromised? Some believe nothing is safe in this digital age .

Previous Blog Posts

Capital Hill budget deal could restore tens of billions of dollars to the Pentagon

December 17, 2013

Hacker drone story a cautionary tale about the need for unmanned vehicle data security

December 10, 2013

Lack of money for systems upgrades threatens to maintain wind-farm radar dead spots

December 3, 2013

Engineering support contracts indicate the Pentagon is sinking into the Mothball Strategy

November 26, 2013

The revenge of COTS: an ageing commercial technology base complicates military supply chain

November 19, 2013

Navy's newest destroyers evolve to fill traditional battleship roles

November 12, 2013

International suspicions of U.S. encryption technology putting defense companies in a bind

November 5, 2013

Defense industry left guessing as Army struggles forward with an unclear mission

October 29, 2013

These are tough times for the combat vehicle and vetronics industries

October 22, 2013

Is the government shutdown a harbinger of more ominous things to come?

October 15, 2013

Government shutdown reduces military contracting, increasing pressure on U.S. defense industry

October 7, 2013

Potential good news: has U.S. defense spending finally bottomed-out?

October 1, 2013

Is robotics revolution the first glimpse of a fundamental change in human evolution?

September 24, 2013

Obsolescent parts: are we enhancing military readiness or creating a hollow force?

September 17, 2013

For the high-tech warfighter, the future of electronics-laden uniforms is here

September 10, 2013

New generation of embedded computing thermal management in development at GE

September 3, 2013

Trading bus stops for credit cards: how far embedded computing has come in three decades

August 27, 2013

Unmanned vehicle industry stands at the doorstep of a fundamental transformation

August 20, 2013

AUVSI 2013, one of the biggest unmanned vehicles shows in the world, opens this week in Washington

August 13, 2013

The Washington Post, under Jeff Bezos, could lead the way for media in the 21st Century

August 6, 2013

Are costs and vulnerabilities making military leaders nervous about satellite communications?

July 30, 2013

Unmanned aircraft carrier that travels beneath the waves may be in the Navy's future

July 23, 2013

Electronic warfare programs kick into high gear with a flurry of contract activity

July 16, 2013

How vulnerable are U.S. Navy vessels to advanced anti-ship cruise missiles?

July 9, 2013

First came VHSIC, then came MIMIC, and now comes ACE to push electronics technology

July 2, 2013

The Mil & Aero Bloggers

John Keller is editor-in-chief of Military & Aerospace Electronics magazine, which provides extensive coverage and analysis of enabling electronic and optoelectronic technologies in military, space, and commercial aviation applications. A member of the Military & Aerospace Electronics staff since the magazine's founding in 1989, Mr. Keller took over as chief editor in 1995.

Ernesto Burden is the publisher of PennWell’s Aerospace & Defense Media Group, including Military & Aerospace Electronics, Avionics Intelligence and Avionics Europe.  He’s a father of four, a runner, and an avid digital media enthusiast with a deep background in the intersection of media publishing, digital technology, and social media. He can be reached at ernestob@pennwell.com and on Twitter @aero_ernesto.

Courtney E. Howard, as executive editor, enjoys writing about all things electronics and avionics in PennWell’s burgeoning Aerospace and Defense Group, which encompasses Military & Aerospace Electronics, Avionics Intelligence, the Avionics Europe conference, and much more. She’s also a self-proclaimed social-media maven, mil-aero nerd, and avid avionics geek. Connect with Courtney at Courtney@Pennwell.com, @coho on Twitter, and on LinkedIn.

Mil & Aero Magazine

May 2015
Volume 26, Issue 5

All Access Sponsors

Download Our Apps




Connect with Us


Military & Aerospace Electronics

Weekly newsletter covering technical content, breaking news and product information

Cyber Security

Monthly newsletter covering cyber warfare, cyber security, information warfare, and information security technologies, products, contracts, and procurement opportunities

Defense Executive

Monthly newsletter covering business news and strategic insights for executive managers

Electronic Warfare

Quarterly newsletter covering technologies and applications in electronic warfare, cyber warfare, optical warfare, and spectrum warfare.

Embedded Computing Report

Monthly newsletter covering news on embedded computing in aerospace, defense and industrial-rugged applications

Unmanned Vehicles

Monthly newsletter covering news updates for designers of unmanned vehicles