Thursday, January 21, 16:32
Home youtube Capitol Attack: Espionage, computer and data theft

Capitol Attack: Espionage, computer and data theft

On January 6, 2021, his followers <br><br>Donald Trump They attacked the Capitol and ransacked some of its offices, while they remained on its premises for more than two hours before being removed.

Capitol

Apart from vandalism, however, there is information about theft of objects and devices, such as his computer of the senator Jeff Merkley.

Although most of them invaders have been found, it is extremely difficult to find out what exactly they did during their hours in the Capitol and consequently in what information, documents, codes gained access. Although only a small number of building appliances are believed to have been breached, the sensitive nature of the information they contain can be a major risk factor for safety.

The situation is worse than initially presented. According to their schedule USA Today, Congress returned at 8 p.m. of 6th January. Obviously, there was no way to completely replace thousands of machines in such a short time. Therefore, from that moment until now, members and staff use digital Appliances which may have been violated. This means that all communications, files and network connections to and from the Capitol may also have been compromised.

The fact that so many people had access to the Capitol area unattended also raises suspicions that some of them may not have been Americans. It is very possible that people from other nations interfered with the protesters in order to gain physical access to places and machines that would otherwise be impossible. In fact, given recent attacks by countries such as Russia, it is not uncommon for malicious agents to gain access to the Capitol's systems with all that entails for its security.

It is possible that the intruders opened the machines and even placed extra discs inside them, which were then sealed. With a powerful screwdriver, it is possible to open a computer tower, to install one USB stick to an open inner door and seal within a minute or two. This may never be detected.

What should be done?

There are some best practices that can reduce the risk. Micro-segmentation of the network can prevent malware from passing through the zones, for example. However, no security practice based on network can not completely mitigate a physical attack.

All machinery in the Capitol must be scanned. Any desktop computer that is not hermetically sealed must be opened and carefully inspected internally. USB drives must be locked so that personnel cannot connect random USB drives. The building must be scanned repeatedly in each room.

Congressional staff should also be trained on best practices, even if extra time is needed.

Any digital device inside the building should be considered suspicious. It is important to maintain a strong security situation even after testing and scanning active machines, because we must be wary of delayed threats and hidden attacks, waiting for the opportunity to allow access to third parties.

Finally, all those involved in the attack, especially those who broke into the building, risk being prosecuted to the fullest extent of the law and possibly even being accused of violating the espionage law.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

Biden: How was the political transition in the US captured on social media?

As Joe Biden was sworn in as President of the United States, this important political transition was captured on popular social media. On January 20, ...

CentOS ceases to be supported but RHEL is offered for free

Last month, Red Hat caused a great deal of concern in the Linux world when it announced the discontinuation of CentOS Linux.

Microsoft Office 365 employee passwords leaked online!

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and ...

COSMOTE and Microsoft provide new cloud solutions for businesses

COSMOTE and Microsoft expand their cooperation, offering even more advanced and high quality cloud solutions, in large and small ...

Cyber ​​attacks in Eastern Europe are on the rise!

The cyber-attacks that have taken place in many US government agencies and companies in recent months have caused concern in the developing countries of ...

Tesla reduces the prices of the Model 3 in Europe

Tesla has reduced the prices of the Model 3 in many European markets, which reductions could be partly linked ...

iOS, Android, XBox users in the crosshairs of a new malvertising campaign

Recently a new malvertising campaign was discovered that targets users of mobile and other connected devices and uses effective ...

Microsoft: "Zero trust" protects against sophisticated hacking attacks

According to Microsoft, the techniques used by the hackers of SolarWinds, were sophisticated but common and preventable. To avoid future attacks ...

US: Twitter locks Chinese embassy account due to "dehumanization"

Twitter said it locked the account of the Chinese embassy in the United States for a tweet about its women ...

Ransomware victims pay a ransom to prevent their data from being leaked

Keeping backups is very important, especially in cases of Ransomware attacks. However, it seems that the hackers are using new methods, with ...