RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Viruses attack UAVs of the U.S. Air Force

width:200px

10.10.11, 14:30, Msk
Текст: Sergey Mazharov

The computer virus infected the command center of Creech air base of the United States Air Force. Hacker attacks on military facilities become more and more impudent.

The "Keylogger" virus got into computers of U.S. Air Force Creech air base in the State of Nevada from where remote piloting of the airplanes operating in Afghanistan is performed.

According to the message of the Wired magazine, the computer virus fixing clicking of keys on the keyboard infected the networks used by the pilots controlling robot planes of the U.S. Air Force over the line of the Afghan front. At the same time, as reports the edition, the malware "resists" efforts on its removal.

There are no confirmed data speaking about leaks of classified documents or about influence of a virus on accomplishment by pilots of flight tasks yet. Specialists in network security of the U.S. Air Force have no confidence in whether the virus is a part of the directed attack or network are infected accidentally. For destruction of a virus different antivirus software, including from Kaspersky Lab was used.

Command of the U.S. Air Force declared officially that it does not intend to discuss publicly threats to its computer networks as it can help hackers to improve tactics of their actions.

According to an informed source of the edition, the virus is constantly deleted, but it appears again. "We consider that it is not dangerous. But there is no unambiguous confidence", - quotes the edition of a word of the source.

The USA often uses unmanned aerial vehicles in Afghanistan and probably at borders with Pakistan where with their help the members of the Taliban suspected of terrorism and Al-Qaeda were killed. On September 30 on Arabian Peninsula in Yemen using UAVs Anwar al-Awlaki, the radical Islamic preacher was killed.

Viruses of this kind are used generally for theft of passwords of users, credit card numbers and bank accounts. Data theft happens in the course of their keyboard input. Afterwards these data are transferred to swindlers by means of networks.

Earlier American military came to a conclusion that insurgents can easily perform interception and record of the personnel received by cameras of pilotless devices and transferred to troops and to air bases.