Skip to main content

Misconfigured Pentagon servers could have been exploited for cyberattack

vulnerable pentagon servers the united states department of defense
Image used with permission by copyright holder
A cybersecurity researcher has discovered a number of misconfigured servers belonging to the Department of Defense that could have left internal networks vulnerable to outsider access and attack.

According to Dan Tentler of Phobos Group, these vulnerable servers could have been used, in theory, to carry out cyberattacks to make them look like they were perpetrated by United States actors. No classified information could be accessed through these vulnerabilities however.

“There were hosts that were discovered that had serious technical misconfiguration problems that could be easily abused by an attacker inside or outside of the country, who could want to implicate the U.S. as culprits in hacking attacks if they so desire,” Tentler told ZDNet.

Last year the Department of Defense launched its first bug bounty program. It allows accredited white hat hackers to test various (but not all) of the Pentagon’s public facing networks for bugs. Hackers are limited to the department’s services on the defense.gov and .mil domains. The servers that Tentler discovered were within these domains.

Tentler said it was “very likely” that these servers have been exploited already. The Pentagon was allegedly made aware of the misconfigured servers eight months ago but has yet to patch the flaws. Tentler reported the bugs to HackerOne, which operates bug bounty programs, but given the rules of the program, he is limited in what he can disclose publicly.

Tentler himself is critical of the cybersecurity preparedness of the Pentagon, and the government in general. “The Pentagon has created a circumstance where the good guys can’t find the problems because we’re not allowed to scan, or go out of scope, or find things on our own,” he said, while bad actors can tinker away at these systems with little or no regard.

Much has been made about how the Trump administration will handle cybersecurity. Tentler added that leaked plans to carry cyber reviews on federal systems every 60 days “demonstrates a complete lack of understanding what the existing problems are.”

Jonathan Keane
Former Digital Trends Contributor
Jonathan is a freelance technology journalist living in Dublin, Ireland. He's previously written for publications and sites…
How to alphabetize lists in Microsoft Word
Microsoft word document.

Microsoft Word is a powerful word processing application that's capable of creating complex and compelling documents. It can also perform very simple but useful tasks, like alphabetizing a list.

Here's how to alphabetize lists in Microsoft Word.

Read more
How to change margins in Google Docs
Laptop Working from Home

You may find that Google Docs has a UI that is almost too clean. It can be difficult to find basic things you're used to, such as margin settings. Don't worry, though, you can change margins in Google Docs just like with any other word processor through a couple of different means.

Read more
Snag a year’s access to Norton’s ‘Secure VPN’ while it’s 75% off
A close-up of a computer monitor displaying a generic VPN.

For one of the best VPN deals today, check out Stack Social which currently has Norton Secure VPN available for just $20 for a one-year subscription instead of the usual price of $80. Protecting up to five devices including all your iOS and Android devices, as well as your laptop or desktop, it’s fantastic value for such strong peace of mind. If you’re in the market for a new VPN, keep reading while we explain why it’s worth buying Norton Secure VPN.

Why you should buy Norton Secure VPN
You won’t see Norton Secure VPN in our look at the best VPNs, but don’t fret as it’s still a major name in the security world featuring prominently in looks at the best antivirus software. With Norton Secure VPN, you get real-time threat protection for up to five of your devices along with online privacy.

Read more