After the breakthrough of SolarWinds. Does the United States use digital identifiers as traps for hackers?

3

The U.S. military has resorted to an unusual strategy to verify security vulnerabilities in its networks, relinquishing control of a major Internet source, IP addresses or digital identifiers, and handing it over to an unknown company.

On the day of President Joe Biden’s inauguration, he unveiled a mysterious florida-based computer networking company that manages a huge portion of the Inert, Pentagon-owned Internet addresses that make up a large part of the Internet.

Since then, the network has more than quadrupled to 175 million addresses, about 1/25 of the current Internet volume.

The IP address known as « IP » is the digital identifier of any device connected to an IP-packed information network, be it a local network or an Internet network. An IP address, for example, in telephone networks corresponds to the phone number.

The Pentagon created these identifiers years ago but did not use them, making them vulnerable to exploitation by hackers who may have come up with a mechanism to identify and use these addresses in their attacks.

Kentik, a network operator, has learned that the Department of Defense has given Florida-based global resource systems global resource systems global resource systems to control nearly 175 million Pentagon IP addresses.

Pentagon Director of Defense Digital Service Brett Goldstein told The Washington Post that the move was part of a « test » to study and prevent the unauthorized use of army IP addresses.

Goldstein said the move will also help identify « potential vulnerabilities » as part of efforts to defend against cyber intrusions by global enemies, who constantly infiltrate U.S. networks and sometimes work through unused Internet addresses.

Pentagon Director of Defense Digital Service Brett Goldstein told The Washington Post that the move was part of a « test » to study and prevent the unauthorized use of army IP addresses.

Goldstein said the move will also help identify « potential vulnerabilities » as part of efforts to defend against cyber intrusions by global enemies, who constantly infiltrate U.S. networks and sometimes work through unused Internet addresses.

However, it is not clear exactly what officials hope to achieve, and the very company that runs the process is shrouded in mystery. It appeared in September 2020 and has no public website.

Doug Madori, Director of Internet Analysis at Kentick, said the flow of data to IP addresses could help the military gather information about cyber threats.

Whatever the reason, it can be an important step. The military may use the passage of so much through its addresses to prevent hostile governments or cyber criminals from hijacking inactive IP addresses.

A security source said this also ensures that the United States can manage IP addresses so that they can use them if they wish to do so as criminal traps so that they use them with pentagon knowledge to set them up in what is known as « honey traps. »

Although strange, the move could be important given the penetration of major companies working with the Pentagon and government companies such as Solar Winds and other threats to government regulations.

What a Pentagon spokesman couldn’t explain On Saturday was why the Department of Defense chose Global Resources Systems, a company with no record of government contracts, to manage the IP address space.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More