--> US drone, tank documents stolen by a Hacker | My Hack Stuff

US drone, tank documents stolen by a Hacker

Yes this is true that a hacker stolen US drone, tank documents for $200 on the dark web. Main reason of information leakage was because of nobody changed the default router password.

How to avoid these type of attacks?

High-profile hacks like this one will remain common (unless people apply critical security patches and change the default passwords on their devices) and could have lasting consequences. An attacker was able to infiltrate the computer network of a Nevada Air Force base (nobody changed the default password of a Netgear router on its network). Then able to access sensitive documents about the Air Force's MQ-9 Reaper drone and put them up for sale on a dark web marketplace.

Those sensitive documents were discovered on the dark web marketplace by a security research firm Recorded Future who spoke with the hacker to confirm the validity of documents. They determined the breach took place as a result of a well known Netgear router vulnerability and a default FTP password on that router.

How Hacker got access to Vulnerable Router?

The hacker used a service called Shodan to find the vulnerable router, which is essentially a search engine for finding internet connected devices around the world. There are still thousands of routers online that are still vulnerable to this type of attack.

US drone, tank documents

When attacker found the device, he compromise it as IT department at the Nevada Air Force base had not patched the router. From here, the attacker gained access to the router's root directory and the ability to remotely execute commands. This gave the hacker access to the computer of the Officer in Charge at the base and all the documents on it. Ironically, one of the documents the hacker ex-filtrated showed that the Officer had recently completed a "Cyber Awareness Challenge."

The government is aware of the leak and is investigating. Although they believe they have the hacker's name and country of origin, they haven't made that information public. if you want to read more about penetration testing techniques click next to read knowledge base articles.

Some links you like to read about penetration testing

Thanks for reading now let me recommend you some other practical guides about penetration testing of Remote Access Protocols, Remote Desktop ProtocolSSH Network Protocol, Network RoutersWordpress website using WPSeku from My Hack Stuff.



Business,1,Coronavirus,2,Cristiano Ronaldo,1,Dortmund,1,Ethical Hacking,3,Exploitation,2,Featured,126,Football,124,Google Adsense,1,Kali Linux,2,LaLiga,1,Live Streams,12,Offensive Security,2,Penetration Testing,2,Politics,2,Post Exploitation,1,Premier League,2,PSG,1,Search Engine Optimization,1,Sports,12,Technology,7,Tips,2,Trending,66,UEFA Champions League,5,United States,1,World News,6,
My Hack Stuff: US drone, tank documents stolen by a Hacker
US drone, tank documents stolen by a Hacker
My Hack Stuff
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content