This article over at Government Executive is pretty damn scary if you ask me.
In a nutshell the Pentagon was hacked with a known vulnerability, no one noticed for two months that malware was jumping from box to box in a spoofed email collecting information. They only noticed during some schedule IT restructuring and not with any of their security devices.
“It made a big difference” in securing the OSD network, which currently gets 70,000 malicious attempts at access a day, Clem said.
If this is true, out of the 70,000 malicious events they see a day. One, that used a known vulnerability got through. Does the Pentagon not patch their systems? I know many enterprises take up to a month (sometimes longer) to get patches tested and rolled out but one would think that the Pentagon would be a little more aggressive. Apparently not. One would think that the Pentagon would be filtering email and perhaps running some sort of IPS. Apparently not. Or if they are, perhaps someone over at the Pentagon needs to read my earlier blog post.