I was having a terrible day last week, and I was browsing the news for some information on the attacks against the U.S. homeland security agency.
In my search, I came across an article about how a hacker group called APT28 has stolen personal information and exploited the milf trope to attack the U-2 spy plane, one of the military’s most vulnerable assets.
The article quoted a security researcher who said the hackers were “the most dangerous actors” on the network.
I quickly scoured the internet for any information about the U2 spy planes, but none of it turned up.
Then I looked at what the hackers had already done to the UMD-6 spy plane.
My search for information on UMDs turned up nothing.
That’s when I realized something was amiss.
It turns out that the hackers have already penetrated UMD’s networks.
UMD’s website and forum are riddled with information that can be exploited for attacks on other UMD systems.
As I was reading the Umd’s forums, I found several posts that suggested that the attackers had already breached UMD and compromised the UMA aircraft’s computer systems.
One post claimed that UMD had been hacked, but they didn’t say how.
One post said that the UMM aircraft had been infected with malware.
“The virus is a copy of the UMAS malware,” one post read.
“It also has a backdoor.”
Another post said UMD was “under attack” from the same group that had breached the UML.
A third post read that the “hackers” had compromised “the entire UMM network,” and “have taken control of the aircraft.”
A fourth post, which is still up on UMM’s forums today, suggested that UMM had been “moved into a state of emergency.”
“We cannot allow any other government agency or government contractor to operate within our network,” the post read, according to a screenshot.
Even if the Umm-6 was compromised, that doesn’t mean the attack against the spy planes was successful.
When I called APTI’s technical support, the receptionist couldn’t provide me with the exact number of UMD planes infected with the UMAN malware.
But she did say that Umm had been compromised.
But UMD isn’t the only UMD target.
Last week, hackers used the same tactic to target a security contractor that runs a database that stores information about UMD aircraft, including information about their vulnerabilities and the date they crashed.
Security firm FireEye said that hackers compromised the contractor’s database last year, and that they had “attempted to take control of a number of aircraft that have been in service for over 30 years.”
FireEye is working with APTI to secure the information it has stored.
Fireeye is also working with UMD to ensure that information it keeps on UM’s planes isn’t compromised.