US military weapons systems found to have vulnerabilities

Department of Defence "did not prioritise weapon system security", claims report

Armed fighter jet

The trillion-dollar arsenal of advanced weaponry the United States Military owns has been found to have "mission-critical cyber vulnerabilities", according to a report.

Published by the US Government Accountability Office (GOA) the report claims that the US Department of Defence (DOD) had not prioritised cybersecurity when building its advanced weapon systems.

Graphic of an automated weapon - courtesy of the GOA

"Automation and connectivity are fundamental enablers of DOD's modern military capabilities," the report said. "However, they make weapon systems more vulnerable to cyber attacks.

"Although GAO and others have warned of cyber risks for decades, until recently, DOD did not prioritise weapon systems cybersecurity. Finally, DOD is still determining how best to address weapon systems cybersecurity."

The DOD is said to be planning to spend an estimated $1.66 trillion to further develop its current portfolio of major weapons and the GOA had been asked to review the state its current weapons system security.

In operational testing, the GOA found mission-critical cyber vulnerabilities in systems that were under development that program official believed were secure - some even discounted the test results as "unrealistic".

Worryingly, very simple tools and techniques were used to take control of the systems and went largely undetected. Basic issues such as poor password management and unencrypted communications were just some of the vulnerabilities found.

According to the report, the DOD is taking steps to improve its weapon system cybersecurity, which includes issuing and revising policy and guidance, but its remedial work will need to be swift as cyber threats are becoming more advanced.

In August, researchers at Rutgers University revealed that a normal Wi-Fi network could be used to detect weapons, such as firearms, bombs and explosive chemicals and in July, it was revealed that a hacker infiltrated the Air Force and stole files pertaining to a lethal drone, which later leaked onto the dark web.

"It is shocking to find out critical systems especially weapons systems are still using default vendor passwords," said Joseph Carson, chief security scientist at Thycotic. "This report's findings reveal that anyone in the world with sufficient cybersecurity skills could be in control of the worlds most advanced weapon systems within hours."  

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Data breach exposes widespread fake reviews on Amazon
data breaches

Data breach exposes widespread fake reviews on Amazon

7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021