Hacked British Royal Navy site sinks

By on
Hacked British Royal Navy site sinks

Hacker claims to breach site security.

The British Royal Navy website remained down this morning after a hacker claimed to have successfully exploited the site and its underlying database yesterday.

An attacker going under the web pseudonym TinKode stated in a blog to have compromised the website with an SQL injection attack this weekend.

TinKode claimed to have accessed both usernames and passwords to different sections of the website, although the Royal Navy has refuted the suggestion any classified information was taken.

The Royal Navy admitted the site was compromised, but said no “malicious damage” was caused.

The website has been suspended as a precaution while security teams investigated, a spokesperson added.

Visitors to www.royalnavy.mod.uk today were greeted by a message reading: “Unfortunately, the Royal Navy website is currently undergoing essential maintenance. Please visit again soon.”

The news comes not long after the  BritishGovernment ranked cyber defence as one of the most important areas of national security, placing it alongside international terrorism and military crises.

The Coalition also recently announced an extra £500 million (AU$795 million) funding for cyber defence, along with £900 million (AU$1.4 billion) towards targeting tax evaders and fraud with better use of technology.

Jason Hart, senior vice president in Europe for two-factor authenticaton provider CRYPTOCard, said the hack had wider implications for the security sphere.

"The fact that a high profile military website can be targeted shows the underlining issues facing organisations and the threat of cyber crime," Hart said.

"Fundamentally this shows that the basic forms of attack can still be executed successfully on very secure sites through the simple tools to obtain the username and password."

Graham Cluley, senior technology consultant for Sophos, labelled the hack “embarrassing.”

“If someone with more malice in mind had hacked the site they could have used it to post malicious links on the Navy's JackSpeak blog, or embedded a Trojan horse into the site's main page,” Cluley said in a blog.

“It is to be hoped that the extent of this attack will be egg on the face of the Ministry of Defence, rather than a more significant assault on a website presenting the public face of an important part of the armed forces.”

This article originally appeared at itpro.co.uk

Copyright © ITPro, Dennis Publishing
Tags:

Most Read Articles

You must be a registered member of iTnews to post a comment.
| Register

Poll

How should the costs of Australia's piracy scheme be split?
Rights holders should foot the whole bill
50/50
ISPs should foot the whole bill
Government should chip in a bit
Other
Flash is heading towards its grave, and that's...
Great! Good riddance
Sad! Flash had some good qualities
Irrelevant. I don't care
What's Flash?
View poll archive

Whitepapers from our sponsors

What will the stadium of the future look like?
What will the stadium of the future look like?
New technology adoption is pushing enterprise networks to breaking point
New technology adoption is pushing enterprise networks to breaking point
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
The next era of business continuity: Are you ready for an always-on world?
The next era of business continuity: Are you ready for an always-on world?

Log In

Username:
Password:
|  Forgot your password?