{"id":741,"date":"2009-10-19T15:06:12","date_gmt":"2009-10-19T08:06:12","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=741"},"modified":"2009-10-19T15:06:12","modified_gmt":"2009-10-19T08:06:12","slug":"nsa-red-team-secret-ops-is-gay","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2009\/10\/nsa-red-team-secret-ops-is-gay\/","title":{"rendered":"NSA Red Team Secret Ops is gay"},"content":{"rendered":"<p>NSA Red Team is like the special forces units of the security industry\u2014highly skilled teams that clients pay to break into the clients\u2019 own networks. These guys find the security flaws so they can be patched before someone with more nefarious plans sneaks in. The NSA has made plenty of news in the past few years for warrantless wiretapping and massive data-mining enterprises of questionable legality, but one of the agency\u2019s primary functions is the protection of the military\u2019s secure computer networks, and that\u2019s where the red team comes in.<\/p>\n<p><!--more-->So why NSA Red Team Secret Ops is gay?<\/p>\n<p>Well it appears, according to the site defacement archive hosted at Zone-H, that on or around October 5th an NSA web site application was the victim of an SQL injection exploit resulting in a web site defacement. A web application loading a list of recruitment events at colleges was compromised on the careers section of\u00a0<a style=\"border-top-width: 0px; border-right-width: 0px; border-bottom-width: 1px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; color: #3a6999; text-decoration: none; outline-style: none; outline-width: initial; outline-color: initial; border-bottom-style: solid; border-bottom-color: #eeeeee; padding: 0px; margin: 0px;\" href=\"http:\/\/www.nsa.gov\/applications\/careers\/recruit_events\/\">nsa.gov<\/a>.<\/p>\n<h4>10\/05\/2009 Appearance:<\/h4>\n<p><a href=\"http:\/\/deepquest.code511.com\/blog\/wp-content\/uploads\/2009\/10\/nsa_hack11-300x271.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-742\" title=\"nsa_hack\" src=\"http:\/\/deepquest.code511.com\/blog\/wp-content\/uploads\/2009\/10\/nsa_hack11-300x271.jpg\" alt=\"nsa_hack\" width=\"300\" height=\"271\" \/><\/a><\/p>\n<p>correct appearance:<\/p>\n<p><a href=\"http:\/\/deepquest.code511.com\/blog\/wp-content\/uploads\/2009\/10\/nsa_hack2-300x239.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-743\" title=\"nsa_hack2\" src=\"http:\/\/deepquest.code511.com\/blog\/wp-content\/uploads\/2009\/10\/nsa_hack2-300x239.jpg\" alt=\"nsa_hack2\" width=\"300\" height=\"239\" \/><\/a><\/p>\n<p>T<span style=\"font-size: 12px;\">he attacker, using the handle <strong>SQL_Master<\/strong>, is attributed on Zone-H to site defacements of Google Tokelau (a territory in New Zealand) and a Microsoft property in Korea. He has been associated with the Jurm team, a Moroccan hacker group known primarily for web site defacements of the Isreali version web sites of major companies, for example Kia, Sprite, and Fanta.<\/span><\/p>\n<p style=\"margin-top: 0px; margin-right: 0px; margin-bottom: 1em; margin-left: 0px; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; text-align: justify; line-height: 1.6em; padding: 0px; border: 0px initial initial;\">A Microsoft defacement attributed to SQL_Master from July of this year references \u201cAgd_Scrop, free him\u201d. Agd_Scorp was part of a Turkish hacker group called Peace Crew that defaced NATO and U.S. military web sites as a political reaction to Operation Cast Lead or more commonly the Gaza War where Israel and Hamas forces clashed in December 2008. The two groups are known to have partnered in defacements at the beginning of this year during the conflict in what was termed a virtual war where a few thousand Israeli web sites were defaced. Agd_Scrop appears to have been arrested by Kayseri (central Turkey) police over the summer, and faces up to 20 years in prison on various cybercrime related charges.<\/p>\n<p>Red Team can&#8217;t protect their own assets? Seems like.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>according to the site defacement archive hosted at Zone-H, that on or around October 5th an NSA web site application was the victim of an SQL injection exploit <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[75,76],"class_list":["post-741","post","type-post","status-publish","format-standard","hentry","category-security","tag-nsa","tag-red-team"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-bX","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=741"}],"version-history":[{"count":1,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/741\/revisions"}],"predecessor-version":[{"id":744,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/741\/revisions\/744"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}