Official: Hackers tried repeatedly to attack Obamacare website
updated 10:32 PM EST, Wed November 13, 2013
Washington (CNN) -- Hackers have attempted more than  a dozen cyber attacks against the Obamacare website, according to a top  Homeland Security Department official.The attacks, which are under investigation, failed, said the official.
Authorities also are  investigating a separate report of a tool designed to put heavy strain  on HealthCare.gov through a so-called distributed denial of service. It  does not appear to have been activated.
"We received about 16  reports from HHS that are under investigation and one open source report  about a denial of service," according to Acting Assistant Homeland  Security Secretary Roberta Stempfley of the Office of Cybersecurity and  Communications.
Stempfley testified at a  hearing of the House Homeland Security Committee that the attempts were  made between November 6 and November 8, but none were successful.
The DDOS program, called  "Destroy Obama Care," was recently spotted on a "torrent" file sharing  web page, and first reported last week on a blog by Arbor Networks,  which said it found no evidence the program had actually been launched  to attack the troubled federal portal for consumers to shop for health  coverage.
"We have not monitored  any attacks. We have not seen any sizable, or anything to believe that  these problems are related to DDOS," said Dan Holden director of  security research for Arbor Networks, adding "I don't believe that the  problems with the site's availability is due to any kind of DDOS  attack."
In a separate hearing, a  top Health and Human Services official, Chief Information Officer Frank  Baitman, said his department had engaged an "ethical hacker" on staff  to test the defenses of the health care site.
The hacker discovered between seven and 10 items related to attempted security breaches which were disclosed in a report.
Baitman said he would not describe these items as serious and said the majority had been resolved.
The use of hackers employed to test on line site security is common, Holden said.
"That's pretty standard  practice, generally referred to as penetration testing," Holden told  CNN. "There are many companies and individuals out there that have done  that for a very long time. The idea being, you want to know where your  weaknesses are and what the potential of attacks could be."
But others are still concerned about the security of the site.
In statements made  before the House Homeland Security hearing, database expert Luke Chang  --whose company did not work on HealthCare.gov -- provided his technical  assessment, saying that the problem with the roll out of the website  was far deeper than "too many users."
Chang said that in his  estimation the skill set of the designers of the website were subpar,  adding that "when you have an environment where the developer can barely  get the web site functional, security is way down on the list of things  to take care of. Security has to be built-in at the very beginning not  at the very end."
But, critical  infrastructure protection specialist and CEO of Lunarline, Inc., Waylon  Krush told the committee, "There's not a system out there that's perfect  in nature, by any means, from a cybersecurity perspective."
"You would assume that for hundreds of millions of dollars it would be a secure site," said Chang.
0 comments:
Post a Comment