#### [Security](/security/)**5** Green Berets storm building after hacking its Wi-Fi===================================================**5** Relax, it’s just a drill. This time at least.———————————————[Iain Thomson](/Author/Iain-Thomson ‘Read more by this author’) Fri 30 Aug 2024 // 21:00 UTC [](https://www.reddit.com/submit?url=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=Green%20Berets%20storm%20building%20after%20hacking%20its%20Wi-Fi) [](https://twitter.com/intent/tweet?text=Green%20Berets%20storm%20building%20after%20hacking%20its%20Wi-Fi&url=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=Green%20Berets%20storm%20building%20after%20hacking%20its%20Wi-Fi&summary=Relax%2c%20it%27s%20just%20a%20drill.%20This%20time%20at%20least.) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) US Army Special Forces, aka the Green Berets, have been demonstrating their hacking chops in the recent Swift Response 24 military exercises in May, the military has now confirmed.The elite team, one of whose remits is unconventional warfare, includes Operational Detachment Alpha (ODA), highly trained, mature soldiers with intensively honed skills. These now include hacking, as the military demonstrated with a target building near Skillingaryd in Sweden stormed by members of the 10th Special Forces Group.’What this allows us to do is target an objective, use the signaling equipment to gain access to any Wi-Fi networks originating at the target, and then monitor activity from that location for a period of time,’ an identity-protected ODA team member [explained](https://www.army.mil/article/279281/green_berets_use_disruptive_cyber_technology_during_swift_response_2024). ![](https://pubads.g.doubleclick.net/gampad/ad?co=1&iu=/6978/reg_security/front&sz=300×50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2ZtLp8GlqN0spU9XXiwiTbgAAAk0&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0)’It’s a very useful tool for us, because it gives us another set of eyes and helps to paint a clearer picture of our objective.’ ![army](https://regmedia.co.uk/2024/08/30/army.jpg?x=648&y=432&infer_y=1 ‘army’)Prepping the way for an attack. Source: Sgt. 1st Class Tim Beery – Click to enlargeThe building in question was scanned using an unnamed remote access device (RAD) to identify the Wi-Fi networks running its security systems from what looks like an undercover van. After cracking the password, the team moved around the network, shutting off CCTV cameras, opening secured doors, and disabling other security systems.In the second phase of the attack, another team parachuted in seven miles from the target, reconnoitered the area, entered the now unsecured building, and left ‘signal jamming equipment to clear any trace of the attack.’ Judging from the released photos, they also left a laptop behind playing Rick Astley’s Never Gonna Give You Up; just because you’re an elite trooper doesn’t mean you can’t have a sense of humor. ![rick](https://regmedia.co.uk/2024/08/30/rick.jpg?x=648&y=432&infer_y=1 ‘rick’)The laptop on the left appears to be rickrolling Green Berets-style. Source: Sgt. 1st Class Tim Beery – Click to enlarge’In a real-world situation, this would allow us to gain information in a way that we haven’t always had,’ explained the commander of the digital ODA team. ‘If we have a specific target or objective we need to reach, we now have the capability to glean critical information in a way that is undetectable if we do our jobs right.’While the war in Ukraine has shown the much-expanded use of drones in the field, much of the hacking operations have been carried out behind the lines. At last year’s Black Hat conference, CISA director Jen Easterly [detailed](https://www.theregister.com/2023/08/10/cisa_ukraine_black_hat/) how Russia’s attempt to cripple Ukraine electronically had largely failed, thanks to help from the US and others, but this is one of the first times we’ve seen front-line hacking. Swift Response 24 is part of a larger NATO training session designed to demonstrate how the alliance will work together in the event of an attack on a member state, and it’s the first time that new members of the defensive alliance – Finland and Sweden – have taken part in operations. ![](https://pubads.g.doubleclick.net/gampad/ad?co=1&iu=/6978/reg_security/front&sz=300×50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44ZtLp8GlqN0spU9XXiwiTbgAAAk0&t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0)It’s one of the largest such drills in years, using more than 17,000 US and 23,000 multinational service members, and sends a pretty clear signal to countries such as Russia that NATO stands ready in case of an attack. ® [Sponsored: A hybrid multicloud world can still be seamless](https://go.theregister.com/tl/3060/shttps://www.theregister.com/2024/08/19/a_hybrid_multicloud_world_can/) Share [](https://www.reddit.com/submit?url=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=Green%20Berets%20storm%20building%20after%20hacking%20its%20Wi-Fi) [](https://twitter.com/intent/tweet?text=Green%20Berets%20storm%20building%20after%20hacking%20its%20Wi-Fi&url=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=Green%20Berets%20storm%20building%20after%20hacking%20its%20Wi-Fi&summary=Relax%2c%20it%27s%20just%20a%20drill.%20This%20time%20at%20least.) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) #### More about* [Military](/Tag/Military/)* [Security](/Tag/Security/)* [Wi-Fi](/Tag/Wi-Fi/) More like these × ### More about* [Military](/Tag/Military/)* [Security](/Tag/Security/)* [Wi-Fi](/Tag/Wi-Fi/) ### Narrower topics* [2FA](/Tag/2FA/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [CHERI](/Tag/CHERI/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Cybercrime](/Tag/Cybercrime/)* [Cybersecurity](/Tag/Cybersecurity/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [Encryption](/Tag/Encryption/)* [Exploit](/Tag/Exploit/)* [Firewall](/Tag/Firewall/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Infosec](/Tag/Infosec/)* [Kenna Security](/Tag/Kenna%20Security/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Phishing](/Tag/Phishing/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [REvil](/Tag/REvil/)* [RSA Conference](/Tag/RSA%20Conference/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Surveillance](/Tag/Surveillance/)* [TLS](/Tag/TLS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [Standards](/Tag/Standards/)* [Wi-Fi Alliance](/Tag/Wi-Fi%20Alliance/) #### More aboutShare [](https://www.reddit.com/submit?url=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=Green%20Berets%20storm%20building%20after%20hacking%20its%20Wi-Fi) [](https://twitter.com/intent/tweet?text=Green%20Berets%20storm%20building%20after%20hacking%20its%20Wi-Fi&url=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=Green%20Berets%20storm%20building%20after%20hacking%20its%20Wi-Fi&summary=Relax%2c%20it%27s%20just%20a%20drill.%20This%20time%20at%20least.) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2024/08/30/green_berets_wifi_hacking/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) **5** COMMENTS #### More about* [Military](/Tag/Military/)* [Security](/Tag/Security/)* [Wi-Fi](/Tag/Wi-Fi/) More like these × ### More about* [Military](/Tag/Military/)* [Security](/Tag/Security/)* [Wi-Fi](/Tag/Wi-Fi/) ### Narrower topics* [2FA](/Tag/2FA/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [CHERI](/Tag/CHERI/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Cybercrime](/Tag/Cybercrime/)* [Cybersecurity](/Tag/Cybersecurity/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [Encryption](/Tag/Encryption/)* [Exploit](/Tag/Exploit/)* [Firewall](/Tag/Firewall/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Infosec](/Tag/Infosec/)* [Kenna Security](/Tag/Kenna%20Security/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Phishing](/Tag/Phishing/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [REvil](/Tag/REvil/)* [RSA Conference](/Tag/RSA%20Conference/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Surveillance](/Tag/Surveillance/)* [TLS](/Tag/TLS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [Standards](/Tag/Standards/)* [Wi-Fi Alliance](/Tag/Wi-Fi%20Alliance/) #### TIP US OFF[Send us news](https://www.theregister.com/Profile/contact/)[#### Microsoft hosts a security summit but no press, public allowedop-ed CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happenedSecurity2 days -| 10](/2024/08/28/microsoft_closed_security_summit/?td=keepreading) [#### Alleged Karakut ransomware scumbag charged in USInfosec in brief Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and moreSecurity5 days -| 2](/2024/08/26/karakut_ransomware_scum_charged/?td=keepreading) [#### CrowdStrike’s meltdown didn’t dent its market dominance … yetTotal revenue for Q2 grew 32 percentSoftware2 days -| 19](/2024/08/29/crowdstrikes_q2_earnings/?td=keepreading) [#### A hybrid multicloud world can still be seamlessNutanix shows how to rule from the centerSponsored Feature](/2024/08/19/a_hybrid_multicloud_world_can/?td=keepreading) [#### Volt Typhoon suspected of exploiting Versa SD-WAN bug since Juneupdate The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructureCyber-crime4 days -| 3](/2024/08/27/chinas_volt_typhoon_versa/?td=keepreading) [#### Microsoft security tools questioned for treating employees as threatsCracked Labs examines how workplace surveillance turns workers into suspectsSecurity4 days -| 46](/2024/08/27/microsoft_workplace_surveillance/?td=keepreading) [#### Watchdog warns FBI is sloppy on secure data storage and destructionupdate National security data up for grabs, Office of the Inspector General findsSecurity5 days -| 6](/2024/08/26/fbi_data_security/?td=keepreading) [#### Microsoft’s Patch Tuesday borks dual-boot Linux-Windows PCsPlus: Three-year-old ProxyOracle flaw added to CISA’s exploited bugs listOSes10 days -| 35](/2024/08/21/microsoft_patch_dual_boot/?td=keepreading) [#### Top companies ground Microsoft Copilot over data governance concernsSecuriti’s Jack Berkowitz polled 20-plus CDOs, and half have hit pauseAI + ML10 days -| 43](/2024/08/21/microsoft_ai_copilots/?td=keepreading) [#### Iran’s Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gearThe government-backed crew also enjoys ransomware as a side hustleCyber-crime3 days -| 5](/2024/08/28/iran_pioneer_kitten/?td=keepreading) [#### GPT apps fail to disclose data collection, study findsResearchers say that implementing Actions omit privacy details and expose infoAI + ML5 hrs -| 1](/2024/08/31/gpt_apps_data_collection/?td=keepreading) [#### This uni thought it would be a good idea to do a phishing test with a fake Ebola scareNeedless to say, it backfired in a big wayCSO9 days -| 118](/2024/08/22/ucsc_phishing_test_ebola/?td=keepreading)
Related Tags:
Lemon Sandstorm
BRONZE SILHOUETTE
Volt Typhoon
Parisite
UNC757
Fox Kitten
Pioneer Kitten
Sodinokibi
REvil
Associated Indicators: