User Panel
Posted: 12/18/2020 9:36:29 PM EST
Catherine Herridge (@CBS_Herridge) Tweeted:Microsoft's president tells @CBSNews "this attack is still taking place, the industry is scrambling, people in government are scrambling to get it under control, but it's not under control yet"
Link Apparently this has been going on for over a month. Yeah, most secure election ever! Here is a list so far of what agencies have been attacked Attached File |
|
|
|
|
|
Quoted: Catherine Herridge (@CBS_Herridge) Tweeted:Microsoft's president tells @CBSNews "this attack is still taking place, the industry is scrambling, people in government are scrambling to get it under control, but it's not under control yet" Link Apparently this has been going on for over a month. Yeah, most secure election ever! Here is a list so far of what agencies have been attacked https://www.AR15.Com/media/mediaFiles/288245/a632ed55-e779-4482-aea3-c100b8589aa6_jpg-1737681.JPG View Quote This is the tip of the iceberg. |
|
i wonder what the actual fallout from this will wind up looking like.
it's incredible. |
|
Could the “tools” recently stolen from that cyber security company be aiding “these” hackers?
|
|
I thought I’d read somewhere today that the attack has been going on for 8-9 months and it’s just in the last month that it was discovered.
|
|
Quoted: Catherine Herridge (@CBS_Herridge) Tweeted:Microsoft's president tells @CBSNews "this attack is still taking place, the industry is scrambling, people in government are scrambling to get it under control, but it's not under control yet" Link Apparently this has been going on for over a month. Yeah, most secure election ever! Here is a list so far of what agencies have been attacked https://www.AR15.Com/media/mediaFiles/288245/a632ed55-e779-4482-aea3-c100b8589aa6_jpg-1737681.JPG View Quote A great many security programs are "security theater" to pad the pockets of executives and nothing more. |
|
Quoted: Which 3 states? View Quote Not sure, I'm seeing where is just wasn't the US but several countries as well. TBH, I starting to think that German Server story may have some validity! How the hell was this kept from the American Public and how is Republican's/Mitch saying Biden was elected fairly! |
|
|
|
Whoever os responsible be it China or Russia we should cripple them
|
|
Quoted: I just want to say that having almost 20 years in as a "security professional", with most of it centered around cyber crime, incident response, threat intelligence and a good bit of exposure to Corporate America and the Government, I'm not surprised at all they got butt fucked. A great many security programs are "security theater" to pad the pockets of executives and nothing more. View Quote My exposure to .gov IT is much more limited than yours (3 years here), but I'm utterly fucking astounded and how much 'zero fucks given' is taken to IT security where I work. It wasn't until we got hit with a virus that my boss went "how did this happen?!" like it was some fucking surprise. I won't list the details, but guessable passwords, deprecated unpatched OS's running in the LE side of things, passwords written on post it notes, you name it were abound. Hell we still have an ASA running code from 10 years ago that has never been patched, and that's our primary firewall. |
|
|
|
Sorry citizens we are going to have to shut down the power grid for 2 weeks.... You know, too slow the curve.
|
|
World War 3 will start with computer hacks. The Chicoms could probably take down our power grid at anytime
Completely fuck our nationwide commerce network |
|
Quoted: @navvet89 My exposure to .gov IT is much more limited than yours (3 years here), but I'm utterly fucking astounded and how much 'zero fucks given' is taken to IT security where I work. It wasn't until we got hit with a virus that my boss went "how did this happen?!" like it was some fucking surprise. I won't list the details, but guessable passwords, deprecated unpatched OS's running in the LE side of things, passwords written on post it notes, you name it were abound. Hell we still have an ASA running code from 10 years ago that has never been patched, and that's our primary firewall. View Quote View All Quotes View All Quotes Quoted: Quoted: I just want to say that having almost 20 years in as a "security professional", with most of it centered around cyber crime, incident response, threat intelligence and a good bit of exposure to Corporate America and the Government, I'm not surprised at all they got butt fucked. A great many security programs are "security theater" to pad the pockets of executives and nothing more. My exposure to .gov IT is much more limited than yours (3 years here), but I'm utterly fucking astounded and how much 'zero fucks given' is taken to IT security where I work. It wasn't until we got hit with a virus that my boss went "how did this happen?!" like it was some fucking surprise. I won't list the details, but guessable passwords, deprecated unpatched OS's running in the LE side of things, passwords written on post it notes, you name it were abound. Hell we still have an ASA running code from 10 years ago that has never been patched, and that's our primary firewall. it's like that just about everywhere. In my experience executive leaderships concerns center around looking good, keeping audit and regulators off their ass and setting themselves up for the next gig. Very very rarely do they actually have the skill sets, wherewithal and fucks to give to do the right thing. My current employer only has about 3 people that have any real experience, the rest of the organizations leadership and worker bees have a complete lack of understanding of basic information security concepts. This is a Fortune 100 mind you. |
|
I think this is less an attack and more someone keeps leaving doors open or outright uplinking shit to sites to allow access. Is it no wonder they can’t stop it if people are actively allowing it?
ETA Covid restrictions in fed buildings has allowed people to have access to things without a lot of eyes around. It’s been way easier to deploy this shit. |
|
Quoted: Whoever os responsible be it China or Russia we should cripple them View Quote Funny Dancing Puppet Show for Kids Edwin Starr - War (Original Video - 1969) |
|
Did the Chinese not get their passwords from the transition team yet?
Kharn |
|
Quoted: it's like that just about everywhere. In my experience executive leaderships concerns center around looking good, keeping audit and regulators off their ass and setting themselves up for the next gig. Very very rarely do they actually have the skill sets, wherewithal and fucks to give to do the right thing. My current employer only has about 3 people that have any real experience, the rest of the organizations leadership and worker bees have a complete lack of understanding of basic information security concepts. This is a Fortune 100 mind you. View Quote +1 |
|
|
Quoted: I think this is less an attack and more someone keeps leaving doors open or outright uplinking shit to sites to allow access. Is it no wonder they can't stop it if people are actively allowing it? View Quote What it is though could allow someone to severely fuck with our country at the core. I'm talking Defensive, Power, Commerce, Comms, you name it. We go tossing a nuke at this perp, and they might be able turn off the power. I'm not saying they can do it, I'm saying whoever did this knows what the fuck they're doing, and they spent a shit ton of time and capital to make it happen. The payload however, nobody knows. |
|
|
|
Quoted: I thought I’d read somewhere today that the attack has been going on for 8-9 months and it’s just in the last month that it was discovered. View Quote That's why Trump shitcanned the cyber security chief. This attack is just a culmination of all those smaller information gathering hacks. |
|
|
|
|
Quoted: View Quote I discovered the last reboot was 2012. I brought it up to my supervisor. He said "yeah, I know. I'm afraid if we reboot it, it won't come back up." My response "Why the fuck is it in production then?!" It's still in production. Still unpatched and still not rebooted since 12. |
|
|
|
I do a lot of contract work with an international Fortune 500 company.
I would routinely find things like Windows servers with domain admin users left logged in indefinitely. VNC (and there's part of the problem) into a server expecting to log in, get someone else's open session. Or log into a server and see it's waiting to install cumulative security updates from 6+ months ago. Someone should have seen this in SCCM, received an alert or anything.. Nope, ignored. Passwords on almost every account never changed. So when they got hacked this year, almost lost all their DCs and infra to ransomware, and had passwords reset on almost all domain admin users, I was not surprised. Then all of their data went up for sale on the dark web. They even wiped all tape backups that were inserted into backup servers worldwide. Backups to NAS? Stored on public shares, now all encrypted and worthless Tip off that something was coming... All of the infosec team members had unpronouncable Indian names and accents to match. Those guys don't give a fuck. |
|
|
Quoted: Why doesn't Congress declare war? View Quote |
|
|
Something to put in context. There were confirmed around 20,000 customers affected.
Government regulations require you monitor certain controls in certain ways. In the DoD space (most other agencies have a similar process) for approved products list. DISA posts the APL. The APL says what products can be used to perform certain functions. Overall it is a good thing. Until a thing like this happens. Now if the OTHER controls are PROPERLY implemented there is a greatly limited scope. It is kinda like saying there is a problem with the brass in military supply and someone starts a thread asking why it is all Lake City. |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.