User Panel
|
Quoted: Sorry citizens we are going to have to shut down the power grid for 2 weeks.... You know, too slow the curve. View Quote DOE is saying that their business networks are impacted, but they maintain pretty tight controls on access to the internal networks used with powerplants, particularly the nuke plants. I briefly worked on a DOE contract and the restrictions were pretty strict (such as no USB devices that had not been certified through their security group, with immediate reporting requirements if you see anybody using one that does not have the appropriate clearance markings). |
|
Quoted: I thought I’d read somewhere today that the attack has been going on for 8-9 months and it’s just in the last month that it was discovered. View Quote That’s usually how it works. You finally find out there’s something going on and perform forensics to see how long and a whole host of other stuff. |
|
Quoted: @navvet89 My exposure to .gov IT is much more limited than yours (3 years here), but I'm utterly fucking astounded and how much 'zero fucks given' is taken to IT security where I work. It wasn't until we got hit with a virus that my boss went "how did this happen?!" like it was some fucking surprise. I won't list the details, but guessable passwords, deprecated unpatched OS's running in the LE side of things, passwords written on post it notes, you name it were abound. Hell we still have an ASA running code from 10 years ago that has never been patched, and that's our primary firewall. View Quote Public/private entities spend more money, time and effort on compliance. This is because the auditors are more visible than the attackers. I also have been in cybersecurity for 20 years and the money spent on compliance blows away the true defensive measures investment. |
|
|
Quoted: it's like that just about everywhere. In my experience executive leaderships concerns center around looking good, keeping audit and regulators off their ass and setting themselves up for the next gig. Very very rarely do they actually have the skill sets, wherewithal and fucks to give to do the right thing. My current employer only has about 3 people that have any real experience, the rest of the organizations leadership and worker bees have a complete lack of understanding of basic information security concepts. This is a Fortune 100 mind you. View Quote Yep, like navvet89 says, there is a serious gap in skilled individuals vs demand. The upside for us security professionals is very good compensation. The downside is companies never focus on the right things because of the difficulty in execs understanding the value of securing their shit. |
|
Hillary, Obama and Kerry sold the Chinese back door access to every server the US government owns.
|
|
A shame they aren't targeting Facebook, Twitter, Alphabet, ABC, CBS, NBC, CNN....
|
|
Quoted: it's like that just about everywhere. In my experience executive leaderships concerns center around looking good, keeping audit and regulators off their ass and setting themselves up for the next gig. Very very rarely do they actually have the skill sets, wherewithal and fucks to give to do the right thing. My current employer only has about 3 people that have any real experience, the rest of the organizations leadership and worker bees have a complete lack of understanding of basic information security concepts. This is a Fortune 100 mind you. View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: I just want to say that having almost 20 years in as a "security professional", with most of it centered around cyber crime, incident response, threat intelligence and a good bit of exposure to Corporate America and the Government, I'm not surprised at all they got butt fucked. A great many security programs are "security theater" to pad the pockets of executives and nothing more. My exposure to .gov IT is much more limited than yours (3 years here), but I'm utterly fucking astounded and how much 'zero fucks given' is taken to IT security where I work. It wasn't until we got hit with a virus that my boss went "how did this happen?!" like it was some fucking surprise. I won't list the details, but guessable passwords, deprecated unpatched OS's running in the LE side of things, passwords written on post it notes, you name it were abound. Hell we still have an ASA running code from 10 years ago that has never been patched, and that's our primary firewall. it's like that just about everywhere. In my experience executive leaderships concerns center around looking good, keeping audit and regulators off their ass and setting themselves up for the next gig. Very very rarely do they actually have the skill sets, wherewithal and fucks to give to do the right thing. My current employer only has about 3 people that have any real experience, the rest of the organizations leadership and worker bees have a complete lack of understanding of basic information security concepts. This is a Fortune 100 mind you. And those auditors are frequently barely literate in the subject at hand. Working at a credit card processing company, I was given responsibility for dealing with the auditors after the previous admin who had been doing so thankfully transferred to another department (she was WORSE than useless - she generated EXTRA work for everyone else through her incompetence and refusal to follow advice or instructions, causing several outages). The auditors wanted to be sure changes to certain system files were tracked, so they required that the servers send an unencrypted email weekly with a diff comparison of a number of files - including both the password and shadow password files, and we had to provide a copy of such emails during an audit. I'll note that the scripts set up to do this did NOT update the reference copies of those files being checked, so this was a diff comparison between the current files on the system and those that existed at the time the script was created. I explained to the next auditor exactly WHY that was a really bad idea and she agreed with me and dropped it from the audit requirements. The very next auditor, after I was laid off, insisted that it be restored and it was. From what I understand, over a decade later, it's still an audit requirement. (as everybody who has the least bit of clue about what sort of information would be useful to have if you wanted to hack a server goes into convulsions reading this). That was at one of the largest credit card processing companies in the US, and knowing that an incompetent ass of a VP who worked there went to work for the competition after being shown the door because I revealed his incompetence to the right person, I have zero hopes that that other company is any better. I've also worked for a Big Four accounting firm and assisted with audits, and seen the internal documentation they maintained, that particular one was still using documentation and criteria for a version of an operating system that had gone end of life two years prior, and had nothing more current that I could find in any of my searches, and I couldn't even find who to contact to update that documentation. |
|
Quoted: This has been going on since March 2020. They just found it recently. This is the tip of the iceberg. View Quote View All Quotes View All Quotes Quoted: Quoted: Catherine Herridge (@CBS_Herridge) Tweeted:Microsoft's president tells @CBSNews "this attack is still taking place, the industry is scrambling, people in government are scrambling to get it under control, but it's not under control yet" Link Apparently this has been going on for over a month. Yeah, most secure election ever! Here is a list so far of what agencies have been attacked https://www.AR15.Com/media/mediaFiles/288245/a632ed55-e779-4482-aea3-c100b8589aa6_jpg-1737681.JPG This is the tip of the iceberg. Access cost money. Someone paid a lot. Someone else copied and pasted. Now it's a convenient excuse. |
|
Quoted: DOE is saying that their business networks are impacted, but they maintain pretty tight controls on access to the internal networks used with powerplants, particularly the nuke plants. I briefly worked on a DOE contract and the restrictions were pretty strict (such as no USB devices that had not been certified through their security group, with immediate reporting requirements if you see anybody using one that does not have the appropriate clearance markings). View Quote View All Quotes View All Quotes Quoted: Quoted: Sorry citizens we are going to have to shut down the power grid for 2 weeks.... You know, too slow the curve. DOE is saying that their business networks are impacted, but they maintain pretty tight controls on access to the internal networks used with powerplants, particularly the nuke plants. I briefly worked on a DOE contract and the restrictions were pretty strict (such as no USB devices that had not been certified through their security group, with immediate reporting requirements if you see anybody using one that does not have the appropriate clearance markings). |
|
|
Whomever is doing it has full knowledge that there won't be any consequences from this current admin or the potential next admin.
|
|
Quoted: Where do you think you go for work if your skillsets still involve ancient things like HP-UX, Solaris and VMS View Quote View All Quotes View All Quotes Quoted: Quoted: lol the other problem that shit you had to run it on was so old it belonged in a museum and was constantly breaking . I hadn't seen those servers types since 1999 Where do you think you go for work if your skillsets still involve ancient things like HP-UX, Solaris and VMS I've had to touch two of the three within the past two years, and got contacted by a recruiter about one of them today. Thankfully, VMS is nowhere on my resume, I barely remember having to do some class assignments on it in the early '90's. |
|
We need a strong leader like biden or Harris to handle stuff like this
|
|
Quoted: Fuck it. My Commodores are safe. https://www.AR15.Com/media/mediaFiles/334993/IMG_2834_jpg-1737727.JPG View Quote This is why Arfcom should have a "like" button. |
|
Quoted: You two don't have a fucking clue what you're talking about. This is, quite possibly, the biggest cyber attack in history. Certainly the most sophisticated. View Quote View All Quotes View All Quotes Quoted: Quoted: Nothing is happening. This is all just another 'breaking news' story to distract people from reality. Another red herring...another nothing burger. Wake me up when there is a single, tangible outcome that impacts any of us directly. Quoted: Government networks get attacked every day multiple times a day. They got more at the link? Otherwise I'm going with sensational nothing burger. You two don't have a fucking clue what you're talking about. This is, quite possibly, the biggest cyber attack in history. Certainly the most sophisticated. |
|
Quoted: How long would it take you to patch 100 virtual servers, reboot them, comfirm they are all back online, After hours? At a 24/7/365 operation. Who does your firewalls? All your switch firmwares? How about your vcenter servers? Nimble SAN arrays. Cisco UCS chassis and host firmwares? Load balancers? Like I said, its a full time job just to manage updates and most IT staff is just trying to troubleshoot the day to day and meet the ever demanding needs of the sheeple . View Quote View All Quotes View All Quotes Quoted: Quoted: Monthly and I automated it all with PowerShell and SCCM. It can be done, it just doesn't get done. How long would it take you to patch 100 virtual servers, reboot them, comfirm they are all back online, After hours? At a 24/7/365 operation. Who does your firewalls? All your switch firmwares? How about your vcenter servers? Nimble SAN arrays. Cisco UCS chassis and host firmwares? Load balancers? Like I said, its a full time job just to manage updates and most IT staff is just trying to troubleshoot the day to day and meet the ever demanding needs of the sheeple . And 100 virtual servers is a small installation. There's a reason Ansible is gaining so much traction, but it operates single-threaded, so if you've got a narrow window for updates, you may have to update only a small number of servers per window. |
|
Huh, interesting.
My company had some network issues for a few hours the other day due to getting DDoS'd. |
|
Quoted: Yep, like navvet89 says, there is a serious gap in skilled individuals vs demand. The upside for us security professionals is very good compensation. The downside is companies never focus on the right things because of the difficulty in execs understanding the value of securing their shit. View Quote View All Quotes View All Quotes Quoted: Quoted: it's like that just about everywhere. In my experience executive leaderships concerns center around looking good, keeping audit and regulators off their ass and setting themselves up for the next gig. Very very rarely do they actually have the skill sets, wherewithal and fucks to give to do the right thing. My current employer only has about 3 people that have any real experience, the rest of the organizations leadership and worker bees have a complete lack of understanding of basic information security concepts. This is a Fortune 100 mind you. Yep, like navvet89 says, there is a serious gap in skilled individuals vs demand. The upside for us security professionals is very good compensation. The downside is companies never focus on the right things because of the difficulty in execs understanding the value of securing their shit. The other part of the equation is that companies doing hiring are frequently using automated applicant tracking systems that are retarded, so unless your resume has the exact keywords they want, it gets rejected, even if you said the same thing in a different way. Plus, of course, they want certifications which are largely useless in many cases. |
|
Quoted: Whomever is doing it has full knowledge that there won't be any consequences from this current admin or the potential next admin. View Quote One of the difficulties is that it's an EXTREMELY deniable attack vector, frequently using systems they've already compromised to attack others, and hosting stuff in countries that don't have the resources or laws to do anything about it. Backtrack an attack and it's a system that was compromised earlier with no logs to indicate where it was compromised from. |
|
Quoted: I've had to touch two of the three within the past two years, and got contacted by a recruiter about one of them today. Thankfully, VMS is nowhere on my resume, I barely remember having to do some class assignments on it in the early '90's. View Quote Which VMS are you guys referring to? HHS-OIG occasionally uses VMS and that shit is like Oregon Trail old. |
|
My direct source is that the FBI asked CrowdStrike to stop announcing all the companies they are repairing. No idea why.
Also same person said that many agencies are hit very hard with this. I know mine is clean for now....but the bad thing is we are 100% Azure so that worries me now. I am getting very interesting updates every 8 hours with new things to search for....this is far from over. |
|
|
|
Quoted: My direct source is that the FBI asked CrowdStrike to stop announcing all the companies they are repairing. No idea why. Also same person said that many agencies are hit very hard with this. I know mine is clean for now....but the bad thing is we are 100% Azure so that worries me now. I am getting very interesting updates every 8 hours with new things to search for....this is far from over. View Quote |
|
|
|
Quoted: You misspelled "most responsible SES employees will take positions at IT services companies that sell solutions to government organizations". View Quote View All Quotes View All Quotes Quoted: Quoted: The fallout: The taxpayers will fund a multi-year, multi-million dollar study that will say mistakes were made but overall everybody involved was great and did the best they could, and More money needs to be spent on cyber security, but spent in the exact same manner as before the attack. No .gov employees will be fired or reprimanded. The most responsible SES employees will be promoted. You misspelled "most responsible SES employees will take positions at IT services companies that sell solutions to government organizations". You are correct. I did misspell that one. |
|
Quoted: Lol, most of the CIA’s in house hacking tools were already leaked in the “Vault 7” leaks. Just a tip, don’t open source your sensitive software to government contractors.... View Quote View All Quotes View All Quotes Quoted: Quoted: Could the “tools” recently stolen from that cyber security company be aiding “these” hackers? Lol, most of the CIA’s in house hacking tools were already leaked in the “Vault 7” leaks. Just a tip, don’t open source your sensitive software to government contractors.... FireEye said everything was standard red team stuff. They were just a victim but I believe with a twist. I wish I was more plugged into the vulnerability market this week, just to see what happened to prices. |
|
Quoted: Catherine Herridge has always seemed to me to be a no nonsense,no bullshit reporter..... I wonder why she left Fox? View Quote View All Quotes View All Quotes Quoted: Quoted: Yeah, I was kinda shocked CBS is reporting this. Heritage has been pretty solid on her reporting considering. Catherine Herridge has always seemed to me to be a no nonsense,no bullshit reporter..... I wonder why she left Fox? They screwed her on her contract and she had been suing for years. Her contract ran out and instead of paying her what she was asking they watched her walk out the door. |
|
In a lot of ways, I am glad I got out of this shit. I managed the company's network for about 20 years. No love lost on any time I spent on that side job. Eventually it was outsourced and everything was done remotely. Gone were the days of airgaped backups stored offsite and off line. I wish them well - well not really.
|
|
Quoted: Which VMS are you guys referring to? HHS-OIG occasionally uses VMS and that shit is like Oregon Trail old. View Quote View All Quotes View All Quotes Quoted: Quoted: I've had to touch two of the three within the past two years, and got contacted by a recruiter about one of them today. Thankfully, VMS is nowhere on my resume, I barely remember having to do some class assignments on it in the early '90's. Which VMS are you guys referring to? HHS-OIG occasionally uses VMS and that shit is like Oregon Trail old. Probably the same one, it was old and considered out of date in the '90's, I think the cluster where we did that assignment was upgraded to something else a quarter or two later. |
|
|
|
cyber security in the USA is a fucking joke.
inherent vulnerability built right in, plus the lax policies about the use of handheld data gathering devices and people of suspect origin.. keep all that sensitive shit connected to the www |
|
Quoted: Public/private entities spend more money, time and effort on compliance. This is because the auditors are more visible than the attackers. I also have been in cybersecurity for 20 years and the money spent on compliance blows away the true defensive measures investment. View Quote View All Quotes View All Quotes Quoted: Quoted: @navvet89 My exposure to .gov IT is much more limited than yours (3 years here), but I'm utterly fucking astounded and how much 'zero fucks given' is taken to IT security where I work. It wasn't until we got hit with a virus that my boss went "how did this happen?!" like it was some fucking surprise. I won't list the details, but guessable passwords, deprecated unpatched OS's running in the LE side of things, passwords written on post it notes, you name it were abound. Hell we still have an ASA running code from 10 years ago that has never been patched, and that's our primary firewall. Public/private entities spend more money, time and effort on compliance. This is because the auditors are more visible than the attackers. I also have been in cybersecurity for 20 years and the money spent on compliance blows away the true defensive measures investment. |
|
Quoted: Government networks get attacked every day multiple times a day. They got more at the link? Otherwise I'm going with sensational nothing burger. View Quote Attached File |
|
|
Quoted: Ya think? I putty'd into it one day about 3 years ago to look at some logs. I discovered the last reboot was 2012. I brought it up to my supervisor. He said "yeah, I know. I'm afraid if we reboot it, it won't come back up." My response "Why the fuck is it in production then?!" It's still in production. Still unpatched and still not rebooted since 12. View Quote This is awesome. |
|
|
Have they tried rebooting the computers?
A great reset if you will. |
|
|
Quoted: Fuck it. My Commodores are safe. https://www.AR15.Com/media/mediaFiles/334993/IMG_2834_jpg-1737727.JPG View Quote You just took me back to my teenage years! Thank you |
|
User friendly and cost driven decisions undercut security everyday in IT.
|
|
Quoted: Quoted: Quoted: What department is responsible for sounding the purge siren? WASHINGTON (AP) President Donald Trump on Tuesday fired the director of the federal agency that vouched for the reliability of the 2020 election. President Trump fired Christopher Krebs in a tweet, saying his recent statement defending the security of the election was "highly inaccurate." |
|
|
Least we forget the enemy is gainfully employed the US Government and has been for quite awhile..
https://www.forbes.com/sites/frankminiter/2017/07/26/this-exploding-dnc-story-is-crazier-than-fiction-maybe-rep-wasserman-schultz-can-explain/?sh=e259e8344144 |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.