User Panel
Quoted: And its Microsoft saying it...and Gates is pushing for vaccines all the other stuff we've seen about Gates.... All tied together? View Quote View All Quotes View All Quotes Quoted: Quoted: Look for Solar Winds if you want more information. The more I read about this, the more I think that is is going to be much bigger than everyone thinks. And its Microsoft saying it...and Gates is pushing for vaccines all the other stuff we've seen about Gates.... All tied together? IMO this is all simply to keep every one scared and confused. Anyone remember that weird stuff happening with Windows before the election and of course YouTube ceasing to function for a while? Also, keep in mind, that the foreign interference angle of the election was dumped out there (ever so slightly) by the IC primarily FBI Director Wray stating the Russians were doing something and Iran was doing something. They floated it prior to the election to get it into people's heads. |
|
Quoted: It is pretty much Chernobyl for Solarwinds and future of IT management and monitoring. View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: Nothing is happening. This is all just another 'breaking news' story to distract people from reality. Another red herring...another nothing burger. Wake me up when there is a single, tangible outcome that impacts any of us directly. Quoted: Government networks get attacked every day multiple times a day. They got more at the link? Otherwise I'm going with sensational nothing burger. You two don't have a fucking clue what you're talking about. This is, quite possibly, the biggest cyber attack in history. Certainly the most sophisticated. |
|
Quoted: Should be pretty easy to come up with a usb connection that uses the same coding standard but the physical connection is different. That way there is no relying on markings. A common store bought usb would simply not be able to fit then. View Quote If it’s the same standard, it will be trivially easy to make a physical adapter from one to the other. I don’t know that you are gaining anything here. |
|
But the good news is that thanks to Senator Lee and his fellow fifth column lemmings in the GoP, we have more H1Bs getting fast tracked for green cards and citizenship
|
|
Quoted: Sounds very similar to our Environment, however our pen tests are done monthly. So long as their MSP products are not effected, we may be able to get through this without any issues. I did see a recent security notice about N-Central that has me a bit concerned though... I pushed for NAC this year, however budget wouldn't allow it. I was able to get splunk though, which is proving to be useful. View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: Quoted: Monthly and I automated it all with PowerShell and SCCM. It can be done, it just doesn't get done. How long would it take you to patch 100 virtual servers, reboot them, comfirm they are all back online, After hours? At a 24/7/365 operation. Who does your firewalls? All your switch firmwares? How about your vcenter servers? Nimble SAN arrays. Cisco UCS chassis and host firmwares? Load balancers? Like I said, its a full time job just to manage updates and most IT staff is just trying to troubleshoot the day to day and meet the ever demanding needs of the sheeple . I'm lucky to work for a CIO who came up through the trenches and gets it. We do the right things. We patch everything monthly. We have top of the line firewalls and keep them current. We have NAC. We encrypt everything in transit and at rest for critical systems. We have pen tests once a year and fix anything they find promptly. I'm proud to say this year they couldn't get in from the outside and we had to disable NAC for them to get anywhere on the inside. All this, and we still are impacted by the SolarWinds debacle. That's how bad this is. I pushed for NAC this year, however budget wouldn't allow it. I was able to get splunk though, which is proving to be useful. |
|
Quoted: People don't understand that what is happening in Cyberland, and I have said this for years. Its as if we've been fighting World War II, and it was up to Ford, GM, and the local soda shop to fight the war by themselvesm, Nazis are firebombing Ford Plants, and the response is that Ford needs to invest in more Anti-Air defense. The amount of pressure and liability on business to fight against Nation states is unsustainable. View Quote This is a pretty good description. |
|
Quoted: In before the Ukrainians (Crowdstrike) blame the Russians. It might indeed be the Russians but you're not going to find that out by asking Crowdstrike. View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: Quoted: My direct source is that the FBI asked CrowdStrike to stop announcing all the companies they are repairing. No idea why. Also same person said that many agencies are hit very hard with this. I know mine is clean for now....but the bad thing is we are 100% Azure so that worries me now. I am getting very interesting updates every 8 hours with new things to search for....this is far from over. It might indeed be the Russians but you're not going to find that out by asking Crowdstrike. |
|
My CIO said, based on how Solarwinds likely kept it a secret and how their ceo sold stock, that we are done using them and need to find alternatives.
I replied, And when they get hacked and their patches are full of trojans? Maybe a strict patch schedule is a bad thing? Face it, humans are too complacent to compete against state sponsored hacking. |
|
|
|
|
|
|
Quoted: World War 3 will start with computer hacks. The Chicoms could probably take down our power grid at anytime Completely fuck our nationwide commerce network View Quote And shut off the EBT card system. Chapter Jackson - It's Free Swipe Yo EBT (Explicit) |
|
Quoted: Probably the same one, it was old and considered out of date in the '90's, I think the cluster where we did that assignment was upgraded to something else a quarter or two later. View Quote There is a project to port OpenVMS to x86-64 and iirc it is being funded by government contract |
|
Quoted: The fallout: The taxpayers will fund a multi-year, multi-million dollar study that will say mistakes were made but overall everybody involved was great and did the best they could, and More money needs to be spent on cyber security, but spent in the exact same manner as before the attack. No .gov employees will be fired or reprimanded. The most responsible SES employees will be promoted. View Quote You know what would be great? If just one word that you typed was inaccurate. Even one word. But there's nothing inaccurate in anything you typed. |
|
Quoted: I have zero doubt that, via whatever the cause, foreign governments can access the vast majority of our nation's 'secure networks' - remotely and with little evidence they did. View Quote Not one person so far in this thread has mentioned our "dirty hands". We do AS MUCH of the same shit, and more, going all the way back to IBM and Compaq and HP. We simply got very beat at a game WE THOUGHT that we and the UK and Israel perfected. Time for us to fuck off with a bunch of H1B visas and step up our game. |
|
Quoted: @navvet89 My exposure to .gov IT is much more limited than yours (3 years here), but I'm utterly fucking astounded and how much 'zero fucks given' is taken to IT security where I work. It wasn't until we got hit with a virus that my boss went "how did this happen?!" like it was some fucking surprise. I won't list the details, but guessable passwords, deprecated unpatched OS's running in the LE side of things, passwords written on post it notes, you name it were abound. Hell we still have an ASA running code from 10 years ago that has never been patched, and that's our primary firewall. View Quote View All Quotes View All Quotes Quoted: Quoted: I just want to say that having almost 20 years in as a "security professional", with most of it centered around cyber crime, incident response, threat intelligence and a good bit of exposure to Corporate America and the Government, I'm not surprised at all they got butt fucked. A great many security programs are "security theater" to pad the pockets of executives and nothing more. My exposure to .gov IT is much more limited than yours (3 years here), but I'm utterly fucking astounded and how much 'zero fucks given' is taken to IT security where I work. It wasn't until we got hit with a virus that my boss went "how did this happen?!" like it was some fucking surprise. I won't list the details, but guessable passwords, deprecated unpatched OS's running in the LE side of things, passwords written on post it notes, you name it were abound. Hell we still have an ASA running code from 10 years ago that has never been patched, and that's our primary firewall. I was a non-IT contractor until recently. On the user level, I got screamed at back in March/April because I told a government customer we couldn't use Zoom because it was a major Chinese security risk, like it was my direction. And then they'd bring it up every damn time we had trouble with virtual meetings that we could just use zoom. I honestly think part of the reason we pay contractor IT/cybersec guys so much is because otherwise they'd just fucking quit rather than deal with their customers. |
|
Quoted: Quoted: And 100 virtual servers is a small installation. There's a reason Ansible is gaining so much traction, but it operates single-threaded, so if you've got a narrow window for updates, you may have to update only a small number of servers per window. Ansible runs tasks in parallel by default. link OK, the place I contracted that was using it must have had really low parallelism set, I wasn't given access to the raw playbooks to look at due to security concerns. |
|
Quoted: OK, the place I contracted that was using it must have had really low parallelism set, I wasn't given access to the raw playbooks to look at due to security concerns. View Quote You can definitely set it to not run in parallel, though. We do for a team that only wants one of their boxes down at a time when we patch them. |
|
Quoted: My CIO said, based on how Solarwinds likely kept it a secret and how their ceo sold stock, that we are done using them and need to find alternatives. I replied, And when they get hacked and their patches are full of trojans? Maybe a strict patch schedule is a bad thing? Face it, humans are too complacent to compete against state sponsored hacking. View Quote Rule #1 in CyberSecurity. 1. Patch, patch, patch. |
|
Quoted: I was a non-IT contractor until recently. On the user level, I got screamed at back in March/April because I told a government customer we couldn't use Zoom because it was a major Chinese security risk, like it was my direction. And then they'd bring it up every damn time we had trouble with virtual meetings that we could just use zoom. I honestly think part of the reason we pay contractor IT/cybersec guys so much is because otherwise they'd just fucking quit rather than deal with their customers. View Quote And yes, I could go on and on and on about bullshit. I actually told my supervisor I was going to write a book about the fucking retardedness of government, even at my local county level; especially from a Security aspect. |
|
For those saying the Chinese could shut down our power grid.. what makes you think we can't shut down theirs as well?
|
|
Quoted: For those saying the Chinese could shut down our power grid.. what makes you think we can't shut down theirs as well? View Quote |
|
Quoted: I'm sure if they seriously attack us like that they will mysteriously lose their ability to control the spill gates at Three Rivers then have to watch that disaster happen in slow motion. View Quote View All Quotes View All Quotes Quoted: Quoted: For those saying the Chinese could shut down our power grid.. what makes you think we can't shut down theirs as well? I have zero doubt the capability exists for us to wreck them as much as they can wreck us. It sort of falls under MAD IMO but there are people here who can speak far more clearly at a high level of cyber attack thought process in the US without getting too into classified info. |
|
|
|
Quoted: Quoted: People don't understand that what is happening in Cyberland, and I have said this for years. Its as if we've been fighting World War II, and it was up to Ford, GM, and the local soda shop to fight the war by themselvesm, Nazis are firebombing Ford Plants, and the response is that Ford needs to invest in more Anti-Air defense. The amount of pressure and liability on business to fight against Nation states is unsustainable. This is a pretty good description. If they gave half of a shit about security, they would stop importing H1B for the cheap & keep it domestic. Quality costs, but as long as muh Wall Street quarterly profits are the priority, the low rent cheap show will go on. |
|
|
Quoted: For those saying the Chinese could shut down our power grid.. what makes you think we can't shut down theirs as well? View Quote I know there's been a big push for years (before Trump was even a candidate) to avoid Chinese made hardware at power companies, and to keep the actual equipment that controls the power grid properly segregated from the internet. Last utility company I worked at immediately replaced all of their IBM x86 hardware once IBM sold the x86 line to Lenovo. |
|
|
Quoted: Where do you think you go for work if your skillsets still involve ancient things like HP-UX, Solaris and VMS View Quote View All Quotes View All Quotes Quoted: Quoted: lol the other problem that shit you had to run it on was so old it belonged in a museum and was constantly breaking . I hadn't seen those servers types since 1999 Where do you think you go for work if your skillsets still involve ancient things like HP-UX, Solaris and VMS VMS? I used that in the early 80's Holy crap. |
|
|
I switched my company to cloud SAS accounting, from on-prem due to a ransom wear attack we had 3 years ago. I don't have IT, so I was asking for it. Figured I'd be a lot better off this way.
Then I read this. https://www.solarwinds.com/company/press-releases/netsuite-selects-solarwinds-for-global-endtoend-it-infrastructure-management#:~:text=Contact%20Us-,NetSuite%20Selects%20SolarWinds%20for%20Global%2C%20End,to%2DEnd%20IT%20Infrastructure%20Management |
|
|
Quoted: Not sure, I'm seeing where is just wasn't the US but several countries as well. TBH, I starting to think that German Server story may have some validity! How the hell was this kept from the American Public and how is Republican's/Mitch saying Biden was elected fairly! View Quote He can claim he was drunk or maybe from when he had all those face bruises, it made him act stupidly, maybe he should stop drinking. |
|
Quoted: i wonder what the actual fallout from this will wind up looking like. it's incredible. View Quote Meh. Remember the OPM breach? So far nothing there. I'm convinced this shit happens all the time. Anyone who's ever dealt with government "cybersecurity" knows it sucks. Where I work, IT is a reward promotion full of people with no actual IT background. It makes big headlines when it's convenient for it to make big headlines. |
|
View Quote View All Quotes View All Quotes Quoted: Quoted: World War 3 will start with computer hacks. The Chicoms could probably take down our power grid at anytime Completely fuck our nationwide commerce network And shut off the EBT card system. https://www.youtube.com/watch?v=xLTTX35LNJo Attached File |
|
There isn’t just ignorance concerning basic IT security practices in many companies. There is often outright hostility towards basic practices. Even an educated and motivated team can get worn down. Gotta wonder how many IT folks are going to be close to cutting wrists next month when the screaming begins over Adobe Flash.
|
|
Quoted: Ya think? I putty'd into it one day about 3 years ago to look at some logs. I discovered the last reboot was 2012. I brought it up to my supervisor. He said "yeah, I know. I'm afraid if we reboot it, it won't come back up." My response "Why the fuck is it in production then?!" It's still in production. Still unpatched and still not rebooted since 12. View Quote View All Quotes View All Quotes Quoted: Quoted: I discovered the last reboot was 2012. I brought it up to my supervisor. He said "yeah, I know. I'm afraid if we reboot it, it won't come back up." My response "Why the fuck is it in production then?!" It's still in production. Still unpatched and still not rebooted since 12. When Cisco had their update a few years ago which changed the config syntax so that it was no longer easy to bring your config to the new version lots of people decide to sit on old software and hardware. There are thousands of ASAs on firmware that's years old and now out of support that I am specifically aware of and who knows how many more. |
|
Quoted: The fallout: The taxpayers will fund a multi-year, multi-million dollar study that will say mistakes were made but overall everybody involved was great and did the best they could, and More money needs to be spent on cyber security, but spent in the exact same manner as before the attack. No .gov employees will be fired or reprimanded. The most responsible SES employees will be promoted. View Quote Your public sector experience is clear. This will also be the fallout at national and state level for Covid. I wonder what award Cuomo will get for his sterling leadership while NYC was so hard hit? |
|
Quoted: World War 3 will start with computer hacks. The Chicoms could probably take down our power grid at anytime Completely fuck our nationwide commerce network View Quote |
|
Quoted: If it’s the same standard, it will be trivially easy to make a physical adapter from one to the other. I don’t know that you are gaining anything here. View Quote View All Quotes View All Quotes Quoted: Quoted: Should be pretty easy to come up with a usb connection that uses the same coding standard but the physical connection is different. That way there is no relying on markings. A common store bought usb would simply not be able to fit then. If it’s the same standard, it will be trivially easy to make a physical adapter from one to the other. I don’t know that you are gaining anything here. So if its a propreity special connection how many people are going to have the means to smuggle out a copy, measure it precisely and build duplicates? It doesn't need to be anything like a usb connector as we know it. As for China making a copy, rotate out the connection types from time to time. If you want real security its going to take some effort. The old let's just generate a whole lot of paperwork and call that security is lazy. Well lazy for those in charge. There is already usb port locks. Could have a second person with the keys who also checks the usb drive to be used. |
|
Wouldn’t be surprised if it is Facebook, Google, and Twitter that are the hackers.
|
|
Quoted: Live and learn? Seems like we really need to up our cyber defense game. Maybe a blessing in disguise? View Quote Negative, we shouldn’t play chase the rabbit. As we’re chasing the rabbit, the foxs are in with the hens! We need to have our military and defense to stop being reactive! |
|
It's absolutely disgusting that Russia, a fucking country with a GDP about that of Texas, was allowed to be in the position to do what they have. The people "protecting" this country against these sorts of things are either absolute idiots or complicit.
|
|
Quoted: When Cisco had their update a few years ago which changed the config syntax so that it was no longer easy to bring your config to the new version lots of people decide to sit on old software and hardware. There are thousands of ASAs on firmware that's years old and now out of support that I am specifically aware of and who knows how many more. View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: I discovered the last reboot was 2012. I brought it up to my supervisor. He said "yeah, I know. I'm afraid if we reboot it, it won't come back up." My response "Why the fuck is it in production then?!" It's still in production. Still unpatched and still not rebooted since 12. When Cisco had their update a few years ago which changed the config syntax so that it was no longer easy to bring your config to the new version lots of people decide to sit on old software and hardware. There are thousands of ASAs on firmware that's years old and now out of support that I am specifically aware of and who knows how many more. |
|
Quoted: Agreed with it's not an attack. Yet. What it is though could allow someone to severely fuck with our country at the core. I'm talking Defensive, Power, Commerce, Comms, you name it. We go tossing a nuke at this perp, and they might be able turn off the power. I'm not saying they can do it, I'm saying whoever did this knows what the fuck they're doing, and they spent a shit ton of time and capital to make it happen. The payload however, nobody knows. View Quote Of course, this is at least 1 foreign intelligence agency. Russia's involved and I wouldn't be surprised if the Chinese or Israelis had their fingers in the pie too |
|
Quoted: It's absolutely disgusting that Russia, a fucking country with a GDP about that of Texas, was allowed to be in the position to do what they have. The people "protecting" this country against these sorts of things are either absolute idiots or complicit. View Quote You don't work in government. The term "government employee" has become such a synonym for lazy, unproductive, incompetent fool that really talented people genuinely don't want to work there. I have worked for state government for over 18 years. Promotions on the LOW end are by merit and ability - HIGH end are all good old boy network, to the point of pulling retired Admin out of retirement to work an Admin position again, for double the pay, of course, rather than promote a promising junior employee. Ideas from juniors are to be stolen and presented as Admins idea, which reduces the number of junior good ideas to practically zero. Stagnation is the order of the day, despite any programs put forth to "advance". Paperwork is the way things are tracked, as we joke, we are judged by the number of trees we kill each day. Don't worry about what is ON the paperwork, just turn it in. Actually DO the inspection/check/drill? Not enough people, not enough time, too many court mandated programs we have to implement, can't do it. If cyber security is managed like this, its amazing WarGames hasn't become reality in years past. |
|
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.