ROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEX
|
18 May 2023, 12:48 AM | #1 |
2024 Pledge Member
Join Date: Feb 2013
Location: swmnpoolsmovie*
Posts: 9,809
|
A fascinating detective story on computer hacking....
This is a long read on tracking down and stopping a major computer hack a few years ago.
https://www.wired.com/story/the-unto...7-ee9891393828
__________________
OlllllllO |
18 May 2023, 12:56 AM | #2 |
"TRF" Member
Join Date: Apr 2023
Location: N/A
Posts: 60
|
A few years ago... must have been the Sandworm story, right? Wait, SolarWinds was a few years ago already?!!
Excellent article - that was a surreal time to be in the security field. Lots of late nights for incident responders, and of course it was over the winter holidays. Name a more iconic duo than major cybersecurity breaches and the second half of December! |
18 May 2023, 02:48 AM | #3 | |
2024 Pledge Member
Join Date: Feb 2013
Location: swmnpoolsmovie*
Posts: 9,809
|
Quote:
I'm amazed at the whole issue of sneaking in and hiding or creating back doors etc.
__________________
OlllllllO |
|
18 May 2023, 03:39 AM | #4 |
"TRF" Member
Join Date: Apr 2023
Location: N/A
Posts: 60
|
Disclaimer, I'm not a software engineer nor a full time security researcher, but I work adjacent to those disciplines.
It's almost impossible to audit code for backdoors and other malware in an enterprise software environment, particularly with how skilled these threat actors are. VPNFilter and its derivatives are another great example of how well-crafted these malware campaigns can be. Code reviews and audits are useful, but it's a Herculean ordeal to try to examine every function and module in a big codebase like SolarWinds. Supply chain attacks are frightening - who's going to audit every individual dependency in millions of packages that are imported into the production code? The alternative is to force developers to create their own packages from scratch, which is incredibly time-consuming and often introduces bugs and security holes anyways. Defenders have a lot of layered approaches at their disposal like looking for abnormal behaviors from legitimate applications or users, which does help. But if one of the big-league offensive teams wants something badly enough, they're most likely going to get it. We only hear about the breaches that get discovered... |
18 May 2023, 03:58 AM | #5 | |
2024 Pledge Member
Join Date: Feb 2013
Location: swmnpoolsmovie*
Posts: 9,809
|
Quote:
The US and probably all the major players have the capabilities and systems in place to basically shut down an enemy country if they wanted to. Even a minor thing like shutting down the banking system and traffic lights. Or shutting down the power grid. No stores, no home entertainment. No gas, etc etc My wife was ready to kill me when we lost internet for 4 hours.
__________________
OlllllllO |
|
18 May 2023, 06:34 AM | #6 | |
2024 SubLV41 Pledge Member
Join Date: Dec 2010
Real Name: PaulG
Location: Georgia
Posts: 42,016
|
A fascinating detective story on computer hacking....
Quote:
It is likely that similarly important breaches have occurred (and are still occurring) using different vectors. Sadly, governments aren’t staffed adequately to protect themselves. It will be the creative talent inside small asymmetrical contractors who will break the next “big breach”. Issuing executive orders to DHS for assessments of “cyber incidents” are too late and too cumbersome. Their desire to spend the least in both industry and government will result in new failures faster than anyone’s tools can evolve to prevent a new attack or detect those that happened earlier (and are still undetected today). A blockchain-driven Web3 has promise to find netflow that’s bogus. But we are years away… Sent from my iPhone using Tapatalk Pro
__________________
Does anyone really know what time it is? |
|
18 May 2023, 04:27 AM | #7 |
2024 SubLV41 Pledge Member
Join Date: May 2013
Real Name: Matt
Location: Tampa, FL
Watch: Hulk/SD4K/SeaQ/P39
Posts: 3,203
|
Great article, thanks for sharing. They should make this story into a movie.
__________________
Why is it, "A penny for your thoughts," but, "you have to put your two cents in?" Somebody's making a penny. |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|
|
*Banners
Of The Month*
This space is provided to horological resources.