|
| tibbydudeza wrote:
| This seems rather suspicious all these reports of a sudden - are
| they plotting to bring back the Clipper chip V2 ???.
| andred14 wrote:
| Just like Klauss Schwab from the World Economic Forum says the
| "cyber pandemic" is coming.
|
| First they test the idea at Cyber Polygon (similar to event 201
| which simulated a virus pandemic just before the fake "cov1d"
| outbreak)
|
| https://cyberpolygon.com/
|
| And then they will just do it. Problem is, just like cov1d - IT'S
| ALL FAKE
| JohnWhigham wrote:
| Is there any group at all lobbying our limpwrist Congress to do
| something about these?
| lupire wrote:
| National Defense is the realm of the Executive.
| lumost wrote:
| The executive branch using a crises to seize power is
| dubious. In the US the legislative branch has the authority
| to declare war, make laws, create, and direct agencies. Power
| is delegated to the President by congress (a progressively
| more common occurrence)
| madcow2 wrote:
| > limpwrist Congress
|
| That's quite the choice of adjective given the month.
| kick_in_the_doo wrote:
| That doesn't necessarily have to be a gay slur. Could refer
| to somewhere sitting around all day doing...that.
| nathanaldensr wrote:
| Just curious if "ties to China" means "an IP address that may or
| may not be allocated to Chinese geography, and may or may not
| simply be a Tor exit node or a VPN service."
|
| People are far too trusting of these claims of where these
| attacks originated. Very few people in the world, including
| journalists, know how IP networks work.
| hn8788 wrote:
| To give them the benefit of the doubt, they said "a hacking
| group believed to have links to the Chinese government", which
| makes me think they probably used tools and techniques
| associated with a known group.
| vmception wrote:
| Cyberattack day!
|
| This one happened over a month ago, its obvious this is a
| trending headline likely not organically, so make sure to
| separate the dates before thinking we are under a coordinated
| attack all at once right now
| booleandilemma wrote:
| The media needs something to scream about after corona is over.
| It looks like Russian and Chinese hackers are on the menu.
| FridayoLeary wrote:
| Corona isn't over and we should still be screaming at the top
| of our lungs at the Chinese for answers. Instead of going out
| to the shops and buying brooms to sweep the topic under the
| carpet (which are also recent buys).
| weaksauce wrote:
| I think on HN this has always been a trend. a headline sparks
| more headlines of similar stories regardless of date. I've seen
| it happen quite frequently.
| FridayoLeary wrote:
| I've also noticed. I think once interest is sparked in a
| topic, any topic, people are thirsty for more. I don't think
| it's the most useful way to orderly accumulate knowledge of a
| subject but there it is, i'm as guilty as the next guy.
| FredPret wrote:
| Perhaps a pentester or security person can help answer this.
| Could a list of minimum network safety standards be made that:
|
| a) would help the ransomware & hacking crisis, and, b) is
| practically enforcable at scale?
| rantwasp wrote:
| there are standards and operating procedures that can be used.
| it's not that hard.
|
| it comes down to training and cost cutting. If the penalty for
| failing miserably is 0 you won't see any change. I would hold
| the companies responsible for things like this liable to the
| point they would be put out of business after an event like
| this. If the cost of being sloppy is that you no longer have a
| business people will start paying attention really quickly.
| wyager wrote:
| > there are standards and operating procedures that can be
| used
|
| 99% of these standards are completely useless and exist only
| to reduce legal liability. The other 1% are only incidentally
| slightly useful.
|
| You will never ever create a secure company by following some
| stupid checklist, unless the checklist is so extreme as to be
| useless to most orgs. "Step 1: only run OpenBSD..."
| madcow2 wrote:
| > Perhaps a pentester or security person can help answer this
|
| Not one of those but since they are [apparently] inadequate
| anyway...
|
| I read an analogy that pinning this on "cyber security" is like
| accusing a mugging victim of having a lack of personal security
| guards. That's just not how _civil_ society works.
|
| Minimum safety standards: laws and ability to enforce them.
|
| This is a short-term win for the bad actors. Just wait until
| the next "great firewall." Well gain safety, but we'll lose
| access to those low cost eastern European dev talent. That's
| more likely than every single US business being forced to hire
| private security just to operate.
| curiousgal wrote:
| I think of it more like someone's house getting robbed
| because of them having bad or no locks-\\_(tsu)_/-
| BitwiseFool wrote:
| I don't think the analogy fits because there are so many
| ways for an attacker to compromise a system besides the
| "front door". If we want to stretch things, a member of
| your own family can unwittingly let a guest perform an
| action that enables the robbery weeks later.
| wyager wrote:
| > That's just not how civil society works.
|
| This is a cope and also irrelevant.
|
| Civil society works a certain way because of its social
| interaction dynamics. The internet works much differently
| (namely, retribution is much harder, which rules out most
| tit-for-tat transgression management strategies, and the
| scale is much larger than is possible with human
| interaction).
| bawolff wrote:
| > I read an analogy that pinning this on "cyber security" is
| like accusing a mugging victim of having a lack of personal
| security guards. That's just not how civil society works
|
| Civil society does punish businesses when bad things happen
| due to negligence. Especially when the result of the
| negligence negatively effects someone else.
| hn8788 wrote:
| A better analogy would be an armored truck full of cash
| parking overnight in a bad neighborhood with the doors
| unlocked, then crying to the media about how they were robbed
| by criminals. There has to be some level of personal
| responsibility; it's foolish to expect people to not do bad
| things just because the law says they shouldn't.
| motohagiography wrote:
| There are none. Compliance is bargaining with a universe that
| doesn't care.
|
| Hold product managers and non-tech execs accountable for
| security breaches. Stop treating IT/ops like the suckers. Since
| that's never going to happen, buy some Monero to increase your
| bargaining leverage on the ransom price.
|
| The bar is not very high, it's bike theft economics. Your stuff
| only needs to be less vulnerable than the next guys, unless you
| are a political target. If you are a political target, please
| forget my name.
| wyager wrote:
| There are definitely strategies that significantly reduce the
| cost of such an attack - one being append-only backups of a
| sufficient frequency and with a fast enough restore time. We
| have the tech to do this cheaply (mount user shares via ZFS-
| backed NFS, for example) but I'm not sure many places have the
| organizational competence to implement something so simple and
| effective. They need to spend 100x more money on something 10%
| as useful.
|
| It's also possible to eliminate these attacks entirely, but it
| probably requires corporate tech infra that looks totally
| different from what most orgs now. If it were my job to set up
| some sort of hardened corporate setup, my first step would
| probably be to restrict most employees to iPads. There's not
| really any reason a shift manager at a meat packing plant or
| whatever needs or benefits from a Windows box.
| bawolff wrote:
| The primary thing to help randsomemware would be to have tested
| backups, where you can reimage the computers and restore from
| backups reasonably quickly.
| anoyesnonymous wrote:
| And offline backups
| paperwasp42 wrote:
| And to add to that, offline backups that go back 90+ days.
| Ransomware gangs frequently use time bombs to deploy their
| encryption after sitting within a system for a month or
| two. If you get hit by one of those gangs and only keep
| backups for 45 days, you're screwed, because your backup is
| still infected.
| viraptor wrote:
| But first you have to figure out how you got owned the first
| time and fix the issue. Otherwise you'll just get owned the
| next day again...
| crummy wrote:
| I think the perpetrators are now taking data "hostage", and
| threatening to release it publically unless the ransom is
| paid - in this case backups don't help, though it depends on
| how sensitive your data is.
| geofft wrote:
| > _To gain access to the M.T.A. and other systems, the hackers
| took advantage of vulnerabilities in Pulse Connect Secure, a
| widely used connectivity tool that offers workers remote access
| to their employers' networks. [...] The hackers took advantage
| of a so-called "zero day," or a previously unknown coding flaw
| in software for which a patch does not exist._
|
| The Pulse VPN has a history of security issues (see e.g.
| https://arstechnica.com/information-
| technology/2020/01/unpat...) - so much so that the second and
| third Google autocomplete results are "pulse vpn vulnerability"
| and "pulse vpn hack". One practically enforceable at scale rule
| is to pay attention to whether your vendors have a bad security
| track record and also be meaningfully prepared to switch
| (switching VPNs is no fun, but it's doable).
|
| Another one is to ask your vendors what they're doing about
| their security track record and whether they are taking
| systematic measures to make zero days less frequent and not
| just fixing individual bugs. "Stop using memory-unsafe
| languages" is one of my favorite answers to that, but there are
| a lot of others: "use sanitizers," "test your code with
| fuzzers," "use open-source components for the privileged
| portions," "get frequent third-party audits," etc. are all
| potential answers too. Some work better than others; any of
| them is better than not having an answer.
|
| > _"The M.T.A.'s existing multilayered security systems worked
| as designed, preventing spread of the attack," said Rafail
| Portnoy, the M.T.A.'s chief technology officer. [...] there was
| "no employee or customer information breached, no data loss and
| no changes to our vital systems."_
|
| The other really good answer here is to not have an all-or-
| nothing architecture for your network, and it sounds like the
| MTA is doing that already. Don't wire the train-switching
| network to the email-checking network just because you can.
| This is much harder to practically enforce at scale in an
| environment that wasn't designed for it, but it's a great rule
| to enforce in _new_ systems. Any time you build something that
| would be worse to get taken over by hackers
| /ransomware/whatever than the rest of your company's
| computerized systems, build it separately and make limited
| interfaces for people to interact with it.
|
| The move to put everything in the cloud really ought to make
| this easier: you can make a new cloud account for new systems
| and use bastion hosts etc. for developer access to them,
| instead of throwing it in your existing account.
| IncludeSecurity wrote:
| CEO of a pentesting company here, I've participated in or
| supervised close to ~2k tests of applications and networks.
|
| Sadly I have to report what you state is possible, but not
| plausible in today's modern heterogenous enterprise.
|
| If I had a static environment with no new software or business
| processes, then NO PROBLEM. I can lock it down in every kinda
| way and it stays locked down to a known baseline.
|
| Add to that new biz processes and now I have interconnection
| internally and externally which make detection and prevention
| difficult. Things are much more difficult now.
|
| Add to that new software, ever changing dev env, OS updates,
| firmware updates, software version updates, dev env dependency
| updates, now you're talking near impossible to keep up.
|
| And that's the state we're in today. There are some generic
| mostly effective controls that if implemented correctly can
| stop most advanced attackers (the so called "20 security
| controls")
| https://www.yumpu.com/en/document/read/6582321/20-critical-s...
|
| But even in spite of that, any major nation state had an
| arsenal of "capabilities" that allow them to dominate most
| cyber warfare area of operations in the civilian sector. US can
| do it, UK, Israel, China, Russia, probably even India and
| others!
|
| Against nation states, there is no stopping nation states in
| the civ sector, despite what every F500 company's CSO wants you
| to believe.....sad but true.
| hn8788 wrote:
| No. The reality is that nobody cares about security unless it's
| their job to, so you have a handful of security people trying
| to get things fixed, meanwhile the rest of the organization
| just sees you as a speedbump in the way of implementing new
| features or buying some new SaaS product. Devs where I work
| even went to my manager and asked if I could only be allowed to
| report security findings during specific timeframes because
| they get behind schedule when they have to fix things. We even
| have a document that lists a bunch of security controls to
| cover almost every situation imaginable, and most of the time
| the devs just say it's impossible to fix the vulnerability
| without breaking the feature, so they go to management and get
| a waiver for the security issue.
|
| Realistically, the only way for an organization to actually be
| secure is if it's part of the culture from the start.
| schoolornot wrote:
| You need a "mature" security organization that can stick it's
| tentacles into everything and still be effective or embed
| security people directly on teams to gate changes like a CI
| tool does. A security team that operates at a distance is
| totally ineffective.
|
| I've worked a bunch of places that have passed various audits
| and certifications, you know, PCI, SOC, and unfortunately the
| audits of infrastructure isn't as deep as the average Joe would
| expect. They place heavier weight on processes over technical
| safeguards. It's like what they say about the CISSP exam, a
| mile wide and an inch deep.
| imglorp wrote:
| If the world had a small fraction of the will necessary to
| counterattack, seize assets, and capture perps, we could shut
| many of these clowns down quickly. The DarkSide group is an
| example of a swift law enforcement action, only days after the
| Colonial hack. Maybe that only happens if you threaten oil
| profits but we could pretend.
|
| https://threatpost.com/darksides-servers-shutdown/166187/
___________________________________________________________________
(page generated 2021-06-02 23:00 UTC) |