HACKED! Multiple Federal Agencies Including Treasury.

Paratus

Lifer
Jun 4, 2004
16,836
13,761
146
https://apnews.com/article/technolo...rity-hacking-e8a2e819f7cc6982f6a72f8c85209b72


Hackers broke into the networks of federal agencies including the Treasury and Commerce departments in attacks revealed just days after U.S. officials warned that cyber actors linked to the Russian government were exploiting vulnerabilities to target sensitive data.

The FBI and the Department of Homeland Security’s cybersecurity arm are investigating what experts and former officials said appeared to be a large-scale penetration of U.S. government agencies.

Didn’t the administration fire a bunch of cyber security folks recently?

At any rate comments I’ve seen online seem to think this is serious.
 
Reactions: Pohemi

BoomerD

No Lifer
Feb 26, 2006
63,330
11,694
136
Saw one story that said the hackers were affiliated with the Rooskie government. I guess with their golden goose losing his job, they gotta find a source of money somewhere.
 

Paratus

Lifer
Jun 4, 2004
16,836
13,761
146
IOS has cursor? How modern.

Yup.

If you misspell a word and backspace an entire word AT forums helpfully auto erases the space before it too. If you don’t realize it then you end up with two words stuck together which have to be fixed. If you have to add the space back again IOS thinks it’s the second space so it capitalizes the word and if you delete that it starts the whole process over.

finally if you jump around a paragraph to fix something it will helpfully randomly select something you recently typed and replace it with what you are typing now.

This is the only forum that does this to me in IOS/Safari.
 
Reactions: Muse

hal2kilo

Lifer
Feb 24, 2009
23,647
10,507
136
According to report on MSNBC, HHS was also hacked. Also Solar Wind's app is what got hacked. Public announcement says ONLY 18,000 of it's 33,000 customers got hacked. ONLY.
 

ch33zw1z

Lifer
Nov 4, 2004
37,964
18,279
146
Cybering is tough 😉.

Seriously, we should just defund the departments though, small gubbermint ftw
 

Exterous

Super Moderator
Jun 20, 2006
20,429
3,533
126
At any rate comments I’ve seen online seem to think this is serious.

It is very serious. From the reports so far Solarwind's Orion product was affected at such a deep level that the majority of IT people would never notice. Somehow the hackers were able to get access to Orion's code repository and compromise it with a single DLL. This was then packaged by Solarwinds and signed as officially verified and vetted software for your Orion product. As it was in an official vendor release hash verification would not have caught this. Once inside it would lay dormant for long periods of time before occasionally checking in with the command and control servers - usually immersed within legitimate Solarwinds traffic making detection difficult. Even worse Orion is so immersed in the network by design once it's compromised it's game over due to the privileged access it needs to do it's work. From there attackers would be able to forge single sign on tokens and could add access for themselves to programs, APIs, servers etc

Solarwinds has a huge customer basis. I don't know how many use Orion but 425 of the Fortune 500 companies use Solarwinds including the top 5 accounting firms and top 10 telecommunications firms. And if they could compromise Orion at such a level there is a chance they compromised their other products. Not a good time to have any Solarwind products in your environment
 
Last edited:
Nov 8, 2012
20,828
4,777
146
https://apnews.com/article/technolo...rity-hacking-e8a2e819f7cc6982f6a72f8c85209b72


Hackers broke into the networks of federal agencies including the Treasury and Commerce departments in attacks revealed just days after U.S. officials warned that cyber actors linked to the Russian government were exploiting vulnerabilities to target sensitive data.

The FBI and the Department of Homeland Security’s cybersecurity arm are investigating what experts and former officials said appeared to be a large-scale penetration of U.S. government agencies.

Didn’t the administration fire a bunch of cyber security folks recently?

At any rate comments I’ve seen online seem to think this is serious.

Well this is just lovely. I see that NASA has gone into moderate guarded operation where they essentially cut-off any remote connections and thus only allow internal. Good ol' government only knows how to be reactive instead of proactive.

So... yeah, thats going to be swell while the pandemic is still ongoing and the majority are WFH.
 

ch33zw1z

Lifer
Nov 4, 2004
37,964
18,279
146
Well this is just lovely. I see that NASA has gone into moderate guarded operation where they essentially cut-off any remote connections and thus only allow internal. Good ol' government only knows how to be reactive instead of proactive.

So... yeah, thats going to be swell while the pandemic is still ongoing and the majority are WFH.

Mmhmm, cuz non government entities are totally proactive, always.
 
Reactions: DarthKyrie

Exterous

Super Moderator
Jun 20, 2006
20,429
3,533
126
Well this is just lovely. I see that NASA has gone into moderate guarded operation where they essentially cut-off any remote connections and thus only allow internal. Good ol' government only knows how to be reactive instead of proactive.

So... yeah, thats going to be swell while the pandemic is still ongoing and the majority are WFH.

What proactive measures would you have wanted them to take? Usually the proactive measures to avoid security issues is to apply vendor patches and updates. Sure you might run them in a dev environment or give them several weeks of public release for others to do the testing for you but these infected vendor updates were released months ago so the proactive 'path your stuff to make sure it's up to date and secure' actually caused the issue
 
Reactions: DarthKyrie

Lanyap

Elite Member
Dec 23, 2000
8,127
2,167
136
https://apnews.com/article/technolo...rity-hacking-e8a2e819f7cc6982f6a72f8c85209b72


Hackers broke into the networks of federal agencies including the Treasury and Commerce departments in attacks revealed just days after U.S. officials warned that cyber actors linked to the Russian government were exploiting vulnerabilities to target sensitive data.

The FBI and the Department of Homeland Security’s cybersecurity arm are investigating what experts and former officials said appeared to be a large-scale penetration of U.S. government agencies.

Didn’t the administration fire a bunch of cyber security folks recently?

At any rate comments I’ve seen online seem to think this is serious.




Donald fired Chris Krebs back in November for contradicting him on the prevalence of election fraud in the 2020 presidential election. Krebs was Director of the Cybersecurity and Infrastructure Security Agency. Donald opened things up for Putin and his gang. Putin knew he wouldn't be able to get in after Biden took over.
 

Dave_5k

Golden Member
May 23, 2017
1,650
3,200
136
It is very serious. From the reports so far Solarwind's Orion product was affected at such a deep level that the majority of IT people would never notice. Somehow the hackers were able to get access to Orion's code repository and compromise it with a single DLL. This was then packaged by Solarwinds and signed as officially verified and vetted software for your Orion product. As it was in an official vendor release hash verification would not have caught this. Once inside it would lay dormant for long periods of time before occasionally checking in with the command and control servers - usually immersed within legitimate Solarwinds traffic making detection difficult. Even worse Orion is so immersed in the network by design once it's compromised it's game over due to the privileged access it needs to do it's work. From there attackers would be able to forge single sign on tokens and could add access for themselves to programs, APIs, servers etc

Solarwinds has a huge customer basis. I don't know how many use Orion but 425 of the Fortune 500 companies use Solarwinds including the top 5 accounting firms and top 10 telecommunications firms. And if they could compromise Orion at such a level there is a chance they compromised their other products. Not a good time to have any Solarwind products in your environment
Even figuring out how badly compromised the systems of most of the US government and majority of Fortune 500 are is likely to take weeks, if they even can.

This hack got not only full admin level access to the networks, it also has been confirmed to have achieved server-admin credentials on the Outlook web access e-mail systems, including a full bypass of multi-factor authentication on Outlook to further hack e-mail accounts. And it was undetected for 6 months while intruders were able to continue to propagate access to additional servers, systems, and accounts. Given 6 months of access when already starting from effectively root level access to all network traffic and e-mail traffic, digging out how deep the hackers ultimately got into linked systems is going to be a nightmare.
 

hal2kilo

Lifer
Feb 24, 2009
23,647
10,507
136
Even figuring out how badly compromised the systems of most of the US government and majority of Fortune 500 are is likely to take weeks, if they even can.

This hack got not only full admin level access to the networks, it also has been confirmed to have achieved server-admin credentials on the Outlook web access e-mail systems, including a full bypass of multi-factor authentication on Outlook to further hack e-mail accounts. And it was undetected for 6 months while intruders were able to continue to propagate access to additional servers, systems, and accounts. Given 6 months of access when already starting from effectively root level access to all network traffic and e-mail traffic, digging out how deep the hackers ultimately got into linked systems is going to be a nightmare.
So they got all of Trump tax return. They at least know the true Trump.
 

[DHT]Osiris

Lifer
Dec 15, 2015
14,569
12,681
146
Even figuring out how badly compromised the systems of most of the US government and majority of Fortune 500 are is likely to take weeks, if they even can.

This hack got not only full admin level access to the networks, it also has been confirmed to have achieved server-admin credentials on the Outlook web access e-mail systems, including a full bypass of multi-factor authentication on Outlook to further hack e-mail accounts. And it was undetected for 6 months while intruders were able to continue to propagate access to additional servers, systems, and accounts. Given 6 months of access when already starting from effectively root level access to all network traffic and e-mail traffic, digging out how deep the hackers ultimately got into linked systems is going to be a nightmare.
This is the part that cannot be emphasized enough. A persistent threat inside a system can spend enough time gathering data or introducing data into a system that even rebuilding may not be enough, if for instance some source code has been tampered with that's carried over to a newly rebuilt system. You almost have to roll back to when the corrupted version was released and start over.

I worked with a military unit that used Orion Solarwinds, a zero trust stance to those systems would be absolutely nightmarish. Like aircraft stuck on the pad (mission planning dead), phone calls not being made (VOIP), email shut down, etc. Glad I'm not working there today.
 
Reactions: DarthKyrie

manly

Lifer
Jan 25, 2000
11,318
2,344
136
Note that FireEye was pwned by this same attack, so government IT systems are relatively easy pickings...

For a great read about Russian state-sponsored hacking over the past decade, check out Sandworm by Wired' Andy Greenberg:

Maybe I'd been living under a rock, because I wasn't even aware of many of these prior incidents until reading this book last week.
 

hal2kilo

Lifer
Feb 24, 2009
23,647
10,507
136
In the old days, we used to get "quicklooks" of unclassified versions of the our system performance during SSBN patrols after analysis from the John Hopkins Applied Physics Lab (APL) delivered in the mail on paper. Then they went online, and we had to get on their list and prove our credentials even to get the unclassified version of the report. And by the time I retired, it was impossible to get those reports. It didn't really matter because their funding went to crap and the "quicklook" moniker became a joke.
 

kage69

Lifer
Jul 17, 2003
27,947
38,323
136
Between the OPM hack and this... shit.

I hope we've replaced a lot of hardware.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |