Russian hack Government, Private sector through Solarwinds

Jon

Hall of Fame
Feb 22, 2002
15,648
12,576
282
Atlanta 'Burbs

Go Bama

Hall of Fame
Dec 6, 2009
13,827
14,194
187
16outa17essee
It's very scary to think about how long this was going on and what information the Russians may have had access to. It seems like the Russians have made a priority of hacking into our computers. As expensive as cybersecurity is, this should not be happening.
 
  • Like
Reactions: TIDE-HSV

4Q Basket Case

FB|BB Moderator
Staff member
Nov 8, 2004
9,631
13,078
237
Tuscaloosa
It's very scary to think about how long this was going on and what information the Russians may have had access to. It seems like the Russians have made a priority of hacking into our computers. As expensive as cybersecurity is, this should not be happening.
To paraphrase Derek Bok and one of my all time favorite quotes: You think cybersecurity is expensive? Just try not having it.
 
  • Like
Reactions: Go Bama

4Q Basket Case

FB|BB Moderator
Staff member
Nov 8, 2004
9,631
13,078
237
Tuscaloosa
It's scary to think who they have on the inside helping out.
You touch on the real vulnerability.

It’s not so much protecting a system from outside threats. Protective measures and software have progressed to the point that that’s not nearly the threat it once was.

The real threat comes from inside. You get the wrong person owing to the wrong people money they can’t pay, but can make all that go away with “only a little“ cooperation, and all those protective measures don’t mean a blessed thing.

Doesn’t matter if you’re talking about the military, the civilian government, financial institutions, your 401k’s custodian.....the real risk is internal, and it’s incredibly hard to mitigate.

Could be as simple as the Administrative Assistant of the head of Corporate Security comes into the boss’s credentials. His girlfriend owes the Russian mafia a bunch of money because of a previous boyfriend’s gambling and drug habit.

Ivan is making her (and his) life hard in ways the American legal system wasn’t built to counter, and can’t even imagine. The AA can clear all that up by “misplacing” credentials nobody even knows he has.

Out of the millions of employees at these places, at salaries ranging from low five figures to low seven figures, it takes only one person, knowing one thing too many, at only one of these, and it’s a problem that affects tens or hundreds of millions of people.

If you’re a bad guy, with essentially unlimited state-sponsored resources, it’s a ton easier to find the vulnerable key person than it is to hack in from the outside, unaided.
 

dtgreg

All-American
Jul 24, 2000
2,989
1,704
282
Tuscaloosa
www.electricmonkeywrench.com
You touch on the real vulnerability.

It’s not so much protecting a system from outside threats. Protective measures and software have progressed to the point that that’s not nearly the threat it once was.

The real threat comes from inside. You get the wrong person owing to the wrong people money they can’t pay, but can make all that go away with “only a little“ cooperation, and all those protective measures don’t mean a blessed thing.

Doesn’t matter if you’re talking about the military, the civilian government, financial institutions, your 401k’s custodian.....the real risk is internal, and it’s incredibly hard to mitigate.

Could be as simple as the Administrative Assistant of the head of Corporate Security comes into the boss’s credentials. His girlfriend owes the Russian mafia a bunch of money because of a previous boyfriend’s gambling and drug habit.

Ivan is making her (and his) life hard in ways the American legal system wasn’t built to counter, and can’t even imagine. The AA can clear all that up by “misplacing” credentials nobody even knows he has.

Out of the millions of employees at these places, at salaries ranging from low five figures to low seven figures, it takes only one person, knowing one thing too many, at only one of these, and it’s a problem that affects tens or hundreds of millions of people.

If you’re a bad guy, with essentially unlimited state-sponsored resources, it’s a ton easier to find the vulnerable key person than it is to hack in from the outside, unaided.
THANK YOU.
This is just so obvious, at least to me. How we can allow Russian money and Russian Mob and KGB people into our Western Democratic alliances and nations and institutions is unfathomable. Nerve agent poisonings - no response. Polonium poisonings - no response. Fiftieth-floor flight attempts - no response.

And then I contemplate the British selling Hitler airplane parts on the eve of WW2. Nothing new under the sun.
 
  • Thank You
Reactions: MobtownK

Jon

Hall of Fame
Feb 22, 2002
15,648
12,576
282
Atlanta 'Burbs
You touch on the real vulnerability.

It’s not so much protecting a system from outside threats. Protective measures and software have progressed to the point that that’s not nearly the threat it once was.

The real threat comes from inside. You get the wrong person owing to the wrong people money they can’t pay, but can make all that go away with “only a little“ cooperation, and all those protective measures don’t mean a blessed thing.

Doesn’t matter if you’re talking about the military, the civilian government, financial institutions, your 401k’s custodian.....the real risk is internal, and it’s incredibly hard to mitigate.

Could be as simple as the Administrative Assistant of the head of Corporate Security comes into the boss’s credentials. His girlfriend owes the Russian mafia a bunch of money because of a previous boyfriend’s gambling and drug habit.

Ivan is making her (and his) life hard in ways the American legal system wasn’t built to counter, and can’t even imagine. The AA can clear all that up by “misplacing” credentials nobody even knows he has.

Out of the millions of employees at these places, at salaries ranging from low five figures to low seven figures, it takes only one person, knowing one thing too many, at only one of these, and it’s a problem that affects tens or hundreds of millions of people.

If you’re a bad guy, with essentially unlimited state-sponsored resources, it’s a ton easier to find the vulnerable key person than it is to hack in from the outside, unaided.
People are always the problem and most hacking isn't technical it is social. I work for one of the largest players in the cyber security space and we regularly test our own employees with fake phishing emails etc and far too often even we fail
 

4Q Basket Case

FB|BB Moderator
Staff member
Nov 8, 2004
9,631
13,078
237
Tuscaloosa
People are always the problem and most hacking isn't technical it is social. I work for one of the largest players in the cyber security space and we regularly test our own employees with fake phishing emails etc and far too often even we fail
I worked for a large regional bank, and it had a fake phishing email routine that I’m sure was similar to the one your company has.

Amazing the number of employees who fell for it. There was a series of escalating consequences. First failure generated a nasty-gram, essentially calling you stupid (in an HR-approved manner). Second required additional training. Soon enough, termination. And a few were terminated over it.

As with lots of things, there were some unintended consequences. A lot of legitimate requests went without response because the recipients feared they were fake.
 

Jon

Hall of Fame
Feb 22, 2002
15,648
12,576
282
Atlanta 'Burbs
I worked for a large regional bank, and it had a fake phishing email routine that I’m sure was similar to the one your company has.

Amazing the number of employees who fell for it. There was a series of escalating consequences. First failure generated a nasty-gram, essentially calling you stupid (in an HR-approved manner). Second required additional training. Soon enough, termination. And a few were terminated over it.

As with lots of things, there were some unintended consequences. A lot of legitimate requests went without response because the recipients feared they were fake.
what is funny for us is that it is easier here to fall for fake as our systems are so good at catching phishing it gets really easy to assume that you are safe with anything that makes it to you. It is a great exercise and I know of no one fired over it
 

2003TIDE

Hall of Fame
Jul 10, 2007
8,603
4,898
187
ATL
Seeing a lot of companies panicked about this. Solarwinds got lazy and I don't know that I'd use them at this point until they prove they can use a password stronger than solarwinds123 for their source code repo.
 
  • Like
Reactions: dtgreg

Jon

Hall of Fame
Feb 22, 2002
15,648
12,576
282
Atlanta 'Burbs
Seeing a lot of companies panicked about this. Solarwinds got lazy and I don't know that I'd use them at this point until they prove they can use a password stronger than solarwinds123 for their source code repo.
it is unbelievable how lax and lazy they are. I agree with you but as you know well, once a tool is built into an IT Process it can be hell to remove
 

2003TIDE

Hall of Fame
Jul 10, 2007
8,603
4,898
187
ATL
it is unbelievable how lax and lazy they are.
Oh, I believe it. Like you said people are always the problem. Most end users are idiots with passwords and at least 50% of people in IT are just plain lazy.
 
  • Like
Reactions: Jon

92tide

TideFans Legend
May 9, 2000
58,314
45,172
287
54
East Point, Ga, USA
he has pulled in like $250M in donations in the last month but I agree, he will still be desperate shortly
i imagine he's probably getting close to half a billion by now, or will get there by the time the georgia election is held.

he's currently "fundraising" for the ga senate races with almost all of it going into his pockets.
 
  • Like
Reactions: Jon

Latest threads

TideFans.shop - NEW Stuff!

TideFans.shop - Get YOUR Bama Gear HERE!”></a>
<br />

<!--/ END TideFans.shop & item link \-->
<p style= Purchases made through our TideFans.shop and Amazon.com links may result in a commission being paid to TideFans.