Check Out Our Shop
Page 3 of 3 FirstFirst 1 2 3
Results 51 to 69 of 69

Thread: SolarWinds hack

  1. #51
    Join Date
    Feb 2007
    Location
    righthere/rightnow
    Posts
    3,231
    I'm surprised there is not some sort of audit log like what Wikipedia and Google Docs uses.
    How could a company of this size not have some sort of user log for their code editor?

  2. #52
    Join Date
    Sep 2001
    Location
    Before
    Posts
    28,769
    Quote Originally Posted by mud View Post
    I'm surprised there is not some sort of audit log like what Wikipedia and Google Docs uses.
    How could a company of this size not have some sort of user log for their code editor?
    Normally, that's tracked by source control, which is likely GIT.
    What hasn't been established is whether the hackers got access to the GIT repository or managed to bypass that and directly hack the server on which the root source lay.
    Merde De Glace On the Freak When Ski
    >>>200 cm Black Bamboo Sidewalled DPS Lotus 120 : Best Skis Ever <<<

  3. #53
    Join Date
    Sep 2006
    Posts
    8,686
    Damn, some people need to lose their jobs.

    https://www.cnn.com/2020/12/23/polit...ery/index.html

    No idea what moving laterally means in the context of computer hacking. But assume it just means moving around within different files that store more sensitive data, like nuclear launch codes and such.

    FireEye was tipped off to the hackers' presence when they attempt to move laterally within the firm's network, according to the sources, a move that suggested the hackers were targeting sensitive data beyond emails addresses or business records. Whether that exposure was the result of a mistake by the attackers or because they took a calculated risk remains unclear, the sources said.
    "At some point, you have to risk some level of exposure when you're going laterally to get after the things that you really want to get. And you're going to take calculated risks as an attacker," one source familiar with the investigation said.
    "We don't beat the reaper by living longer, we beat the reaper by living well and living fully." - Randy Pausch

  4. #54
    Join Date
    Sep 2001
    Location
    Before
    Posts
    28,769
    FWIW, this hack is much, much different than previous efforts when existing code or administrative credential are exploited.

    When dealing with code databases, there is literally terabytes of code and no one person can even read it, let alone understand it all.

    Right now, it's unclear how the hackers placed their code in the source tree, but it's not something people normally look for, particularly when code reviews are based on objectives within the organization. The problem here is that the code was injected outside of all the ongoing efforts within the company.

    I just don't like blaming people, I'd rather try to identify the loopholes in the constructs.
    Merde De Glace On the Freak When Ski
    >>>200 cm Black Bamboo Sidewalled DPS Lotus 120 : Best Skis Ever <<<

  5. #55
    Join Date
    Dec 2012
    Location
    I can still smell Poutine.
    Posts
    26,410
    Change the para-diggum.

  6. #56
    Join Date
    Dec 2003
    Location
    Nhampshire
    Posts
    7,873
    Also, just as likely they used some contractor creds and someone was asleep at the wheel on code reviews of pull requests since that stuff is usually scripted. They'd just have to ape the script for the first third and it's doubtful anyone would dig if it doesn't trip any static code analysis vulnerability alerts.

  7. #57
    Join Date
    May 2018
    Location
    NorCal
    Posts
    852
    Quote Originally Posted by Toadman View Post

    No idea what moving laterally means in the context of computer hacking. But assume it just means moving around within different files that store more sensitive data, like nuclear launch codes and such.
    "Moving laterally" is jumping around a network in which you have already gained access. Say "Server A" has super sensitive information and is blocked off from the outside world, with the exception of "Server B". If "Server B" is improperly secured, then a hacker can get to "Server B" and use the one open access point to "Server A". In the real world this is generally lots of hops between systems allowing a hacker to get access to "very well secured" systems that they could not get directly into. "Very well" secured systems is in quotes because it is security 101 to defend against these types of hacks with segmented access controls.

    In skiing terms, imagine they only check for lift tickets at the bottom lifts. If you managed to get to the upper mountain without a lift ticket, you can jump around between all those lifts without getting caught.

  8. #58
    Join Date
    Dec 2012
    Location
    I can still smell Poutine.
    Posts
    26,410
    My wife likes to dream up conspiracy theories as a hobby. What if the "discovery" of the hack was intentional so that when Donnie starts selling secrets, he can blame any data compromises on the hackers? She doesn't believe the stuff she comes up with, it's just a fun mental exercise over our morning hot beverages.

  9. #59
    Join Date
    Dec 2012
    Location
    I can still smell Poutine.
    Posts
    26,410
    Quote Originally Posted by davjr96 View Post
    "Moving laterally" is jumping around a network in which you have already gained access. Say "Server A" has super sensitive information and is blocked off from the outside world, with the exception of "Server B". If "Server B" is improperly secured, then a hacker can get to "Server B" and use the one open access point to "Server A". In the real world this is generally lots of hops between systems allowing a hacker to get access to "very well secured" systems that they could not get directly into. "Very well" secured systems is in quotes because it is security 101 to defend against these types of hacks with segmented access controls.

    In skiing terms, imagine they only check for lift tickets at the bottom lifts. If you managed to get to the upper mountain without a lift ticket, you can jump around between all those lifts without getting caught.
    There are mountains that don't check tickets at every lift?

  10. #60
    Join Date
    Jun 2020
    Location
    in a freezer in Italy
    Posts
    7,906
    There used to be, at least. Solitude was that way, and I've been other places like that.

  11. #61
    Join Date
    Dec 2003
    Location
    Nhampshire
    Posts
    7,873
    Quote Originally Posted by riser3 View Post
    My wife likes to dream up conspiracy theories as a hobby. What if the "discovery" of the hack was intentional so that when Donnie starts selling secrets, he can blame any data compromises on the hackers? She doesn't believe the stuff she comes up with, it's just a fun mental exercise over our morning hot beverages.
    For those that don't work in technology: rare that stuff like this is a conspiracy as so much shit is broken/badly configured/poorly built.
    That anything works at all is a small miracle.

  12. #62
    Join Date
    Dec 2012
    Location
    I can still smell Poutine.
    Posts
    26,410
    Quote Originally Posted by ötzi View Post
    There used to be, at least. Solitude was that way, and I've been other places like that.
    Weird.

  13. #63
    Join Date
    Dec 2012
    Location
    I can still smell Poutine.
    Posts
    26,410
    Quote Originally Posted by schuss View Post
    For those that don't work in technology: rare that stuff like this is a conspiracy as so much shit is broken/badly configured/poorly built.
    That anything works at all is a small miracle.
    Heh. I've seen it first-hand.

  14. #64
    Join Date
    Nov 2008
    Posts
    1,486
    Quote Originally Posted by riser3 View Post
    There are mountains that don't check tickets at every lift?
    JHole still don’t as far as I know

  15. #65
    Join Date
    Feb 2006
    Location
    Among Greatness All Around
    Posts
    6,875
    Quote Originally Posted by davjr96 View Post
    "Moving laterally" is jumping around a network in which you have already gained access. Say "Server A" has super sensitive information and is blocked off from the outside world, with the exception of "Server B". If "Server B" is improperly secured, then a hacker can get to "Server B" and use the one open access point to "Server A". In the real world this is generally lots of hops between systems allowing a hacker to get access to "very well secured" systems that they could not get directly into. "Very well" secured systems is in quotes because it is security 101 to defend against these types of hacks with segmented access controls.

    In skiing terms, imagine they only check for lift tickets at the bottom lifts. If you managed to get to the upper mountain without a lift ticket, you can jump around between all those lifts without getting caught.
    Great analogy, getting past the first server device security "gate" and then being able to use the trusted network once you are behind the first device.

  16. #66
    Join Date
    Dec 2016
    Location
    In a van... down by the river
    Posts
    15,158
    Quote Originally Posted by riser3 View Post
    Weird.
    Pretty much every mountain "out west" that has a upper mountain lifts, IME, doesn't check lift passes on the upper mountain.

  17. #67
    Join Date
    Dec 2012
    Location
    I can still smell Poutine.
    Posts
    26,410
    Quote Originally Posted by skaredshtles View Post
    Pretty much every mountain "out west" that has a upper mountain lifts, IME, doesn't check lift passes on the upper mountain.
    That would explain things. I am from "back east".

  18. #68
    Join Date
    Jun 2020
    Location
    in a freezer in Italy
    Posts
    7,906
    Quote Originally Posted by skaredshtles View Post
    Pretty much every mountain "out west" that has a upper mountain lifts, IME, doesn't check lift passes on the upper mountain.
    Now that they have lift tickets that can be scanned this has changed a lot, they put the readers at every lift a lot of places.

  19. #69
    Join Date
    Sep 2001
    Location
    Before
    Posts
    28,769
    I've read that there's 2 hacks: one a signed binary and one not.
    So not only has someone hacked their source and build processes, but the release process as well.

    I haven't read much about the unsigned binary.
    Merde De Glace On the Freak When Ski
    >>>200 cm Black Bamboo Sidewalled DPS Lotus 120 : Best Skis Ever <<<

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •