I'm surprised there is not some sort of audit log like what Wikipedia and Google Docs uses.
How could a company of this size not have some sort of user log for their code editor?
I'm surprised there is not some sort of audit log like what Wikipedia and Google Docs uses.
How could a company of this size not have some sort of user log for their code editor?
Merde De Glace On the Freak When Ski
>>>200 cm Black Bamboo Sidewalled DPS Lotus 120 : Best Skis Ever <<<
Damn, some people need to lose their jobs.
https://www.cnn.com/2020/12/23/polit...ery/index.html
No idea what moving laterally means in the context of computer hacking. But assume it just means moving around within different files that store more sensitive data, like nuclear launch codes and such.
FireEye was tipped off to the hackers' presence when they attempt to move laterally within the firm's network, according to the sources, a move that suggested the hackers were targeting sensitive data beyond emails addresses or business records. Whether that exposure was the result of a mistake by the attackers or because they took a calculated risk remains unclear, the sources said.
"At some point, you have to risk some level of exposure when you're going laterally to get after the things that you really want to get. And you're going to take calculated risks as an attacker," one source familiar with the investigation said.
"We don't beat the reaper by living longer, we beat the reaper by living well and living fully." - Randy Pausch
FWIW, this hack is much, much different than previous efforts when existing code or administrative credential are exploited.
When dealing with code databases, there is literally terabytes of code and no one person can even read it, let alone understand it all.
Right now, it's unclear how the hackers placed their code in the source tree, but it's not something people normally look for, particularly when code reviews are based on objectives within the organization. The problem here is that the code was injected outside of all the ongoing efforts within the company.
I just don't like blaming people, I'd rather try to identify the loopholes in the constructs.
Merde De Glace On the Freak When Ski
>>>200 cm Black Bamboo Sidewalled DPS Lotus 120 : Best Skis Ever <<<
Change the para-diggum.
Also, just as likely they used some contractor creds and someone was asleep at the wheel on code reviews of pull requests since that stuff is usually scripted. They'd just have to ape the script for the first third and it's doubtful anyone would dig if it doesn't trip any static code analysis vulnerability alerts.
"Moving laterally" is jumping around a network in which you have already gained access. Say "Server A" has super sensitive information and is blocked off from the outside world, with the exception of "Server B". If "Server B" is improperly secured, then a hacker can get to "Server B" and use the one open access point to "Server A". In the real world this is generally lots of hops between systems allowing a hacker to get access to "very well secured" systems that they could not get directly into. "Very well" secured systems is in quotes because it is security 101 to defend against these types of hacks with segmented access controls.
In skiing terms, imagine they only check for lift tickets at the bottom lifts. If you managed to get to the upper mountain without a lift ticket, you can jump around between all those lifts without getting caught.
My wife likes to dream up conspiracy theories as a hobby. What if the "discovery" of the hack was intentional so that when Donnie starts selling secrets, he can blame any data compromises on the hackers? She doesn't believe the stuff she comes up with, it's just a fun mental exercise over our morning hot beverages.
There used to be, at least. Solitude was that way, and I've been other places like that.
I've read that there's 2 hacks: one a signed binary and one not.
So not only has someone hacked their source and build processes, but the release process as well.
I haven't read much about the unsigned binary.
Merde De Glace On the Freak When Ski
>>>200 cm Black Bamboo Sidewalled DPS Lotus 120 : Best Skis Ever <<<
Bookmarks