Solar wind cosy bear hack
Author
Discussion

Ridgemont

Original Poster:

8,868 posts

155 months

Thursday 17th December 2020
quotequote all
I did try and see if there is a thread on this already and couldn’t see one in NPE (not interested in IT fora).

https://www.theregister.com/2020/12/15/solar_winds...

The tldr version. Russian gov hacking outfit accessed solar winds services (commercial security company (!) )to be able install back door access via a software update. Apparently gave full control mode once accessed.

Hacked targets: Pentagon, state department, NASA, NSA, DoJ and.. the Whtehouse.

As well as hundreds of commercial firms.

Unbelievable. And the U.K. impact is still to be confirmed.

This has been going on since March.

Words fail me.


Edited by Ridgemont on Thursday 17th December 01:20

bitchstewie

64,412 posts

234 months

Thursday 17th December 2020
quotequote all
Some scary things coming out that don't reflect well on their security practises.

Security Researcher Reveals Solarwinds' Update Server Was 'Secured' With The Password 'solarwinds123'

Andeh1

7,511 posts

230 months

Thursday 17th December 2020
quotequote all
Modern warfare indeed, though I'm sure we have our fingers in a few pies as well....! (I'd hope so anyway)

durbster

11,824 posts

246 months

Thursday 17th December 2020
quotequote all
Not too surprising. Human beings are rubbish at digital security as a lot of it goes against our instincts.

The President of the United States' Twitter account - one of the most powerful tools in the world until recently - had the password MAGA2020! with no two-factor authentication.

rodericb

8,560 posts

150 months

Thursday 17th December 2020
quotequote all
Ridgemont said:
I did try and see if there is a thread on this already and couldn’t see one in NPE (not interested in IT fora).

https://www.theregister.com/2020/12/15/solar_winds...

The tldr version. Russian gov hacking outfit accessed solar winds services (commercial security company (!) )to be able install back door access via a software update. Apparently gave full control mode once accessed.

Hacked targets: Pentagon, state department, NASA, NSA, DoJ and.. the Whtehouse.

As well as hundreds of commercial firms.

Unbelievable. And the U.K. impact is still to be confirmed.

This has been going on since March.

Words fail me.


Edited by Ridgemont on Thursday 17th December 01:20
Is there something weird with the comments on The Register? It appear that one commentor often replies to themselves, having a conversation of sorts with themself.

Edit: I've worked it out - it's a guest account for non-members....... Crikey I thought that person spends a lot of time on that site....... hehe

BrettMRC

5,616 posts

184 months

Friday 18th December 2020
quotequote all
This is going to keep on giving for a long time to come.

Scary stuff and not getting enough coverage in the media.


pquinn

7,167 posts

70 months

Friday 18th December 2020
quotequote all
Lots of eggs all protected by one big basket that had flaws a basic security assessment should have picked up.

Their update process was an insecure joke.

As was anyone who built a network where data could be exfiltrated by a patched monitoring package - surely a basic principle is that you trust *nothing* enough that a single system is capable of compromising everything.

Plus some people trust their tools far too much - most of this monitoring stuff (even when not compromised by the FSB) doesn't seem to give a properly accurate or detailed view of anything if you really start digging into it. Mostly it seems to work just well enough to make you happy that it does something for the money and that you're keeping an eye on things, right up to the point where something properly bad happens.

(I may be slightly jaded after dealing with some supposedly top end specialists/kit who when something actually needed tracing had monitoring records that didn't tie up with known facts, and when push came to shove couldn't really trace anything accurately across their hugely expensive 'secure' infrastructure.)

paul.deitch

2,289 posts

281 months

Friday 18th December 2020
quotequote all
^^^
Yes I immediately thought that it's a monoculture and in nature that's a dangerous thing. And I know nothing about secure systems.

CrutyRammers

13,735 posts

222 months

Friday 18th December 2020
quotequote all
pquinn said:
Lots of eggs all protected by one big basket that had flaws a basic security assessment should have picked up.

Their update process was an insecure joke.

As was anyone who built a network where data could be exfiltrated by a patched monitoring package - surely a basic principle is that you trust *nothing* enough that a single system is capable of compromising everything.

Plus some people trust their tools far too much - most of this monitoring stuff (even when not compromised by the FSB) doesn't seem to give a properly accurate or detailed view of anything if you really start digging into it. Mostly it seems to work just well enough to make you happy that it does something for the money and that you're keeping an eye on things, right up to the point where something properly bad happens.

(I may be slightly jaded after dealing with some supposedly top end specialists/kit who when something actually needed tracing had monitoring records that didn't tie up with known facts, and when push came to shove couldn't really trace anything accurately across their hugely expensive 'secure' infrastructure.)
Agree with all of that. The swiss cheese model applies