kid

joined 9 months ago
MODERATOR OF
[–] kid 17 points 6 months ago (16 children)

Please note that the attack can only be carried out if the local network itself is compromised.

[–] kid 1 points 7 months ago

IoCs available here. Some of them with no detection on VT.

[–] kid 0 points 7 months ago

MS involved. Again.

[–] kid 2 points 7 months ago

Of course, in the end it is just conflict, and when it spills over into the real world then you have a war. But this is not always the case We have already had disruption in power grids, nuclear plants, hospitals, public offices, critical infrastructure of financial markets (some of them with impact in real lives) without retaliation in the physical world.

Cyberwar, in my perspective, have some nuances. For instance, in a physical conflict, a hostile nation's invasion of my property immediately becomes a state issue. However, this isn't always the case in a cyberwar if a hostile state invades my organization (It's hard to immediately distinguish whether the actor is a nation state, a financially motivated group, hacktivists, or just a guy who eats pizza in his mom's basement). Most of the time, organizations are on their own.

In a cyberwar, espionage is also far more acceptable. This is something the NSA (and FSB/SVR) has been doing for years (against private entities and states). In a way, I understand that it is something similar to what the cold war was (is), but with no boots on the ground.

[–] kid 2 points 7 months ago

I'd better say that states have been doing this.

[–] kid 1 points 7 months ago (3 children)

Cyber war, of course. I think that there is a cyber war going on for quite some time now. CWWI (Cyber World War I).

[–] kid 1 points 7 months ago

If anyone is still using it, anyways....

[–] kid 1 points 7 months ago

Maybe cyber resilience? Quick identify, respond and recover from an incident.

[–] kid 13 points 7 months ago

Hackers 10 - 1 LastPass

[–] kid 13 points 7 months ago

From the article:

Microsoft locked down a server last month that exposed Microsoft employee passwords, keys and credentials to the open Internet, as the company faces growing pressure to strengthen the security of its software. Microsoft was notified of the vulnerability on February 6th and the block on March 5th. It is unclear whether anyone accessed the exposed server during this period.

[–] kid 2 points 7 months ago
[–] kid 10 points 8 months ago

In this particular case, the method of infection of the router was not disclosed. However, typically, the most common methods involve an open administration port to the internet (user interface or TR-069) or through the internal interface, in case a network host has been compromised.

They often perform brute-force password attacks, and once access is obtained, they look for typical Linux administrative tools (such as bash, etc.) and proceed to compromise the router.

So I understand that a router with custom firmware can be compromised if it has a weak password and resources to maintain the infection, or of course, a vulnerability that is exploitable.

view more: ‹ prev next ›