Inside the Massive Crime Industry That's Hacking Billion-Dollar Companies (wired.com)
- Reference: 0175400509
- News link: https://tech.slashdot.org/story/24/11/04/1815206/inside-the-massive-crime-industry-thats-hacking-billion-dollar-companies
- Source link: https://www.wired.com/story/inside-the-massive-crime-industry-thats-hacking-billion-dollar-companies/
[1] https://www.wired.com/story/inside-the-massive-crime-industry-thats-hacking-billion-dollar-companies/
I was waiting for "Russia" to show up (Score:1)
Yes, the country that needs washing machine CPUs is a cyberglobal cybersecurity cyberthreat, cyberinvestigators cyberreport.
Cyber!
Re: (Score:3)
50000BTU_barbecue writes:
> Yes, the country that needs washing machine CPUs ...
I detest the servo mechanisms in car vent actuators that replace a stiff wire. A $270 electronic device that breaks every 2 years is not an improvement over a $0.35 wire that lasts for (not kidding, did a 1934 Cord) 90 years with zero issues.
Tech for the sake of Tech is just stupid.
Re: (Score:2)
On the one hand, those reports were ginned up, based on rumors at best and clearly intended to valorize the Ukraine war, as easily won against an incompetent and incapable opponents, and the demonstrate that American media cannot be trusted to discuss foreign nations, especially hostile ones, accurately.
On the other hand, Russia absolutely is safe harbor for "hackers", due in no small part to the US overplaying its hand with sanctions, and Russia no longer even pretending to give a shit what people within t
Re: I was waiting for "Russia" to show up (Score:2)
The smaller the CPU is the more skill the programmer needs.
Not the crime industry that's behind these hacks (Score:1)
Only state sponsored actors have the resources to hack billion-dollar corporations. Think China, Russia,N Korea, Iran and the like. IMHO
Re: (Score:1)
Having spent time in the cybersecurity trenches, I disagree with your thesis. A reasonably endowed criminal gang could assemble a team of the caliber needed to *successfully* hack billion dollar corporations. Does state sponsored hacking happen. Yes it does, but with the exception of China (and perhaps Iran) not in the way you think it does. Maybe Russia does now, but in the past the government just turned a blind eye to hacking as long as it didn't target organizations inside the borders. North Korea and r
Re: (Score:2)
You're so right about executives. Not only are they worried about this quarter's results above all else, they tend to be nontechnical, sometimes even the CTO. Unless they're smart (and humble) enough to listen to the people they hired to actually know and do this stuff, they're always going to be vulnerable to one-size-fits-all-and-cures-all "solutions" sold using slide decks full of buzzwords like "zero trust". (Yet the company is supposed to put 100% trust in the vendor!)
Re: (Score:1)
I'm glad someone here gets it. You must be Gen X like me. When I was younger, I was a lot more naive about root causes of these problems. After years of observation, I am just cynical ... but not naive. I'm proud of my accomplishments, and my former manager tells me that my security architecture still has not been hacked to this day. So I know it can be done.
You nailed on the other reason I exited cybersecurity. The vendors selling snake oil and silver bullet solutions for millions of dollars. My life is to
Re: (Score:2)
calarndt writes:
> Only state sponsored actors have the resources to hack billion-dollar corporations.
Remember that (vital infrastructure system) was found to expose internal SCADA controls to the internet using OEM default passwords. (Large cloud actor) had an internal compromise to their Active Directory system for over 8 years before they figured it out and it was a group of crooks.
Remember, an attacker can attempt millions and millions of times and fail for one success as there are no consequences for the most part. While state actors are a threat, they are not the only one, nor the mos
Don't only trust MS and other vendors. (Score:2, Insightful)
Companies also have to do their own work to make sure that an intrusion is contained.
Multinational corporations depend too much on a single site managing their entire worldwide network. Those that work there are often underpaid greenhorns too.
Add to it that they are now handing over the entire user database into the hands of Microsoft. (Hello there). They are also throwing in many business applications into Azure, so now M$ holds them by the balls.
Meanwhile VMware is now in control of local servers with tim
Re: (Score:2)
Not just contained, but detected early before they do enough damage that containment includes reputational damage mitigation. Canaries are great for this
Opportunity Knocks... (Score:2)
In post Soviet Russia, stealing from sanctioned Western commerce is an excellent gig with commissions and bonus pay as well as exemption from serving in the infantry, The more Russia antagonizes the west, the better their business plan goes: their people can blame the west for hardships, while the oligarchs laugh all the way to the bank. Its much simpler to negotiate terms when you refuse to play by anyone else's rules..
The longer cryptocurrencies enable... (Score:2)
...this highly profitable & low-risk extortion, the worse this problem will get. The ransom money is paying for their R&D to get even better at gaining control of other people's computers. This is what "freedom" looks like in the real world.
MFA (Score:5, Informative)
> malware that harvests login credentials from infected computers
This is why multi-factor authentication is a must these days. Even with stolen credentials, you can prevent unauthorized logins to your account.
I used [1]Duo [duo.com] for things like VPN connections, RDP logins, and web applications. It's free for up to 10 users.
[1] https://duo.com/
Re: (Score:2)
You used a third party service to do MFA so you could add an additional party into your security situation who could get compromised and lead to compromise of your resources? Great plan there, sport.
Re: (Score:3)
> You used a third party service to do MFA so you could add an additional party into your security situation who could get compromised and lead to compromise of your resources? Great plan there, sport.
Feel free to describe your better solution to stolen credentials.
Re: (Score:2)
> Feel free to describe your better solution to stolen credentials.
Do your own MFA that doesn't depend on some fly by night free service that owes you nothing and has no responsibility for your security.
Re:MFA (Score:5, Informative)
>> Feel free to describe your better solution to stolen credentials.
> Do your own MFA that doesn't depend on some fly by night free service that owes you nothing and has no responsibility for your security.
You are talking out of your ass. Duo Security is hardly a "fly by night free service". They are a subsidiary of Cisco, with over 25,000 customers in over 100 countries. Ya, I'm sure your home-rolled multi-platform MFA solution is way more secure.
Re: (Score:1)
>>> Feel free to describe your better solution to stolen credentials.
>> Do your own MFA that doesn't depend on some fly by night free service that owes you nothing and has no responsibility for your security.
> You are talking out of your ass. Duo Security is hardly a "fly by night free service". They are a subsidiary of Cisco, with over 25,000 customers in over 100 countries. Ya, I'm sure your home-rolled multi-platform MFA solution is way more secure.
Would someone stop this shit? This is ridiculous. Duo probably sucks. You shouldn't use a service that someone named "nuckfuts" stealthily advertises on a free message board.
Re: (Score:2)
> Would someone stop this shit? This is ridiculous. Duo probably sucks.
You know what's ridiculous? People making pronouncements about things that they obviously know nothing about.
> You shouldn't use a service that someone named "nuckfuts" stealthily advertises on a free message board.
Coming from a guy named "ihavesaxwithcollies".
Furthermore, there was nothing "stealthy" about my comments, and I was not advertising it. I was recommending a service based on my own experience with it. And FWIW, my experience includes over 30 years as a Systems Administrator and security specialist.
Re: (Score:1)
You know what you're right. There was nothing stealthy about it. You are posting an advertisement for a shitty service on here.
> Coming from a guy named "ihavesaxwithcollies".
Dumbass, I'm not the one selling shit on a free message board. No one cares what my name is.
I don't care if you're the pope of chili town. Talk is cheap and you're a disgusting shill.
Re: (Score:2)
> You know what you're right. There was nothing stealthy about it. You are posting an advertisement for a shitty service on here.
Not an advertisement. An endorsement. And not a shitty service, hence the endorsement. If you have no interest in recommendations from people who have actually used a product, feel free to ignore.
> Dumbass, I'm not the one selling shit on a free message board.
Again. not selling anything.
> No one cares what my name is.
Yet you started out with a criticism of my name.
> Talk is cheap
As you so aptly demonstrate.
Re: (Score:2)
Seriously - if you aren't familiar with Duo, then you probably don't actually work in tech.
Re: MFA (Score:2)
Oh, it's part of Cisco, the back door guys? Well that certainly makes it better.
Wait no, that means you should have your head examined.
Re: (Score:2)
> Oh, it's part of Cisco, the back door guys? Well that certainly makes it better.
> Wait no, that means you should have your head examined.
My endorsement was of Duo, not Cisco. They built their reputation for 8 years before being acquired by Cisco. Are you suggesting their products immediately became insecure after acquisition? Feel free to reference any evidence for your assertion.
Also, know your threats. When I deploy MFA for Remote Desktop connections, I'm not trying to thwart the capabilities of the NSA. I'm trying to thwart Russian ransomware gangs for the most part. If they have access to backdoors, then I guess I'm fucked. There will al
Re: (Score:2)
Uh, yea, that's how enterprise identity management/authentication kind of works