Simple answer - "MURCA, FUCK YEAH"OK I get it.
Big time crisis, needs to be dealt with immediately.
If I was at a white House press conference I would ask - what's the point of nukes, NATO ? etc cause no one does.
Would be a laugh to hear what they would come out with
Those pesky Somalians!!i was in a meeting about a year ago, and one of the guys there said 'i was working in maersk - actually in the operations room when we were hit' and there was an audible intake of breath from nearly everyone there.
that nearly sank maersk (pun unintended) - IIRC what saved them was a domain controller which had been taken offline for maintenance before the attack and was still clean.
I read up about conti there. So they get onto the systems and encrypt the shit out of as much shit, as quickly as they can.i had a meeting with broadcom/symantec during the week, about other issues, and they specifically warned us about conti.
I know most data is sensitive but considering Tusla have also been affected, you’d hate to think what data is out there now that should be kept safe. And the fact that their referral system is down is a major risk for kids in need of help right now.what the actual fucking hell are they doing if they are unaware for days?
interesting, thanks for posting. This bit struck meIn 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers. Read about it first here.www.cybereason.com
AFAIR, about ten telcos were infiltrated by APT10. and a bunch of high profile tech companies (dell, HP, etc.) were also compromised to some extent by them. i was surprised that didn't get higher publicity at the time.
the bigger and more complex your organisation, obviously the more endpoints you'll have which will be in some way uncontrolled.
The attack began with a web shell running on a vulnerable, publicly-facing server
I doubt the hackers even know what they're dealing with. There are a couple of scenarios that need to be considered.I know most data is sensitive but considering Tusla have also been affected, you’d hate to think what data is out there now that should be kept safe. And the fact that their referral system is down is a major risk for kids in need of help right now.
oh, agreed. i work for a company which gets nation state level attention so a lot of our security guys are shit hot. but we're spread across the world, which means there's always going to be rogue systems unpatched and forgotten about knocking around the place.scutter said:But poor design, vulnerable software and human error are always the first things I would suspect.
there was a scandinavian mental healthcare provider hacked in a similar way a year or two back, and the hackers knew exactly what they were going for - they were contacting the patients/clients with demands for ransom or the notes from their therapy sessions would be made public.If the data was exfiltrated, its unlikely the hackers have even looked at it, or have any real clue what they're looking at. They are hoping for a quick, effortless buck. While it is very worrying for people's personal medical records to have been hacked in this fashion, other than asking for this ransom, I'm not sure what value the hackers think this data is to them.
Upgrade your account now to disable all ads... If we had any... Which we don't right now.Upgrade now