Welcome to the Hardcore Husky Forums. Folks who are well-known in Cyberland and not that dumb.

Russia strikes again

135

Comments

  • Pitchfork51
    Pitchfork51 Member Posts: 27,681
    edited July 2018
    Actually when things get hacked it's statistically likely that it's the Russian mob or some punk 15 year old nerd

    Btp is too dumb so he's safe
  • ThomasFremont
    ThomasFremont Member Posts: 13,325

    If you read the article you’d see they’re using legit credentials to get by security. This isn’t a brute force hack, but rather a social engineering operation. They’re working American citizen assets.

    Poont of clarification, the article does not say the Russians have American moles or double-agents or whatever.
    Correct. But the usage of legit credentials to avoid detection implies that the leak is at the personal level. They’re targeting individual employees. Whether they are cooperating/collaborating or just left their laptop open is anyone’s guess. But the idea of a GRU spy trying to get the lower wage employees to cooperate is scarier than the notion that they can hack an air-gapped system.
  • Swaye
    Swaye Moderator, Swaye's Wigwam Posts: 41,741 Founders Club

    If you read the article you’d see they’re using legit credentials to get by security. This isn’t a brute force hack, but rather a social engineering operation. They’re working American citizen assets.

    Poont of clarification, the article does not say the Russians have American moles or double-agents or whatever.
    Correct. But the usage of legit credentials to avoid detection implies that the leak is at the personal level. They’re targeting individual employees. Whether they are cooperating/collaborating or just left their laptop open is anyone’s guess. But the idea of a GRU spy trying to get the lower wage employees to cooperate is scarier than the notion that they can hack an air-gapped system.
    It's standard phishing to credential theft I'd bet.
  • ThomasFremont
    ThomasFremont Member Posts: 13,325
    Swaye said:

    If you read the article you’d see they’re using legit credentials to get by security. This isn’t a brute force hack, but rather a social engineering operation. They’re working American citizen assets.

    Poont of clarification, the article does not say the Russians have American moles or double-agents or whatever.
    Correct. But the usage of legit credentials to avoid detection implies that the leak is at the personal level. They’re targeting individual employees. Whether they are cooperating/collaborating or just left their laptop open is anyone’s guess. But the idea of a GRU spy trying to get the lower wage employees to cooperate is scarier than the notion that they can hack an air-gapped system.
    It's standard phishing to credential theft I'd bet.
    Possibly. But any system worth a shit has more than an email/password credential. Basic 2-factor means they phished credentials and THEN got to the phone where the verification code generates in order to get in. This means personal contact.
  • GrundleStiltzkin
    GrundleStiltzkin Member Posts: 61,516 Standard Supporter

    Swaye said:

    If you read the article you’d see they’re using legit credentials to get by security. This isn’t a brute force hack, but rather a social engineering operation. They’re working American citizen assets.

    Poont of clarification, the article does not say the Russians have American moles or double-agents or whatever.
    Correct. But the usage of legit credentials to avoid detection implies that the leak is at the personal level. They’re targeting individual employees. Whether they are cooperating/collaborating or just left their laptop open is anyone’s guess. But the idea of a GRU spy trying to get the lower wage employees to cooperate is scarier than the notion that they can hack an air-gapped system.
    It's standard phishing to credential theft I'd bet.
    Possibly. But any system worth a shit has more than an email/password credential. Basic 2-factor means they phished credentials and THEN got to the phone where the verification code generates in order to get in. This means personal contact.
    You're throwing some conjecture over top of what was reported.
  • ThomasFremont
    ThomasFremont Member Posts: 13,325

    Swaye said:

    If you read the article you’d see they’re using legit credentials to get by security. This isn’t a brute force hack, but rather a social engineering operation. They’re working American citizen assets.

    Poont of clarification, the article does not say the Russians have American moles or double-agents or whatever.
    Correct. But the usage of legit credentials to avoid detection implies that the leak is at the personal level. They’re targeting individual employees. Whether they are cooperating/collaborating or just left their laptop open is anyone’s guess. But the idea of a GRU spy trying to get the lower wage employees to cooperate is scarier than the notion that they can hack an air-gapped system.
    It's standard phishing to credential theft I'd bet.
    Possibly. But any system worth a shit has more than an email/password credential. Basic 2-factor means they phished credentials and THEN got to the phone where the verification code generates in order to get in. This means personal contact.
    You're throwing some conjecture over top of what was reported.
    Oh I’m speculating about it, no denying that. How they did it is not that big of a deal. What we? are gonna do about it is.
  • GrundleStiltzkin
    GrundleStiltzkin Member Posts: 61,516 Standard Supporter
    edited July 2018

    Swaye said:

    If you read the article you’d see they’re using legit credentials to get by security. This isn’t a brute force hack, but rather a social engineering operation. They’re working American citizen assets.

    Poont of clarification, the article does not say the Russians have American moles or double-agents or whatever.
    Correct. But the usage of legit credentials to avoid detection implies that the leak is at the personal level. They’re targeting individual employees. Whether they are cooperating/collaborating or just left their laptop open is anyone’s guess. But the idea of a GRU spy trying to get the lower wage employees to cooperate is scarier than the notion that they can hack an air-gapped system.
    It's standard phishing to credential theft I'd bet.
    Possibly. But any system worth a shit has more than an email/password credential. Basic 2-factor means they phished credentials and THEN got to the phone where the verification code generates in order to get in. This means personal contact.
    You're throwing some conjecture over top of what was reported.
    Oh I’m speculating about it, no denying that. How they did it is not that big of a deal. What we? are gonna do about it is.
    That.

    I was cheering like every other GOOD American when we! took out the centrifuges with Stuxnet. But even then I was worrying what might be coming back at us.
  • RaceBannon
    RaceBannon Member, Moderator, Swaye's Wigwam Posts: 115,567 Founders Club
    dnc said:

    Swaye said:

    If you read the article you’d see they’re using legit credentials to get by security. This isn’t a brute force hack, but rather a social engineering operation. They’re working American citizen assets.

    Poont of clarification, the article does not say the Russians have American moles or double-agents or whatever.
    Correct. But the usage of legit credentials to avoid detection implies that the leak is at the personal level. They’re targeting individual employees. Whether they are cooperating/collaborating or just left their laptop open is anyone’s guess. But the idea of a GRU spy trying to get the lower wage employees to cooperate is scarier than the notion that they can hack an air-gapped system.
    It's standard phishing to credential theft I'd bet.
    Possibly. But any system worth a shit has more than an email/password credential. Basic 2-factor means they phished credentials and THEN got to the phone where the verification code generates in order to get in. This means personal contact.
    You're throwing some conjecture over top of what was reported.
    Oh I’m speculating about it, no denying that. How they did it is not that big of a deal. What we? are gonna do about it is.

    Bidness as usual
  • ThomasFremont
    ThomasFremont Member Posts: 13,325

    Swaye said:

    If you read the article you’d see they’re using legit credentials to get by security. This isn’t a brute force hack, but rather a social engineering operation. They’re working American citizen assets.

    Poont of clarification, the article does not say the Russians have American moles or double-agents or whatever.
    Correct. But the usage of legit credentials to avoid detection implies that the leak is at the personal level. They’re targeting individual employees. Whether they are cooperating/collaborating or just left their laptop open is anyone’s guess. But the idea of a GRU spy trying to get the lower wage employees to cooperate is scarier than the notion that they can hack an air-gapped system.
    It's standard phishing to credential theft I'd bet.
    Possibly. But any system worth a shit has more than an email/password credential. Basic 2-factor means they phished credentials and THEN got to the phone where the verification code generates in order to get in. This means personal contact.
    You're throwing some conjecture over top of what was reported.
    Oh I’m speculating about it, no denying that. How they did it is not that big of a deal. What we? are gonna do about it is.
    That.

    I was cheering like every other GOOD American when we! took out the centrifuges with Stuxnet. But even then I was worrying what might be coming back at us.
    Turn off the lights in America for 1 week and the shit will get real. Do lasting damage to a few critical systems and it could spiral into chaos. Infrastructure was the one thing Trump was selling that I was buying, and it ain’t happening any time soon (or ever).