David E. Sanger / New York Times: The CrowdStrike debacle may have accidentally provided cybercriminals and countries like China a more detailed road map to disrupt US critical infrastructure  —  With each cascade of digital disaster, new vulnerabilities emerge.  The latest chaos wasn’t caused by an adversary …

    • Blaster M@lemmy.world
      link
      fedilink
      English
      arrow-up
      13
      ·
      edit-2
      4 months ago

      Worse… target CrowdStrike or any other security monitoring system… which means being able to get in anything, Windows, Linux, MacOS… not that they don’t already do that. Because they definitely do.

        • Blaster M@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          4 months ago

          My point exactly. What good is a dozen docker containers nested in four VMs if you can slap all of it aside with the giant ROOT SHELL hand because you hacked into the remote monitoring software to take control of the system.

          The remote management system is now the weaket link in the system’s security chain.

      • Optional@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        4 months ago

        If it’s specifically allowed, yes. Windows is swiss cheese with tons of contaminants in.

          • Optional@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 months ago

            Not necessarily. Proper permissions and lack of system bugs are ok to monitor, it doesn’t mean the system is less secure.

  • kaffiene@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    ·
    4 months ago

    Why the fuck does the writer think that state actors weren’t already aware of these vectors?

  • cerement@slrpnk.net
    link
    fedilink
    English
    arrow-up
    7
    ·
    4 months ago

    we’ll do all their work for them, they just need to sit back and take credit the next time we shoot ourselves in the foot …

  • OppositeOfOxymoron@infosec.pub
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 months ago

    Uh, between SolarWinds and XZ and the supply chain attacks being conducted by the NSA that were revealed by Snowden… They already know.

    • Frozengyro@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 months ago

      Yes, but only country that matters is US /s

      Also, they are likely the primary targets (certainly not the only ones) for bad actors.