Salta al contenuto
0
  • Categorie
  • Recenti
  • Tag
  • Popolare
  • Mondo
  • Utenti
  • Gruppi
  • Categorie
  • Recenti
  • Tag
  • Popolare
  • Mondo
  • Utenti
  • Gruppi
Collassa

Forum Federato

Di Piero Bosio
  1. Home
  2. Categorie
  3. Senza categoria
  4. That NodeJS supply chain hack incident is amazing because the threat actor(tm) got RCE access to like a billion devices and ran the world’s shittest Etherum dumper.

That NodeJS supply chain hack incident is amazing because the threat actor(tm) got RCE access to like a billion devices and ran the world’s shittest Etherum dumper.

Pianificato Fissato Bloccato Spostato Senza categoria
4 Post 3 Autori 0 Visualizzazioni
  • Da Vecchi a Nuovi
  • Da Nuovi a Vecchi
  • Più Voti
Rispondi
  • Topic risposta
Effettua l'accesso per rispondere
Questa discussione è stata eliminata. Solo gli utenti con diritti di gestione possono vederla.
  • Kevin Beaumontundefined Questo utente è esterno a questo forum
    Kevin Beaumontundefined Questo utente è esterno a questo forum
    Kevin Beaumont
    scritto su ultima modifica di
    #1

    That NodeJS supply chain hack incident is amazing because the threat actor(tm) got RCE access to like a billion devices and ran the world’s shittest Etherum dumper.

    Imagine if they had done reverse shells instead, or automated lateral movement to ransomware deployment NotPetya style.

    The thing that saved companies here was the threat actor was incompetent crypto boy, nothing more.

    Kevin Beaumontundefined 1 Risposta Ultima Risposta
    • Kevin Beaumontundefined Kevin Beaumont

      That NodeJS supply chain hack incident is amazing because the threat actor(tm) got RCE access to like a billion devices and ran the world’s shittest Etherum dumper.

      Imagine if they had done reverse shells instead, or automated lateral movement to ransomware deployment NotPetya style.

      The thing that saved companies here was the threat actor was incompetent crypto boy, nothing more.

      Kevin Beaumontundefined Questo utente è esterno a questo forum
      Kevin Beaumontundefined Questo utente è esterno a questo forum
      Kevin Beaumont
      scritto su ultima modifica di
      #2

      I cannot tell you have many security incidents I’ve worked at orgs on critical national infrastructure over the years where the threat actor got access and *mind boggles* deployed coin miners.

      No really, I don’t think I can you tell you, I’d get sued 🤣

      David Chisnall (*Now with 50% more sarcasm!*)undefined 1 Risposta Ultima Risposta
      • Kevin Beaumontundefined Kevin Beaumont

        I cannot tell you have many security incidents I’ve worked at orgs on critical national infrastructure over the years where the threat actor got access and *mind boggles* deployed coin miners.

        No really, I don’t think I can you tell you, I’d get sued 🤣

        David Chisnall (*Now with 50% more sarcasm!*)undefined Questo utente è esterno a questo forum
        David Chisnall (*Now with 50% more sarcasm!*)undefined Questo utente è esterno a questo forum
        David Chisnall (*Now with 50% more sarcasm!*)
        scritto su ultima modifica di
        #3

        @GossiTheDog

        Around ten years ago, one of the FreeBSD developers had an SSH key compromised. This key gave access to the machine with our subversion server on it. And, due to how svn worked, every user had write access to the directory containing the repo.

        Subversion does not have any way of doing integrity checks, so the recovery process involved (via a script) checking out each revision in turn, then doing the same with a git mirror, and validating that they were the same.

        Audit logs showed that the attacker had logged in, tried running a few Linux commands, got error messages, and logged out. We were incredibly fortunate that they didn’t do anything more serious.

        Mark Koekundefined 1 Risposta Ultima Risposta
        1
        • David Chisnall (*Now with 50% more sarcasm!*)undefined David Chisnall (*Now with 50% more sarcasm!*)

          @GossiTheDog

          Around ten years ago, one of the FreeBSD developers had an SSH key compromised. This key gave access to the machine with our subversion server on it. And, due to how svn worked, every user had write access to the directory containing the repo.

          Subversion does not have any way of doing integrity checks, so the recovery process involved (via a script) checking out each revision in turn, then doing the same with a git mirror, and validating that they were the same.

          Audit logs showed that the attacker had logged in, tried running a few Linux commands, got error messages, and logged out. We were incredibly fortunate that they didn’t do anything more serious.

          Mark Koekundefined Questo utente è esterno a questo forum
          Mark Koekundefined Questo utente è esterno a questo forum
          Mark Koek
          scritto su ultima modifica di
          #4

          @david_chisnall @GossiTheDog I once investigated a breach of a majorly critical UNIX system that could have killed a multinational company, and found that the guy typed "DIR C:" in the shell he got, tried some more MS DOS commands in vain, and gave up

          1 Risposta Ultima Risposta
          1
          • Stefano Marinelliundefined Stefano Marinelli ha condiviso questa discussione
          Rispondi
          • Topic risposta
          Effettua l'accesso per rispondere
          • Da Vecchi a Nuovi
          • Da Nuovi a Vecchi
          • Più Voti


          • Accedi

          • Accedi o registrati per effettuare la ricerca.
          • Primo post
            Ultimo post