General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region Forums"Russians are too good to be caught, they don't leave evidence"
Vladimir Putin reportedly told Donald Trump that if Russian hackers had infiltrated Democratic groups, they would have been too good to have been caught. And now the President is making the same claims, the White House has admitted.
According to the New York Times, Mr Putin told Mr Trump during their G20 meeting that "Moscows cyber-operators are so good at covert computer-network operations that if they had dipped into the computer systems, there is no way they could have been detected".
Since then Trump has shared this claim with his team, his communications director Anthony Scaramucci has said.
During a CNN interview on Sunday, Mr Scaramucci told Jake Tapper that "someone" had told him Russian hackers were too good to be detected. "You know, somebody said to me yesterday I won't tell you who that if the Russians actually hacked this situation and spilled out those e-mails, you would have never seen it," Mr Scaramucci told Mr Tapper.
https://www.independent.co.uk/news/world/americas/us-politics/putin-trump-russia-hackers-too-good-get-caught-reports-scaramucci-a7858241.html
There was another thing where no evidence was left behind, just sayin'.
Ilsa
(61,690 posts)That load belongs in a diaper, then a toilet.
erronis
(15,185 posts)Sorry, DC (or Miami). It's an ugly wad that will need to pass. Things will be much better in a few weeks.
triron
(21,984 posts)Blecht
(3,803 posts)This is from July of 2017.
TeamPooka
(24,209 posts)donkeypoofed
(2,187 posts)It was from the Dutch who had hacked the GRU. ie. Mueller even learned which computer was used and what order the keystrokes were in and at what time of day.
Besides Scaramucci is a turd - why would anyone listen to him?!
Besides they're just.Russians - not gods. Geez
They fuck up, just like everybody else.
SWBTATTReg
(22,077 posts)it depends upon the IT operations to realize/analysis files that record every incursion to determine who the intruder is/was.
We had tracking of every incursion into our files (a feature I've loved) and we used it if need be to prevent unauthorized entry into account files/payables/receivables/etc. A handy feature that needs to be used and monitored more frequently than it was in the past...
CabalPowered
(12,690 posts)TheBlackAdder
(28,167 posts).
Over the past decade, there has been backdoor access to all US shipped mainboards, routers, and most operating systems that allow for NSA and FBI to perform mass surveillance on citizens. Famous companies like Cisco corporate routers were caught with these backdoors. The warrant program was expanded to include up to one million desktops. It was also enhanced to not just read information on a computer, but to allow the injection of spyware, the deletion and insertion of files on computers too. The government needed quick access to computers en mass, and the current setup allows NA/FBI to directly bypass all user security measures in seconds. Heck, even Verizon is now storing your WPA-2 key online, and forced changed the userid of their new routers to 'admin', which is a Security 101 no-no and cannot be changed. I've got one and I can't change anything on it. I'm going to set a second router in between, with VPN software on it.
Couple this with the Intel Management Engine and suspected AMD equivalent and remote access to a computer can occur without any footprints--as it is designed to access all functions of the computer without leaving a trace. Computer firms, such as Purism, are working to disable this hardware feature, but one slight error and you brick the CPU.
The use of a single tier server is also to blame for the email breech, because to get any kind of security, you need a three-tier server setup with a DMZ in the middle and proper bus communication that prevents people from sending anything but authorized messages to the second level and then to the back-end server. A single server can never be made secure, especially one running any Windows build.
Now, China, Russia and DPRK had some ability to penetrate these systems--but Snowden gave away the toolkits that the NSA use to penetrate our computers, so we're all open for hacking. Take a few cyber security courses and it will scare the shit out of you.
.
triron
(21,984 posts)TheBlackAdder
(28,167 posts).
I think I've posed a couple things here, in the past, citing the security firms that performed the audits.
.
fescuerescue
(4,448 posts)The NSA intercepted cisco routers inroute from factory to the customer. It was there that they placed the hardware backdoors into the devices, and then they were in turn forwarded on to the customer.
I have a more than a bit of beef with Cisco for other reasons, but I saw all this unfold extremely first hand and in person and this was totally the NSA overstepping their bounds. Cisco had and hopefully still has a very strong anti-backdoor security program. The Cisco PSIRT team was (hopefully still is), the equivalent of "internal affairs" in keeping backdoors and other vulnerabilities out.
I can only touch on this, but Cisco took measures to obscure the end-customer and utilize creative package routing to lessen the chance of NSA interception, but it's unclear how successful those measures were/are. (This is the NSA we are talking about)
btw, the compromised routers are not the same class that a consumer might pickup at Best Buy. These are enterprise class routers going into the heart of targeted major corporations, but mostly foreign governments. None of those went into homes and many of them cost as much as a home.
Here's a little more info
https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/
https://www.scmp.com/news/world/article/1515718/cisco-chief-chambers-complains-obama-over-nsa-spying-practices