Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

SheltieLover

(57,073 posts)
Thu Dec 17, 2020, 08:08 AM Dec 2020

Microsoft unleashes 'Death Star' on SolarWinds hackers in extraordinary response to breach

https://www.geekwire.com/2020/microsoft-unleashes-death-star-solarwinds-hackers-extraordinary-response-breach/

BY CHRISTOPHER BUDD on December 16, 2020 at 3:20 pm

This week Microsoft took a series of dramatic steps against the recent SolarWinds supply chain attack. In the size, speed and scope of its actions, Microsoft has reminded the world that it can still muster firepower like no one else as a nearly-overwhelming force for good.

Through four steps over four days, Microsoft flexed the muscle of its legal team and its control of the Windows operating system to nearly obliterate the actions of some of the most sophisticated offensive hackers out there. In this case, the adversary is believed to be APT29, aka Cozy Bear, the group many believe to be associated with Russian intelligence, and best known for carrying out the 2016 hack against the Democratic National Committee (DNC).

While details are continuing to emerge, the SolarWinds supply chain attack is already the most significant attack in recent memory. According to SolarWinds, Microsoft, FireEye, and the Cybersecurity and Infrastructure Security Agency (CISA) the attackers compromised a server used to build updates for the SolarWinds Orion Platform, a product used for IT infrastructure management. The attackers used this compromised build server to insert backdoor malware into the product (called Solorigate by Microsoft or SUNBURST by FireEye).

According to SolarWinds, this malware was present as a Trojan horse in updates from March through June 2020. This means any customers who downloaded the Trojaned updates also got the malware. While not all customers who got the malware have seen it used for attacks, it has been leveraged for broader attacks against the networks of some strategically critical and sensitive organizations.

Much more at link. A big fuck you to putin! Yankee ingenuity in real time!
128 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Microsoft unleashes 'Death Star' on SolarWinds hackers in extraordinary response to breach (Original Post) SheltieLover Dec 2020 OP
I am so glad we have Bill Gates on our side. nt leftyladyfrommo Dec 2020 #1
Me too! SheltieLover Dec 2020 #2
He and his wife are amazing. nt leftyladyfrommo Dec 2020 #3
Yes, they truly are! SheltieLover Dec 2020 #4
They are saving millions from suffering from Malaria grantcart Dec 2020 #5
They sure are! SheltieLover Dec 2020 #10
Why? he doesn't work for Microsoft anymore. BadgerKid Dec 2020 #7
Exactly. plimsoll Dec 2020 #42
SolarWinds123 SergeStorms Dec 2020 #57
Yes, but I'll bet they still take his calls! Dyedinthewoolliberal Dec 2020 #84
I appreciate and respect Mr. Gates Marthe48 Dec 2020 #81
This message was self-deleted by its author CatLady78 Dec 2020 #122
I haven't read the link yet, but I hope there's more specific information on liberalla Dec 2020 #6
Yes, there is quite a bit of info in the article! SheltieLover Dec 2020 #8
And who's going to prosecute them? SergeStorms Dec 2020 #58
Remains to be seen. SheltieLover Dec 2020 #59
Yes. But soon we'll have a patriotic executive branch. BadgerMom Dec 2020 #83
I was replying to... SergeStorms Dec 2020 #107
Got it BadgerMom Dec 2020 #111
Interpol Red Corner notices can be a huge issue DonaldsRump Dec 2020 #115
The US Cyber Command can, and has... reACTIONary Dec 2020 #103
The question wasn't about retaliation.... SergeStorms Dec 2020 #106
This message was self-deleted by its author BrightKnight Dec 2020 #120
I believe they can be extradited from various Ilsa Dec 2020 #117
Microsoft has assigned quite substantial resources to fighting the hackers. BSdetect Dec 2020 #9
No response from chump SheltieLover Dec 2020 #13
This reads like industry hype Ponietz Dec 2020 #11
Proactive would have been smart SheltieLover Dec 2020 #14
Just limiting the damage is like not prosecuting and punishing those in the Trump admin. Ligyron Dec 2020 #30
Shouldn't matter if they respond. notinkansas Dec 2020 #86
Agreed, but the first job in cleaning up a mess like this... paleotn Dec 2020 #34
yep oioioi Dec 2020 #60
Ponletz, that was my reaction, too. It's a puff piece about how awesome Microsoft is. I'm waiting Nitram Dec 2020 #99
Hi Nitram, I just read the latest Washington Post article Ponietz Dec 2020 #104
Taking Microsoft at their word that they saved the day would be dangerous because it would result Nitram Dec 2020 #124
Yeah, I agree. This is puffery by Microsoft to change the 'Windows vulnerability' narrative Maven Dec 2020 #113
Closing the barn door after the horses have fled pecosbob Dec 2020 #118
The US government needs more people like Gates. Lonestarblue Dec 2020 #12
Totally agree! SheltieLover Dec 2020 #15
Quantum computing will make passwords obsolete and systems, as we know them, untenable. Ponietz Dec 2020 #17
Trying to wrap my non-IT brain around this concept SheltieLover Dec 2020 #23
Let me explain. Pobeka Dec 2020 #47
Good grief! SheltieLover Dec 2020 #48
It's not that I disagree with anything you're saying here, Pobeka. Hugin Dec 2020 #61
100% agree with that! n/t Pobeka Dec 2020 #64
... Hugin Dec 2020 #67
The technology, if proved viable, is a long way away from practical usage Tommymac Dec 2020 #62
Yep. Thanks for the additional detail. n/t Pobeka Dec 2020 #66
Only if those bits can be maybe to byte. Arne Dec 2020 #43
This is why Trumpers are traitors... Jon King Dec 2020 #16
All the while calling Dems "communists!" SheltieLover Dec 2020 #20
On the other hand... Klaralven Dec 2020 #18
Very true SheltieLover Dec 2020 #21
No kidding. plimsoll Dec 2020 #44
What a pantload of crap. Virus prone Microsoft operating systems SUCK! infullview Dec 2020 #19
I'm not generally a fan of MS by any means SheltieLover Dec 2020 #22
Source? Please delete this Dumps news you gave posted here. nt Nimble_Idea Dec 2020 #28
Source? Not sure what you are asking for. infullview Dec 2020 #32
Is this a professional opinion? KatyMan Dec 2020 #35
Yes I am a professional, and not opinion, fact. infullview Dec 2020 #45
Lol, again! Nt USALiberal Dec 2020 #52
Apple has another advantage over MS jmowreader Dec 2020 #63
You should have got royalties for your excellent idea! BobTheSubgenius Dec 2020 #114
Smart process improvement! JudyM Dec 2020 #116
Thanks, just asking KatyMan Dec 2020 #69
"the only thing you can infect on a Mac or a Unix machine is an application like a browser" CloudWatcher Dec 2020 #96
Can't protect some people from themselves, but Unix, Mac, Linux all ask for a password and inform infullview Dec 2020 #109
Although I agree with your post, Arne Dec 2020 #46
Lol, ok! Nt USALiberal Dec 2020 #51
You don't even know what DLL Means!!! Nt USALiberal Dec 2020 #54
Dynamic Link Library LeftInTX Dec 2020 #89
Right wing Trump excuses posted here for allowing this attack. Demsrule86 Dec 2020 #70
So now we're accusing people we disagree with of posting "right wing Trump excuses?" Nitram Dec 2020 #100
Pretty sure DLL stands for Dynamically Linked Library (NT) HuskyOffset Dec 2020 #105
Need a time warp. MyNameGoesHere Dec 2020 #110
DLL stands for "Dynamic Link Library." Aussie105 Dec 2020 #24
Thx! SheltieLover Dec 2020 #25
I stand corrected. Dynamic is correct infullview Dec 2020 #26
Doesn't matter how you name it, it's still a bad idea. infullview Dec 2020 #27
Agreed! SheltieLover Dec 2020 #31
"Death star"? Apparently Microsoft is the Empire and the hackers are the Rebel Alliance? Klaralven Dec 2020 #76
Good. WW111 is already happening on Roc2020 Dec 2020 #29
Couldn't agree more! SheltieLover Dec 2020 #33
Cold War moved to the digital world.... paleotn Dec 2020 #36
I totally agree! SheltieLover Dec 2020 #38
MS as "a nearly-overwhelming force for good"... TomVilmer Dec 2020 #37
This is what employees / former employees convey SheltieLover Dec 2020 #40
Microsoft unleashes 'Death Star' on SolarWinds hackers in extraordinary response to breach LudwigPastorius Dec 2020 #39
Great questions! SheltieLover Dec 2020 #41
Hype. There is a key statement that needs to cause REAL concern for all. cayugafalls Dec 2020 #49
I agree! SheltieLover Dec 2020 #50
I see your point and hope that we begin proactive Cyber Warfare now. cayugafalls Dec 2020 #55
I can hear the barn door slamming from here. Hugin Dec 2020 #53
When I was still doing simulation S/W rickford66 Dec 2020 #56
This is the most overheated article ever Azathoth Dec 2020 #65
+1 Hugin Dec 2020 #68
It is a great article and consider...there were things used that are not in the article...they Demsrule86 Dec 2020 #71
This is what I'm hoping! SheltieLover Dec 2020 #74
Ty for sharing! SheltieLover Dec 2020 #73
Sinkholing is not a cure CloudWatcher Dec 2020 #94
If I didn't know better, I'd suspect Microsoft paid for this PR piece. Nitram Dec 2020 #101
Great article and a big fuck you to Putin indeed...thanks for it. K&R Demsrule86 Dec 2020 #72
YW! 👍 SheltieLover Dec 2020 #75
It is a very good sign...again thanks. Ignore the naysayers. Demsrule86 Dec 2020 #77
Ty SheltieLover Dec 2020 #78
I've got news for you ItsjustMe Dec 2020 #119
Very cool, thanks for sharing. nt Hotler Dec 2020 #79
Yw! SheltieLover Dec 2020 #80
Kick! Hekate Dec 2020 #82
Hard to defend against human foibles. klook Dec 2020 #85
I'd read their password was company name, followed by 123 SheltieLover Dec 2020 #87
No kidding. klook Dec 2020 #90
Yu SheltieLover Dec 2020 #91
"...By the end of this week..." superpatriotman Dec 2020 #88
yep - "barely a fraction" is still a fraction 0rganism Dec 2020 #93
this is just sensible first steps, the impacts are far from over 0rganism Dec 2020 #92
The hackers should all die in a fire. nt cstanleytech Dec 2020 #95
We got rid of Trump. We should rid the world of Putin Captain Zero Dec 2020 #97
Thank you Microsoft seta1950 Dec 2020 #98
Bill effn' Gates, Ladies and Gentlemen! OMGWTF Dec 2020 #102
So why are we not using multiple technology firms ecstatic Dec 2020 #108
My husband received a strange, automatic Microsoft update today. Baitball Blogger Dec 2020 #112
Interesting. This is why I usually delay updates ecstatic Dec 2020 #123
Why was this not reported on any of the news shows? Fla Dem Dec 2020 #121
If that's true, it is one more reason not to rely on TV "news". It's been in the Post for a week at Nitram Dec 2020 #125
The Washington Post? NY Post? Fla Dem Dec 2020 #126
Sorry, I was a referring to the Washington Post. I'm not sure the term "Microsoft Deathstar" is Nitram Dec 2020 #127
Thanks for the link. It appears the top poster was a bit over enthusiastic Fla Dem Dec 2020 #128

plimsoll

(1,668 posts)
42. Exactly.
Thu Dec 17, 2020, 10:12 AM
Dec 2020

And the source of this appears to have been mind numbingly stupid single factor authentication (password) on a source for updates.

Granted it’s the kind of stupid we knew about when Bill was in charge, so great that lessons that lessons Bill might actually have learned have to be relearned.

SergeStorms

(19,199 posts)
57. SolarWinds123
Thu Dec 17, 2020, 10:44 AM
Dec 2020

If an "internet security" company can't come up with a better password than that.........

They sound like a bunch of amateurs.

Marthe48

(16,949 posts)
81. I appreciate and respect Mr. Gates
Thu Dec 17, 2020, 02:09 PM
Dec 2020

Microsoft, for all of the complaints, has brought a vital technology to the world. Along with the technology comes destructive people determined to spoil using it, from something as selfish as being remembered for creating a virus, to something as nefarious as destroying a nation.

Mr. Gates retired many years ago, but Microsoft and its employees continue to fine tune their products. I appreciate Apple too, but I have always used laptops and this o.p. is about Microsoft's effort to combat this latest hack.

Response to leftyladyfrommo (Reply #1)

liberalla

(9,243 posts)
6. I haven't read the link yet, but I hope there's more specific information on
Thu Dec 17, 2020, 08:38 AM
Dec 2020

exactly what was done to "nearly obliterate the actions of some of the most sophisticated offensive hackers out there." How it has damaged the hackers... It's good to get some positive news on the fall out after the hack.

SheltieLover

(57,073 posts)
8. Yes, there is quite a bit of info in the article!
Thu Dec 17, 2020, 08:43 AM
Dec 2020

I hear you about the need for positive news!

Just imagine how we will feel when chumputin & coconspirators are indicted!

SergeStorms

(19,199 posts)
58. And who's going to prosecute them?
Thu Dec 17, 2020, 10:46 AM
Dec 2020

Unless they set foot on U.S. soil nothing will ever be done legally.

SergeStorms

(19,199 posts)
107. I was replying to...
Thu Dec 17, 2020, 08:46 PM
Dec 2020

someone who said they'd be indicted. That will never happen in this country. Biden can retaliate as he sees fit, but they'll never go to court. That was my point.

DonaldsRump

(7,715 posts)
115. Interpol Red Corner notices can be a huge issue
Thu Dec 17, 2020, 11:06 PM
Dec 2020

If a Russian resident under indictment in the US travels to a country that has an extradition treaty with the US, they could be arrested on arrival in that country and sent to the US.

It can be a big issue for some people, as it can really curtail where they can travel.

https://www.interpol.int/en/How-we-work/Notices/Red-Notices

SergeStorms

(19,199 posts)
106. The question wasn't about retaliation....
Thu Dec 17, 2020, 08:43 PM
Dec 2020

it was about being indicted. Of course we can retaliate, but they'll never be subject to U.S. legal prosecution.

Response to reACTIONary (Reply #103)

Ilsa

(61,694 posts)
117. I believe they can be extradited from various
Fri Dec 18, 2020, 12:39 AM
Dec 2020

Allies of ours, if they visit those countries. Their world is smaller now.

BSdetect

(8,998 posts)
9. Microsoft has assigned quite substantial resources to fighting the hackers.
Thu Dec 17, 2020, 08:43 AM
Dec 2020

They don't have much choice given the weak response of our so called ICs

SheltieLover

(57,073 posts)
13. No response from chump
Thu Dec 17, 2020, 08:46 AM
Dec 2020

But, as Nancy so aptly stated, "All roads lead to Russia with shitstain.

I'm really grateful that MS is reacting with forceful actions!

Ponietz

(2,965 posts)
11. This reads like industry hype
Thu Dec 17, 2020, 08:44 AM
Dec 2020

The text indicates that the malware attack is, now, ALMOST neutralized. The damage is done and there are zero consequences for Russian intelligence, so calling it “Death Star” is a non-starter. More like “Clean Up on Aisle 2020.”

From the article: “They may still have access to compromised networks through other means: that’s what incident responders are likely working on now. And there’s no undoing whatever they did while the infiltration went unnoticed for months.”



SheltieLover

(57,073 posts)
14. Proactive would have been smart
Thu Dec 17, 2020, 08:49 AM
Dec 2020

But patriarchy is always reactive.

I can only hope that there were built-in protective measures that are classified.

This is what we get with a traitor in the WH.

Ligyron

(7,631 posts)
30. Just limiting the damage is like not prosecuting and punishing those in the Trump admin.
Thu Dec 17, 2020, 09:41 AM
Dec 2020

Where appropriate of course.

The Russians need to be cyber attacked and serious damage occur to their servers and infrastructure. If they respond, hit them even harder and impose sanctions on the Putin regime. Hopefully, once up and running, the Biden/Harris Administration will have the courage to do so to the extent possible for an Executive branch.

notinkansas

(1,096 posts)
86. Shouldn't matter if they respond.
Thu Dec 17, 2020, 02:49 PM
Dec 2020

What they have already done should have gotten them immediate sanctions. Sanctioned bigly.

paleotn

(17,912 posts)
34. Agreed, but the first job in cleaning up a mess like this...
Thu Dec 17, 2020, 09:47 AM
Dec 2020

is closing the barn door. MS is doing that. We have to realize, these intrusions have been going on for months. We may clean up the mess they left behind, but what's really important is ascertaining what they stole. What information is now compromised.

oioioi

(1,127 posts)
60. yep
Thu Dec 17, 2020, 10:59 AM
Dec 2020

"Finally, today, Wednesday, Dec. 16, Microsoft basically changed its phasers from “stun” to “kill” by changing Windows Defender’s default action for Solorigate from “Alert” to “Quarantine,” a drastic action that could cause systems to crash but will effectively kill the malware when it finds it."

LOL @ M$FT. Still crashing after all these years.

Nitram

(22,794 posts)
99. Ponletz, that was my reaction, too. It's a puff piece about how awesome Microsoft is. I'm waiting
Thu Dec 17, 2020, 06:08 PM
Dec 2020

for a more reliable source with a report on what happened.

Ponietz

(2,965 posts)
104. Hi Nitram, I just read the latest Washington Post article
Thu Dec 17, 2020, 07:43 PM
Dec 2020

It is a horrifying scenario. Looks like they got into almost everything and there’s no short-term solution. The damage is probably ongoing, and will be into the indefinite future.

https://www.washingtonpost.com/business/technology/government-warns-new-hacking-tactics-russia/2020/12/17/bba43fd8-408c-11eb-a402-fba110db3b42_story.html

Purging the intruders and restoring security to affected networks could take months, some experts say, because the hackers moved rapidly from the initial intrusions through the corrupted software patches to collect and deploy authentic system credentials, making discovery and remediation far more difficult. Closing the digital back doors initially created by the Russians will not suffice because they appear to have stolen keys to an unknown number of official doorways into federal and private corporate systems, according to investigators at FireEye, a cybersecurity firm that also was hacked.

On Monday, Microsoft and FireEye diverted the channel the Russians used to send commands to systems that download the corrupted patch, causing the malware to shut down. But that does not help those organizations whose networks the Russians have deeply penetrated.
...
The Russian hackers are known for their stealth and ability to dwell at length inside compromised networks undetected. “My biggest concern would be if you’ve got an advanced adversary that has been in the network for a long time,” said Jack Wilmer, until August the Pentagon’s chief information security officer, who has no independent knowledge of the incident. “It may be very difficult to get them out and to be assured of the fact they’re no longer there.”

Nitram

(22,794 posts)
124. Taking Microsoft at their word that they saved the day would be dangerous because it would result
Fri Dec 18, 2020, 12:12 PM
Dec 2020

in complacency and leave us defenseless against a dangerous opponent.

Maven

(10,533 posts)
113. Yeah, I agree. This is puffery by Microsoft to change the 'Windows vulnerability' narrative
Thu Dec 17, 2020, 09:56 PM
Dec 2020

Russia should suffer major consequences for the attack, both in the cyber realm and elsewhere, but this ain't it.

pecosbob

(7,538 posts)
118. Closing the barn door after the horses have fled
Fri Dec 18, 2020, 01:01 AM
Dec 2020

Kind of like cancelling a credit card after it was used for an unauthorized shopping spree.

Lonestarblue

(9,981 posts)
12. The US government needs more people like Gates.
Thu Dec 17, 2020, 08:44 AM
Dec 2020

Cyberspace is where more wars are being fought, not with behemoth battleships. We need a serious evaluation of how we spend our defense dollars because I think we might be allocating too much to building war materiel, since that keeps jobs and makes the billionaire investors in companies like Lockheed Martin, Boeing, and Ratheon very happy. In fact, I’m sure the whole federal government needs a tech update since we know Trump and Republicans have starved it of resources in an effort to destroy as much as possible.

SheltieLover

(57,073 posts)
15. Totally agree!
Thu Dec 17, 2020, 08:51 AM
Dec 2020

Ridiculous!

I can only hope our new admin will indict & punish all traitors to the absolute fullest extent of the law!

Pobeka

(4,999 posts)
47. Let me explain.
Thu Dec 17, 2020, 10:25 AM
Dec 2020

To "crack" a password, the brute-force method means try every possible combination of letters in a word as the password, see if the system lets you in, or you successfully de-encrypt some captured "secret" information.

Since the combination of all possible letters is huge, in today's computing environment, it can take 10,20 even 100 or 1000 years to reasonably expect to achieve success at guessing the correct password.

Quantum computers are going to be *spectacularly faster* than today's computers, even 100 million times faster.

http://quantumly.com/quantum-computer-speed.html

So with quantum computers, that 1000 year problem, becomes a 1/10th of a second problem.

Hugin

(33,135 posts)
61. It's not that I disagree with anything you're saying here, Pobeka.
Thu Dec 17, 2020, 11:08 AM
Dec 2020

However, no amount of quantum computing is ever going to make up for the idiocy of keeping a password as "solarwinds123". A password probably printed on the outside of the box in which it was shipped. Also, going with the lowest bidder. No computer in the world can make up for that very human failing of laziness. Only wisdom can fix things like this.

Hugin

(33,135 posts)
67. ...
Thu Dec 17, 2020, 11:30 AM
Dec 2020

Coincidentally, I was recently studying up on quantum computing and how a single hardware circuit can simultaneously contain multiple digital states. Pretty sweet, let me tell you!

Tommymac

(7,263 posts)
62. The technology, if proved viable, is a long way away from practical usage
Thu Dec 17, 2020, 11:08 AM
Dec 2020

IT folks are working hard at it, but Quantum Computing is not yet proven practical. Hell, we still don't know when it will be - perhaps 4 or 5 years which is an eternity in the IT world.

For now complex pass phrases of 14 characters or more, and 2 factor authentication are the Masks and hand washing of IT loss prevention. Easy to use - but most folks don't understand the need and shrug them off as an inconvenience.

Criminal that SolarWinds used such a crap password for their production rollout of the updates however - they need to be fined heavily. IT pros should know better.

Jon King

(1,910 posts)
16. This is why Trumpers are traitors...
Thu Dec 17, 2020, 08:57 AM
Dec 2020

Unreal how these flag waving fake patriots damage America. Trumpers hate science, hate Gates, hate Fauci. They worship a guy who sold a mansion to Russians for 3 times its value then became President 6 years later and helps Russia. Bill Gates helps the world against disease and his company helps secure the world vs Russian attacks. Fauci is a hero.

It is simply amazing how much damage these Trump loving aholes have done and continue to do to the country, all while pretending to be patriots. Russia figured out long ago the best weapon against America was fooling its most gullible citizens. These Trumpers are literally doing the bidding of Putin.

SheltieLover

(57,073 posts)
20. All the while calling Dems "communists!"
Thu Dec 17, 2020, 09:10 AM
Dec 2020

The stupidity is truly mind boggling!

At least we will have a competent admin for the next 4 years!

And I most certainly hope our new DOJ will indict, convict the guilty & punish to the fullest extent of the laws! Every. Single. One. Of. Them!

 

Klaralven

(7,510 posts)
18. On the other hand...
Thu Dec 17, 2020, 09:02 AM
Dec 2020

While the Solorigate was active, the hackers had plenty of time and opportunity to plant a variety of persistent threats in the victim's networks.

So just eliminating the Solorigate malware and disabling the command server doesn't secure the networks.

plimsoll

(1,668 posts)
44. No kidding.
Thu Dec 17, 2020, 10:21 AM
Dec 2020

The only safe response would be to go back to the last known good OS and infrastructure software builds. But that won’t happen.

This will remain an ongoing advanced persistent threat to ALL enterprises and Governments. For a long time to come.

We’re talking about the Russians on this, but honestly, why would a company with such negligent disregard for what is basic security be allowed to continue in operation? And what will prevent their security people from being employed in this field in the future? We’ll treat it as if nothing could have been done. That’s just not true, but hey “Mistakes were made.”

infullview

(981 posts)
19. What a pantload of crap. Virus prone Microsoft operating systems SUCK!
Thu Dec 17, 2020, 09:08 AM
Dec 2020

If the operating system wasn't put together out of bits and pieces, it wouldn't have been vulnerable to this kind of attack in the first place. Real operating systems such as Unix are monolithic and cannot be infected like this. A little history about why Microsoft sucks: In the days when memory was expensive and small, Microsoft used bits of code called DLL's (download link and load) to allow big programs to run in limited memory space. As time went on computers were able to address more memory (went from 8 bit to 64 bit) and memory got cheap and plentiful. Instead of abandoning DLL's, Microsoft just loaded them sequentially in memory (yuck!), This allowed hackers to substitute or add operating system DLL's to infect the computer on startup.

SheltieLover

(57,073 posts)
22. I'm not generally a fan of MS by any means
Thu Dec 17, 2020, 09:19 AM
Dec 2020

What they are doing with 10 is beyond ridiculous!

I'm not an IT pro, so I was unaware of what you have shared. Doesn't surprise me at all, tbh. Ty for sharing!

It's always about greed.

But I'm glad someone is taking action. Gawd knows we cannot depend upon shitstain to look after our country's best interests!


infullview

(981 posts)
45. Yes I am a professional, and not opinion, fact.
Thu Dec 17, 2020, 10:23 AM
Dec 2020

You're more than welcome to do the research yourself. I've been in IT since 1980. I worked in the mini computer industry and lived through the rise of Microsoft which displaced so many other excellent computer systems. Microsoft should have abandoned the DLL when the hardware supported larger memory. They didn't do this because it would have forced their users to buy a new operating system and software. It was purely a marketing decision that has caused them no end of pain ever since. BTW Mac did it right. They've always had a monolithic OS - the only thing you can infect on a Mac or a Unix machine is an application like a browser. All you have to do to fix it is remove it and reinstall with a clean install.

One more thing... insurance companies charge a premium to companies that use Microsoft servers due to their inherent risk.

jmowreader

(50,557 posts)
63. Apple has another advantage over MS
Thu Dec 17, 2020, 11:19 AM
Dec 2020

You can’t format the startup volume on a Mac, and - as far as I know - you can still do it on a Windows box. Worse, you at least could do it with a Word macro. If I, for some reason, actually want to wipe a Mac startup volume, I have to start the machine from a different drive.

A long time ago I set up a Windows machine for graphic arts; we were getting a lot of files created on Windows machines and, before OpenType shipped, the fonts were different. (How long ago this was: those files were made in PageMaker.) When we specced out the box, I told my salesman “I want x RAM, y disk, and an office suite not made by Microsoft.” He looked at me like I was fucking nuts, but I explained about malicious Office macros and he then understood. The machine came in with WordPerfect Office. I also asked him to bring me Ethernet cables that were all different colors, and this he wouldn’t do. Then I had to expand the network to other machines in the building, and then I used different colors for every node. The guy came in a few months after I did, and I showed him the logic: if the receptionist’s computer is on a channel on the switch that goes dead and you know her cable is green, all you need do is move the green cable to a different Jack and you’re done. Simple and efficient. He never sold another system with all-white cables again.

KatyMan

(4,190 posts)
69. Thanks, just asking
Thu Dec 17, 2020, 11:49 AM
Dec 2020

thanks for your reply.

Been in the biz since 1995 or so, mainly in MS shops but now in a more mixed environment. I'm not on the server side anymore, so don't have to deal with those issues! Just have to make sure my app plays nice on the server, which for me are a mix of Linux and MS. Of course, depending on the size of the company one works for, no matter what your opinion of MS or Unix or Mac might be, you have to use what corp says to!

CloudWatcher

(1,847 posts)
96. "the only thing you can infect on a Mac or a Unix machine is an application like a browser"
Thu Dec 17, 2020, 04:27 PM
Dec 2020

Ah, not so fast. Unix and the macOS has advantages, but it has its share of vulnerabilities too. The biggest one is the user being willing to click to install almost anything that looks reasonable. Bogus driver updates, trojan horses, malware disguised as games or utilities, "free" versions of copyrighted software. MacOS Kernel extensions ( "kexts" ) are a great target. And even apps in the "trusted" Apple Mac Store (and iOS store) are occasionally infected.

Humor: I was the first one to call the FBI when the Morris worm hit our BSD Unix system in 1988. The next day my team got a few minutes of fame by being on the forefront of decoding exactly how it worked. A little background info ... https://en.wikipedia.org/wiki/Morris_worm


infullview

(981 posts)
109. Can't protect some people from themselves, but Unix, Mac, Linux all ask for a password and inform
Thu Dec 17, 2020, 09:38 PM
Dec 2020

the user that something *is* being installed. Again, the operating system does NOT use shared object (.so) libraries so these canl only infect applications. On Linux, a kernel extension has to be compiled into the OS on a restart and is limited to things like 3rd party video drivers. So yes, it is possible to hack one of these systems, but it is much harder to hijack the operating system. A hacked Linux OS is much easier to fix as well. Bottom line: a Unix/Linux server isn't going to encounter the level of user interaction you're describing to make it vulnerable. Kernel updates are always done from a trusted source and usually don't use daemons to push updates quite like Windoze does so - much safer.

Arne

(2,012 posts)
46. Although I agree with your post,
Thu Dec 17, 2020, 10:24 AM
Dec 2020

hacks go way deeper than Microsoft.

You remember we started it with Stuxnet.

LeftInTX

(25,287 posts)
89. Dynamic Link Library
Thu Dec 17, 2020, 03:16 PM
Dec 2020

Not techy myself, but .dll is file extension. When they work all is fine, but they will sometimes point to deleted or moved files or places in the registry that have been changed. They can cause programs to freeze or crash....they can be buggy...They aren't as much of a problem as they used to be....Never drag a dll file into the recycle bin..LOL (By default they are now hidden in Windows Explorer)

This was a big problem in Windows 95 and 98, but by Windows XP, DLL Hell seemed to be going away.

Malware may often consist of only a DLL file as opposed to an EXE file, which makes them harder to locate and remove...


https://en.wikipedia.org/wiki/Dynamic-link_library

Aussie105

(5,383 posts)
24. DLL stands for "Dynamic Link Library."
Thu Dec 17, 2020, 09:23 AM
Dec 2020

If you are going to attack MS, at least get the terminology right.

The article is deceptive though, all the actions on MS's part have been defensive. A Death Star is not a defensive weapon.

Roc2020

(1,615 posts)
29. Good. WW111 is already happening on
Thu Dec 17, 2020, 09:40 AM
Dec 2020

the internet/cyberspace/virtual between countries. Nice to see a news report that the U.S is fighting back.

SheltieLover

(57,073 posts)
33. Couldn't agree more!
Thu Dec 17, 2020, 09:45 AM
Dec 2020

We all know chumputin will do nothing to stop the destruction of our country for putin!

paleotn

(17,912 posts)
36. Cold War moved to the digital world....
Thu Dec 17, 2020, 09:56 AM
Dec 2020

And we're not without our own offensive capabilities. New sheriff in town on Jan. 20. Payback will be hell.

If anyone thought the Cold War ended with the fall of the USSR, they are sorely mistaken. Russian nationalists and KGB types kept that fire alive and now we're back to 1968 in that regard. They were and are the sworn enemy of western democracy. How those in my age group can throw off decades of conditioning and think the Russians are our friends because a spray tan con man says so is beyond me.

To paraphrase James T. Kirk, I've never trusted Russians and I never will.

SheltieLover

(57,073 posts)
38. I totally agree!
Thu Dec 17, 2020, 10:03 AM
Dec 2020

I can't wait for our "new sheriff" to deal with Putin & our new DOJ to indict & punish puppets in this country!

TomVilmer

(1,832 posts)
37. MS as "a nearly-overwhelming force for good"...
Thu Dec 17, 2020, 09:58 AM
Dec 2020
"Microsoft has reminded the world that it can still muster firepower like no one else as a nearly-overwhelming force for good."

That is not the words I would ever use to describe them. MS is a bunch of evil MFs.

SheltieLover

(57,073 posts)
40. This is what employees / former employees convey
Thu Dec 17, 2020, 10:05 AM
Dec 2020

But I'm glad they are countering this hack, even if (typical of patriarchy!) reactively, rather than proactively!

LudwigPastorius

(9,137 posts)
39. Microsoft unleashes 'Death Star' on SolarWinds hackers in extraordinary response to breach
Thu Dec 17, 2020, 10:05 AM
Dec 2020

Meanwhile, Russia is probably implementing the next big hack.


So, was SolarWinds the lowest bidder on the government contract, or somebody's brother-in-law's company, or the company of some mega donor?

SheltieLover

(57,073 posts)
41. Great questions!
Thu Dec 17, 2020, 10:06 AM
Dec 2020

I only know they are out of RX & read that their system password was company name followed by 123.

Someone's head(s) needs to roll over this!

cayugafalls

(5,640 posts)
49. Hype. There is a key statement that needs to cause REAL concern for all.
Thu Dec 17, 2020, 10:29 AM
Dec 2020
They may still have access to compromised networks through other means: that’s what incident responders are likely working on now. And there’s no undoing whatever they did while the infiltration went unnoticed for months.


We did not WIN this battle. We fucking lost because WE HAD A TRAITOR IN POWER.

Never fucking forget. Trump needs to rot in prison.

cayugafalls

(5,640 posts)
55. I see your point and hope that we begin proactive Cyber Warfare now.
Thu Dec 17, 2020, 10:40 AM
Dec 2020

We have the tools and the know how, hell, I am just a lowly ex-IT guy and I know we can do WAY more to win this war.

We just need to throw SERIOUS dollars at the effort and hire the best hacker minds out there.

One of the simplest ways to stop this is to build a national firewall system. I know it sounds a lot like Trumps wall, but this is different, we really are being ATTACKED across the Internet border.

Hugs to you to, hope you are doing well, my friend. Stay well, SheltieLover!

Hugin

(33,135 posts)
53. I can hear the barn door slamming from here.
Thu Dec 17, 2020, 10:36 AM
Dec 2020

Nine months or more of sifting through all of the data they could ever wish for at will can be boring. They had probably moved on to other things.

What we need right now to feel safe is a Star Wars reference and a puff-piece on Microsoft.

Note to SheltieLover: This is not directed at you. I find your wild eyed optimism refreshing. Please, keep doing you.

rickford66

(5,523 posts)
56. When I was still doing simulation S/W
Thu Dec 17, 2020, 10:40 AM
Dec 2020

and several people were working on the same load, each of us checked for diffs after each build.

Azathoth

(4,608 posts)
65. This is the most overheated article ever
Thu Dec 17, 2020, 11:22 AM
Dec 2020

1) Revoking digital certificates is done everyday. Its effectiveness depends on whether every client machine is configured properly to always check for revoked certificates. Doesn't do anything to repair already-compromised systems.

2) Two and four are Microsoft bragging that it added a virus definition to its antivirus software. *slow clap*

3) Sinkholing the domain is the only thing here that could be considered a "death star" move. It's an important mitigation step, but depending on how the trojan is designed, it's far less effective than the article implies. Sophisticated attackers would not design a worm that can only be accessed through a single domain. What likely happens is the trojan infects a system, then sends a message to the domain notifying the hackers that a new system has been compromised. The hackers store the info and can connect directly to the backdoor at a later time. So taking down the domain does nothing for the systems that are already infected and have already used the domain to notify the hackers. It also doesn't stop new infections from happening. It merely prevents the hackers from learning of newly infected machines.

Not trying to be a downer, but this isn't a benevolent sovereign using his awesome power to make everything right.

Demsrule86

(68,556 posts)
71. It is a great article and consider...there were things used that are not in the article...they
Thu Dec 17, 2020, 11:59 AM
Dec 2020

were dealing with the Russian KGB...cozi bear.

SheltieLover

(57,073 posts)
73. Ty for sharing!
Thu Dec 17, 2020, 12:31 PM
Dec 2020

As said in previous posts, I'm not an IT pro, so I have little understanding of what they claim to be doing.

And I alm not a fan of MS. I just thought it would be nice to share with the community an article I thought was some good news.

We are quite obviously long plast due for justice!

CloudWatcher

(1,847 posts)
94. Sinkholing is not a cure
Thu Dec 17, 2020, 04:04 PM
Dec 2020

The malware could have lots of different domains and just try the next one in the list if the first one doesn't work. Or even just have a list of IP addresses and bypass domain name lookups entirely.

Revoking the compromised signing key and tying up their domain name is standard-procedure, not anything close to something I'd call a "Death Star" response.

Kudos to Microsoft for adding signing requirements to apps. But that's something that Microsoft and Apple have been doing for a long time. Not exactly a new weapon rolled out in response to this attack. And the article doesn't describe anything more than trying to dismantle their attack .... i.e. nothing going back to infect (or even reveal) the attackers. I'm hoping there's a lot more going on than what's public.

Nitram

(22,794 posts)
101. If I didn't know better, I'd suspect Microsoft paid for this PR piece.
Thu Dec 17, 2020, 06:15 PM
Dec 2020

Or maybe I don't know better. Vastly overstated and hyped.

SheltieLover

(57,073 posts)
75. YW! 👍
Thu Dec 17, 2020, 12:33 PM
Dec 2020

According to the IT pros' posts above, it isn't much, but it is something.

Considering chumputin is saying / doing nothing, I think it is a good sign!

SheltieLover

(57,073 posts)
80. Yw!
Thu Dec 17, 2020, 01:54 PM
Dec 2020

Good to know someone is taking action to protect our natiinal interests, since the russian asset in the WH won't.

klook

(12,154 posts)
85. Hard to defend against human foibles.
Thu Dec 17, 2020, 02:31 PM
Dec 2020
SolarWinds exposed FTP credentials in Public Github Repository
SolarWinds exposed their FTP server credentials in a public Github repo, which was identified by cybersecurity expert Vinoth Kumar who reported it to SolarWinds in 2019. Did some poor security practices lead to the US Government breach?
- SaveBreach.com
...the SolarWinds breach seems to be just another case of gross carelessness and weak credentials. Although not confirmed by official sources, this is what we can conjecture for now. This reveals a very important piece of the puzzle, that is the attack was possibly not as sophisticated as it was reported to be.

Good information at https://savebreach.com/solarwinds-credentials-exposure-led-to-us-government-fireye-breach/

Updated info in this Twitter thread says the credentials were exposed as far back as June 2018:
https://threadreaderapp.com/thread/1338929932647477257.html

SheltieLover

(57,073 posts)
87. I'd read their password was company name, followed by 123
Thu Dec 17, 2020, 02:54 PM
Dec 2020

Last edited Thu Dec 17, 2020, 04:21 PM - Edit history (1)

How much did putin pay for this?

This company needs to be prosecuted & barred from future govt work.

SheltieLover

(57,073 posts)
91. Yu
Thu Dec 17, 2020, 03:46 PM
Dec 2020

This company should be held liable & owners / decision makers punished to the fullest extent of the law & banned from govt. contracts. Perhaps russian assets? I had never heard of the company but it is hard to imagine high leve IT folks being this stupud about security.

A 5 year old would know better!

superpatriotman

(6,247 posts)
88. "...By the end of this week..."
Thu Dec 17, 2020, 03:05 PM
Dec 2020
"By the end of this week, the attackers will be left with barely a fraction of the systems under their control."

And how much is that exactly????

0rganism

(23,944 posts)
93. yep - "barely a fraction" is still a fraction
Thu Dec 17, 2020, 03:53 PM
Dec 2020

that piece reads like a damn press release from Microsoft

0rganism

(23,944 posts)
92. this is just sensible first steps, the impacts are far from over
Thu Dec 17, 2020, 03:52 PM
Dec 2020

going after the cracker domain helps short term, but crackers will simply create more
updating "Windows Defender" is an expected minimal beginning of a response

the sad truth: every one of those compromised systems is suspect, many will need to be scrapped and replaced, entire networks must be rebuilt ground-up. impacted agencies and companies will face delays and incur significant expenses replacing hosts and verifying security. those that cut costs put anyone engaging them with online transactions at risk of malware infection and identity theft.

the OP article reads like a puff piece for Microsoft.

OMGWTF

(3,955 posts)
102. Bill effn' Gates, Ladies and Gentlemen!
Thu Dec 17, 2020, 06:51 PM
Dec 2020

I was sitting at the receptionist desk when he came in to meet with one of the business lawyers in his dad's law firm. Later that day, I asked Mr. Gates' secretary, "Who was that geeky guy that came in earlier?" She replied, "That's Mr. Gates' son and he is making a company that makes the brains for computers. And you know how smart computers are!" I am so proud of this wonderful family.

ecstatic

(32,699 posts)
108. So why are we not using multiple technology firms
Thu Dec 17, 2020, 09:05 PM
Dec 2020

to oversee cyber security? Is it because it's too risky?

Baitball Blogger

(46,703 posts)
112. My husband received a strange, automatic Microsoft update today.
Thu Dec 17, 2020, 09:53 PM
Dec 2020

And I just received it a few minutes ago.

Are they forcing patches on our laptops?

Fla Dem

(23,656 posts)
121. Why was this not reported on any of the news shows?
Fri Dec 18, 2020, 03:57 AM
Dec 2020

Maybe it was and I missed it. But watched NBC and CBS evening news, as well as msnbc and only heard what a disaster it was. Not even any mention of Microsoft, just Solarwind.

Nitram

(22,794 posts)
125. If that's true, it is one more reason not to rely on TV "news". It's been in the Post for a week at
Fri Dec 18, 2020, 12:18 PM
Dec 2020

least.

Fla Dem

(23,656 posts)
126. The Washington Post? NY Post?
Fri Dec 18, 2020, 12:41 PM
Dec 2020

I just googled Microsoft Death star and the only references that come up are the Geekwire, reddit, crooks and liars which just references Geekwire's article. See nothing at all from mainstream media. No interviews I've seen with Democratic congressmen/senators have mentioned it when talking about the hack.

I hope it's true, but can find no evidence that it is. Please provide a link to the articles in the"Post" you have seen.

Many thanks.

Nitram

(22,794 posts)
127. Sorry, I was a referring to the Washington Post. I'm not sure the term "Microsoft Deathstar" is
Fri Dec 18, 2020, 02:11 PM
Dec 2020

anything other than a hyped-up PR stunt for Microsoft. Check this link for solid information and facts:

https://www.washingtonpost.com/business/technology/government-warns-new-hacking-tactics-russia/2020/12/17/bba43fd8-408c-11eb-a402-fba110db3b42_story.html

Fla Dem

(23,656 posts)
128. Thanks for the link. It appears the top poster was a bit over enthusiastic
Fri Dec 18, 2020, 04:05 PM
Dec 2020

and the geek wire article overstated the significance of the action Microsoft initiated.

From the W/P

On Monday, Microsoft and FireEye diverted the channel the Russians used to send commands to systems that download the corrupted patch, causing the malware to shut down. But that does not help those organizations whose networks the Russians have deeply penetrated.


What was accomplished possibly was terminating any further hacking, not restoring any compromised systems.

That's a lot different than what geek wire reported or intimated .

Through four steps over four days, Microsoft flexed the muscle of its legal team and its control of the Windows operating system to nearly obliterate the actions of some of the most sophisticated offensive hackers out there. In this case, the adversary is believed to be APT29, aka Cozy Bear, the group many believe to be associated with Russian intelligence, and best known for carrying out the 2016 hack against the Democratic National Committee (DNC).


That made it sound like M/S reversed the actions of the hackers and restored the hacked systems.

All I was trying to do was verify if the situation deserved the enthusiasm displayed by the poster. It appears it does not.

Latest Discussions»General Discussion»Microsoft unleashes 'Deat...