this post was submitted on 17 Jul 2025
118 points (98.4% liked)

Cybersecurity

7834 readers
257 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
top 14 comments
sorted by: hot top controversial new old
[–] ExtremeDullard@lemmy.sdf.org 58 points 23 hours ago* (last edited 23 hours ago) (2 children)

This is light on one detail: who was running the compromised infrastructure?

Because the US military doesn't do its own IT anymore. It's all outsourced to Microsoft and other cloud providers to the tune of tens of billions of dollars. And here, the report conveniently doesn't mention who let the hackers in.

I'd like to know which sloppy cloud contractor is responsible.

[–] PhilipTheBucket@quokk.au 31 points 22 hours ago

It's a hell of a lot wider than one specific sloppy contractor. They basically compromised everybody (Verizon, AT&T, T-Mobile, Spectrum, Lumen, Consolidated Communications, Windstream, the system for CALEA requests, routers made by Cisco, phones belonging to Trump and Vance... basically, everything.) Viasat is on that list, but they're no more particularly sloppy than any other contractor in that space. Basically it would have been truly remarkable if some Guard agency had managed to hire a cloud contractor that was able to resist it.

[–] sylver_dragon@lemmy.world 14 points 22 hours ago (1 children)

who was running the compromised infrastructure?

The DoD report doesn't get into it. It repeatedly references "a US state’s Army National Guard network". Which, is probably not the same network as the US Army's network. It's also likely to be an Unclassified network; so, it's not quite as bad as it could be. But also not great.

the US military doesn’t do its own IT anymore. It’s all outsourced to Microsoft and other cloud providers to the tune of tens of billions of dollars.

While some of it is on Microsoft's and other cloud providers, there is also a lot which isn't. On top of that, much of the stuff "in the cloud" is all IaaS or PaaS. So, while MS, et al. run the hardware, the operating systems and software is often run by the IT departments for the various branches and programs. These IT departments will be some mix of US Civilian State or Federal employees and then a lot of IT contractors. Generally, the people doing the actual IT work are contractors working for companies like Boeing or Booz-Allen-Hamilton.

I’d like to know which sloppy cloud contractor is responsible.

If you want to find the people responsible, find the managers who have programs on the "state’s Army National Guard network" (as the report puts it) and figure out which one of them either authorized some sort of "shadow IT" project, or just threw a hissy-fit every time the IT folks tried to roll out patches. That's often how these things go. The report mentions multiple CVEs which were exploited, and I'd place a pretty large bet that they were unpatched in the environment because some manager whined loud enough to get his assets exempted from patching. All too often these types of vulnerabilities hang out there far too long because some department wants high availability on their stuff, but aren't willing to pay for high availability. So, they bitch and moan that they should be exempt from regular patching. And upper management isn't willing to back IT and say, "no you aren't special, you get patched like everyone else".

[–] Zorsith@lemmy.blahaj.zone 1 points 17 hours ago

Guard? Yeah that shit doesn't even stay powered on for more than like a week a month lol

[–] Xanthrax@lemmy.world 32 points 21 hours ago

This was already the presumption. The rule of thumb is "assume you're always being watched."

[–] ChickenAndRice@sh.itjust.works 8 points 17 hours ago

skill issue

[–] sunzu2@thebrainbin.org 9 points 22 hours ago

Didn't the Chinese exploit what is now known as a back door?

Now all these clowns doing pikachu face 🤡

[–] bacon_pdp@lemmy.world 5 points 22 hours ago (1 children)

Funny, they were handed a secure bootstrap thanks to gnu guix and stage0; yet choose not to just rebootstrap their shit from trusted source code.

[–] PhilipTheBucket@quokk.au 10 points 22 hours ago (1 children)

Boots into secure bootstrap

npm install

I'm not sure that the Ken Thompson type of backdoor is even on the radar as an urgent enough threat to be worth worrying about at this point. I mean, it's fine, but the boot-i-est of bootstraps at this point is the network hardware that's running the network you are trying to secure, and most of it is riddled with holes which are likely to largely undo whatever you're trying to do sad to say.

[–] bacon_pdp@lemmy.world -2 points 20 hours ago

It only takes one secure system to setup a secure network if one physically has control over the hardware, fiber optic cables need only be trusted to carry encrypted data and be monitored for physical tampering

[–] Thedogdrinkscoffee@lemmy.ca 2 points 22 hours ago (1 children)

Oh no. I'm sure all of America's friends really care deeply about this.

ಠ_ಠ

(Hint: they don't have any.)

[–] atrielienz@lemmy.world 5 points 20 hours ago* (last edited 3 hours ago) (1 children)

They don't have friends but what they do have is strategic alliances with other nations to share data and this detrimentally affects those nations too. So there's that.

[–] Thedogdrinkscoffee@lemmy.ca 1 points 19 hours ago* (last edited 2 hours ago)

You mean those alliances that are fraying as fast as US credibility?

Edit: countries around the world including NATO are rearming because no one trusts the US anymore.

Also Agent Krasnov has already likely sold any info of value to Putin.

[–] TropicalDingdong@lemmy.world 2 points 22 hours ago