Top
Best
New

Posted by laurex 3 days ago

We May Be Living Through the Most Consequential Hundred Days in Cyber History(ringmast4r.substack.com)
199 points | 117 commentspage 2
KIFulgore 3 days ago|
I miss the days when the big security concern was quantum breaking contemporary encryption. Air gaps and local stacks are overdue for a comeback.
Animats 3 days ago|
Even that may not work. See Stuxnet.[1]

[1] https://en.wikipedia.org/wiki/Stuxnet

KIFulgore 3 days ago||
Yep, there is always the human factor. Leave a USB drive in a parking lot, someone will insert it. You don't even need an obvious drive anymore, a malicious cable will suffice.
jrm4 3 days ago||
[flagged]
john_strinlai 3 days ago||
>As someone who's older, and is just generally gobsmacked all the time by the sloppiness in cybersecurity, all of this is just not surprising.

as someone who used to work in cybersec (and is also older), most of the time (in my experiences) it isnt sloppiness.

1) people fight tooth and nail against anything that inconveniences them. security is almost always going to be an inconvenience tradeoff, so it is always fought against. from every person and every department. rolling out 2fa was worse than pulling teeth, despite it being a single button press ("approve") on the phone, once or twice a day (or less). c-suite is the worst, demanding exclusions and bypasses. its hard to say no to your bosses boss when they refuse to use a password manager, refuse to setup 2fa, or whatever the case is.

2) security offers no immediate or visible return on investment. so, it gets little to no positive attention by c-suite and even less budget. you end up with underpaid, under-qualified, over-worked people trying to figure out which thing they might be able secure out of the 10 things that need securing. half of them will be tied up trying to explain to someone why they cant use the company name as their password or begging someone to use the password manager.

even here, a forum of hackers, security is often put in scare quotes and almost always mentioned beside the word "theater". people brag about still running windows 7, because it was the last good windows. antiviruses arent needed. X security feature is just a lie so that company Z can control my device. people get big mad when a company rolls out mandatory 2fa. and so on.

edit: case in point, on this thread a comment was just posted with "I think you can argue that cybersecurity doesn't really matter, in the grand scheme of things."

BobaFloutist 3 days ago|||
> once or twice a day (or less).

If that was all it was, people would be a lot less annoyed by it.

jrm4 3 days ago||||
[flagged]
gdrift 3 days ago|||
Freedom, Security, Convenience. Choose two.
jancsika 3 days ago|||
> We managed to put buttons on appliances that don't make the appliance explode, but failed to do that in email links, which are just buttons.

Reminds me of the time I accidentally entered my bank PIN into my washing machine and hackers ran off with $500 of my money.

What puzzled me most was the time and energy put into the attack, all for the off chance of a successful attack. Security footage showed them removing my washing while I was at work and replacing it with one the hackers controlled. This "phishing machine"-- as I now call it-- was apparently fitted with some kind of LoraWAN device waiting for me to unwittingly enter my PIN to unlock. Something my washing machine never asked me to do before, btw, but I did it anyway (like an idiot).

I changed my bank PIN, but I still use the old PIN to run the phishing machine-- funny enough it's fully functional and in fact works better than the old one.

All said, the hackers probably lost $1000 on the deal. Police said this is a very common attack on washing machine buttons throughout the Southeast, so I'm wondering if part of our current economic stagnation is due hackers going into bankruptcy from this.

ryandrake 3 days ago|||
> And then, we still have yet to punish or hold accountable any large party who made things this way. Until we do that, keep expecting this.

This is the key. No incentive to change. It's always "the hacker's fault" and never "the manufacturer's negligence" or "the developer's carelessness" or "the user's gullibility." Combine this with the currently-prevailing Don't Blame The Victim mentality, and it's the perfect environment for never improving cybersecurity.

myself248 3 days ago||
But yet, the pigs who built the houses of straw and sticks got eaten. The pig who built the house of bricks is seen as responsible, even though it took longer and cost more; he made the right choice.

The wolf is seen as ever-present. Failure to consider the wolf when choosing building materials has consequences.

It blows my mind that this story has been part of our culture for centuries, yet we apply exactly the opposite model to cybersecurity.

IsTom 3 days ago||
But have you thought about the bonus you can get by reducing house building costs in Q3?
stackskipton 3 days ago||
Yea, CyberSecurity will get fixed when companies are held responsible to the point that data breaches have severe impact on bottom line.
FuriouslyAdrift 3 days ago||
We just caught our company president, CFO, and head of sales using smuggled Starlink dishes on the roof with wide open wifi because our firewall "broke things".

Thank goodness for all the other layers... the firewall is just doing basic hygiene. The SASE and zero trust policies are doing the heavy lifting.

No one want's to follow any rules and when caught out do not want to take respnsibility for their own actions.

Since it was an open wifi, I hope we get nailed for hosting child porn or cryptocoin scams... ffs

burningChrome 3 days ago||
>>> We just caught our company president, CFO, and head of sales using smuggled Starlink dishes on the roof with wide open wifi because our firewall "broke things".

Wait, what?!?! I gotta hear this story. I have so many questions like how in the hell do you casually smuggle in not one, but several Starlink dishes?

FuriouslyAdrift 2 days ago||
Well.. they pay the checks so it was easy to go shadow IT. They paid the company that manages the physical building to install access pipes on the roof and run the cables between the dish and the routers. Dishes sitting on the roof and routers above the drop ceiling.

Didn't even notice until the wifi rogue detector flagged the SSID due to it's relative strength (we're in a highly contested area for 2.4 and 5 Ghz).

john_strinlai 3 days ago||
>And yet, the public conversation around them has been quiet to the point of being strange.

i dont think its that strange. there are multiple wars raging on, with many people fearing the breakout of a global conflict. a giant pedophile ring has been exposed that no one in power seems interested in doing anything about. prices for everything are haywire. markets are an absolute rollercoaster, hinging completely on one mans late night tweets. and so on.

people just dont have the bandwidth to also learn about what an npm or github is, and why a hack of it is important. news stations are going to pick the news that results in the most people tuning in to watch. that is war, not whatever a mercor is.

the non-tech (and many of the tech) people in my life are also just plain tired of hearing about hacks. they have heard that their information has been stolen 10 times or whatever in the last 5 years. they have heard 100s of "this company was hacked" stories. "another hack? who cares?".

jgeada 3 days ago||
The issue is also one of agency: the public has absolutely no agency in this. There is nothing an ordinary member of the public can do to avoid having their data exposed, there is nothing they can do to cause corporations to have more robust security models nor to cause actual consequences for all the executives that chose profit over security at every possible decision point.

To the public this becomes like the risk of being hit by lightning or being in a car accident, just background noise we avoid thinking about as much as possible. It is just the cost of living in this economy.

Ray20 3 days ago|||
> a giant pedophile ring has been exposed that no one in power seems interested in doing anything about

But that's not true. The European Union and many other countries are taking extreme measures to ensure that what happened in the United States never happens with them and they are introducing a bunch of different measures to strengthen control over society, the media sphere, and other measures to ensure that no pedophile rings could be exposed.

Der_Einzige 3 days ago||
Really? The UK never even did anything except sweep the LAST pedophile ring uncovered under the rug too!

https://en.wikipedia.org/wiki/Rotherham_child_sexual_exploit...

https://en.wikipedia.org/wiki/Rochdale_child_sex_abuse_ring

https://en.wikipedia.org/wiki/Investigations_into_the_Rother...

"A 2024 report on child sex exploitation in Rochdale from 2004 to 2013 found that there was "compelling evidence" of widespread abuse, and that Greater Manchester Police and Rochdale Council had failed to properly investigate these cases, leaving girls "at the mercy of their abusers". While there were successful prosecutions, the report said that the investigations carried out during the period covered by the report only "scraped the surface" of what had happened, and that many abusers had gone unpunished."

john_strinlai 3 days ago|||
>The UK never even did anything except sweep the LAST pedophile ring uncovered under the rug too!

the comment you are replying to is written sarcastically, ending with: "to ensure that no pedophile rings could be exposed"

in other words, they agree with what you have written. your reply appears to assume the opposite.

pfdietz 3 days ago|||
Read again what you are responding to.
imglorp 3 days ago|||
As fatiguing as legal breach notices are to lay people, it's equally frustrating as a dev because security is not a distinguishing feature we can advertise in our product so we can't prioritize it at all. Let the lawyers figure it out later seems to be best practice now.

And of course vuln finding is now automated so even if we do a good job locking it down this morning, nothing will not keep out the next wave tonight.

Plus, our current political atmosphere encourages digital chaos, for example gutting CISA.

tokai 3 days ago|||
Its the tech worlds equivalent to eating X causes cancer.
ifwinterco 3 days ago|||
HN is a bit of a bubble in that people here tend to be quite privacy focused and would be horrified at the prospect of their details being leaked.

For a lot of normal people that's not the case and as long as they don't get someone actually stealing their identity etc. they aren't really concerned about these kind of things

hydrogen7800 3 days ago|||
Frustratingly, I have my foot in both worlds to a degree. I'm interested enough in tech to pay attention and often lurk the tech bubble that is HN and hear about the raging dumpster fires from the folks who live and work in that domain. But I exist in a mostly non-tech world IRL where this exists among the other burning dumpster fires to the point that I can't care about another data hack, and i hate that I don't have the bandwidth to care. To a more acute degree, my mother was nearly wiped of half her life savings by "hackers"/fraudsters posing as employees of her bank. Being "hacked" is a part of life now, and outrage fatigue is real.
philipallstar 3 days ago||
> a giant pedophile ring has been exposed that no one in power seems interested in doing anything about

This was one of the things Trump got 2024 elected on - many Republican voters were extremely keen on this being addressed. I'm glad Trump's fumbled it now so the Democrats are interested in addressing it, though for the wrong reasons.

vdqtp3 3 days ago||
> so the Democrats are interested in addressing it

They're not any more interested in addressing it than the existing administration - it's just a talking point like everything else. Ammunition to get elected and then put away in a dark closet.

gcr 3 days ago||
If cybersecurity is slowly ramping up in complexity, isn’t the statement “we’re living through the most consequential hundred days in history” always trivially true?
tptacek 3 days ago|
Yep.
titzer 3 days ago||
> Cisco’s private GitHub was cloned.

From this,

https://www.sdxcentral.com/news/cisco-source-code-breach-lea...

It sounds like they were/are using GitHub to host company-private source code, presumably of high-value.

While it's hard to know exactly the setup (e.g. maybe they are running their own instance of GitHub internally), this is your reminder that public clouds are not secure, no matter how much you pay the maintainers of said clouds.

Internal network compromise is of course always possible, but sheesh, it sounds like this list has lots of public cloud failures.

myth_drannon 3 days ago||
Looking at the Israeli startup scene, there is a huge surge in cybersecurity investments (especially agentic security) in the last couple of months, looks very abnormal.

https://www.calcalistech.com/ctechnews/article/hy8t7fcobe

alephnerd 3 days ago|
There's nothing abnormal about that.

These were all funded 2-3 years ago (heck I participated in some of these). Companies only go out of stealth when they are publicly announcing their Series A (usually right around the time of a major buyer event like BSides/RSA or DEFCON/Blackhat.

Funding rounds usually happen around 5-6 months before they get announced on TechCrunch or Calcalistech becuase such information are a signal to competition about a specific approach. It's also a massive distraction from building, because then you have to deal with media, press releases, and actually have a product marketing team. You don't want to do this until you can hire a couple PMs and PMMs (which is usually around the seed-to-series A transition becuase you will have hit the $5M ARR mark by then).

This how stuff is done here in SV as well and has been for decades.

themafia 3 days ago||
> And yet, the public conversation around them has been quiet to the point of being strange.

These events aren't new or novel anymore. The fact that the news does or does not report on something is indicative of editorial prerogatives and nothing more.

> This is a curious observation more than a complaint.

We went from 25% of the world population using the internet to now more than 80% are on the internet. More people understand the fundamental issue, and so are uninterested by it, so for-profit publications will not cover it.

lubujackson 3 days ago|
I have this mental model that the natural state of the web is to act like an organism that is continuously assaulted by viruses - sometimes that is SEO spam, sometimes actual viruses, sometimes a game-changing shift like AI vulnerability scanning. The pattern is the organism gets assaulted, digests the virus and comes back a bit tougher with more layers of complexity and defensiveness.

I think right now we are waiting for the Morris worm (https://en.wikipedia.org/wiki/Morris_worm) equivalent shock to the system, but it is likely to be much, much worse and much more specific. I expect something that will make DOGE stealing SSNs look kind of tame. Something like every private GitHub exposed, every Visa card data and history exposed, every Mac injected with a rootkit, etc. It's like waiting for the plot from Sneakers to manifest.

For all the security we have built over the last 50 years, it has been impossible (or nearly so) to lock down any web-accessible content. It is a structural issue at a certain level of complexity, the surface area is just far too wide for any focused effort. Aside from direct 0 day vulnerabilities in software there are vulnerabilities in core libraries, frameworks, CI/CD, cloud services, hardware bugs, gaps between services, permission vectors, etc.

The U.S. has relied on the legal system to allow our insane credit card system to persist, where security by obscurity (knowing someone's CC#) is the main deterrent to abuse. I need a complex password to access any website, but CC#s are flying free. I think the combination of easy worldwide vulnerability scanning and U.S.'s focus on pissing every country off is going to lead to significant and unending asymmetrical warfare. If our gov't has been co-opted by big business, big business is going to become the target. As we have seen with Iran with Hormuz and Ukraine with drone strikes, it isn't so hard for small countries to fuck up global systems.

We are entering a 90s-style phase where any script kiddie can cause massive disruptions. Trump likes to threaten NUCLEAR but security issues could potentially cause even more death and destruction - overwhelm the energy grid, open dams, crash air traffic control communications, etc. There is lots of concern over the oligarchy owning AI and keeping it for themselves, but the more immediate risk is that any country can potentially lash out with disruptive actions.

There has been a retreat from globalization since COVID. I wouldn't be surprised if that extends to global internet communications as well. Internet traffic between countries might soon be severely restricted, that's the last line of defense we actually have if this goes as badly as Anthropic is implying.

More comments...