State actor blamed for cyberattack on B.C. government systems

45 points by allannienhuis 1 year ago | 24 comments
  • qp11 1 year ago
    Microsoft is looking like the next Boeing for anyone paying attention to the attacks in the last couple years. End result of limitless greed. No TikTok or Snowden required, just the fantastic Microsoft software stack. They can't even protect themselves - https://www.crn.com/news/security/2024/microsoft-says-senior...
    • sofixa 1 year ago
      Azure's security is a joke. They're the only major cloud provider with cross-tenant security vulnerabilities, and they've had like 10 of them in the past years. Some of the absolutely trivial to exploit, indicating security isn't taken seriously.
      • 1 year ago
        • nox101 1 year ago
          Is that really fair? We had the xz thing recently, that was open source.

          I'm not saying MS isn't the worst. But there are plenty of linux exploits. An expert IT person might keep that up to date but your average business, government agency, hospital is not up to it.

          • ahiknsr 1 year ago
            https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review...

            > The Board concludes that Microsoft’s security culture was inadequate. The Board reaches this conclusion based on:

            > Microsoft’s failure to detect the compromise of its cryptographic crown jewels on its own, relying instead on a customer to reach out to identify anomalies the customer had observed

            > Microsoft’s failure to detect a compromise of an employee’s laptop from a recently acquired company prior to allowing it to connect to Microsoft’s corporate network in 2021

          • josefx 1 year ago
            The xz thing never managed to hit production versions of the affected distros. You had to use testing or similar pre production releases to get hit by it.
            • Hamuko 1 year ago
              Ironically enough the xz backdoor was discovered by a Microsoft employee too.
              • prmoustache 1 year ago
                1.Being a public domain library, likely used in many other proprietary products, I doubt the xz library would have targetted linux systems only. It may have been the first target because Linux provided a very large blast radius but it might just have been the beginning of a broader rootkit.

                So I wouldn't call the xz incident as linux specific.

                2. I don't know why you oppose Microsoft, a provider of online services in the cloud with Linux, a small piece of software or an OS family depending on your definition.

                This is apples vs oranges comparison.

            • nox101 1 year ago
              I'm actually curious, if there is anyone here that's actually an expert on this stuff can you explain

              (1) How do you tell a state actor from just hackers looking to make money?

              (2) Is this a solvable problem?

              I can't imagine most state agencies, hospitals, doctors offices, small businesses, being able to afford good experienced IT staff. I can't imagine outsourcing it to nearly any company and trusting that company. Exceptions might be Google or Apple but neither company provides more than email/docs/spreadsheets. They don't supply bookkeeping, appointments, medical record management, etc... and AFAICT, all the suppliers for those kinds of services have terrible security practices. And, even if Apple and Google could do a good job there's still social engineering.

              • blueflow 1 year ago
                (1) You really can't. The Mirai botnet was initially attributed to some state actor due to its massive DDoS attacks, but in the end it was just a bunch of teenagers.
                • ClumsyPilot 1 year ago
                  I think this is important to keep in mind, media will attribute back to the ‘enemy of the day’ but the actual evidence is scant.

                  the recent Ministry of Defence, UK hack was blamed on China, but if you actually dig into it that’s just a hypothesis and it really could have been anyone. If this was happening straight after 9/11 we’d be blaming terrorists, etc.

                  • wesapien 1 year ago
                    Anytime states point a boogeyman, there must be a power grab lurking.
                • 7373737373 1 year ago
                  These companies can work on building and then actually distributing more secure operating systems. This won't fix problems like social engineering, but it will prevent/harden a ton of other attack vectors.

                  Since it allows much more fine grained control over data and resource access than contemporary popular systems, https://en.wikipedia.org/wiki/Capability-based_security and the concept of "hollowing out the attack surface with the https://en.wikipedia.org/wiki/Principle_of_least_privilege" can't be mentioned often enough.

                  Some specific projects to mention are https://en.wikipedia.org/wiki/Fuchsia_(operating_system) ,https://en.wikipedia.org/wiki/Genode and https://en.wikipedia.org/wiki/Qubes_OS

                  If these don't make it to the mainstream, it is the responsibility of FAANG companies that at least the concepts/mechanisms contained in them do, in other systems. To provide the world with a secure computing substrate.

                  • gds44 1 year ago
                    There is an alternate option which is stop putting everything online and using the cloud.

                    The benefits have been greatly oversold by BigTech multimillion $$$ sales teams. They are lots of stories of bribery involving these contracts.

                    • thworp 1 year ago
                      re. 1:

                      Assuming the source of the attribution is acting with pure intentions, it is usually a preponderance of (mostly circumstantial) evidence. Does the malware and MO look similar to past known attacks? Did they leave any localized strings in the binary file, if yes does that nation have an interest in hacking the target? Does the malware use a stack of 0-days and labour-intensive obfuscation techniques (indicating a large amount of resources)? Does the whole picture make sense when you put it all together?

                      The above is in an ideal world, in reality almost all attributions are political and based on almost nothing. Even if they were based on some other intelligence source, how could a random member of the public verify that?

                      On top of the difficulty of gathering evidence, there is an incentive alignment between the heads of hacked organizations and intelligence agencies. The hacked company will look better as the victim of a "cyberattack" or a "chinese cyberattack" then as the victim of "random.ransomware.0238023". The intelligence agency can get more funding and PR by proclaiming the same.

                      • RobotToaster 1 year ago
                        1) It sounds better if you say you were hacked by spooks rather than a teenager in their parents basement.
                        • throwaway290 1 year ago
                          > 1) How do you tell a state actor from just hackers looking to make money?

                          Why do you think those governments are not just trying to make money? You should check how much crypto DPRK made from ransomware. Krebs and others wrote about it

                          • ClumsyPilot 1 year ago
                            Well yes, the real distinction is - is that someone trying to make money, and it’s ‘nothing personal’ or is it political
                            • throwaway290 1 year ago
                              Either way a crook who wants easy money, no real distinction.

                              But it doesn't mean you can't trace what exact crook did by correlating various signs. Plus, nation state crooks have more capability usually.

                        • 1 year ago
                          • aaron695 1 year ago
                            [dead]
                            • oldpersonintx 1 year ago
                              [dead]
                              • 1 year ago