Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
DNC Leak: US Intel Chief Says It's Too Soon To Attribute Blame
Newest First  |  Oldest First  |  Threaded View
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
8/1/2016 | 8:43:24 AM
Re: Coincides with my previous statement
We all know how expensive political campaigns can be. Campaign staff are usually comprised of political folks close to the candidate, and not necessarily looking all all aspects of the campaign, notably their information infrastructure. As with industry, infosec likely takes a back seat in the budgeting process. It is almost laughable to think that the DNC would provide this protection, given their candidate's recent debacle with email confidentiality. One would think that the other party however, would likely offer a bit more protection with their candidate more knowledgeable in business matters where all aspects of infrastructure are considered, and hopefully surrounding himself with not just political staff, but also business folks. I guess time will tell, because as you pointed out, most don't act until they themselves get burned. That is an axiom that makes infosec folks uncomfortable.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/31/2016 | 9:29:58 PM
Re: Coincides with my previous statement
Very good point. I would hope the RNC would learn from the event at the DNC less it happen to them in the future. But then again, I've seen first hand that most don't act until they themselves get burnt.
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
7/29/2016 | 2:42:37 PM
Re: Coincides with my previous statement
There are really two issues at hand. First, the method and motive - although at some point in time it will be possible to attribute the breach/leak actors and their methods, it will be difficult to pin a motive short of a confession. At best, an educated guess will result. Second, the exposure resulting from the leak. Although it is difficult to have an end justify the means, the more important message gleaned is that a major political party disenfranchised 13 million or so voters. That, coming from the party that claims the other political party disenfranchises voters is certainly disingenuous. It does not end there. Now, there appears to be collusion between a political party and news media. People get their news from the media, but how genuine or trustworthy is that news if it is seriously influenced or even shaped by a political party? Although this is not Nazi Germany with Goebbels at the helm of their propaganda machine ... it does resemble it, just with different actors. Here is a more important question - was it a good or bad thing that the leak occurred, when it sheds light on an organization's activities? If so, how is that different from officials "hacking" into data sources to reveal their contents, in the interest of national security, knowing that the leak was a result of a hack (case in point, FBI and terrorist iPhones)? In these cases, there are blurred lines when attempting to define good and bad.

One thing is certain - the DNC is now a richer target environment because there is now a known trove of "juicy information", so they had better be on their toes. Additionally, the RNC should be increasingly alert because their opponents will be searching for their "juicy information" to counterbalance that which was exposed about the DNC. A digital information war by proxy, as it were.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/29/2016 | 1:58:57 PM
Re: Coincides with my previous statement
I agree that another dump of emails will most likely occur soon. As for there not being a motive I would find that difficult to believe in this case. For a cause such as a cyber threat or hack there is normally an effect that the hacker is trying to achieve.
theb0x
100%
0%
theb0x,
User Rank: Ninja
7/29/2016 | 1:43:26 PM
Re: Coincides with my previous statement
There doesn't necessarily have to be a motive. We all know the level of corruption there is within these organizations based on what has been exposed. I am predicting another dump of emails soon. This is just the surface...
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/29/2016 | 1:06:17 PM
Coincides with my previous statement
This coincides with a previous statement I made for the quick hit "Russia Likely behind DNC Breach says FBI." (I tried linking the article but the post window would not accept it.)


There haven't been enough parameters defined to assess motive.


Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5423
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
CVE-2020-29454
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
CVE-2020-7199
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...
CVE-2020-14260
PUBLISHED: 2020-12-02
HCL Domino is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Domino or execute attacker-controlled code on the server system.
CVE-2020-14305
PUBLISHED: 2020-12-02
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat ...