Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
After DHS Notice, 21 States Reveal They Were Targeted During Election
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
jenshadus
67%
33%
jenshadus,
User Rank: Strategist
9/26/2017 | 10:01:00 AM
Really? We're still pointing fingers at the Russians?
There are so many things in this article that I disagree with.  I'll just point out one.

What's the evidence it was the Russians.  I went to Defcon and it took many of these people but 10 to 15 minutes to hack into the sample machines that were available.  I heard that one of them turned the booth into a PACMAN game.  Don't know if that's also true.  Virginia had one 100% red country that voted 100% blue, Maryland is notorious for sending people to vote in Virginia using fake ID's, not counting all the dead people who come in to vote (huh?). 

 
screwbird
50%
50%
screwbird,
User Rank: Strategist
9/26/2017 | 10:37:43 PM
Re: Really? We're still pointing fingers at the Russians?
It would be nice to know how attribution was established. 
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
9/27/2017 | 9:50:09 AM
Re: Really? We're still pointing fingers at the Russians?
There are any number of fine countries to blame - North Korea and China to start with and just assuming that all BAD in the world belongs to Russian hackers is simplistic.  IP trace does not mean a tinker's damn as those can be hidden, fudged quite easily.    As for me,I personally fear hackers from Towaco, New Jerssy!!!  Now THAT is a tough area!!! LOL
jenshadus
50%
50%
jenshadus,
User Rank: Strategist
9/27/2017 | 10:42:45 AM
Re: Really? We're still pointing fingers at the Russians?
Amen
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
9/27/2017 | 11:08:09 AM
DHS is late
It is a little bit late for DHS to come out with this information, everybody knows not only Russians but may other countries try to attack other counties systems and that includes election systems too.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
9/27/2017 | 11:09:43 AM
Re: Really? We're still pointing fingers at the Russians?
What's the evidence it was the Russians. Good question. There may not be a clear set of evidence. However Russians and many others have interests in attacking US systems.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
9/27/2017 | 11:11:24 AM
Re: Really? We're still pointing fingers at the Russians?
Virginia using fake ID's, not counting all the dead people who come in to vote (huh?). Yes, fake ID would be another major issue for an selection system. All needs to be avoided,
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2017 | 11:12:37 AM
Re: Really? We're still pointing fingers at the Russians?
There are any number of fine countries to blame - North Korea and China to start with That is true, I would add many others that have capabilities to execute an attack.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2017 | 11:14:55 AM
Re: Really? We're still pointing fingers at the Russians?
IP trace does not mean a tinker's damn as those can be hidden, fudged quite easily I would agree, IP address can easily be spoofed. It is not a traceable entity, there needs to be other mechanisms to track the attackers.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/27/2017 | 7:54:34 PM
Re: Really? We're still pointing fingers at the Russians?
@Dr. T: Absolutely. Reminds me of the forensics tracking that big Sony hack that was traced to North Korea...except other researchers eventually traced it to...Russia!

And even then, that location tracking may not have been accurate/the whole story. There seems to be little shortage of IP-masking tech if you know where to look (no pun intended).
Page 1 / 2   >   >>


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Hunny, I looked every where for the dorritos. 
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
CVE-2020-8570
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
CVE-2020-8554
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...