(no title)
quatrefoil | 1 year ago
That said, if you're not using it, it defeats the purpose. And the more you're using it, the higher the likelihood you will be detected down the line. Compare to Solarwinds.
quatrefoil | 1 year ago
That said, if you're not using it, it defeats the purpose. And the more you're using it, the higher the likelihood you will be detected down the line. Compare to Solarwinds.
londons_explore|1 year ago
Most people don't log TCP connections, and those that do don't go through their logs looking for odd certificates in ssh connections.
And no common logging at the ssh/pam level would have picked this up.
Your only chance is some sysadmin who has put 'tripwires' on certain syscalls like system(), fork() or mmap() looking for anything unusual.
Even then, they might detect the attack, yet have no chance at actually finding how the malicious code loaded itself.
amscanne|1 year ago
I’m not arguing with the point, but this is a great place to hide — very difficult to have meaningful detection rules even for a sophisticated sysadmin.
matrix_overload|1 year ago
guenthert|1 year ago
lll-o-lll|1 year ago
Not if this was injected by a state actor. My experience with other examples of state actor interference in critical infrastructure, is that the exploit is not used. It’s there as a capability to be leveraged only in the context of military action.
sunshine_reggae|1 year ago
Why do non-friendly state actors (apparently) not detect and eliminate exploits like this one?
Supposedly, they should have the same kind of budgets for code review (or even more, if we combine all budgets of all non-friendly state actors, given the fact that we are talking about open-source code).
golergka|1 year ago
Not always. Weapons of war are most useful when you don't have to actually use them, because others know that you have it. This exploit could be used sparingly to boost a reputation of a state-level actor. Of course, other parties wouldn't know about this particular exploit, but they would see your cyber capabilities in the rare occasions where you decided to use it.
kosh2|1 year ago
Except that cyber weapons like these are
1. One time use 2. Expire upon detection (mostly)
I think this is simply just a tool for offensive action only.
rigid|1 year ago
Well, software supply chains are a thing.
"where no auditor ever is paid to look" would be more correct.
bandrami|1 year ago
guenthert|1 year ago
NekkoDroid|1 year ago
After something like 2 years of planning this out and targeted changes this isn't something "just done for science".