Nation state cybersecurity threats are a big deal, and heavily targeting Microsoft is definitely part of a larger game plan by Russia.
If Microsoft is struggling, imagine how helpless “smaller” corporations (Even 10/100’s of billion $ corps) would be.
I’m interested in how this plays out, and the kinds of postmortems we’ll get from this. Will we see any shift in security culture and best practices?
Smaller corporations have it easier, IF they took IT Security serious. For the simple fact, that there are just a lot less entry points and way less whack amole playing.
And Microsoft never took security as serious as they should have.
Edith: And I highly doubt, we’ll see a substantial change on Microsoft’s side. 1.: There’s less Money to be made. 2.: In some ways, their hands are tied because of the still ongoing Patriot Act/USA Freedom Act (which is a bullshit name) or rather the safe harbor stuff.
I don’t think we’ll get the post mortems you ate imagining.
Microsoft has typically been extremely vague - famously vague, even - about any details.
Can we now call Microsoft software compromised?
Always has been meme
🌕🧑🚀🔫🧑🚀
🧀👨🚀🔫👨🚀
I’ve seen them owned by the RSS functionality. So many little hidey holes. I can’t imagine how diverse their infrastructure is.
If I ran a software utility that the US gov used and had an intrusion I couldn’t mitigate and resolve, I would be blacklisted and out of business.
Have you tried being too big to fail, to the extent your own financial success is considered a matter of “national security”?
Is it iso9001 that says “don’t have a single supplier for stuff”?
Linux anyone ?
Linux anyone ?
I don’t want to sound dismissive, this is a genuine question and not an attack on Linux.
Other than security by obscurity, how is it possible that an operating system whose entire source code is available to hackers to peruse at will could be more secure than a closed source one?
Security by obscurity doesn’t work. Microsoft software has always been closed source and it has never prevented hackers making exploits.
Open source software allows hundreds of thousands of people to comb over the code and find/fix vulnerabilities much easier.
It’s also true that because of the way Linux is developed, security flaws in Linux are patched much faster than in other projects, with Linux patching issues in an average of 25 days compared to Microsoft’s 83 days. And the gap is widening, recently Linux has got that down to 15 days.
There’s a reason companies go with Linux for servers that handle sensitive information or are business-critical. And there’s a reason why the best encryption algorithms are all open source.
Code being in the open allows the whole world to participate and fix the problems quicker than closed source binary.
Because if a vuln gets found or exploited, it gets immediately patched, often with some big backing by OEMs that run on Linux.
Open source also reduces the likelihood of exploitable bugs going unnoticed because everyone can see and play with the source code by themselves.
There is a risk of malicious merge requests, but so far that hasn’t been a problem besides a university getting banned for pointing out the issue with a live test without telling the devs.
Much of linux is also designed to be hardened by default because it’s used on so much infara. SELinux by itself is a great example because it was essentially created by RedHat and now is a major standard for MAC.
Windows on the other hand needs Microsoft alone to solve the problem. No one can patch it themselves, and there’s no guarantee the patches will work, which has happened several times. I believe print spooler basically had to be disabled because there was no good solution due to implementation.
The amount of Windows OS specific exploits vs Linux specific exploits kind of shows the results of closed source vs open source.
The worst vuln I can think of for Linux is dirty cow which is a local priv esc on basically Linux kernels 2.x-4.x which was a big deal when it was discovered because of the range of versions
Meanwhile windows had eternal blue, a whole remote code execution that existed on every version of windows since win95 that the NSA kept for probably a decade before it was leaked.
Imagine for a moment that the business world transitioned to Linux, and now there’s enormous incentive for all adversaries from state sponsored to financially motivated criminals to spend all their time hunting through linux source code.
-
Do you think the ideas above stand up? (I’m not saying they dont)
-
Would linux vulnerabilities be found at a higher rate? I wonder if they aren’t now because there aren’t as many eyes on them. Sure there’s corporate side project efforts and volunteers, just curious how that stacks up against the amount of research happening to break Windows systems.
-
NSA would definitely want to keep some linux exploits around if their adversaries were using linux instead of windows. I think the result would be the same regarding eternal blue.
Linux is already used everywhere, from servers to satellites to phones to infrastructure. There’s already a huge incentive to find exploits, moreso than Windows devices.
I do think more desktop-oriented exploits would be found if more people used Linux desktop, but I think that’s more down to distro fragmentation and not every distro maker being as competent as others, or not having the manpower to keep up with development, as opposed to there intrinsically being danger in people seeing source code.
NSA would definitely want to keep some linux exploits around
And they’d be spotted in the source code and patched. If the code is proprietary, you can never trust that there aren’t backdoors.
The point is, they already did. 99% of webservers run Linux. They are all out in the open and hackers love to get their hand on them as they are likely to have mailservers on them and they have a public IP so they can always be reached.
And most of them do not get hacked. And those that do mostly get hacked due to bad passwords or bad website code. I administer one and see the thousands of attacks running up against it daily (most are just attempts to log in with basic credentials). And of course I see the daily influx of updates from Linux.
If a new security flaw is seen, its often quite difficult to use. And with Linux somebody makes a patch before simple tool for hackers are out. With Microsoft products you wait till the next patch day, in the best case critical exploited bugs are patched in days. Also security flaws in closed source products are often easier to exploit and tools to use them are available fast. (Such flaws are often already discovered in open source products by third eyes and testers before they make it to production systems.)
Of course there are exceptions to the rule, like heartbleed. This was an easy to exploit flaw in an often used Linux service and it caused a big turmoil because many where to slow to patch their systems.
Also of course if Linux gets more popular on the desktop more software will be an attractive target for malicious actors and some software may get popular before many people take a look at the source code. But the situation will still be much better compared to closed source systems.
(Also of course more closed source software will be made for Linux then)
Linux is currently having parts of the kernel rewritten in memory safe languages like Rust, eliminating entire classes of exploits. Wayland is being developed with a far more secure architecture than the old X.org window manager. One important reason why they can do this is because the whole industry follows and stuff like drivers can be updated at the same time to keep everything working, and it doesn’t even need to be the original developer patching it.
Microsoft’s opacity makes it near impossible for them to do the same thing, so much of their security improvements are essentially hacked in on top of old code to not break compatibility. Instead of eliminating bug classes they rely on tons of techniques to make them harder to exploit instead - yet not impossible.
If that happeninux will also recieve more contributions and donations from that structers also linux devs also doesn’t have to worry about building blobs, ads, tracking, making UI prettierso they can worry about real stuff and aolve those issues . The security of linux isn’t because of the low amount of users its simply because it is what it is an OS build and used by nerds who whether you like it or not are some of the most tech savy people you can find and they have their heart in it because they are not doing it for corpos or salary . Also linux is the OS used by most (and best ) hackers and proggrammers and often recieve contributions from (only sometimes from the hackers but as the linux users are naturally paranoid they often review code and PR for vulnabilities instead of the need to add extra features cause jomo)
Also spelling, grammer etc.
proggrammers
Also spelling, grammer [sic] etc.
There is a great t-shirt that says:
I’m a programar
I’m a programmar
I’m a programer
I write codeI love this shirt. So many programmers are awful at spelling. I do not, personally, suffer this malady, so I don’t own the shirt, but I still love it.
I do not, personally, suffer this malady
Um actually it’s spelled m’lady. /s
Perfektion
I proggram for hobby and i am really really bad at it like if a legitamate programmer sees my life’s work in it they will beat me to death with bare hands bad . And the grammer and spellings is because english isn’ty first language.
Governments of Russia China India use Linux, nsa definitely keeping exploits active to keep tabs
-
Closed source doesn’t prevent people from reverse engineering it to find exploits, it just makes it harder for others to contribute to fixing it
Because many eyes are there watching it. While not everyone is an active kernel hacker, many parties have an active interest in certain aspects of the kernel, and watch source code and patches closely.
Yup. E.g. years ago Huawei tried to merge something in the kernel that had a glaring security hole, many speculated that it was a deliberate attempt to add an exploit to the kernel.
It was immediately spotted before it even got close to being merged, and of course it got rejected.
The likes of Google, Microsoft, RedHat/IBM, Intel, AMD, Chronos group, etc are always investigating what other companies are trying to implement into the kernel. They obviously won’t stand for any dodgy stuff from another company being injected into the kernel.
Everything is highly scrutinised, not just by the kernel maintainers, but also by the contributors.
ReactOS FTW.
This is the best summary I could come up with:
BOSTON (AP) — Microsoft said Friday it’s still trying to evict the elite Russian government hackers who broke into the email accounts of senior company executives in November and who it said have been trying to breach customer networks with stolen access data.
The hackers from Russia’s SVR foreign intelligence service used data obtained in the intrusion, which it disclosed in mid-January, to compromise some source-code repositories and internal systems, the software giant said in a blog and a regulatory filing.
A company spokesman would not characterize what source code was accessed and what capability the hackers gained to further compromise customer and Microsoft systems.
“The threat actor’s ongoing attack is characterized by a sustained, significant commitment of the threat actor’s resources, coordination, and focus,” Microsoft said Friday, adding that it could be using obtained data “to accumulate a picture of areas to attack and enhance its ability to do so.” Cybersecurity experts said Microsoft’s admission that the SVR hack had not been contained exposes the perils of the heavy reliance by government and business on the Redmond, Washington, company’s software monoculture — and the fact that so many of its customers are linked through its global cloud network.
When it initially announced the hack, Microsoft said the SVR unit broke into its corporate email system and accessed accounts of some senior executives as well as employees on its cybersecurity and legal teams.
Microsoft’s latest disclosure comes three months after a new U.S. Securities and Exchange Commission rule took effect that compels publicly traded companies to disclose breaches that could negatively impact their business.
The original article contains 551 words, the summary contains 264 words. Saved 52%. I’m a bot and I’m open source!
W10 EOL news and compromised news at the same time.
Securing a general purpose operating system seems like the Dutch boy with his finger in the dike. It doesn’t matter if its Windows, Linux, or Mac OS X. Lots of little leaks, not enough fingers to plug them.
I’m certainly no Microsoft fanboy, but if they decided to respond to the hack by devoting their resources to taking down the Russian government, Vladimir Putin would be dead within two months.
deleted by creator
Hahah, I think they’re implying that with their vast stores of wealth, they could spend billions on hiring assassins and/or mercenaries to take down the Russian government? Idk
That would be kinda cool tho
And so begins the corporate wars. Nation states are toppled and continents will be controlled by Microsoft, Apple, Amazon and Facebook, and google who continue to war Alibaba Tencent and baidu for territory.
Haha right, I often think how it’s starting to feel like we’re entering the early years of the capitalist dystopian cyberpunk era.
Google fourth corporate war on cyberpunk wiki
What’s crazy is if you read the monetary value of the biggest corps on the Cyberpunk wiki, we have corporations in real life that dwarf those numbers. Granted, Cyberpunk was written in the 80s, which had IBM as the richest corporation at the time worth around $130 billion (adjusted for inflation). Meanwhile, nowadays, Microsoft is worth over $3 trillion, Apple over $2.8 trillion, Saudi Aramco over $1.9 trillion, etc. Absolutely wild that even in the worst predictions by the Cyberpunk creator, it’s still a fraction of what reality turned out to be.
What are you smoking? Putin doesn’t even know how to use computer.
Kremlin desktop computers run on Astra Special Edition.
Ha, if it was that easy, I think the NSA would have solved that problem by now…