umeHack social
  • FAQ
  • Login
GNU social-nod för Umeå Hackerspace. Inbjudan krävs, men det är bara att hojta till oss om du vill vara med!
  • Public

    • Public
    • Groups
    • Popular
    • People

Conversation

Notices

  1. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Wednesday, 28-Jun-2017 05:30:53 CEST Mike Gerwitz Mike Gerwitz
    Remote profile options...
    A reminder that this latest ransomware attack (#Petya) is made possible by #NSA-developed exploits #ETERNALBLUE and #ETERNALROMANCE (the former used in #WannaCry)---exploits that the government decided to hoard as 0days instead of notifying Microsoft to fix the issues. Instead of helping to protect the United States and its allies, it has made us far less safe. Petya and WannaCry are products of its negligence.

    This issue goes back to the #VEP (the Vulnerabilities Equities Process)---the supposed process that is used by the government to determine whether to disclose to weaponize exploits. If WannaCry didn't spur enough discussion, let's hope this does.

    https://social.mikegerwitz.com/url/7904
    In conversation Wednesday, 28-Jun-2017 05:30:53 CEST from social.mikegerwitz.com permalink
    • Klaus Jónsson Zimmermann likes this.
    • Klaus Jónsson Zimmermann, Annah and Charles ☭ Hutchins repeated this.
    • zoowar (zoowar@indy.im)'s status on Wednesday, 28-Jun-2017 06:02:04 CEST zoowar zoowar
      Remote profile options...
      in reply to
      You are mistaken. These exploits are common knowledge and were patched in April. Fault is to be directed at those who have not patched their systems.
      In conversation Wednesday, 28-Jun-2017 06:02:04 CEST permalink
    • Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Wednesday, 28-Jun-2017 06:34:10 CEST Mike Gerwitz Mike Gerwitz
      Remote profile options...
      in reply to
      • zoowar
      @zoowar They were exposed in April by the Shadow Brokers leak. Many of them (including both of the above) were already patched by Microsoft exactly one month prior, leading to suspicions that they were tipped off, or that the Shadow Brokers decided to leak them because they had been fixed.

      WannaCry and Petya integrate the exploits leaked by the Shadow Brokers; they would not exist without the leaks.

      If you were only saying "you are mistaken" to my statement that both are products of the NSA's negligence, you're blaming the victim. If someone unleashes a bioweapon, and immunizations are offered to the general population, and a number of people die because they fail to get immunized, you don't blame the people---you blame whomever deployed the weapon.

      Some systems aren't upgraded because of negligence. Others aren't updated because users don't know there's a problem, or don't know how (e.g. grandma). Others are using ancient operating systems and upgrading might be a financial burden. Others haven't upgraded because of strict regulations or bureaucracy within an organization, or because of incompatibility with critical systems. Others rely on technical support staff or contractors that haven't come by, or that they can't afford to pay at the moment.

      Blaming most users for not upgrading their system is wholly inappropriate. If I used Windows and didn't update? Sure. You? Sure. But we're both technical people with no hoops to jump through or people to pay.
      In conversation Wednesday, 28-Jun-2017 06:34:10 CEST permalink
    • zoowar (zoowar@indy.im)'s status on Wednesday, 28-Jun-2017 06:40:52 CEST zoowar zoowar
      Remote profile options...
      in reply to
      I agree that they were exposed in April. However, a patch was issued back in April, so those who have not patched their systems are responsible for what ever harm they incur from the current attack. "Blaming most users for not upgrading their system is wholly inappropriate." WTF? The first rule of security is patch your system.
      In conversation Wednesday, 28-Jun-2017 06:40:52 CEST permalink
    • Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Wednesday, 28-Jun-2017 06:57:47 CEST Mike Gerwitz Mike Gerwitz
      Remote profile options...
      in reply to
      • zoowar
      @zoowar *most* users; average users. Yes, they should update, but they don't, for reasons I listed.

      If the company I work for gets pwned? There's a difference between being negligent in your professional responsibilities to defend your own systems and negligent for hoarding exploits that are then leaked and used to attack people.

      You were attributing full blame on users who didn't patch their systems. That doesn't forgive the US of its negligence. They are different faults.
      In conversation Wednesday, 28-Jun-2017 06:57:47 CEST permalink
    • zoowar (zoowar@indy.im)'s status on Wednesday, 28-Jun-2017 07:08:10 CEST zoowar zoowar
      Remote profile options...
      in reply to
      You continue to be mistaken. Every Microsoft system is informed when a patch is available, unless the admin has disabled this feature.
      In conversation Wednesday, 28-Jun-2017 07:08:10 CEST permalink
    • zoowar (zoowar@indy.im)'s status on Wednesday, 28-Jun-2017 07:13:11 CEST zoowar zoowar
      Remote profile options...
      in reply to
      "If the company I work for gets pwned? There's a difference between being negligent in your professional responsibilities to defend your own systems and negligent for hoarding exploits that are then leaked and used to attack people." Not once said company has been informed to patch their system. If said company decides not to patch their system, they are responsible.
      In conversation Wednesday, 28-Jun-2017 07:13:11 CEST permalink
    • zoowar (zoowar@indy.im)'s status on Wednesday, 28-Jun-2017 07:34:01 CEST zoowar zoowar
      Remote profile options...
      in reply to
      I'm not forgiving the organization that held onto the exploit. I'm also not holding them accountable for any harm which occurred after it was patched.
      In conversation Wednesday, 28-Jun-2017 07:34:01 CEST permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

umeHack social is a social network, courtesy of Umeå Hackerspace. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All umeHack social content and data are available under the Creative Commons Attribution 3.0 license.