23
submitted 3 days ago by 0x815@feddit.org to c/technology@beehaw.org

cross-posted from: https://feddit.org/post/3122226

Archived link

Chinese state-sponsored spies have been spotted inside a global engineering firm's network, having gained initial entry using an admin portal's default credentials on an IBM AIX server.

Binary Defense's Director of Security Research John Dwyer said the cyber snoops first compromised one of the victim's three unmanaged AIX servers in March, and remained inside the US-headquartered manufacturer's IT environment for four months while poking around for more boxes to commandeer.

It's a tale that should be a warning to those with long- or almost-forgotten machines connected to their networks; those with shadow IT deployments; and those with unmanaged equipment. While the rest of your environment is protected by whatever threat detection you have in place, these legacy services are perfect starting points for miscreants.

[...]

This particular company, which Dwyer declined to name, makes components for public and private aerospace organizations and other critical sectors, including oil and gas. The intrusion has been attributed to an unnamed People's Republic of China team, whose motivation appears to be espionage and blueprint theft.

[...]

top 1 comments
sorted by: hot top controversial new old
[-] tal@lemmy.today 4 points 3 days ago

using an admin portal’s default credentials on an IBM AIX server.

I think that there are two ways to solve that.

The first is to have the admins actually complete setups.

But, humans being humans, maybe the second is a better approach:

When creating a computer system, don't let a system be used, at all, until all default credentials have been replaced with real ones. If you do, someone is invariably gonna screw it up.

Your directions may say "Before pulling lever 2, pull lever 1 so that machine does not explode". And maybe you feel that as the manufacturer, that's covered your hind end; you can say that the user ignored your setup instructions if they get into trouble. But instead of doing that, maybe it's better to not permit for a situation where the machine explodes in the first place; have pulling lever 2 also trigger lever 1.

this post was submitted on 23 Sep 2024
23 points (100.0% liked)

Technology

37608 readers
357 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS