Know the rules The Paceline Forum Builder's Spotlight


Go Back   The Paceline Forum > General Discussion

Reply
 
Thread Tools Display Modes
  #1  
Old 03-19-2024, 10:37 AM
Latestart Latestart is offline
LateStart
 
Join Date: Mar 2015
Location: Seattle, WA
Posts: 522
OT: Replace your old Internet Routers/Devices

https://podcasts.apple.com/us/podcas...=1000649684078

Great podcast about how the Chinese ran a botnet using old networking and security equipment.

Good reminder that once devices are out of security updates they can work but be insecure.

TL;DR:

Last May, Microsoft announced that a Chinese state-sponsored hacking group, Volt Typhoon, appeared to be targeting U.S. critical infrastructure and entities abroad in part through establishing a presence in a malware-infected network, or botnet, consisting of old devices located in the United States. At the end of January, the Justice Department announced it had removed the botnet from hundreds of American devices.

Cybersecurity experts Timothy Edgar and Paul Rosenzweig both wrote articles for Lawfare discussing the Volt Typhoon intrusion and the U.S. response. But the authors take away very different lessons from the intrusion. Edgar argued that although the removal of the botnet was a success in terms of cybersecurity, the legal theory the government relied on for conducting this operation has dangerous privacy implications. Rosenzweig, on the other hand, contended that the Volt Typhoon breach illuminates flawed assumptions at the core of the U.S. cybersecurity strategy, which he says must be reexamined.

Lawfare Research Fellow Matt Gluck spoke with Edgar and Rosenzweig about why the Volt Typhoon intrusion and the U.S. response that followed matter for the future of U.S. cybersecurity and privacy, how the government should weigh security and privacy when responding to cyber intrusions, whether nuclear conflict is a good analogy for cyber conflict, and much more.
__________________
On the bike > not on the bike

Last edited by Latestart; 03-19-2024 at 11:02 AM.
Reply With Quote
  #2  
Old 03-19-2024, 10:51 AM
paredown's Avatar
paredown paredown is offline
Senior Member
 
Join Date: Nov 2011
Location: New York Hudson Valley
Posts: 4,442
Quote:
Originally Posted by Latestart View Post
https://podcasts.apple.com/us/podcas...=1000649684078

Great podcast about how the Chinese ran a botnet using old networking and security equipment.

Good reminder that once devices are out of security updates they can works but be insecure.

TL;DR:

Last May, Microsoft announced that a Chinese state-sponsored hacking group, Volt Typhoon, appeared to be targeting U.S. critical infrastructure and entities abroad in part through establishing a presence in a malware-infected network, or botnet, consisting of old devices located in the United States. At the end of January, the Justice Department announced it had removed the botnet from hundreds of American devices.

Cybersecurity experts Timothy Edgar and Paul Rosenzweig both wrote articles for Lawfare discussing the Volt Typhoon intrusion and the U.S. response. But the authors take away very different lessons from the intrusion. Edgar argued that although the removal of the botnet was a success in terms of cybersecurity, the legal theory the government relied on for conducting this operation has dangerous privacy implications. Rosenzweig, on the other hand, contended that the Volt Typhoon breach illuminates flawed assumptions at the core of the U.S. cybersecurity strategy, which he says must be reexamined.

Lawfare Research Fellow Matt Gluck spoke with Edgar and Rosenzweig about why the Volt Typhoon intrusion and the U.S. response that followed matter for the future of U.S. cybersecurity and privacy, how the government should weigh security and privacy when responding to cyber intrusions, whether nuclear conflict is a good analogy for cyber conflict, and much more.
Thanks for the heads up--I'm a big Lawfare fan, so I will go look for this.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 12:12 PM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.