Know the rules The Paceline Forum Builder's Spotlight


Go Back   The Paceline Forum > General Discussion

Reply
 
Thread Tools Display Modes
  #16  
Old 08-03-2020, 09:27 AM
NYCfixie NYCfixie is offline
Senior Member
 
Join Date: Dec 2015
Location: 10065
Posts: 932
Quote:
Originally Posted by GregL View Post
Many companies have robust training programs for employees to recognize these attacks. They generate internal phishing e-mails to test employees and ensure that they follow company policy for dealing with cyber attacks. Employees who fail to follow cyber security policy are subject to remedial training, poor performance reviews, and ultimately termination. There's too much at stake to not take these attacks seriously. And you are very correct, it's amazing how very knowledgeable persons still fall victim to these attacks. The attackers are very good at what they do.

Greg
What is this based on? From a report? From your own experience?

IME, there are very few (not many as you suggested) companies that do this type of broad and deep training and testing for non-IT employees. At-best, it is once a year or at time of hiring and thus simply not enough.
Reply With Quote
  #17  
Old 08-03-2020, 09:33 AM
GregL GregL is offline
Senior Member
 
Join Date: Dec 2004
Location: North Syracuse, NY
Posts: 3,578
Quote:
Originally Posted by NYCfixie View Post
What is this based on? From a report? From your own experience?

IME, there are very few (not many as you suggested) companies that do this type of broad and deep training and testing for non-IT employees. At-best, it is once a year or at time of hiring and thus simply not enough.
Based on personal experience. Note that I stated "many," not "most," "majority," etc... I can't and won't provide more details as it would be inappropriate. Just sharing my personal observations.

Greg
Reply With Quote
  #18  
Old 08-03-2020, 09:35 AM
NYCfixie NYCfixie is offline
Senior Member
 
Join Date: Dec 2015
Location: 10065
Posts: 932
Quote:
Originally Posted by GregL View Post
Based on personal experience. Note that I stated "many," not "most," "majority," etc... I can't and won't provide more details as it would be inappropriate. Just sharing my personal observations.

Greg
Fair enough.

Any chance I can get you to overnight me a sandwich from Brooklyn Pickle and some food from Dinosaur BBQ?
Reply With Quote
  #19  
Old 08-03-2020, 09:50 AM
Mark McM Mark McM is offline
Senior Member
 
Join Date: Jun 2006
Posts: 12,018
Quote:
Originally Posted by NYCfixie View Post
What is this based on? From a report? From your own experience?

IME, there are very few (not many as you suggested) companies that do this type of broad and deep training and testing for non-IT employees. At-best, it is once a year or at time of hiring and thus simply not enough.
At my company, employees who have access to the company's networks (which is pretty much everyone at my job site) have to take on-line security training at least once a year, and they send out fake phishing emails multiple times a year to test if the employees are on their toes.
Reply With Quote
  #20  
Old 08-03-2020, 09:57 AM
GregL GregL is offline
Senior Member
 
Join Date: Dec 2004
Location: North Syracuse, NY
Posts: 3,578
Quote:
Originally Posted by NYCfixie View Post
Fair enough.

Any chance I can get you to overnight me a sandwich from Brooklyn Pickle and some food from Dinosaur BBQ?
Now that is a great idea! The beauty of living in Sibera-cuse is that I am literally 5 minutes from either of those fine establishments. I'll politely counter your offer with one of my own: if you visit CNY, hit me up for a ride and post-ride meal! The riding in CNY and the adjacent Finger Lakes is truly world class. Miles of quiet country roads, wide shoulders, and great food and beverage options. There's also some good gravel riding options within a reasonable drive.

Greg
Reply With Quote
  #21  
Old 08-03-2020, 10:08 AM
kppolich's Avatar
kppolich kppolich is offline
SageOfMilwaukee
 
Join Date: Dec 2013
Location: Eastern Iowa
Posts: 5,561
Quote:
Originally Posted by Mark McM View Post
At my company, employees who have access to the company's networks (which is pretty much everyone at my job site) have to take on-line security training at least once a year, and they send out fake phishing emails multiple times a year to test if the employees are on their toes.
Every tech company I have worked at these trainings have been mandatory for all employees, not just for those with exclusive network access. I've been doing digital project management stuff for a while now and dealt with large clients like Wells Fargo, Phizer, etc and I'm still never surprised by anything that comes across my desk. Reason: Marketing gets the budget, IT gets the scraps.
Reply With Quote
  #22  
Old 08-03-2020, 10:10 AM
dem dem is offline
Senior Member
 
Join Date: Apr 2013
Location: Santa Cruz Foothills
Posts: 761
Interestingly the group that hacked Garmin is on the US terrorist list. Giving a terrorist group $10M is a pretty big no-no.

I was also amused the hack only received 6 words on Garmin's earnings phone call on the 29th.
Reply With Quote
  #23  
Old 08-03-2020, 10:10 AM
mcteague's Avatar
mcteague mcteague is offline
Senior Member
 
Join Date: Oct 2005
Location: Maryland, USA
Posts: 3,117
Quote:
Originally Posted by unterhausen View Post
My understanding is that it infects the backups. The process is to gain admin level control first, generally through social engineering.
There is no way for it to hit off-site backups. They are off the network. Delete the affected files, make sure updates are run and the malware is gone and then restore the files. As in our case quite a few PCs needed to be reimaged anyway.

Tim
Reply With Quote
  #24  
Old 08-03-2020, 10:13 AM
benb benb is offline
Senior Member
 
Join Date: Apr 2007
Location: Eastern MA
Posts: 9,862
These articles are fun but as I said in the other threads they are just wild fun speculation from cycling journalists with little knowledge of computer systems or networks.

As an engineer working in software security these articles don't convince me of anything. It's all speculation with zero revealed sources or primary source information.

Wasted Locker can't take down a whole organization like this.

It doesn't take down Garmin's phone systems. It's not going to take down a data center that doesn't run on Windows. It's not going to affect the machines that are Macs and we know Garmin has some of those. It would have 0 effect on Connect if Connect was running in the cloud on a non-windows setup (which is almost everything). Amazingly the comments on these articles often have people pretending Wasted Locker could go into AWS or another cloud platform and erase the backups, etc...

It's a Windows thing.

Most of the non-tech people where I work have Windows machines and if they weren't patched/managed well one of them could click on these phishing type scams and get something like Wasted Locker introduced into the system.

But Wasted Locker could never cause this level of damage and shut down.. it might spread through some of the department's windows machines where the initial infection happened.

It's not going to do a damn thing to phone systems or non-windows development systems or non-windows servers running on the other side of firewalls. It's not going to take out routers or any of these other things.

Garmin had so much damage & so many things shutdown this story just doesn't sound legit to me it could be a piece of what happened but not the whole thing. And it keeps being reported this way by Cycling journalists with no inside sources.

This isn't even the same story that was unfolding when I went and started reading the twitter threads about it.

Even the windows machines.. if you don't build the whole network in a completely windows way that's completely incompetent you can just wipe all these machines and reimage them and lose almost nothing.

My employer can erase my workstation today and we'd lose almost nothing. It'd take me a day or two to set everything back up to get productive again but there would be no need to pay the ransom.

Last edited by benb; 08-03-2020 at 10:26 AM.
Reply With Quote
  #25  
Old 08-03-2020, 10:14 AM
Red Tornado's Avatar
Red Tornado Red Tornado is offline
Senior Member
 
Join Date: Jun 2014
Location: CenTex
Posts: 1,148
Quote:
Originally Posted by Mark McM View Post
At my company, employees who have access to the company's networks (which is pretty much everyone at my job site) have to take on-line security training at least once a year, and they send out fake phishing emails multiple times a year to test if the employees are on their toes.
Same here.
Reply With Quote
  #26  
Old 08-03-2020, 10:18 AM
buddybikes buddybikes is offline
Senior Member
 
Join Date: Jan 2013
Location: Northeast USA
Posts: 4,036
What the heck is our NSA doing? This is such massive exposure to US companies (Garmin is a large MIL provider and of course airlines). Just firing a bunch a people and setting up new corporate policies won't work - all they need is one key in.

This 100% agree!

Since, we've spend a large sum trying to keep our system free from outside hacking. Nearly every consultant we've engaged has said there's little way to fully prevent it, and it's better to put resources into developing a parallel system and backing up data frequently. Given hacks of Twitter, Facebook and even Garmin, it seems they're correct, that no system is impenetrable.
Reply With Quote
  #27  
Old 08-03-2020, 10:28 AM
dem dem is offline
Senior Member
 
Join Date: Apr 2013
Location: Santa Cruz Foothills
Posts: 761
US regulators are hilariously underfunded and have no teeth, and have tons of "private" partnerships for governance and auditing. Very much like the Credit Agencies during the 2008 financial crisis and garbage mortgage securities.

European regulators are much more serious. I would trust a european entity over an american any day.

Also: Training is pointless and merely there as a CYA for the company. Limited span of control, minimizing blast radius, separation of duties, extreme access control at all layers and assuming all actors are bad actors (including your own employees) is the only way to secure things. 99% of companies don't operate like this - it is expensive, it is hard, and if you're a legacy company nearly impossible to retrofit.

As someone said earlier.. cost/benefit is "risk a piddly $10M cyber attack, or spend a hundred million plus give up $x earnings-per-share forever" - 9 times out of 10, executives are gonna go with the near term stock price.
Reply With Quote
  #28  
Old 08-03-2020, 10:29 AM
benb benb is offline
Senior Member
 
Join Date: Apr 2007
Location: Eastern MA
Posts: 9,862
Also keep in mind every website in the chain you follow reading these stories is ad driven, including the security blogs.
Reply With Quote
  #29  
Old 08-03-2020, 10:33 AM
benb benb is offline
Senior Member
 
Join Date: Apr 2007
Location: Eastern MA
Posts: 9,862
Quote:
Originally Posted by steveandbarb1 View Post
Given hacks of Twitter, Facebook and even Garmin, it seems they're correct, that no system is impenetrable.
There's been almost no other hacks like this Garmin one... Twitter & Facebook have never been hacked like this.

The amount of downtime/damage Garmin had here is more like the NSA + IDF attacking the Iranian nuclear program.

To take everything down including phone systems, data centers, servers, etc, etc.. it would have taken a multi-prong approach that was way more sophisticated.

The only way it was just Wasted Locker is if Garmin's setup is so incompetent & homogenous it's unimaginable to me.

Other possibilities would be Garmin lying about some of the effects, like their phones were fine the whole time and they were just lying cause they didn't want anyone calling.

It is way more plausible they just shut everything down and did a large & time consuming restoration from backup than it is that the only solution was paying the ransom.
Reply With Quote
  #30  
Old 08-03-2020, 10:35 AM
FlashUNC FlashUNC is offline
Senior Member
 
Join Date: Apr 2008
Location: Berkeley, CA
Posts: 14,452
Quote:
Originally Posted by benb View Post
There's been almost no other hacks like this Garmin one... Twitter & Facebook have never been hacked like this.

The amount of downtime/damage Garmin had here is more like the NSA + IDF attacking the Iranian nuclear program.

To take everything down including phone systems, data centers, servers, etc, etc.. it would have taken a multi-prong approach that was way more sophisticated.

The only way it was just Wasted Locker is if Garmin's setup is so incompetent & homogenous it's unimaginable to me.
After using Garmin's software for years as an end-user (Hello Garmin Connect) I can absolutely believe their back-end IT was similarly awful. If what they put in front of paying customers was garbage, I can only imagine what their in-house stuff was like.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 03:45 AM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.