thewayne: (Default)
[personal profile] thewayne
SolarWinds provides network security appliances to corporations. And governments. And universities. These organizations depend on companies like SolarWinds because security is VERY hard and it helps to get outside help. You can take my word for it to a degree - I worked in IT for over three decades, and while I did not specifically work in computer/network security, I had enough exposure to it to understand what a huge, tiresome, endless, and thankless job it was. It was truly neverending. You never had enough money or resources, and you were always outnumbered by the baddies.

Now what happens when a company like SolarWinds gets hacked?

I guess the first thing to talk about would be the nature of the hack. Let's suppose an update that SolarWinds pushes out to all of their customers was compromised. Now, ALL of your customers are vulnerable to being infiltrated by the people who compromised SolarWinds.

Perhaps it was a nation-state who did it.

Perhaps Russia.

Let's take a look at who makes up SolarWinds customer list. Here's a listing from SolarWinds' web site:



Notice any familiar names there?

I thought not.

So basically, Russian hackers, some of which are largely synonymous with the Russian government, compromised pretty much the entirety of the United States Government. And the U.S. Military. And effectively the entirety of the S&P 500.

Yeah, and our President has poo-poohed Russian election interference and sucked up to Putin for how long?

https://krebsonsecurity.com/2020/12/u-s-treasury-commerce-depts-hacked-through-solarwinds-compromise/

https://www.schneier.com/blog/archives/2020/12/another-massive-russian-hack-of-us-government-networks.html

Date: 2020-12-16 04:11 am (UTC)
kathmandu: Snipped from a NASA picture of the Earth by night (Earthlights)
From: [personal profile] kathmandu
Yow, that's chutzpah.

Date: 2020-12-17 01:36 pm (UTC)
kraig: Salty+Zack (Default)
From: [personal profile] kraig
If you want to snoop your own traffic, there's cleaner ways to do it than hubs, which aren't really compatible with the environment you'd be likely to have at home in 2020. I don't know what your home internet is like, but here 150 meg down is pretty standard for cable connections now (I just upgraded to 500M). Your hub can likely do 100M max, and if you've got multiple devices connected to it, your speed is going to be severely affected as network traffic floods to each port.

Of course, something you already have can be better than a better solution you need to acquire, but for a bit under $100 Canadian I just ordered a Netgear 8 port switch with port mirroring and VLAN capabilities - model GS108PE-300NAS - for exactly that purpose, snooping my own traffic. That model has 4 POE ports because I wanted to play with a VOIP phone, but you could likely get the 5 port equivalent sans POE for about half that price.

Date: 2020-12-22 05:25 pm (UTC)
kraig: Salty+Zack (Default)
From: [personal profile] kraig
I think you're thinking of putting the network card on your monitoring server into promisc, hubs by design already flood traffic to every port, then your NIC will ignore any unicast traffic not directed to its address without PROMISC.

Date: 2020-12-23 08:15 pm (UTC)
kraig: Salty+Zack (Default)
From: [personal profile] kraig
Zeek (zeek.org) is fun to put on mirror ports. We made extensive use of this BC, but even with many people WFH and a lot not VPN'ing, it's still useful.

July 2025

S M T W T F S
   1 2345
67891011 12
13 1415 1617 18 19
2021 22 23242526
2728293031  

Most Popular Tags

Page Summary

Style Credit

Expand Cut Tags

No cut tags
Page generated Jul. 24th, 2025 01:47 pm
Powered by Dreamwidth Studios