Hackers may have bitten off too much

Hackers may have bitten off too much

Author
Discussion

Pistom

Original Poster:

5,590 posts

166 months

Monday 2nd October 2023
quotequote all
Hackers are said to have taken hold of data from Johnson Controls but it turns out that Johnsons are involved with systems for state and federal buildings.

I wouldn't like to be on either side of this - or stuck in the middle!!

https://www.bitdefender.com/blog/hotforsecurity/ra...

Gareth79

8,045 posts

253 months

Monday 2nd October 2023
quotequote all
Pretty sure they work on UK government stuff too, as well as large businesses here.

Pistom

Original Poster:

5,590 posts

166 months

Monday 2nd October 2023
quotequote all
You can be sure they do.

I'm amazed they've got themsleves into this pickle, am interested to see how it plays out but furthermore together with how it will impact the business going forward.

I wonder if they hackers realised what they were getting into?

markbigears

2,343 posts

276 months

Monday 2nd October 2023
quotequote all
I know they were a provider for the BBC a while ago

Gecko1978

10,475 posts

164 months

Monday 2nd October 2023
quotequote all
I doubt the hackers care they just want the money. Whether they get to enjoy it is a different matter

rodericb

7,269 posts

133 months

Tuesday 3rd October 2023
quotequote all
Yeah I'm sure they're quaking in their boots.

grumbledoak

31,855 posts

240 months

Tuesday 3rd October 2023
quotequote all
"bitten off more than they can chew"? I doubt it. I imagine they are pretty confident of their anonymity and looking forward to payment of the ransom.

We are not living in a William Gibson novel yet. These corps do not have access to world-wide augmented mercs to get revenge.

No ideas for a name

2,408 posts

93 months

Tuesday 3rd October 2023
quotequote all
Pistom said:
I'm amazed they've got themsleves into this pickle, am interested to see how it plays out but furthermore together with how it will impact the business going forward.

I wonder if they hackers realised what they were getting into?
It (ransomware attacks) are much more complex than it first appears.
Simplistically, It should be possible to go back to a backup made before the attack.
I realise there won't be a single backup, in a single location as it is a global distributed business - but, theoretically possible.

The problem is that the ransomware usually runs in two phases.
First it exports data which is stored on the intruder's system.
Second it lies dormant possibly for months and then performs the encryption - it is only at the point that the target knows they have been hacked.
So again simplistically, it is very difficult to wind back to a point where both the data is not encrypted, and also the dormant encryption agents aren't also restored.

Payday #1 is asking for cash to decrypt the data.
Payday #2 is leaking the data captured on day 1, before the encryption.
Payday 2 can also be using the captured data to compromise other systems.

It can actually be quite easy to compromise some systems. People are usually the weekness.

As to whether the hackers will be worried about being detected - no, not at all. Pretty well untraceable - and quite possibly located in Russia who isn't going to help anyone.


dxg

8,792 posts

267 months

Tuesday 3rd October 2023
quotequote all
They wrote the infotainment software for Mazda, if we're looking for a PH angle.

Pistom

Original Poster:

5,590 posts

166 months

Tuesday 3rd October 2023
quotequote all
Interesting to read comments from those who understand how this things are implemented.



Greenmantle

1,475 posts

115 months

Tuesday 3rd October 2023
quotequote all
25TB of data is a whopping amount of data.

its taken 8 days for me to transfer 5TB of data across a gigabyte switch from one NAS to another.
so unless they had 40 days of unfettered access and then as many days to encrypt the data at the source without anyone noticing then I would question the validity.

Its like the plot in Goldfinger. He wasn't out to steal the gold just make it unusable.

Hacking is about being believed. Tell a whopper that certain people in the know don't believe then your credibility as a hacker plummets and so does your demands.

untakenname

5,052 posts

199 months

Tuesday 3rd October 2023
quotequote all

If that's taken you over a week to move 5TB then that's an average rate of less than 6 MB/s!

For most modern large companies 25TB wouldn't be noticeable in these days of SaaS, that amount could be done overnight.

anonymous-user

61 months

Tuesday 3rd October 2023
quotequote all
Greenmantle said:
25TB of data is a whopping amount of data.

its taken 8 days for me to transfer 5TB of data across a gigabyte switch from one NAS to another.
so unless they had 40 days of unfettered access and then as many days to encrypt the data at the source without anyone noticing then I would question the validity.

Its like the plot in Goldfinger. He wasn't out to steal the gold just make it unusable.

Hacking is about being believed. Tell a whopper that certain people in the know don't believe then your credibility as a hacker plummets and so does your demands.
I'd get the IT guy in.

Flooble

5,571 posts

107 months

Tuesday 3rd October 2023
quotequote all
If it was already in the "cloud" then they may have already had access to an ExpressRoute or similar - 10Gbps is available, with 100Gbps in some places.

At those speeds, 25Tb transfer isn't too bad. And that assumes no other form of exploit was used.

No ideas for a name

2,408 posts

93 months

Tuesday 3rd October 2023
quotequote all
As far as I am aware, at least some of the issue was a compromise of VMWare servers. You can take down entire (virtual) servers in a single command. Once it is down, you can encrypt in the background. Servers can be down, the company know about it, but the attack still happening in the background.

There is a trick to moving large amounts of data - as already mentioned, it may have already been off-site in the way of backups.
It is better to copy data slowly over a large time span as this might not trigger intrusion detection software.

Smaller scale, but I get traffic graphs from some of my sites and can spot outgoing traffic pegged at maximum bandwidth. Usually a simple email issue, but can react to that and shut it down. If I was seeing a lower level for a longer time it is harder to spot.

Probably a large transfer just 'looks like' an off-site backup.
'Quality' hacks will probably vary that data rate so it doesn't trigger also.
It is possible to spoof IP addresses too, so far than simple to spot it going to the wrong place.

You can get compromised as easily as by sending someone inside the organisation a USB stick. Make it attractive to them to plug in (some reward, or something they are interested in) and you can have software that will then tunnel back out and give the hacker 'inside' access.



pquinn

7,167 posts

53 months

Tuesday 3rd October 2023
quotequote all
No ideas for a name said:
Smaller scale, but I get traffic graphs from some of my sites and can spot outgoing traffic pegged at maximum bandwidth. Usually a simple email issue, but can react to that and shut it down.
I remember the one time I managed to trigger a response from the very expensive cybersecurity apparatus as implemented by a large multinational that sells this stuff to many other people.

Query comes in - 'it looks like you uploaded XXXX gigabytes to somewhere external at this time & date'; not a surprise someone noticed something, it was a hefty transfer.

Never heard back again after pointing out it was a *download* of data (from a very trusted source) & the time it happened was a few hours out from when they asked about (I had full logs of what/when/where) - basically their monitoring setup was all sorts of fked and telling stories.

bigandclever

13,949 posts

245 months

Tuesday 3rd October 2023
quotequote all
Greenmantle said:
25TB of data is a whopping amount of data.

its taken 8 days for me to transfer 5TB of data across a gigabyte switch from one NAS to another.
Try plugging it in laugh

Harpoon

1,983 posts

221 months

Tuesday 3rd October 2023
quotequote all
No ideas for a name said:
You can get compromised as easily as by sending someone inside the organisation a USB stick. Make it attractive to them to plug in (some reward, or something they are interested in) and you can have software that will then tunnel back out and give the hacker 'inside' access.
It doesn't even need to be / look like a USB memory stick these days. What can look to be a (working) USB charging cable can have a chip inside which can deliver malware, so leave a few in a coffee shops, trade shows etc and people will pick them up or borrow them. The really clever ones don't show us a storage device either, so aren't always blocked by endpoint controls / restrictions.

Rusty Old-Banger

4,948 posts

220 months

Tuesday 3rd October 2023
quotequote all
Greenmantle said:
its taken 8 days for me to transfer 5TB of data across a gigabyte switch from one NAS to another.
Alright Morpheus, calm down


DeejRC

6,482 posts

89 months

Tuesday 3rd October 2023
quotequote all
It’s a pen testers of the world unite conference in here today isn’t it? tongue out