State of Nevada Cyberattack

I’ve heard tech bros I know talk about huge companies still running windows 98 systems. Probably not a big deal to get in to that these days. Also the amount of morons who will plug in found thumb drives or open links in spam emails is too damn high
 
Last edited:
The FCC's been working on/pushing some major standardized cybersecurity requirements for the past few years for IoT, CUI, and some other stuff.

Guess what's still a bureaucratic mashup of dog shit, monkey shit, and retard shit, with a bit of horse shit sprinkled on for flavor, that no one knows what to do with?
 
  • Like
Reactions: Modoc
Public sector IT is horrible. To make it even worse the laws are written and enforced by them so they get all kinds of free passes to do wildly stupid shit that would result in biblical fines or jail time if the things they do were committed by an entity in the private sector.

The average time that an attacker is present in compromised systems usually hovers around 200 days. So the timing isn't really indicative of the State being more incompetent than usual. Also, every attack is always performed by a "sophisticated and well resourced attacker". Nobody wants to admit they got wrecked by a handful of marginally intelligent script kiddies who took advantage of the targets being cheap and not giving a fuck about cybersecurity.
 
Public sector IT is horrible. To make it even worse the laws are written and enforced by them so they get all kinds of free passes to do wildly stupid shit that would result in biblical fines or jail time if the things they do were committed by an entity in the private sector.

The average time that an attacker is present in compromised systems usually hovers around 200 days. So the timing isn't really indicative of the State being more incompetent than usual. Also, every attack is always performed by a "sophisticated and well resourced attacker". Nobody wants to admit they got wrecked by a handful of marginally intelligent script kiddies who took advantage of the targets being cheap and not giving a fuck about cybersecurity.
I listened to a podcast that the guy deals with ransom attacks and the upwards of millions these kids get out of companies is insane. The best is when the negotiate down only for others in the group to demand money repeatedly and they return 6 months later
 
Last edited:
I listened to a podcast that the guy deals with random attacks and the upwards of millions these kids get out of companies is insane. The best is when the negotiate down only for others in the group to demand money repeatedly and they return 6 months later
Imagine how surreal it is to have to go to the C-Suite and tell them that you need to buy $10 Million in Monero and then send it to parties unknown on the uncertain promise that your going to get the decrypt key for your locked files. Not only do you have the potential for US Criminal law violations there, there isn't any guarantee that you'll get the right key or that you won't get hit again immediately. Better yet, there could be multiple independent attackers in your systems at the same time.

There is a reason that most CISO positions have fairly high turnover.
 
  • Like
Reactions: akmike47