Report: Massive Russian Hack Effort Breached DHS, State Department And NIH | Talking Points Memo

How about they can’t comprehend what the hell happened? And if the boss isn’t talking about it than neither are they?

2 Likes

I remember…and yet within 4 years the GOP went all in for Putin and screamed about ‘socialist, fascist, whatever’ loving Democrats. Consistency (or knowledge) is not their strong suit.

5 Likes
1 Like

Aw look at young Matthews Lillard and Broderick!

1 Like

I assume Trump will publicly kiss Putin’s ass and apologize for him before the day is out.

1 Like

So it looks the USA is now paying the price for Covid Donnie’s Russian assistance in his 2016 election.

5 Likes

Don’t hold your breath. I bet 80% will never make a connection from A -> B -> C.

7 Likes

Let the cyber wars began.
It’s not like we haven’t done the same thing in the past. Quite a number of years ago we infiltrated Russia’s entire computer system. Kaspersky said that a factory reset didn’t help in clearing the hard drives with a reset option because the virus penetrated the reset wall and reinstalled itself. In other words, our IC may have had a little help from MS.

1 Like

Actually, within two years: when Russia invaded Ukraine in 1994 the Republicans slobbered all over Putin, praising him as a real leader who gets things done. Rudy Giuliani gushed over Putin, and Sarah Palin swooned over how he wrestled bears and rode horses while Obama wore a bicycle helmet and mom jeans.

The Republicans have been flirting with authoritarianism long before Trump.

11 Likes

I’m not saying Matthew Broderick’s best days are in his past, I’m just sort of waiting for his older character parts to see if he still has it.

2 Likes

Maybe not in the literal sense, but there are reports he is considering granting a pardon for Edward Snowden and Julian Assange.

1 Like

I can’t help but feel this is the Mango Mussolini’s parting gift to Putin. Probably something he gave away in passing in one of tRump’s many private, non-secure and officially unrecorded conversations he had with Putin (and there have been many of those over the last four years). Putin probably figured out early how easy it was to dupe the Dotard into revealing stuff he was never supposed to share.

In any case, someone seems to have left the backdoor open.

4 Likes

It was either a gift from Trump, or Putin having his way with the lame duck.

No one around the world is afraid of Trump anymore, and his White House is now the political equivalent of edible panties, with many getting in their licks.

sorry for that visual.

2 Likes

I wonder if to some extent this was not an inside job where at least to some extent the Russians got help.

On another note it is my understanding that before leaving office Trump must meet with Putin to receive his final job performance review.

2 Likes

So, IS IT a coincidence that this happened now that Chris Krebs is no longer at CISA?

Asking for a country…:roll_eyes:

1 Like

This was a nasty (but brilliant) attack vector. From what I can see, a high profile cyber security firm (FireEye) only discovered the back door in Solarwinds software (probably Orion) after their own forensic toolkit got grabbed by the hackers.

5 Likes

Wow, thats kinda scary. :flushed:

So the hackers DID get the toolkit?!?:confused:

1 Like

Response from the “America First” GOP:

5 Likes

Yep.

https://www.bloomberg.com/amp/news/articles/2020-12-15/fireeye-stumbled-across-solarwinds-breach-while-probing-own-hack

1 Like

This has been ongoing for at least 9 months. Which means – if you read about how long it takes people to craft that kind of attack – likely a year or more. It’s likely not connected to anything other than the general incompetence of the trump administration.

Depending on how the patches are/were structured and distributed, the process might have been relatively simple once the attackers had access to Solarwind’s network. If you’re replacing/adding/subtracting entire files at a time, you just add your hostile file(s) to the directory where things get packaged up and let the packaging/signing process do its thing. If the patches are in the form of changes to particular locations in particular existing files, then you have either know the code intimately to insert your bits in the right place, or compromise the source code so that your stuff gets compiled in automatically. (And possibly compromise source checking setups.)

3 Likes