Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Microsoft says Chinese hackers breached email, including U.S. government agencies
NPR ^ | 7/12/2023 | Jenna McLaughlin

Posted on 07/12/2023 7:59:45 AM PDT by Right Wing Vegan

click here to read article


Navigation: use the links below to view more comments.
first 1-2021 next last

1 posted on 07/12/2023 7:59:45 AM PDT by Right Wing Vegan
[ Post Reply | Private Reply | View Replies]

To: Right Wing Vegan

At this point you can assume that China and Russia have people working at the big tech companies and the data is being pipelined along with the NSA.


2 posted on 07/12/2023 8:08:45 AM PDT by jdt1138 (Where ever you go, there you are.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Right Wing Vegan

At what point will Microsoft be viewed as the national security risk that it is? What would have to happen? (Haven’t such things already happened?)


3 posted on 07/12/2023 8:10:30 AM PDT by coloradan (They're not the mainstream media, they're the gaslight media. It's what they do. )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Right Wing Vegan
Cheyna, while you're at it can you see what's on Hunter's laptop?


4 posted on 07/12/2023 8:14:49 AM PDT by Tell It Right (1st Thessalonians 5:21 -- Put everything to the test, hold fast to that which is true.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Right Wing Vegan

A POTUS should make an executive order instructing all U.S. agencies to move all government cyber operations and data off of private companies cloud systems, establish and protect their own.


5 posted on 07/12/2023 8:25:39 AM PDT by Wuli
[ Post Reply | Private Reply | To 1 | View Replies]

To: Right Wing Vegan

Bkmk


6 posted on 07/12/2023 8:26:32 AM PDT by sauropod (Sun Tzu: “The supreme art of war is to subdue the enemy without fighting”)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wuli

No,that makes too much sense.


7 posted on 07/12/2023 8:58:50 AM PDT by Bigg Red (Trump will be sworn in under a shower of confetti made from the tattered remains of the Rat Party.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Right Wing Vegan

**U.S. government safeguards** identified an intrusion in Microsoft’s cloud security.

Yeah that’s the ticket the Chinese did it.


8 posted on 07/12/2023 9:05:43 AM PDT by Vaduz (....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wuli

As long as one is using the Internet, stolen credentials will ALWAYS be an issue, no matter who manages security.

The issue is packets going through routers and connections between third parties that cannot be managed by first parties.

There are no systems using TCPIP on the internet that doesn’t use credentials (user-name, password, and alternate measures-phone, text, call, secret questions, whatever). While these systems are better than just username/password, they can be spoofed.

https://www.computer.org/publications/tech-news/trends/what-is-modern-authentication

Cloud-based systems are better for security—they have more, not less protection, 24/7 HUMAN monitoring of systems and expert groups of thousands that can mitigate and stop attacks.

Having been in the military for 22 years doing cyber security and communications system (Univac, PDP/Vax Ultrix, TCPIP) worked on DDN, then MilNet, and Internet I can tell you there are very few at the working DOD level who do better security—unless the systems are unplugged. I then spent the next 26 years as an MCT and CompTIA instructor.

The problem with unplugged (meaning non-routed communications cut off from Internet TCPIP processing) is the need so many have—even government—to connect to third party customers, clients, data sources and even the public citizen.

The government has separately routed systems that use TCPIP but are not connected to the public Internet for classified communications/processing. But I have seen people put a SIPRNet connection on a server plugged in to the public network. Only a government worker (or contractor at a gov facility) can do this level of FUBAR.


9 posted on 07/12/2023 9:09:22 AM PDT by Alas Babylon! (Repeal the Patriot Act; Abolish the DHS; reform FBI top to bottom!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Alas Babylon!

“As long as one is using the Internet, stolen credentials will ALWAYS be an issue, no matter who manages security.”

I worked for a major global corporation, consulting for/with them. Everything internal was behind a firewall on their own systems inside what is called an Intranet - use of everything that can be done “Internet” style, but dedicated on a closed corporate system.

Outside access to the “world wide web” was restrticted first based on a users security and then the user had to log out of their Intranet and go through their coporate VPN to use a restricted dedicated “outside-the-company” access using communications lines walled off from everything inside the company. The later method was constanly being tested by their global cyber security experts to detect holes in the “outside” connectability that could let intruders come in via that route. Our government agencies can all do the same thing, they most often need a secure Intranet more than the “world wide web” and with a firewall between the two they can monitor and prevent “back door” cyber access. In some situations more than one agency (like the DOJ and its FPI dept, or Treassury and IRS) could share an Intranet system.


10 posted on 07/12/2023 9:34:41 AM PDT by Wuli
[ Post Reply | Private Reply | To 9 | View Replies]

To: Wuli
The later method was constanly being tested by their global cyber security experts to detect holes in the “outside” connectability that could let intruders come in via that route.

That was my point, as this is exactly what the big cloud vendors are doing, but on a massive scale.

Not just a few, or even a dozen global security experts, but thousands. No other single company has more of these experts than Microsoft--as much as people hate them, they're real specialty is business services.

But do understand how packets work. They still hit the firewall, and can be wrapped in http/https/smtp and other normally allowed protocols. The point of compromise is those allowed packets. They can then be used to authenticate a compromised account or simply inject code or stop normal service.

There is no foolproof firewall on the Internet. The only way to completely protect is to unplug it.

And don't trust big government. More than half of the attacks going on at any moment are being committed by big governments.

11 posted on 07/12/2023 10:00:13 AM PDT by Alas Babylon! (Repeal the Patriot Act; Abolish the DHS; reform FBI top to bottom!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Alas Babylon!

“That was my point, as this is exactly what the big cloud vendors are doing, but on a massive scale.”

I don’t trust them and I want govt to host its own systems and to fire folks when they fail to keep it secure.

“But do understand how packets work. They still hit the firewall, and can be wrapped in http/https/smtp and other normally allowed protocols. “

We understood that and no packets passed accross the Internet-Intranet barriers without being “unwrapped” and deconstructed contents inspected in multiple ways.


12 posted on 07/12/2023 10:15:26 AM PDT by Wuli
[ Post Reply | Private Reply | To 11 | View Replies]

To: Alas Babylon!

“There is no foolproof firewall on the Internet. The only way to completely protect is to unplug it.”

Yes. And that is why they ran totally separate VPN comm lines, globally, for the Intranet and Internet access and the “bridge” between them, anywhwre in the company, comprised 90% of the cyber security effort. Also, having the Inranet and restricted Internet access minimized that traffic as well.


13 posted on 07/12/2023 10:19:32 AM PDT by Wuli
[ Post Reply | Private Reply | To 11 | View Replies]

To: Wuli

Good. Again, these are services and practice that are always applied to you by the cloud vendor.

We’re not really disagree on the actual way the stuff works, just who has the most resources to provide it.

The Air Force doesn’t make its own airplanes, those are contracted out to vendors. Same with all manner of government data and communications systems.

For getting you critical and sensitive communications OFF the internet, you can also use ExpressRoute with Azure.

ExpressRoute enables you to extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider. This connection is private. Traffic doesn’t go over the internet. With ExpressRoute, you can establish connections to Microsoft cloud services, such as Microsoft Azure, Microsoft 365, and Dynamics 365.

This is NOT a routed (using TCPIP) connection. It relies on a third party—through a commercial communications provider—usually fiber from a business’s demarcation point to Microsoft’s physical internal network.

https://learn.microsoft.com/en-us/azure/expressroute/expressroute-introduction


14 posted on 07/12/2023 10:33:08 AM PDT by Alas Babylon! (Repeal the Patriot Act; Abolish the DHS; reform FBI top to bottom!)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Wuli
I don’t trust them and I want govt to host its own systems and to fire folks when they fail to keep it secure.

We don't even fire--or punish--high-ranking FBI government employees when they deliberately lie on a FISA court warrant, commit provable election fraud, or lie about gain-of-function experiments and duplicity with Enemy China that killed millions of people globally...

Do not trust the government, and less so than even a woke company.

15 posted on 07/12/2023 10:39:14 AM PDT by Alas Babylon! (Repeal the Patriot Act; Abolish the DHS; reform FBI top to bottom!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Alas Babylon!

“The Air Force doesn’t make its own airplanes, those are contracted out to vendors. Same with all manner of government data and communications systems.”

We always divide the ideas of buying things we can use from “services”. and our philosphy on services is - especially if you are the government - you can buy the equipment you need AND you can HIRE the talent to run the equipment, and that combination allows you to control and secure the security of that equipment yourself.

The idea that the “cloud” is inherently bigger and therefor can afford and perform services “better” than the U.S. government misunderstands (1) how massive the federal government is and (2) once you reach a certain internal scale of things “outside” is not more affordable than inside.


16 posted on 07/12/2023 10:42:31 AM PDT by Wuli
[ Post Reply | Private Reply | To 14 | View Replies]

To: Wuli
The idea that the “cloud” is inherently bigger and therefor can afford and perform services “better” than the U.S. government misunderstands (1) how massive the federal government is and (2) once you reach a certain internal scale of things “outside” is not more affordable than inside.

Having been part of that massive federal government, I can say... Not so. I do not misunderstand them, but rather understand them too well.

The scales have fallen off my eyes. I still love my country, but not the bureaucrats and politicians currently running its government.

It's been a real hard pill to swallow, given how much of my life I dedicated to it.

Let's agree to disagree.

17 posted on 07/12/2023 10:53:43 AM PDT by Alas Babylon! (Repeal the Patriot Act; Abolish the DHS; reform FBI top to bottom!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Wuli; Alas Babylon!

...and then there are those Sandy Burger types.


18 posted on 07/12/2023 11:33:24 AM PDT by GingisK
[ Post Reply | Private Reply | To 16 | View Replies]

To: Right Wing Vegan

A short time ago, Bill Gates was in China. Now we are learning the Microsoft Cloud has been compromised. Does anyone else not believe in coincidences.


19 posted on 07/12/2023 11:35:18 AM PDT by MIchaelTArchangel
[ Post Reply | Private Reply | To 1 | View Replies]

To: Right Wing Vegan
The Wall Street Journal reports that the hackers, identified as “Storm-0558,” exploited a security
weakness in Microsoft’s cloud-computing environment to gain access to sensitive computerbr> networks.

Anyone thinking cloud based data is safe has their head in a cloud.

20 posted on 07/12/2023 4:15:09 PM PDT by chief lee runamok (Anti Socialist Flâneur@Large)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson