Welcome to City-Data.com Forum!
U.S. CitiesCity-Data Forum Index
Go Back   City-Data Forum > General Forums > Science and Technology > Internet
 [Register]
Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
View detailed profile (Advanced) or search
site with Google Custom Search

Search Forums  (Advanced)
 
Old 10-14-2020, 11:56 AM
 
20,757 posts, read 8,579,752 times
Reputation: 14393

Advertisements

It's Greek to me. Can you spot anything shady or that makes no sense? Potential problems?


https://us-cert.cisa.gov/ncas/alerts/aa20-283a
Reply With Quote Quick reply to this message

 
Old 10-14-2020, 12:57 PM
 
Location: McAllen, TX
5,947 posts, read 5,479,098 times
Reputation: 6747
Quote:
Originally Posted by PilgrimsProgress View Post
It's Greek to me. Can you spot anything shady or that makes no sense? Potential problems?


https://us-cert.cisa.gov/ncas/alerts/aa20-283a
Quote:
CISA has recently observed advanced persistent threat (APT) actors exploiting multiple legacy vulnerabilities in combination with a newer privilege escalation vulnerability—CVE-2020-1472—in Windows Netlogon. The commonly used tactic, known as vulnerability chaining, exploits multiple vulnerabilities in the course of a single intrusion to compromise a network or application.

This recent malicious activity has often, but not exclusively, been directed at federal and state, local, tribal, and territorial (SLTT) government networks. Although it does not appear these targets are being selected because of their proximity to elections information, there may be some risk to elections information housed on government networks.

CISA is aware of some instances where this activity resulted in unauthorized access to elections support systems; however, CISA has no evidence to date that integrity of elections data has been compromised.
There are steps that election officials, their supporting SLTT IT staff, and vendors can take to help defend against this malicious cyber activity.
It's up to the appropriate people to take action to protect their systems and our election support systems, as they put it. Just in case...

It's difficult for these "foreign players" to have a direct impact on the vote, as in changing voting outcomes (we hope). They can and have been trying to influence voters in other ways, through indirect means. We just have to be smart enough to recognize it and block it out.

Much to do about nothing as far as we are concerned.
Reply With Quote Quick reply to this message
 
Old 10-14-2020, 02:06 PM
 
Location: Berkeley Neighborhood, Denver, CO USA
17,710 posts, read 29,829,274 times
Reputation: 33301
I have no concerns about voting and accurate results in Colorado.
Every ballot is paper.
Every county counts separately.
Government at all levels is competent.
Reply With Quote Quick reply to this message
 
Old 10-14-2020, 05:18 PM
 
23,601 posts, read 70,425,146 times
Reputation: 49275
Yawn.
Reply With Quote Quick reply to this message
 
Old 10-19-2020, 10:42 AM
 
2 posts, read 613 times
Reputation: 12
I think the thing that bothers me the most about this is that the government has made an effort to move towards digital processing of a great deal of things internally, but don't want to commit to keeping them up to date. There's still a ton of paper stuff going on, but there is a significant amount of digital processing happening now, and that isn't going to change.

That being said, What is in that article is nothing new to internet facing systems. every single internet facing system with a unique IP address or an access point receives something between 100 and 5000 lock checks per day from automated software that is looking for a variety of conditions to exploit.

If these computers aren't patched regularly with security updates, they WILL be accessed by people who don't have permission to look at or modify the computers or their data. That is a simple fact of operating in a computerized industry.

That article talked about these attacks as leveraging 'Legacy' exploits, which is the language you'd use if these computers had not been receiving regular maintenance.

That article goes on on provide instructions for migrating the computers to a secured network, but goes on to say that you must change the passwords for the accounts that are being accessed on these computers, why? Because some of those computers WERE compromised by automated attacks that could have done anything at all, including sending an exact copy of the hard drives of these systems to a remote location for later analysis.

analysis which should provide a variety of things, like user accounts and passwords to things that people are going to be using on the new secured network, which means that the new secured network isn't really secure if that complete password reset doesn't happen first.

So I ask you-- If the people responsible for maintaining that network of computers aren't even applying software updates, what makes anyone think they are going to reset every single password on the system?

CO might be protected with an all paper system (insofar as you can trust the handlers of the paper, just like we try to trust the computers as handlers of data), but it doesn't matter - if Florida isn't, or Iowa isn't, or any of the other battleground states.

I think the problem is just that there either isn't enough money to keep these digital systems up to date and secure, or the people who make the decisions want them to be exposed and vulnerable.
Reply With Quote Quick reply to this message
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.

Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.


Reply
Please update this thread with any new information or opinions. This open thread is still read by thousands of people, so we encourage all additional points of view.

Quick Reply
Message:


Over $104,000 in prizes was already given out to active posters on our forum and additional giveaways are planned!

Go Back   City-Data Forum > General Forums > Science and Technology > Internet

All times are GMT -6. The time now is 02:20 AM.

© 2005-2024, Advameg, Inc. · Please obey Forum Rules · Terms of Use and Privacy Policy · Bug Bounty

City-Data.com - Contact Us - Archive 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37 - Top