Calvin Morrison on 4 Apr 2018 14:13:51 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] understanding Russian threats (was: Re: Massive Breach in Panera Bread)


I for one embrace our new russian overlords! I am actually learning
Russian on duolingo right now.

On 4 April 2018 at 17:03, brent timothy saner <brent.saner@gmail.com> wrote:
> On 04/04/2018 04:24 PM, george@georgesbasement.com wrote:
>> While the security breach revealed in this clearly documented discussion
>> is important to inform IT managers about the privacy risks to affected
>> individual accounts of blind usage of canned proprietary software, I've
>> been following another risk growing out of the Russian interference with
>> our 2016 election.
>>
>> This has been going on since September 2016 and continues to the present
>> day. The Russians are working on the logistics of attacking our entire
>> installed software base with the aim to control a massive shutdown of the
>> Internet by pushing a "Czar" button at the Troll farm ...
>>
>> They have been developing a technique of activating an arbitrarily large
>> number of compromised Russian-language websites worldwide from the Remote
>> Access Ports shared by a number (presently about two dozen) of Russian and
>> Seychelles-based servers controlled by a handful of actors. They now are
>> able to engineer the nearly simultaneous arrival of HEAD / HTTP requests
>> made by the numerous compromised Russian-language websites.
>>
>> Starting December 2017 and since they have apparently been escalating to
>> the
>> near-simultaneous sending of PORT requests to deliver compromised WordPress
>> applications, plugins, etc. to minimally protected WordPress installations
>> so as to compromise them or their servers.
>>
>> They're doing this to my webpage (anonymized on the 'Net) even though there
>> is no WordPress software on its server, but I presume that the attempt is
>> spread among as many prospective victims as possible without evaluating or
>> winnowing the unproductive instances.
>>
>> To whom should these activities be reported ? I've gotten no feedback of
>> any
>> kind since I went public with this, and the only "visitors" to the website
>> (pinthetaleonthedonkey.com) are RU, UA, CN, TR, IR, KR and various
>> WordPress
>> attackers, all 403'd or promptly added to the site's .htaccess file. Google
>> occasionally visits, but in-depth readers are few and far between.
>>
>> These efforts will be exceedingly difficult to stop because the compromised
>> Russian-language websites are scattered worldwide and the Port 3389 servers
>> are all out of our reach. However, if the Powers-That-Be can gain
>> admittance
>> to the Access Files of the compromised servers that are on friendly ground,
>> then the presently hidden activating servers might be traced from the
>> timing
>> and identity of the specific requests documented in
>> pinthetaleonthedonkey.com.
>>
>> George Langford
>
> do you talk about anything *other* than what you perceive to be a
> targeted attempted campaign by Russian actors-in-power aimed at you,
> Some Guy Who Runs His Own Server?
>
> because that's literally all you post about. this isn't even relevant to
> panera's breach.
>
> you haven't gotten any feedback on this because it's unrealistic.
>
> let's break it down:
>
> first off, your first premise of russians conducting a widescale attack
> doesn't suit them. if anything, they prefer targeted, narrow-scope
> compromise attempts but it's a lot cheaper and easier to conduct psyops,
> which they definitely engage in a lot more than any sort of direct
> digital attack. when you conduct an attempted compromise, you never do
> it wide-scale because that's how you blow your cover, period. (not to
> mention the cost involved in something like that.) they spend their
> money where there'd be an actual payoff - .gov's, gov contractors, and
> the like. i doubt your nonexistent Wordpress server holds US state
> secrets. (sidenote: the US gov sites do not use Wordpress.)
>
> secondly, "They're doing this to my webpage (anonymized on the 'Net)" -
> if it's anonymized, how do you know it's russian in origin?
>
> third, "To whom should these activities be reported ?"
> certainly not to a LUG, assuming it's actually valid.
>
> "the Port 3389 servers are all out of our reach" - what does this have
> to do with Wordpress probes?
>
> "of the specific requests documented in pinthetaleonthedonkey.com" -
> stop peddling your website.
>
>
> lastly, anyone can tell you that wordpress probes have been happening in
> large number from a slew of IP ranges for... well, forever. it's a part
> of being on the 'net, and it certainly predates any russian involvement
> in US 2016 election. it's mostly a bunch of skids with a bot farm trying
> to deface wordpress websites because it's easy. state-level operations
> are much less noisy.
>
> (inb4 "you're one of them!")
>
>
> ___________________________________________________________________________
> Philadelphia Linux Users Group         --        http://www.phillylinux.org
> Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
> General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug
>
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug