Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo (krebsonsecurity.com) 26
Brian Krebs: In March 2020, KrebsOnSecurity alerted Swedish security giant Gunnebo Group that hackers had broken into its network and sold the access to a criminal group which specializes in deploying ransomware. In August, Gunnebo said it had successfully thwarted a ransomware attack, but this week it emerged that the intruders stole and published online tens of thousands of sensitive documents -- including schematics of client bank vaults and surveillance systems. The Gunnebo Group is a Swedish multinational company that provides physical security to a variety of customers globally, including banks, government agencies, airports, casinos, jewelry stores, tax agencies and even nuclear power plants. The company has operations in 25 countries, more than 4,000 employees, and billions in revenue annually.
Acting on a tip from Milwaukee, Wis.-based cyber intelligence firm Hold Security, KrebsOnSecurity in March told Gunnebo about a financial transaction between a malicious hacker and a cybercriminal group which specializes in deploying ransomware. That transaction included credentials to a Remote Desktop Protocol (RDP) account apparently set up by a Gunnebo Group employee who wished to access the company's internal network remotely. Five months later, Gunnebo disclosed it had suffered a cyber attack targeting its IT systems that forced the shutdown of internal servers. Nevertheless, the company said its quick reaction prevented the intruders from spreading the ransomware throughout its systems, and that the overall lasting impact from the incident was minimal.
Acting on a tip from Milwaukee, Wis.-based cyber intelligence firm Hold Security, KrebsOnSecurity in March told Gunnebo about a financial transaction between a malicious hacker and a cybercriminal group which specializes in deploying ransomware. That transaction included credentials to a Remote Desktop Protocol (RDP) account apparently set up by a Gunnebo Group employee who wished to access the company's internal network remotely. Five months later, Gunnebo disclosed it had suffered a cyber attack targeting its IT systems that forced the shutdown of internal servers. Nevertheless, the company said its quick reaction prevented the intruders from spreading the ransomware throughout its systems, and that the overall lasting impact from the incident was minimal.
Minimal impact (Score:3)
There is an easy way to prevent this (Score:2)
In 2000-2001, I worked for a company focused on digital encryption and certificates. We used some security measures that still make sense:
Re: (Score:3)
Re: (Score:2)
Stuxnet has proved air-gaps aren't the be-all end-all of security.
And Valve is probably better positioned to airgap their source code (though probably why they don't do much
Security Giant? (Score:2)
You keep using that word, I don't think it means, what you think it means.
Internet, Intranets, all houses of cards (Score:3)
Here's how secure it should be (Score:2)
> I don't think anyone can say their network, or anything Internet-connected, is ever 'secure'
Well the drive I just wiped is secure, even if Input it in the internet, but what's the fun in that? :)
But seriously, there is an equation for how secure things should be, and lots of things are appropriately secured. You wouldn't get a $10,000 safe to protect your lunch from being stolen, that would be too much security. (Especially since a $200 safe would mean the attacker would be better off buying their own
Re: (Score:2)
Never. The other way around (Score:2)
> And how often do your employers stand in the way of you doing your job because of cost, or tell you to dumb things down to the bare minimum to save money?
Never. Actually it's the other way around - I tell the bosses that X system isn't top-secret national security data, we shouldn't be focusing our efforts/budget on protecting it to the level DoD requires of Top Secret. The appropriate level of protection is some other, less expensive, level. Doing that increases our OVERALL protection because we spe
Quick example (Score:2)
I have a database admin who is always letting me know about developers using service accounts to change stored procedures in the database. The database structure in production servers should be changed only by the DB admin, he says - and he's right. We're working on making it so devs don't have the passwords that the applications use.
The exact same sysadmin thinks it's ridiculous for me to say his SQL queries shouldn't be changing the operating system of the server that the database happens to run on. SQ
Re: (Score:2)
I forgot to say:
> or tell you to dumb things down to the bare minimum to save money?
Getting hit by ransomware doesn't save money.
Having an intern take everything you've got with her when she goes to work for a competitor doesn't save money.
Having unstable systems that can be easily DOSed on purpose or on accident, constantly putting our fires because your systems aren't robust, doesn't save money.
If the people making budget decisions think that cutting security is going to save money, the head security p
Re: (Score:2)
So if I condense down what I just read, based on your own personal perspective, of course (which in no way shape or form invalidates any of it, mind you), it sounds to me that if there is a world-wide Internet and data security problem, the core of that problem is really communication and expectations between humans, not a lack of technical ability to adequately and
Re: (Score:2)
> Waited until this morning to read your comments because they appeared to need to be read carefully, containing actual content, and I was right.
Thanks. :)
> it sounds to me that if there is a world-wide Internet and data security problem, the core of that problem is really communication and expectations between humans, not a lack of technical ability to adequately and appropriately secure everything
Yeah, I'd agree that's a good summary. Also there is a very specialized type of communication needed as
Re: (Score:2)
1. Law enforcement could get what they wanted without wrecking encryption entirely, handing the 'keys to the kingdom' to criminal hackers,
and
2. I knew I could trust the Government (at all levels, including especially three-letter-agencies, both known and hidden) and law enforcement to play by the rules, always get a warrant, and never, never, ever circumvent due process and The Law themselves,
then I might just let them have the power to see into anything they wanted.
However the curr
Re: (Score:2)
> I just do not believe that the government and law enforcement should have the power to make all encryption irrelevant, technical issues aside.
I totally agree. Which makes me scratch my head about your support of Kamala Harris, of all people. From your post, I could see you maybe holding your nose and voting for Biden despite Harris, but I'm surprised you pemote a rather "aggressive" DA and attorney general in your sig. Just weird to say "I don't trust law enforcement, vote for the author of the Crime
Re: (Score:3)
Re: (Score:2)
I totally understand. I voted against Trump, twice. Several elected Republican leaders have said Biden is better than *Trump*. Not that they like Biden.
Even if he wasn't a jackass (and he is), it's not like traditional Republicans would like him - he's a Clinton donor who decided he wouldn't make it running as a Dem or an Independent, so he went after the R nomination.
It's just your sig kinda threw me for a loop. It's like saying:
Support women's rights - free Bill Cosby.
I totally understand not liking Tru
Re: (Score:2)
Who knows? Maybe she'll surprise everyone.
I'll be happier if they just plain repair the damage Trump has done to pretty much everything he's touched, and to be sure Biden will get rid of the sycophant boot-licker Trump appointees. Sadly he's also appointed a metric buttload of Federal judges, and that's potentially going to hurt for a long time to come.
Re: (Score:2)
Re: (Score:2)
> the appointment of woman to the SCOTUS will set back womens' rights
Suddenly I have the urge to listen to Pink Floyd's album from 1987.
Re: (Score:2)
Re: (Score:2)
Somehow I don't think any of this is Momentary.
Re: (Score:2)
:)
Re: Here's how secure it should be (Score:1)
Re: (Score:2)
> What if the value of the customers loss, is very different than the value for the attacker?
That's an interesting question. I left that out of my simplified rul above. Considering the value to each may mean you should reduce the protection level compared to the rule above.
To be clear, the way I'm understanding your query is the value to the attacker of a successful attack vs the cost to the defender of the same attack.
Suppose the value of the resource to the attacker is $10, to the defender $10,000. Th