Posted on 12/14/2020 5:56:54 AM PST by TigerClaws
CISA warning at link.
Dominion connection below. Look at the bottom of the page.
https://dvsfileshare.dominionvoting.com/Web%20Client/Mobile/MLogin.htm
Is this how foreign actors got into the system?
Full text of warning.
WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) tonight issued Emergency Directive 21-01, in response to a known compromise involving SolarWinds Orion products that are currently being exploited by malicious actors. This Emergency Directive calls on all federal civilian agencies to review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediately.
“The compromise of SolarWinds’ Orion Network Management Products poses unacceptable risks to the security of federal networks,” said CISA Acting Director Brandon Wales. “Tonight’s directive is intended to mitigate potential compromises within federal civilian networks, and we urge all our partners—in the public and private sectors—to assess their exposure to this compromise and to secure their networks against any exploitation.”
This is the fifth Emergency Directive issued by CISA under the authorities granted by Congress in the Cybersecurity Act of 2015. All agencies operating SolarWinds products should provide a completion report to CISA by 12pm Eastern Standard Time on Monday December 14, 2020.
https://mobile.twitter.com/GenFlynn/status/1338457125270523904?s=20
This means the US SolarWinds product is Hundred points symbol compromised across the USG. Likely China w/ back doors to every dept, agency & activity in the USG. Not good.
@realDonaldTrump
this is a grave natl scty threat, esp at this moment. Demand answers ASAP! Know you will.
Quote Tweet
Tracy Beanz
@tracybeanz
· 2h
Hey, @C_C_Krebs care to answer how US government systems were penetrated here but somehow this election was the most secure in history? Did you know about this in advance? Is Dominion a customer? twitter.com/tracybeanz/sta…
Show this thread
Proof Dominion uses Solarwinds:
https://dvsfileshare.dominionvoting.com/Web%20Client/Mobile/MLogin.htm
https://archive.is/S5j0R
Article explaining the hack:
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
List of Solarwinds customers:
https://www.solarwinds.com/company/customers
https://archive.is/K4R0C
I.T. virtualization software to remotely manage I.T. systems from anywhere...along with the login management. If the Dominion systems are using this then WTF!?!
We need to pass laws around any voting technology, this is just absurd. A cyber security “threat analysis and risk assessment” would highlight dozens of exploitable attack vectors. This whole thing is a turd and should NEVR have been allowed to manage an election.
WE MUST rid ourselves of all of it otherwise we’ll never have another legitimate election.
LET’S SEE WHO RESISTS!
I swear, voter I.D. and purple finger voting, in person, would decimate the D’s from everything.
This could go one of two ways:
1. Dominion is being setup as a fall guy for the elections assuming Trump and his team have something big to announce in the coming days.
-or-
2. Dominion is salting the Earth to blame third party nation states for the system insecurities.
Connecting Dominion with Solarwinds is like connecting Ford to BP. Solarwinds is so ubiquitous in IT monitoring that you’re less likely not to find it when you go into any IT shop.
The Malware was Embedded in the RELEASE PACKAGE of the SolarWinds TRAFFIC MANAGEMENT TOOL.
This may be no more than how to log into the Dominion company web page, and not a city, county, or state segment of any vote tabulating servers using the Dominion voting systems.
Thanks, bfl.
Whether or not the cited web page, run by Solar Winds, gets anyone access to any city, county, or state vote tabulating system that uses Dominion voting systems, or merely access to Dominion’s corporate web page, this news remains noteworthy:
“The Washington Post, on December 13, 2020, reported that multiple government agencies were breached through SolarWinds’s Orion software, “according to three people familiar with the matter...” It was reported, but not confirmed, that APT29, aka Cozy Bear, working for the Russian Foreign Intelligence Service (SVR) was behind the attack.[27] Victims of this attack include the cybersecurity firm FireEye, The US Treasury Department and the US Department of Commerce’s National Telecommunications and Information Administration.[28] FireEye reported the hackers inserted “malicious code into legitimate software updates for the Orion software that allow an attacker remote access into the victim’s environment” and that they have found “indications of compromise dating back to the Spring of 2020.”
Thank you for taking the effort to use ARCHIVE.IS.
ptsal
Zactly
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.