Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: FreedomPoster

I’m trying to process, what does all this mean?


9 posted on 12/14/2020 4:26:23 AM PST by nfldgirl
[ Post Reply | Private Reply | To 1 | View Replies ]


To: nfldgirl
said, "what does all this mean?"
In Department of Home land and Cyber-security words
"CISA ISSUES EMERGENCY DIRECTIVE (which) COMPROMISE (the software which Dominion voting system uses)
12 posted on 12/14/2020 4:37:44 AM PST by Steve Van Doorn (*in my best Eric Cartman voice* 'I love you, guys')
[ Post Reply | Private Reply | To 9 | View Replies ]

To: nfldgirl

Foreign interference in our national election?


17 posted on 12/14/2020 5:47:03 AM PST by motoman (")
[ Post Reply | Private Reply | To 9 | View Replies ]

To: nfldgirl

“Solar Winds” is software used by many organizations to monitor servers. We have thousands of servers at my organization, and Solar Winds is used to monitor and administer to a lot of functions such as:

Disk Space
Memory Usage
Processor Usage
Network status

It does this behind the scenes, and if there are issues, it has notification functionality to send emails to the people responsible for maintaining those servers.

It is pretty slick.

Now, also pretty compromised, apparently.


18 posted on 12/14/2020 5:49:41 AM PST by rlmorel ("I’d rather enjoy a risky freedom than a safe servitude." Robby Dinero, USMC Veteran, Gym Owner)
[ Post Reply | Private Reply | To 9 | View Replies ]

To: nfldgirl; FreedomPoster

Microsoft, FireEye confirm SolarWinds supply chain attack: Known victims so far include the US Treasury, the US NTIA, and FireEye itself

https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/

A hack initially corrupted a Solarwinds file, after which, that corrupted Solarwinds file had been installed on various Windows OS based machines as a part of routine updating.

The hacked file hatches, you might say, active hack commands that find certain files and deletes those certain files.

The hack tries to hide its tracks, and then force a reboot of the Windows OS based machine.

It is a cover-up.


37 posted on 12/14/2020 7:03:13 AM PST by linMcHlp
[ Post Reply | Private Reply | To 9 | View Replies ]

To: nfldgirl; FreedomPoster

https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html


41 posted on 12/14/2020 7:17:34 AM PST by linMcHlp
[ Post Reply | Private Reply | To 9 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson