Anonymous wrote:
You're not very bright, there are multiple brands other than Cisco, -and most VPN providers use open source products like OpenVPN. Beyond that, most hackers don't use windows, so it's harder to install keyloggers
jsteele wrote:Anonymous wrote:jsteele wrote:Anonymous wrote:CERT had released the report and has IPs - which mean squat
https://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity
IP addresses are interchangeable and can be spoofed. Even the CERT report and DHS provides no concrete evidence. It's circumstantial at best and certainly nothing concrete.
And everyone is running around saying 'look at this definite proof this was Russian State Actors.'
Its circumstantial, at best. IPs and methods associated with previous hacks that are believed to be Russian sponsored but also not proven to be Russian sponsored.
I'd sincerely hope that the agencies looking into this have better evidence, they just can't release it without harming their efforts. Its either that or they are bluffing for political leverage of some form.
Had you read the thread, you would see that not everyone is "running around saying 'look at this definite proof this was Russian State Actors.'" I have repeatedly pointed to the deficiencies of the report. That said, you are wrong in your conclusions about IP addresses. While they can be spoofed, they cannot be spoofed in many of the applications in which they were used in this attack. More importantly, the key evidence that would tie this attack to specific actors would not be forensic information simply showing the source of the attacks, but actual captured communications that showed the entire communications chain (e.g. attacker -> proxy -> victim). It may well be the dilemma facing the intelligence services is how to release proof without simultaneously how much Internet data is being routinely captured.
You're naive to think that if VPNs or proxies were used the original attackers will be traced. Chances are those endpoints are behind a secure system or a VPN provider that doesn't retain logs. A lot of the malware used is on the black market or phishing attacks. Poor security and stupid staffers (like Podesta) were the way in.
You don't appear to have much understanding of the type of traffic monitoring that is possible. Let's turn to Edward Snowden for some highlights (as revealed in Glenn Greenwald's book):
http://www.infoworld.com/article/2608141/internet-privacy/snowden--the-nsa-planted-backdoors-in-cisco-products.html
"Greenwald reveals that a program called X-KEYSCORE allows 'real-time' monitoring of a person's online activities, enabling the NSA to observe emails and browsing activities as they happen, down to the keystroke"
But, you say, the hackers used VPNs. Well:
"Routers, switches, and servers made by Cisco are booby-trapped with surveillance equipment that intercepts traffic handled by those devices and copies it to the NSA's network, the book states."
and:
http://arstechnica.com/security/2015/10/backdoor-infecting-cisco-vpns-steals-customers-network-passwords/
"Backdoor infecting Cisco VPNs steals customers’ network passwords"
It is very likely that the NSA has been exploiting this vulnerability and that VPNs are minimal defense against the government.
To be clear, I don't know what evidence the government has and, as a result, I am not ready to believe the assertions unless/until they are substantiated. But, while it is easy for hackers to hide their tracks when attacking you or me, it is a different story when the NSA gets their teeth into it.
Anonymous wrote:jsteele wrote:Anonymous wrote:CERT had released the report and has IPs - which mean squat
https://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity
IP addresses are interchangeable and can be spoofed. Even the CERT report and DHS provides no concrete evidence. It's circumstantial at best and certainly nothing concrete.
And everyone is running around saying 'look at this definite proof this was Russian State Actors.'
Its circumstantial, at best. IPs and methods associated with previous hacks that are believed to be Russian sponsored but also not proven to be Russian sponsored.
I'd sincerely hope that the agencies looking into this have better evidence, they just can't release it without harming their efforts. Its either that or they are bluffing for political leverage of some form.
Had you read the thread, you would see that not everyone is "running around saying 'look at this definite proof this was Russian State Actors.'" I have repeatedly pointed to the deficiencies of the report. That said, you are wrong in your conclusions about IP addresses. While they can be spoofed, they cannot be spoofed in many of the applications in which they were used in this attack. More importantly, the key evidence that would tie this attack to specific actors would not be forensic information simply showing the source of the attacks, but actual captured communications that showed the entire communications chain (e.g. attacker -> proxy -> victim). It may well be the dilemma facing the intelligence services is how to release proof without simultaneously how much Internet data is being routinely captured.
You're naive to think that if VPNs or proxies were used the original attackers will be traced. Chances are those endpoints are behind a secure system or a VPN provider that doesn't retain logs. A lot of the malware used is on the black market or phishing attacks. Poor security and stupid staffers (like Podesta) were the way in.
Anonymous wrote:Proof? Faith should not require proof. If you don't believe or don't understand, you're not nuanced enough. Therefore, you should have blind faith, sheeple.
jsteele wrote:Anonymous wrote:CERT had released the report and has IPs - which mean squat
https://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity
IP addresses are interchangeable and can be spoofed. Even the CERT report and DHS provides no concrete evidence. It's circumstantial at best and certainly nothing concrete.
And everyone is running around saying 'look at this definite proof this was Russian State Actors.'
Its circumstantial, at best. IPs and methods associated with previous hacks that are believed to be Russian sponsored but also not proven to be Russian sponsored.
I'd sincerely hope that the agencies looking into this have better evidence, they just can't release it without harming their efforts. Its either that or they are bluffing for political leverage of some form.
Had you read the thread, you would see that not everyone is "running around saying 'look at this definite proof this was Russian State Actors.'" I have repeatedly pointed to the deficiencies of the report. That said, you are wrong in your conclusions about IP addresses. While they can be spoofed, they cannot be spoofed in many of the applications in which they were used in this attack. More importantly, the key evidence that would tie this attack to specific actors would not be forensic information simply showing the source of the attacks, but actual captured communications that showed the entire communications chain (e.g. attacker -> proxy -> victim). It may well be the dilemma facing the intelligence services is how to release proof without simultaneously how much Internet data is being routinely captured.
Anonymous wrote:I'm so lost in this mess. But did I read somewhere that there were leaks in our own government that helped with the hacking?
Anonymous wrote:CERT had released the report and has IPs - which mean squat
https://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity
IP addresses are interchangeable and can be spoofed. Even the CERT report and DHS provides no concrete evidence. It's circumstantial at best and certainly nothing concrete.
And everyone is running around saying 'look at this definite proof this was Russian State Actors.'
Its circumstantial, at best. IPs and methods associated with previous hacks that are believed to be Russian sponsored but also not proven to be Russian sponsored.
I'd sincerely hope that the agencies looking into this have better evidence, they just can't release it without harming their efforts. Its either that or they are bluffing for political leverage of some form.
Anonymous wrote:There's no "disconnect." The Obama Administration put out propaganda which it said was based on a "consensus" of the intelligence community that the Russians hacked the election with the specific purpose of aiding Trump. This report was supposed to contain the basis of that supposed "consensus." That's not a disconnect. Pretending that this report wasn't supposed to cover the issue of whether the Russians were trying to support Trump is balderdash, because some of the liberals posting in this thread are trying to claim that the report does exactly that.
To operate at the intersection of government, private sector, and international network defense communities, applying unique analytic perspectives, ensuring shared situational awareness, and orchestrating synchronized response, mitigation, and recovery efforts while protecting the Constitutional and privacy rights of Americans in both the cybersecurity and communications domains.
