Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
James Baud
May 24, 2015

by LITERALLY AN ADMIN

infernal machines posted:

did you see the part where the article says

***
The cyberattack has been characterized in the media as a "ransomware" event.

However, ransomware attacks typically involve locking an organization out of its electronic files rather than stealing data.

In this instance, Lifelabs said a payment was made to the cybercriminals to retrieve data.
***

Potato, potato.

Adbot
ADBOT LOVES YOU

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.

James Baud posted:

Potato, potato.

:shrug:

probably, otoh there's some good reasons to want specifics on the breach so firing off a few FOIAs isn't unreasonable

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

James Baud posted:

Non-technical CEO asked technical question and doesn't know answer is just miles up there.

Even if the data was encrypted, any non-automated breach is typically going to also include scoring the means to decrypt it.

You know enough about this stuff to know better.

You are being incredibly obtuse and short-sighted here.

LifeLabs opted to pay a ransom to "retrieve" the data back, meaning that they had no mechanism to know what was exfiltrated and no mechanism to restore the data. Any sensible organization that deals with sensitive customer data which includes medical records and PII would have had this data regularly backed up and had those backups tested. It is quite apparent in this case that their backups were never tested and they had no methods to determine what was actually leaked out. As a result, the only avenue they had left was to pay the ransom to get a decryption key.

Adding to this, 85,000 medical records were found to have been leaked as well which is to me evidence that at best they may have partial encryption of their data. This is something the CEO should know especially since we're dealing the loss of 15 million records belonging to those in BC, Ontario, and Yukon, but he stumbled and it speaks to either it being not the case or him never being briefed. These questions were coming up on Twitter yesterday and if they weren't making it to the CEO for an interview with the media for the next day, they have terrible crisis management skills or they again do not want to openly state that they don't do anything with the data at rest.

LifeLabs' response to the matter is just as problematic:
https://customernotice.lifelabs.com

Ignoring the fact that the content isn't dated to begin with, this paragraph is the problem:

quote:

I want to emphasize that at this time, our cyber security firms have advised that the risk to our customers in connection with this cyber-attack is low and that they have not seen any public disclosure of customer data as part of their investigations, including monitoring of the dark web and other online locations.

For the 85,000 Ontario residents who have had their records exposed, this is complete nonsense that the risk is "low". They had to force a password reset to all users and if you're unsure of what was actually exposed, here's what I see as soon as I log in:



Look at that, it's my personal health number, age, full name, phone number, and my physician. This is the information that was readily available that LifeLabs is unable to report whether or not it was actually encrypted. If you're confident about your PHN being worthless to everyone on these forums, please do share it just to prove it, but I am obfuscating all of that for a good reason.

And let's go back to that password reset: I logged in on December 13th to see my results from my test the day before, and there was no indication of a problem, meaning that I successfully logged in under the same password that was in my password manager for however long. However, after news of this broke, I went to see if I could still log in and low and behold it demanded that I reset my password.

So I did.

However, today, I noticed something:



This message on the bottom was not there yesterday when the news hit and would you know it they haven't bothered to link to their notice, meaning that they're again downplaying how big of a risk this breach was.

If the matter wasn't so concerning, why did they force a password reset? Why are they offering information protection? And why did they take from October 28th until December 17th to inform the public and force a password reset?

While I don't like commenting on Glassdoor reviews because they're not reliable, there's this:
https://www.glassdoor.com/Reviews/LifeLabs-Reviews-E340429.htm

quote:

Lack of accountability across the entire organization, no alignment or collaboration, silo'd in every way possible, resources used incorrectly (i.e. people and roles), zero transparency and almost zero processes, lack of engagement and responsiveness from staff,

That is probably the problem they have: nobody knows what they're doing and they're probably too afraid to tell the CEO. The CEO should have heard at least once in the 51 days between the breach and the radio interview he gave with the CBC this morning (one that I heard myself) something along the lines of "the data was encrypted". I guess in a roundabout way it was at one point because it was obviously ransomed.

So yeah. To you, this is overblown, but there are some of us who actually care about patient data and as a result I am FOI'n the health authorities to know more since LifeLabs isn't coming forward on the problem.

Grace Baiting
Jul 20, 2012

Audi famam illius;
Cucurrit quaeque
Tetigit destruens.



yes our data was encrypted securely at probably all times, even a bit too securely for a minute there, ha ha ha! no further questions

Hollow Talk
Feb 2, 2014

Grace Baiting posted:

yes our data was encrypted securely at probably all times, even a bit too securely for a minute there, ha ha ha! no further questions

During the attack, all of our data was encrypted.

Partycat
Oct 25, 2004

graph posted:

speaking of, plexpass is on sale for the next two days for 90 bucks

what do you do with this if you’re not connecting it to an internet crime depot

Proteus Jones
Feb 28, 2013



Partycat posted:

what do you do with this if you’re not connecting it to an internet crime depot

You get access to the LiveTV and DVR features via an HDHomeRun device (OTA or cable card device). You can also use the remote access features to access your library from anywhere.

Perplx
Jun 26, 2004


Best viewed on Orgasma Plasma
Lipstick Apathy
remote access is free, downloading to the mobile app is payed though

Agile Vector
May 21, 2007

scrum bored



Partycat posted:

internet crime depot

mods please rename the bitcoin thread to this

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Hollow Talk posted:

During the attack, all of our data was encrypted.

loving perfect.

The MUMPSorceress
Jan 6, 2012


^SHTPSTS

Gary’s Answer

Hollow Talk posted:

During the attack, all of our data was encrypted.

thread title?

Qtotonibudinibudet
Nov 7, 2011



Omich poluyobok, skazhi ty narkoman? ya prosto tozhe gde to tam zhivu, mogli by vmeste uyobyvat' narkotiki
lol https://www.theguardian.com/world/2019/dec/17/vladimir-putin-still-uses-obsolete-windows-xp-despite-hacking-risk

> Putin, 67, appears to have the obsolete Microsoft Windows XP operating system installed on computers in his office at the Kremlin and at his official Novo-Ogaryovo residence near Moscow, according to images released by his press service.

CRIP EATIN BREAD
Jun 24, 2002

Hey stop worrying bout my acting bitch, and worry about your WACK ass music. In the mean time... Eat a hot bowl of Dicks! Ice T



Soiled Meat

infernal machines posted:

piracy dads

could be a ganagtag

hell yeah.

my dad told me a story about one of the local tv networks did over-the-air pay tv, which was on maybe NBC or whatever network. essentially you needed a special antenna they rented to you for a fee, and after a certain time in the evening, you could watch some special broadcast that would be scrambled for others. on launch day him and his friends tore the back of the tv off my grandparents set, attached an oscilloscope, and figured out the simple phase shift required, and the next day was selling boxes at his high school to pirate it.

actually now that i type that out this explains a lot

Jonny 290
May 5, 2005



[ASK] me about OS/2 Warp

daaaaaank

Progressive JPEG
Feb 19, 2003

pseudorandom name posted:

open source backup program Duplicity supports round-robining your data across the following backends:

Amazon S3
Backblaze B2
DropBox
ftp
GIO
Google Docs
Google Drive
HSI
Hubic
IMAP
local filesystem
Mega.co
Microsoft Azure
Microsoft Onedrive
par2
Rackspace Cloudfiles
rsync
Skylabel
ssh/scp
SwiftStack
Tahoe-LAFS
WebDAV

missing docker hub

they dont give a gently caress

just upload whatever you want, at any size, against infinite image tags

Bulgakov
Mar 8, 2009


рукописи не горят

Hollow Talk posted:

During the attack, all of our data was encrypted.

:nsavince: lol

Soricidus
Oct 21, 2010
freedom-hating statist shill

James Baud posted:

Even if the data was encrypted, any non-automated breach is typically going to also include scoring the means to decrypt it.

while that is indeed often technically feasible, the bar is higher as it may require access to more systems and/or at a higher privilege level than is necessary just to exfil data.

it’s dumb not to lock your door even though burglars can still get into your house.

Xarn
Jun 26, 2015

Hollow Talk posted:

During the attack, all of our data was encrypted.

:drat:

redleader
Aug 18, 2005

Engage according to operational parameters

Partycat posted:

internet crime depot

what a beautiful phrase

Chris Knight
Jun 5, 2002

me @ ur posts


Fun Shoe
https://twitter.com/a_greenberg/status/1207340911463669760

Shame Boy
Mar 2, 2010

Hollow Talk posted:

During the attack, all of our data was encrypted.

man imagine if that holds up in court somehow

"oh it was encrypted at rest in the specific window of time this court case is dealing with"

Shame Boy
Mar 2, 2010

Lain Iwakura posted:

I want to emphasize that at this time, our cyber security firms have advised that the risk to our customers in connection with this cyber-attack is low and that they have not seen any public disclosure of customer data as part of their investigations, including monitoring of the dark web and other online locations.

i love this

look we haven't seen it so it's not a problem, and we hired the best blind people available to look too!

Captain Foo
May 11, 2004

we vibin'
we slidin'
we breathin'
we dyin'

Shame Boy posted:

man imagine if that holds up in court somehow

"oh it was encrypted at rest in the specific window of time this court case is dealing with"

oh my god

Jenny Agutter
Mar 18, 2009

graph posted:

speaking of, plexpass is on sale for the next two days for 90 bucks

Does this require a coupon or something? I'm not seeing it

ewiley
Jul 9, 2003

More trash for the trash fire

Shame Boy posted:

man imagine if that holds up in court somehow

"oh it was encrypted at rest in the specific window of time this court case is dealing with"

hopefully someone can explain how keys work to the court, but I'm not super confident about that

graph
Nov 22, 2006

aaag peanuts

Jenny Agutter posted:

Does this require a coupon or something? I'm not seeing it

e: yeah oops guess the link was in the email i got vvv

graph fucked around with this message at 17:25 on Dec 19, 2019

mystes
May 31, 2006

https://www.plex.tv/plex-pass/gift/

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

ewiley posted:

hopefully someone can explain how keys work to the court, but I'm not super confident about that

I don't think that's too hard to make into plain English.

"When spies talk to each other, they send each other secret messages. The receiver needs to know the special code to make the message readable. For example, say in our special code A is 1, B is 2, C is 3 and so forth. Now imagine if I took this document, turned it into numbers, but added 1 to each number. A is 2, B is 3, and so forth. There's no letter after Z so when 26 becomes 27 we then turn it back into a 1.

Adding by 1 here is called the encryption key, because it's the key we use to make the message encrypted, or scrambled, even if you know how to turn the numbers back to letters. If you know to subtract 1 then turn the numbers back to letters, that's called the decryption key, and the person who you want to read the message needs that to decrypt it, or make readable, the message and understand it. If you just tried to turn the numbers back to letters without this key, the word 'Hello' would come out as 'Icmmp' and so forth.

Computers use a special kind of math to encrypt their messages, called public key cryptography. This is so called because the encryption key, which you use to scramble the message, can be sent to anyone you want to send you a message. Unlike the simple example before, the way messages can be scrambled for public key cryptography make it nearly impossible for someone to decrypt, or unscramble, the message without the decryption key. That decryption key is called the private key, because you want to keep it private. Anyone who wants to make sense of the message needs that key, or they can't understand the message. This is how computers talk to each other on the internet when you go to a secure website; they send each other the public keys, which is safe to do, and then use their private key to read the messages sent to them so that no one else can understand them.

In this case, instead of encrypting messages, the hackers encrypted the files. It's the same process with the same result. The hacker uses their public key to scramble all of the files, and then holds the private key for ransom. If there are no backups, or extra copies, of the files somewhere else, there is no way to unscramble the files."

Etc etc

Volmarias fucked around with this message at 18:46 on Dec 19, 2019

Pile Of Garbage
May 28, 2007



one of our customers got pen-tested recently and failed hard, the testers got domain admin within a couple hours. as usual the culprit was a fuckin "scheduled task service account" which is a theme i've seen all over. it was a member of domain admins and the password was something like "scheduledtask" but with some symbols/numbers/upper-case substitutions.

a shameful display

Grace Baiting
Jul 20, 2012

Audi famam illius;
Cucurrit quaeque
Tetigit destruens.



Pile Of Garbage posted:

one of our customers got pen-tested recently and failed hard, the testers got domain admin within a couple hours. as usual the culprit was a fuckin "scheduled task service account" which is a theme i've seen all over. it was a member of domain admins and the password was something like "scheduledtask" but with some symbols/numbers/upper-case substitutions.

a shameful display

name of their sec tape

Happy Thread
Jul 10, 2005

by Fluffdaddy
Plaster Town Cop

Volmarias posted:

I don't think that's too hard to make into plain English.

"When spies talk to each other, they send each other secret messages. The receiver needs to know the special code to make the message readable. For example, say in our special code A is 1, B is 2, C is 3 and so forth. Now imagine if I took this document, turned it into numbers, but added 1 to each number. A is 2, B is 3, and so forth. There's no letter after Z so when 26 becomes 27 we then turn it back into a 1.

Adding by 1 here is called the encryption key, because it's the key we use to make the message encrypted, or scrambled, even if you know how to turn the numbers back to letters. If you know to subtract 1 then turn the numbers back to letters, that's called the decryption key, and the person who you want to read the message needs that to decrypt it, or make readable, the message and understand it. If you just tried to turn the numbers back to letters without this key, the word 'Hello' would come out as 'Icmmp' and so forth.

Computers use a special kind of math to encrypt their messages, called public key cryptography. This is so called because the encryption key, which you use to scramble the message, can be sent to anyone you want to send you a message. Unlike the simple example before, the way messages can be scrambled for public key cryptography make it nearly impossible for someone to decrypt, or unscramble, the message without the decryption key. That decryption key is called the private key, because you want to keep it private. Anyone who wants to make sense of the message needs that key, or they can't understand the message. This is how computers talk to each other on the internet when you go to a secure website; they send each other the public keys, which is safe to do, and then use their private key to read the messages sent to them so that no one else can understand them.

In this case, instead of encrypting messages, the hackers encrypted the files. It's the same process with the same result. The hacker uses their public key to scramble all of the files, and then holds the private key for ransom. If there are no backups, or extra copies, of the files somewhere else, there is no way to unscramble the files."

Etc etc

Hi I'm an average judge or jury foreman, let me just take a look at the first line of this *immediate loud snoring while dreaming about the payoff I might get for siding with the company*

Kazinsal
Dec 13, 2011



Volmarias posted:

"When spies talk to each other

"what? spies in my computer? healthcare espionage? and they can do this because of encryption? that's scary! encryption is now illegal" - judge dipshit q. lawmaker

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.
a question from ignorance, in the case of PIPEDA and related data governance requirements, do they qualify the nature of the encryption used for data at rest? everything i've seen seems to suggest something like bitlocker/fde technically meets the requirement even though it's absolutely useless in the case of a breach of a live system.

Shame Boy
Mar 2, 2010

Volmarias posted:

I don't think that's too hard to make into plain English.

"When spies talk to each other

wait are you saying spies did this?? obviously this company is innocent and we should be punishing these spies and their evil spy codes!

Midjack
Dec 24, 2007




stoll owns and you owe it to yourself to get one of his klein bottle mugs, mine is 20 years old and still great. the paperwork he includes in the box is hilarious.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

infernal machines posted:

a question from ignorance, in the case of PIPEDA and related data governance requirements, do they qualify the nature of the encryption used for data at rest? everything i've seen seems to suggest something like bitlocker/fde technically meets the requirement even though it's absolutely useless in the case of a breach of a live system.

i don't work in the public sector but there's this

https://www.priv.gc.ca/en/privacy-t...s/p_safeguards/

quote:

Protect personal information in a way that is appropriate to how sensitive it is.

Protect all personal information (regardless of how it is stored) against loss, theft, or any unauthorized access, disclosure, copying, use or modification.

[...]

  • Develop and implement a security policy to protect personal information.
  • Use appropriate security safeguards to provide necessary protection. These can include:
    • physical measures (e.g., locked filing cabinets, restricting access to offices, and alarm systems);
    • up-to-date technological tools (e.g., passwords, encryption, firewalls and security patches);
    • organizational controls (e.g., security clearances, limiting access, staff training and agreements).
  • Consider the following factors when selecting the right safeguard:
    • the sensitivity of the information and the risk of harm to the individual. For instance, health and financial information would be considered highly sensitive;
    • the amount of information;
    • the extent of distribution;
    • the format of the information (e.g., electronic or paper);
    • the type of storage; and
    • the types and levels of potential risk your organization faces.
  • Review security safeguards regularly to ensure they are up to date, and that you have addressed any known vulnerabilities through regular security audits and/or testing.
  • Make your employees aware of the importance of maintaining the security and confidentiality of personal information, and hold regular staff training on security safeguards.

the real question then becomes was lifelabs getting audited and sending reports to the government? i'd imagine so but how they were conducted who knows

BlankSystemDaemon
Mar 13, 2009



Has ARM pulled an Intel about a speculative execution bug after ERET? Because from a recent fix in FreeBSD, I found that it was (EDIT: quietly) fixed in Linux almost a year ago and this POC seems recently new.

BlankSystemDaemon fucked around with this message at 21:22 on Dec 19, 2019

pseudorandom name
May 6, 2007

D. Ebdrup posted:

Has ARM pulled an Intel about a speculative execution bug after ERET? Because from a recent fix in FreeBSD, I found that it was (EDIT: quietly) fixed in Linux almost a year ago and this POC seems recently new.

I think this is Spectre variant 4, which is documented in https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/download-the-whitepaper and nobody cares about FreeBSD.

NFX
Jun 2, 2008

Fun Shoe

Midjack posted:

stoll owns and you owe it to yourself to get one of his klein bottle mugs, mine is 20 years old and still great. the paperwork he includes in the box is hilarious.

and read his book. speaking of books + andy greenberg, has anyone read sandworm? patrick gray mentioned it on risky biz some time ago, but i don't know if it's dumbed down

Adbot
ADBOT LOVES YOU

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender
Clifford Stoll is the reason why I am in infosec.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply