[Info-vax] Reuters: Security Breach at HPE

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Sat Jul 13 00:30:10 EDT 2019


Reuters is reporting security breaches at HPE, DXC, IBM, CSC, and other 
organizations.

https://www.reuters.com/investigates/special-report/china-cyber-cloudhopper/

"For security staff at Hewlett Packard Enterprise, the Ericsson 
situation was just one dark cloud in a gathering storm, according to 
internal documents and 10 people with knowledge of the matter.

For years, the company’s predecessor, technology giant Hewlett Packard, 
didn’t even know it had been hacked. It first found malicious code 
stored on a company server in 2012. The company called in outside 
experts, who found infections dating to at least January 2010.

Hewlett Packard security staff fought back, tracking the intruders, 
shoring up defenses and executing a carefully planned expulsion to 
simultaneously knock out all of the hackers’ known footholds. But the 
attackers returned, beginning a cycle that continued for at least five 
years.

The intruders stayed a step ahead. They would grab reams of data before 
planned eviction efforts by HP engineers. Repeatedly, they took whole 
directories of credentials, a brazen act netting them the ability to 
impersonate hundreds of employees.

The hackers knew exactly where to retrieve the most sensitive data and 
littered their code with expletives and taunts...

Then things got worse, documents show."



Breaching the servers hosting the HPE operating systems and software 
products and product firmware—if you own the AD, you usually own the 
network—would all be obvious targets for the attackers, too. Cloning 
and then reviewing the existing source code for issues and 
vulnerabilities is obvious. Backdoors or weaknesses or "dumb bugs" 
added into some of the packages would further the cascade, spreading to 
those that have installed the packages.






-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list