Originally posted by vetran
View Post
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Reply to: YouTube and Gmail both down
Collapse
You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:
- You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
- You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
- If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.
Logging in...
Previously on "YouTube and Gmail both down"
Collapse
-
-
*.avsvmcloud.com is the file you should all be searching for if using SW.
Leave a comment:
-
Originally posted by vetran View PostI wish people would understand that the cloud is someone else's badly managed computer.
Everyone is running towards it but what happens when these outages occur daily when accountants continue to overrule techies.
Leave a comment:
-
Originally posted by rogerfederer View PostSolarWinds is a network tool that facilitates a range of services, such as the polling of devices to check configuration changes and then log them iteratively somewhere. It has a large range of addons but is considered a poor tool for the job in a modern context.
The main issue is that many companies have had the software for a decade or longer and see no reason to retire it. Companies that started in the cloud or have moved completely to serving from cloud services are very unlikely to have any form of SolarWinds running that requires patching.
The list I have seen has a very large number of companies that have been hacked through malware packaged by SolarWinds, unknowingly to them, by what is thought to have the hallmarks and evidence of Russian state sponsored hackers. This could be one of the most widespread attacks for public and private companies ever seen and details are continually emerging.
It's safe to say that if I was a betting person I would put the money on Google being among one of SolarWinds' customers, as they still run a lot of kit on premises in datacenters and have been around since the dot com boom in some form or another.
It is worth remembering that it is also very likely that the number of public entities and private companies currently sitting with an affected patch from Solarwinds from many months ago is going to be very high. That malware may already have been used to either spread, after initiating connection with the outside world and a CAC (command and control) server, or it may have been customised to automatically try various paths to infecting other services within the company networks to propagate. The latter is more common, as this avoids triggering suspicious firewall rules and deep packet inspection that is suspicious of unusual activity. The worst case scenario is that the outside world communication with the malware was via SolarWinds patching servers for months, and this traffic will not have been marked as suspicious by almost all DPI services.
In the coming days the view of this could increase so much that it is likely that most SolarWinds customers are infected and have had information stolen. Disinfecting a client of the other malware/intrusions introduced as a result of the initial hack via SolarWinds is almost impossible without shutting up shop and starting again from ground zero.
We could be witnessing one of the biggest hacks in history. As many US core public services have been impacted, including intelligence, it is an extremely bad outcome.
Enjoy your cat videos.
It was nasty and crap back then. I am willing to bet a tenner that not much has changed in 10 years.
Leave a comment:
-
Originally posted by NickFitz View PostThey posted a status message on Google Docs… oh, hang on
(But seriously folks, the other week AWS had a serious outage in one of their services, and the service status dashboard relied on that service, so they couldn't tell anybody what was going on with the serious outage)
I wish people would understand that the cloud is someone else's badly managed computer.
Everyone is running towards it but what happens when these outages occur daily when accountants continue to overrule techies.
Leave a comment:
-
If FireEye, that have architecture at the level of the US intelligence agencies, have been compromized by this simple hack then it is fair to say that anybody who works in Security or a Network team here, or leads one, will be busy over the festive season resolving this.
Just removing SolarWinds in entirety isn't enough. Every piece of kit requires inspected for code changes, config changes, while triple checking firewall logs and all Security apparatus in each company.
Time to up the day rate.
Leave a comment:
-
Originally posted by rogerfederer View PostSolarWinds is a network tool that facilitates a range of services, such as the polling of devices to check configuration changes and then log them iteratively somewhere. It has a large range of addons but is considered a poor tool for the job in a modern context.
The main issue is that many companies have had the software for a decade or longer and see no reason to retire it. Companies that started in the cloud or have moved completely to serving from cloud services are very unlikely to have any form of SolarWinds running that requires patching.
The list I have seen has a very large number of companies that have been hacked through malware packaged by SolarWinds, unknowingly to them, by what is thought to have the hallmarks and evidence of Russian state sponsored hackers. This could be one of the most widespread attacks for public and private companies ever seen and details are continually emerging.
It's safe to say that if I was a betting person I would put the money on Google being among one of SolarWinds' customers, as they still run a lot of kit on premises in datacenters and have been around since the dot com boom in some form or another.
It is worth remembering that it is also very likely that the number of public entities and private companies currently sitting with an affected patch from Solarwinds from many months ago is going to be very high. That malware may already have been used to either spread, after initiating connection with the outside world and a CAC (command and control) server, or it may have been customised to automatically try various paths to infecting other services within the company networks to propagate. The latter is more common, as this avoids triggering suspicious firewall rules and deep packet inspection that is suspicious of unusual activity. The worst case scenario is that the outside world communication with the malware was via SolarWinds patching servers for months, and this traffic will not have been marked as suspicious by almost all DPI services.
In the coming days the view of this could increase so much that it is likely that most SolarWinds customers are infected and have had information stolen. Disinfecting a client of the other malware/intrusions introduced as a result of the initial hack via SolarWinds is almost impossible without shutting up shop and starting again from ground zero.
We could be witnessing one of the biggest hacks in history. As many US core public services have been impacted, including intelligence, it is an extremely bad outcome.
Enjoy your cat videos.
Leave a comment:
-
SolarWinds is a network tool that facilitates a range of services, such as the polling of devices to check configuration changes and then log them iteratively somewhere. It has a large range of addons but is considered a poor tool for the job in a modern context.
The main issue is that many companies have had the software for a decade or longer and see no reason to retire it. Companies that started in the cloud or have moved completely to serving from cloud services are very unlikely to have any form of SolarWinds running that requires patching.
The list I have seen has a very large number of companies that have been hacked through malware packaged by SolarWinds, unknowingly to them, by what is thought to have the hallmarks and evidence of Russian state sponsored hackers. This could be one of the most widespread attacks for public and private companies ever seen and details are continually emerging.
It's safe to say that if I was a betting person I would put the money on Google being among one of SolarWinds' customers, as they still run a lot of kit on premises in datacenters and have been around since the dot com boom in some form or another.
It is worth remembering that it is also very likely that the number of public entities and private companies currently sitting with an affected patch from Solarwinds from many months ago is going to be very high. That malware may already have been used to either spread, after initiating connection with the outside world and a CAC (command and control) server, or it may have been customised to automatically try various paths to infecting other services within the company networks to propagate. The latter is more common, as this avoids triggering suspicious firewall rules and deep packet inspection that is suspicious of unusual activity. The worst case scenario is that the outside world communication with the malware was via SolarWinds patching servers for months, and this traffic will not have been marked as suspicious by almost all DPI services.
In the coming days the view of this could increase so much that it is likely that most SolarWinds customers are infected and have had information stolen. Disinfecting a client of the other malware/intrusions introduced as a result of the initial hack via SolarWinds is almost impossible without shutting up shop and starting again from ground zero.
We could be witnessing one of the biggest hacks in history. As many US core public services have been impacted, including intelligence, it is an extremely bad outcome.
Enjoy your cat videos.
Leave a comment:
-
"Google has been contacted for comment, but one spokesperson said they were unable to access their email." - Google outage: YouTube, Docs and Gmail knocked offline - BBC News
Leave a comment:
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- Why umbrella company regulation proposals will backfire Today 10:11
- IT contractor jobs market in February took ‘turn’ for the better Yesterday 09:50
- HMRC off-payroll update: What new IR35 research from the taxman isn’t telling you Mar 13 10:19
- Contractors, run a free payslip audit to check your umbrella company is upstanding Mar 12 10:55
- Labour’s naïve umbrella regulation plan uses a bulldozer to crack a nut Mar 11 10:24
- Labour replies to ‘Tackling umbrella company non-compliance’, but stops short of clarity Mar 10 00:11
- Will the McCann Loan Charge Review step outside itself to defy the biased, half-baked, narrow exercise Labour wants? Mar 6 01:01
- Spring Statement 2025: What contractors need on March 26th Mar 5 10:30
- Hidden costs of IR35 continue to be ignored by HMRC Mar 4 11:00
- HMRC just tried to tax a discrimination payout. Whatever next!? Mar 3 10:30
Leave a comment: