- cross-posted to:
- technology@lemmy.world
- cross-posted to:
- technology@lemmy.world
Maybe we could have a comprehensive tariff on goods that floats with the number of state-sponsored cyber crimes, human rights violations, etc. Hack our routers? The rate just went up 5%.
I think this is fair, but man the retaliatory tariffs for NSA backdoors would be atrocious
Working as it should be then
better to block their goods form the market if they refuse to allow others to compete in theirs
cant sell your goods or software in china without local business taking cuts and trade secrets? well bad luck now you cant do business in the west either until you drop that shit
China has the infrastructure to produce, the population to produce it, and the government to build more. I don’t think there’s really anybody that can compete with that.
People underestimate how much production other countries are capable of. Of course, China does dominate the manufacturing game, especially mass production.
There’s no shortage of alternatives all the same. Vietnam in particular has been doing quite well taking manufacturing work that companies are moving out of China so as to diversify their production chain. India is rising on that front too. Not to mention that the west truly does far more manufacturing than people give credit for — I’ve found that nearly every category of general goods that I try to buy will have some US made options. That’s not even touching the rest of the west. The big exception being electronics, but those have Vietnam and India as growing alternatives, with Taiwan, Japan, Malaysia, and Singapore all as solid players in that market.
The overall point being: it’s entirely possible to remove China from the manufacturing chain if there’s enough money behind the push. The US economy is probably large enough to do so with some meaningful struggle. The US and major allies could do so more easily. The difficulty is more political and temporal. Getting everyone on board and committed plus going through with the multi-year long process.
I think that the most disappointing aspect of obama’s presidency was that he did not do anything about china imposing those bullshit rules. he should have imposed some balance or outright make it illegal for those companies to put themselves in a situation where their ip’s will be sucked dry.
The one thing that could get Americans to revolt would be blocking them from getting cheap 50" tvs.
American tech is gonna get way more expensive dang
Lol. Ya don’t forget to monitor the router for unauthorized network access… in its logs, controlled by its firmware 😅
“Cisco said the threat actors are compromising the devices after acquiring administrative credentials and that there’s no indication they are exploiting vulnerabilities. Cisco also said that the hacker’s ability to install malicious firmware exists only for older company products. Newer ones are equipped with secure boot capabilities that prevent them from running unauthorized firmware.”
“Good news everyone, our old products are compromised, and the only solution is to buy new ones!”
“China found the backdoors we installed for the NSA, buy our new product with different backdoors.”
I wonder if they’re using default/hard coded creds (Ciscos have had a ton of them) or if its just bad password hygiene on the admins’ part.
Hardcoded creds seems like a really bad idea on a network appliance. If they MUST have hardcoded creds how about they only work when sent through a serial console at least your attacker would have to have local physical access to the device.
I do agree, and Cisco immediately grabbed the occasion to push their shitty restrictive trusted boot policy. Which is worrying.
This is the best summary I could come up with:
The threat actor is somehow gaining administrator credentials to network devices used by subsidiaries and using that control to install malicious firmware that can be triggered with “magic packets” to perform specific tasks.
In an advisory of its own, Cisco said the threat actors are compromising the devices after acquiring administrative credentials and that there’s no indication they are exploiting vulnerabilities.
Cisco also said that the hacker’s ability to install malicious firmware exists only for older company products.
Newer ones are equipped with secure boot capabilities that prevent them from running unauthorized firmware, the company said.
BlackTech members use the modified firmware to override code in the legitimate firmware to add the SSH backdoor, bypass logging, and monitor incoming traffic for “magic packets.” The term refers to small chunks of data the attackers send to the infected routers.
While they appear random and innocuous in system logs, these packets allow the attackers to surreptitiously enable or disable the backdoor functionality.
The original article contains 522 words, the summary contains 160 words. Saved 69%. I’m a bot and I’m open source!
The threat actor is somehow gaining administrator credentials
…lemme guess. Default logins.
We might never know how they managed to somehow to obtain the secret password …1…2…3 …4
That’s the same code I have on my luggage!
No one will ever guess admin/admin, it’s so blatanly obvious!
“You’re a hacker Harry”.
Avad
It seems the spell suffered some packet loss.
That’s UDP for you
Probably DNS
Ke
a
ra
dav
# ################# # Welcome to Hogwarts # ################# root@licorice>
ls
From the Grassy Node?
“Alohomora”
– Li Dazhou