What did they hack and how did they “get in”?
Contrary to the title, there is little “how” and mostly “what”.
Although I don't know, I think this story was released for exactly that purpose, to improve public support for the NSA and Cyber Command. With Snowden being in the news lately I'm sure they're looking for opportunities to run cool war stories to balance out their image.
> They even had file sharing through them. "If we could take those over," Neal said, grinning, "we were going to win everything."
Then see some public CVE's around that time, such as:
> CVE-2015-5474: BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
> Project Zero 2018: Simply put, those JSON-RPC issues create a vulnerability in the desktop and web-based uTorrent clients, which both use a web interface to display website content. An attacker behind a rogue website, Ormandy said, can exploit this client-side flaw by hiding commands inside web pages that interact with uTorrent’s RPC servers. Those commands range from downloading malware into the targeted PC’s startup folder or gaining access to user’s download activity information.
And the remote code execution via media files / video virus (Hollywood movies, porn) https://www.cvedetails.com/vulnerability-list/vendor_id-5842... .
So you have file sharing going on, and can remote code execute, if: you get the target to visit a website you (partly) control, you get the target to click a (.torrent) link you crafted, you get the target to download a manipulated video file, compromised (Adobe) software, or cracked game with the payload. These if's are for a military that can easily DNS hijack, spoof (update) certs, ask help from allies who control 25% of all internet advertisements, set up convincing websites targeted to the region, or reroute internet traffic.
Get a TS/SCI and go work for CyberCommand if you want to be in the know.
It would be naive to require that all government information is shared with the public, but we should maintain robust oversight on all clandestine activities and give that oversight teeth to correct problems when such activities to too far. My 2c.
Why would you publicly inform your enemy of a vulnerability?
Disclaimer: I had a security clearance when I was in the Army.
I think that "hacking a human" as they described it was the most likely vulnerability. Interesting to see that ISIS actually seem to have a decent infrastructure. From media reports you would believe that they are mainly some barbarians that may have or may have not access to electricity, never mind net access.
That aside: NPR offering a plain text site is just awesome. Found that nearly by accident since I just wanted to accept that damn cookies.
Isn't that what all reports after 9/11 would have you believe of al-qaeda and the taliban? Complete with videos of masked men "training" in deserts by jumping over logs and climbing ropes? And Reports that Bin Laden is hiding in mountains?
Meanwhile Bin Laden was living in a large compound in Pakistan all but protected by the Pakistani military and I believe 8 of the 9/11 hijackers had degrees in engineering and a couple PhDs among them.
For example, the Stuxnet worm used multiple OS zero days and involved hacking or otherwise exfiltrating signing keys from multiple other third parties (https://www.quora.com/What-is-the-most-sophisticated-piece-o...). I bet a lot of that sort of thing is going on these days too, and we just don't know about it.
It's in the interest of cyber-warfare actors to not expose their capabilities unnecessarily. Although efforts are taken to prevent malware from coming to the attention of enemies / rivals, or even being adopted by them or criminals, deployment always comes with that risk.
He was later killed in a dronestrike.
USA always will win.
And I will infinitely fault the Obama administration for providing technology which immediately fell into jihadist hands, which any reasonable analyst would have told them would happen.
But it's not accurate to say the US 'supplied' equipment to ISIS. ISIS stole it.
edit: I don't recommend reading Dabiq because a decapitation is really difficult to unsee.
Cringe.
> Once he did that, he would see: 404 error: Destination unreadable.
Sounds like somebody got their ICMP types and HTTP response codes mixed up but, hey, they're journalists, not IT guys. We understood their point.
Be kind. Don't be snarky. Comments should get more
thoughtful and substantive, not less, as a topic
gets more divisive.
When disagreeing, please reply to the argument
instead of calling names. "That is idiotic;
1 + 1 is 2, not 3" can be shortened to "1 + 1
is 2, not 3."
Please don't post shallow dismissals, especially
of other people's work. A good critical comment
teaches us something.
[0] https://news.ycombinator.com/newsguidelines.html