Profile picture
Mudge @dotMudge
, 8 tweets, 2 min read Read on Twitter
Unfortunately this is not a new revelation or disclosure.

Going back to 2009 there was an engagement that used a battle command system.

The opposing force in the exercise found the contractor, downloaded the user and training materials from a web and FTP site, exposed...

1/
to the public Internet, and found by scanning the IP range of the sub-contractor who did the work.

Then, they just logged in as privileged users to all the battle systems. You would think that would have been game over (it was a very simple default password).

2/
However, the defenders claimed foul (?!?).

While the OpFor (opposing force) was frustrated, they said ‘fine’.

They proceeded to essentially fuzz the input and found numerous ways to crash the system. Some of these were probably exploitable, but for the exercise, ...

3/
and more importantly for Title-10 type engagements disruption (with attribution no less) can be more desireable than silent compromise.

The engagement continued and promptly the OpFor crippled everyone by crashing the systems.

4/
The ‘red team’ was then dismissed because everyone else needed to get ‘realistic’ training out of the exercise.

The bad news is that this happens, and there are a lot of systems that didn’t take ‘cyber’ hardening into account for risk models in development/engineering.

5/
The good news is that this can be addressed in the:

* short term via certain stop gap measures

* medium term via minimization of types of accessibility to input (phys, network, em, ...)

* long term via quantified measurements/transparency of hygiene in contractor deliverables.
To be fair contractors weren’t/aren’t given instructions or guidelines to build systems in hardened fashions against types of attacks that practitioners in the infosec field consider basic.

Similarly program managers were/are not generally aware of the exposure.

Addressable.
Colophon: Such disruption and ‘effect’ should be expected in any actual engagement with an adversary possessing modest capabilities, coordination, and military strategy.
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Mudge
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!