HNNewShowAskJobs
Built with Tanstack Start
Cybersecurity breach at Congressional Budget Office remains a live threat(politico.com)
52 points by mooreds 2 days ago | 11 comments
  • lschueller2 days ago

    Reading the short article it feels like the old routine of 1. Cyber incident, 2. sparse information in all directions, 3. after fixed, all personnel returns to old habits with higher level of insecurity against a blurry, unspecific threat and back to square one. while the few sec op folks try to train employees to better secure the systems without really improving the crucial understanding of how such incidents really work. Or do I completely misinterpret such causalities?

    • firefax2 days ago |parent

      >Reading the short article it feels like the old routine

      Difference being the shutdown will make remediation much harder and take longer.

    • vpShane2 days ago |parent

      Sounds about right.

    • mistrial92 days ago |parent

      you missed "increase budget and capabilities of overseers"

    • khana2 days ago |parent

      [dead]

  • neilv2 days ago

    > “Maintain a high level of vigilance and verify the legitimacy of CBO communications by confirming with the sender via telephone that they sent the message,” the note continues.

    Depends how sophisticated and incentivized the attacker, of course.

    • dylan6042 days ago |parent

      Man, and I thought government was inefficient before. Now, after every message they receive, they must then call the person to verify the message before responding. Which naturally means, they then must call you back to verify you sent the response. Electronic messaging was meant to do away with this phone tag scenario, yet now they want to ensure messaging is dependent on phone tag.

      • terribleperson2 days ago |parent

        Since it's obviously impractical, the procedure will be worked around or ignored 99% of the time. The phone logs will however allow for the picking of a convenient scapegoat in the wake of a future attack.

        • dylan60411 hours ago |parent

          Man, if something ever needed group participation in malicious compliance, this would something I would nominate

      • retrochameleon2 days ago |parent

        If only telecomms made any sense for the 25th century with easily verifiable sender identification, and it would block malicious, spoofed, and spam messages before they ever got to your phone in the first place.

  • metalmana day ago

    in other news, busses in Norway have been found to have had internet conectivity installed by there chinese makers,spy busses and spy cranes, which is supposed to terrify us enough that we stop demanding $10000 chinese electric cars, which will spy on us, and send pictures of our children, likely throwing sandwiches at each other, back to china, for analysis of our eating habits and child rearing practice, so that they can wage profound psychological warfare on us, yes you, YOU, are making your child, FAT!