←back to thread

492 points vladyslavfox | 2 comments | | HN request time: 0.481s | source
Show context
TheFreim ◴[] No.41895901[source]
> "It's dispiriting to see that even after being made aware of the breach weeks ago, IA has still not done the due diligence of rotating many of the API keys that were exposed in their gitlab secrets," reads an email from the threat actor.

This is quite embarrassing. One of the first things you do when breached at this level is to rotate your keys. I seriously hope that they make some systemic changes, it seems that there were a variety of different bad security practices.

replies(5): >>41896145 #>>41896897 #>>41897646 #>>41897785 #>>41898493 #
galleywest200 ◴[] No.41896145[source]
>"It's dispiriting to see that even after being made aware of the breach weeks ago..."

These people are not dispirited whatsoever, if anything they are half-cocked that these script kiddies found an easy target.

replies(3): >>41896810 #>>41897552 #>>41899451 #
1. EasyMark ◴[] No.41897552[source]
I highly doubt they are script kiddies. More than likely they are state actors or mercenaries of state actors attempting to bring down the free transmittal of information between regular folks. IA evidently has not so good security and wikipedia must be doing pretty well I guess? I can’t recall the last time one of these attacks worked on Wiki.
replies(1): >>41898090 #
2. luckylion ◴[] No.41898090[source]
Why would they publicly call them out and lay open the way they breached them if they were "attempting to bring down the free transmittal of information between regular folks"?

They could have done much worse but they chose not to and instead made it public. Which state actor does that?