Penn State Yanks Engineering Network From Internet After China-Based Attack 101
coondoggie writes: Penn State's College of Engineering has disconnected its network from the Internet in response to two sophisticated cyberattacks – one from a what the university called a "threat actor based in China" – in an attempt to recover all infected systems. The university said there was no indication that research data or personal information was stolen in the attacks, though usernames and passwords had been compromised.
Penn should hire Hillary's cybersecurity people (Score:2, Informative)
What do you say of the cybersecurity surrounding Hillary Clinton?
It sounds like Penn should hire Hillary Clinton's cybersecurity people. There is absolutely no evidence at all that her basement mail server was ever hacked.
There is no evidense at all (Score:1)
In a manner of saying. There is no evidence at all. The Clinton Crime family scrubbed the machine, yoga emails and all. My guess is Vlad and Xi have read every detail.
Re:Penn should hire Hillary's cybersecurity people (Score:5, Insightful)
What do you say of the cybersecurity surrounding Hillary Clinton?
It sounds like Penn should hire Hillary Clinton's cybersecurity people. There is absolutely no evidence at all that her basement mail server was ever hacked.
Of course there is no evidence.... She literally erased EVERYTHING on the server. Oh sure, she had some e-mails printed, but the server, and the E-mail supposedly on it where erased before anybody had a chance to look. All we really have is her word that it never was hacked, not that she'd know if it was anyway.
Re: (Score:2)
Okay, so a Republican controlled congress failed to seize the server before it was wiped clean. I wouldn't go around making a big deal about this if I were a Republican. It may come back to bite you when the presidential election rolls around.
When the election rolls around? Uh, I think it's hear now and we have nearly 2 years of campaigning in our future... Heaven help us... Hillary won't be materially harmed by this, by the time she actually starts campaigning it will be old news but thinking the republicans will be harmed by this somehow is nuts... Unless of course they over play the card... But that's a self inflected "unforced error" kind of thing and if the democrats are hoping for that, it's going to go badly for them and they know it.
Re: (Score:2)
Still doesn't align well with the 'transparent government' push. Come on, as a public official you shouldn't be using private servers for official communications.
Re: (Score:3)
What do you say of the cybersecurity surrounding Hillary Clinton? The real solution is to elect a rock ribbed conservative to the Presidency like Ted Cruz who won't be squeamish about bustin' some heads.
You don't have any idea how moronic that sounds, do you?
Re: (Score:3)
Re: (Score:3)
I thought the president was elected? When did we stop ruling?
Re: (Score:1)
these things will just keep happening. They just don't get security, and they actually like it when the average person gets hurt by a communist. It gives them more of an excuse to go on another one of their constant murder rampages. That is the way of their kind. They are encouraging this to happen.
Talk about rank partisan stupidity... normalizing relations with China was a good move overall. They are no longer a communist country, though the communist party is still in control, they are gradually relinquishing control as their quality of living overall improves. The US on the other hand was controlled exclusively by the Democrats for 2 years, and a Democrat majority (Senate and Presidency, only lacking the House) for 4 more years, rounding out to 6 years out of the last 7 being dominated by the De
A logical response (Score:2, Insightful)
There are Chinese nationals at Penn State and every other university in America, displacing our own people. Why don't we start revoking student VISAs as a response?
Re:A logical response (Score:5, Funny)
Yeah, and they'll switch to Mastercards. Great plan.
Wait, what? :)
Re: (Score:1)
Now, come on ... this is funny.
Re: (Score:3, Insightful)
Because the radical left on campuses would say that's racist and 'anti-social.'
Re: (Score:3, Insightful)
Because the radical left on campuses would say that's racist and 'anti-social.'
And the left would be right.
Re: (Score:2)
Re:A logical response (Score:4, Insightful)
There are Chinese nationals at Penn State and every other university in America, displacing our own people. Why don't we start revoking student VISAs as a response?
Because the radical left on campuses would say that's racist and 'anti-social.'
Here's a thought... perhaps we should stop this xenophobic whining and retaliate against the culprits rather than applying a shotgun remedy like revoking the student visas of every Chinese person in sight regardless of whether they were involved in these attacks or not? The "drop a 2000lb bomb on it" approach may be intensely satisfying, especially to the political right. However, it causes collateral damage, it is therefore inelegant and it reeks of stupidity and desperation. Just play the old eye for an eye and tooth for a tooth game. If the Chinese can set up 'cyber warfare' units and think they can attack the USA with impunity in times of peace without it being an act of war then surely they will not complain if the USA uses the 'cyber warfare' branch of it's military to launch attacks inside China against the assholes who are doing this? ... and if they do complain about being hoisted by their own petard then they'll just look pathetic. The USA does have a credible 'cyber warfare' capability does it not?
Re: (Score:2)
We should probably make a distinction between cyber "attacks" and cyber "thefts". This appears to be of the latter variety, although of course no details were given. Ransom-ware or Stuxnet would better be classified as an "attack". No doubt the government would like any military or political intelligence they can get, and I'm sure they're working to that end already.
One problem (among many) with equivalent retaliation is that we have a lot more worth stealing then they do. There's less of an incentive i
Re: (Score:2)
Stop making bullshit claims for a start. Got a complaint, prove it in court and then apply a fiscal trade penalty by confiscating assets from foreign business located locally and placing the onus upon them to recover the money from their government. Considering the behaviour of the NSA the rest of the world could logically claim something in the order of a couple of hundreds billion dollars of economic damages. Oh, yeah and the US can also try doing it to the rest of the world.
Stop with the bullshit, got
Re: (Score:2)
no, it would have more to do with it being effectively a conviction and punishment without due process let alone accusation.
I'm beginning to think you are having a stroke, your lack of context and knowledge of definitions is so striking.
that or you just suffer from diarrhea of the mouth, issuing random phrases you heard once.
Re: (Score:1, Insightful)
Because that would create a major diplomatic incident over something that you have no evidence involves any State players. Just because the attack is based in China does not imply that China was behind the attack.
Re: (Score:2)
bullshit.
Re: (Score:1)
Considering that the Penn State College of Engineering has a research partnership with the U.S. Navy, state-sponsored espionage is a reasonable working assumption until an investigation proves otherwise (much like suicides are investigated as homicides, until proven otherwise).
Re:A logical response (Score:5, Insightful)
Because Microsoft would lose all their new H-1B employees.
Re: (Score:1)
If the librarians were breaking the law and committing blackmail to protect a child rapist, then yes you could blame them. The President of the university and the Athletic Director were convicted for breaking the law to protect a child rapist. They were notified about the rapes, but instead of putting a stop to it, they protected the rapist so he could continue to rape and rape and rape. Your analogy is bad.
And, why would Microsoft associate themselves with an organization that is from the top pro-child
Re: (Score:1)
> wasn't even an employee of Penn State during his crimes
He was there from 1963 to 1966 then from 1969 to late 2011 when he was finally banned. That's 47 years that he was on campus. He was either a student-rapist or coach-rapist for all but the last few of those years. He most certainly did rape children when he was there. The Second Mile was founded in 1977 to provide that Penn State employee access to boys to rape. 1977! You can't argue with the timeline that convicted him in court. Why are you
Re: (Score:1)
Want to know how I know you don't know anything about international relations? First clue is you are talking out your ass.
Re: (Score:3)
Why don't we start revoking student VISAs as a response?
Yes, that is so much better than implementing decent security and salting passwords.
Just block China already. (Score:3)
Re:Just block China already. (Score:4, Insightful)
So protecting your data and your intellectual property is racist? That's a new play on the race card. It's not about blocking the Chinese people from accessing information, shit their own government does a pretty good job of that already. It's about blocking concerted, direct espionage against US companies, educational institutions and the government. It's not some pimple faced teenager trying to break in for fun, it's about the theft of our technology. Sure, technology leaks and history is replete with examples but this wholesale theft needs to be curtailed and if necessary start blocking IP address ranges; better yet we need a great firewall of China for traffic going to/from China.
Re: (Score:2)
The reality being that most of China has no knowledge or approval of these things, and punishing them is silly. And the hypocrisy is that there are plenty of US agents engaging in espionage.
That's good. I'd hate to be punished for all the stuff my government is doing supposedly in my name.
Re: (Score:1)
Personally, I do something very similar... every address block assigned to APNIC. Yes, it's a shotgun approach, but it's surprisingly effective. HOWEVER, it's not something that can be done by everyone; it works for me because I have no need to talk to anything in Asia. That won't work for my employer as they have offices all over the world -- including Asia, and all of our manufacturing is done by companies in Asia.
Passwords were compromised? (Score:1)
Re: (Score:2)
No.
Re: (Score:2)
Ever heard of john the ripper and the 50 other password crackers that are free to download?
Re: (Score:3)
Or maybe use use of "compromised" comes from a responsible adult to mean that "a copy of the salted and encrypted db has been made which they could possibly brute-force before the heat-death of the universe so we should go ahead and replace all entries now".
A Message from The President of Penn State (Score:3)
Moving forward, we all will need to take additional steps to protect ourselves, our identities and our information from a new global wave of cybercrime and cyberespionage.
Second, and most importantly, how long until the US and China "come in from the cold" and enter an actual hot war(with the way events are unfolding in the South China Sea, and this cold war that has been going on for the last 15 years)?
Re: (Score:2)
As to the odds of a shooting war in East Asia, my hope is that there is too much money and profit involved for anything to really get out of hand. That said, what concerns me is the possibility that the Chinese government will rely increasingly on nationalism to shore up its domestic popular support as the double-digit growth years become a thing of the past. This i
Bad PR angle (Score:2)
"We will prepare your children for the future by hiding in caves."
And this is why you monitor your traffic (Score:2)
Re: (Score:2)
WE ARE (Score:2)
Where did other attack come from? (Score:2)
The Penn State announcement doesn't mention China at all. The other says an unnamed source said one of the two sources was China. Where was the other?
Other countries are doing exactly what the NSA does. The NSA does the same thing, forwarding technology information and foreign business strategies to US companies by hacking communications through ECHELON, tapping into privately owned infrastructure cables, keylogging and tapping phones at sources.
But that's OK because it's "us" and not "them."
Oxymoron (Score:2)
The university said there was no indication that research data or personal information was stolen in the attacks, though usernames and passwords had been compromised.
Because you know...who would consider passwords to be personal information...
Penn State disconnected network? (Score:1)
What was the nature of the attack, what Operating System does Penn State run on?
Happened at Rutgers, too (Score:1)
A friend of mine at Rutgers complained that attacks resulted in Rutgers being cut off from the Internet in recent weeks.