• Bell@lemmy.world
    link
    fedilink
    English
    arrow-up
    64
    arrow-down
    6
    ·
    1 year ago

    Maybe we could have a comprehensive tariff on goods that floats with the number of state-sponsored cyber crimes, human rights violations, etc. Hack our routers? The rate just went up 5%.

    • xodoh74984@lemmy.world
      link
      fedilink
      English
      arrow-up
      53
      arrow-down
      3
      ·
      1 year ago

      I think this is fair, but man the retaliatory tariffs for NSA backdoors would be atrocious

    • 50gp@kbin.social
      link
      fedilink
      arrow-up
      22
      arrow-down
      1
      ·
      1 year ago

      better to block their goods form the market if they refuse to allow others to compete in theirs

      cant sell your goods or software in china without local business taking cuts and trade secrets? well bad luck now you cant do business in the west either until you drop that shit

      • BeMoreCareful@lemdro.id
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        3
        ·
        1 year ago

        China has the infrastructure to produce, the population to produce it, and the government to build more. I don’t think there’s really anybody that can compete with that.

        • LetMeEatCake@lemm.ee
          link
          fedilink
          English
          arrow-up
          10
          ·
          1 year ago

          People underestimate how much production other countries are capable of. Of course, China does dominate the manufacturing game, especially mass production.

          There’s no shortage of alternatives all the same. Vietnam in particular has been doing quite well taking manufacturing work that companies are moving out of China so as to diversify their production chain. India is rising on that front too. Not to mention that the west truly does far more manufacturing than people give credit for — I’ve found that nearly every category of general goods that I try to buy will have some US made options. That’s not even touching the rest of the west. The big exception being electronics, but those have Vietnam and India as growing alternatives, with Taiwan, Japan, Malaysia, and Singapore all as solid players in that market.

          The overall point being: it’s entirely possible to remove China from the manufacturing chain if there’s enough money behind the push. The US economy is probably large enough to do so with some meaningful struggle. The US and major allies could do so more easily. The difficulty is more political and temporal. Getting everyone on board and committed plus going through with the multi-year long process.

      • Zima@kbin.social
        link
        fedilink
        arrow-up
        8
        arrow-down
        2
        ·
        1 year ago

        I think that the most disappointing aspect of obama’s presidency was that he did not do anything about china imposing those bullshit rules. he should have imposed some balance or outright make it illegal for those companies to put themselves in a situation where their ip’s will be sucked dry.

      • RobotToaster@mander.xyz
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        The one thing that could get Americans to revolt would be blocking them from getting cheap 50" tvs.

  • mvirts@lemmy.world
    link
    fedilink
    English
    arrow-up
    52
    arrow-down
    1
    ·
    1 year ago

    Lol. Ya don’t forget to monitor the router for unauthorized network access… in its logs, controlled by its firmware 😅

  • halfempty@kbin.social
    link
    fedilink
    arrow-up
    41
    arrow-down
    1
    ·
    1 year ago

    “Cisco said the threat actors are compromising the devices after acquiring administrative credentials and that there’s no indication they are exploiting vulnerabilities. Cisco also said that the hacker’s ability to install malicious firmware exists only for older company products. Newer ones are equipped with secure boot capabilities that prevent them from running unauthorized firmware.”

    • Aqarius@lemmy.world
      link
      fedilink
      English
      arrow-up
      27
      arrow-down
      1
      ·
      1 year ago

      “Good news everyone, our old products are compromised, and the only solution is to buy new ones!”

    • RobotToaster@mander.xyz
      link
      fedilink
      English
      arrow-up
      22
      arrow-down
      1
      ·
      1 year ago

      “China found the backdoors we installed for the NSA, buy our new product with different backdoors.”

    • Unaware7013@kbin.social
      link
      fedilink
      arrow-up
      20
      ·
      1 year ago

      I wonder if they’re using default/hard coded creds (Ciscos have had a ton of them) or if its just bad password hygiene on the admins’ part.

      • partial_accumen@lemmy.world
        link
        fedilink
        English
        arrow-up
        24
        ·
        1 year ago

        Hardcoded creds seems like a really bad idea on a network appliance. If they MUST have hardcoded creds how about they only work when sent through a serial console at least your attacker would have to have local physical access to the device.

      • ddkman@lemm.ee
        link
        fedilink
        English
        arrow-up
        9
        ·
        1 year ago

        I do agree, and Cisco immediately grabbed the occasion to push their shitty restrictive trusted boot policy. Which is worrying.

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    26
    arrow-down
    1
    ·
    1 year ago

    This is the best summary I could come up with:


    The threat actor is somehow gaining administrator credentials to network devices used by subsidiaries and using that control to install malicious firmware that can be triggered with “magic packets” to perform specific tasks.

    In an advisory of its own, Cisco said the threat actors are compromising the devices after acquiring administrative credentials and that there’s no indication they are exploiting vulnerabilities.

    Cisco also said that the hacker’s ability to install malicious firmware exists only for older company products.

    Newer ones are equipped with secure boot capabilities that prevent them from running unauthorized firmware, the company said.

    BlackTech members use the modified firmware to override code in the legitimate firmware to add the SSH backdoor, bypass logging, and monitor incoming traffic for “magic packets.” The term refers to small chunks of data the attackers send to the infected routers.

    While they appear random and innocuous in system logs, these packets allow the attackers to surreptitiously enable or disable the backdoor functionality.


    The original article contains 522 words, the summary contains 160 words. Saved 69%. I’m a bot and I’m open source!