• Optional
    link
    256 days ago

    . . .hackers “gained access to a key used by the vendor to secure a cloud-based service used to remotely provide technical support for Treasury Departmental Offices (DO) end users. With access to the stolen key, the threat actor was able to override the service’s security, remotely access certain Treasury DO user workstations, and access certain unclassified documents maintained by those users.”

    Hey let’s store the nation’s critical infrastructure documents on Jeff Bezos’ computers! Yay! What a cost savings that will be. And why not send all government communications through Microsoft?! Boy what a load off that will be.

    • @CharlesDarwin
      link
      English
      66 days ago

      FACEPALM. I still don’t know how AWS, et al, did it, but they have convinced a whole shit-ton of people to believe that using their “cloud” is not only as secure as building and maintaining their own infrastructure, they’ve convinced a lot of people it’s more secure. Because “core competencies”, etc…yeah, let’s de-skill a whole lot of IT people by learning only certain vendor dashboards and think that’s going to work out long term for things like security, DR, BC…

      It’s kinda dumb when really, really big tech companies do this, it’s even stupider if government agencies fall for it…

  • @phoneymouse
    link
    186 days ago

    Maybe it’s time for the US govt to start paying high enough wages to recruit tech talent.

      • @CharlesDarwin
        link
        English
        16 days ago

        They’ll obediently adhere to Musk’s stupid notions of being “hardcore”. Unlike those uppity American citizens, thinking they have any rights or dignity…

  • @[email protected]
    link
    fedilink
    English
    96 days ago

    It’s weird how, despite the feds being the ones who push security requirements onto the states, the states often have better security in place than the people making the rules…wtf

    • @RapidcreekOP
      link
      106 days ago

      First of all, I’m not buying that states have better security. But, most of all I’d say that the US government have much larger networks with much more important data. Which is what the hackers want.

    • JWBananas
      link
      English
      26 days ago

      They were breached via a compromised security vendor

        • JWBananas
          link
          English
          05 days ago

          They didn’t. They had access to workstations which were then compromised in turn.

  • @RapidcreekOP
    link
    46 days ago

    The Boyz from Beijing are at it again