this post was submitted on 07 Aug 2023
49 points (98.0% liked)

cybersecurity

3030 readers
2 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
top 11 comments
sorted by: hot top controversial new old
[–] [email protected] 27 points 1 year ago

Actually, two things went badly wrong here. The first is that Azure accepted an expired signing key, implying a vulnerability in whatever is supposed to check key validity. The second is that this key was supposed to remain in the the system’s Hardware Security Module—and not be in software. This implies a really serious breach of good security practice. The fact that Microsoft has not been forthcoming about the details of what happened tell me that the details are really bad.

Jesus fucking Christ..... I really did not expect this from Microsoft I have to say. The first one is strange already but the second one? Really looking forward to their explanation of this cluster fuck....

[–] [email protected] 16 points 1 year ago

Ooops!? I mean what can a person really say about this other than this was an epic failure on Microsoft's part. Either through hubris, lack of oversight, or just good plain old incompetence of management the Chinese have the keys to the castle. This really highlights the inherent weakness of proprietary software solutions and (in)security through obscurity. This is why everything I do that is not related to my job as a Windows desktop support engineer is going to be on open source.

[–] [email protected] 13 points 1 year ago (1 children)

This sort of thing is exactly the reason why I don't want things like TMP and Pluton built into my computer hardware. Microsoft is incompetent at best and outright malicious at worst, and allowing them to add "security features" directly at the hardware level is madness IMO.

[–] [email protected] 4 points 1 year ago* (last edited 11 months ago)

[This comment has been deleted by an automated system]

[–] [email protected] 6 points 1 year ago

How does one even recover from this. I guess the assumption stays the same that everything on a corp network is compromised. Can’t imagine this is going to win Azure new business for DoD workloads.

[–] [email protected] 3 points 1 year ago (2 children)

Maybe our government shouldn't be using corporate products. Maybe we should use that shit ton of money in our military budget to create our own software.

[–] [email protected] 2 points 1 year ago (1 children)

The government could save so much money gathering data directly instead of buying it from Microsoft.

[–] [email protected] 1 points 1 year ago (1 children)

Remember the OPM hack? Remember when pretty much every bit of PII for everyone in the government leaked? What makes you think the US government could do a better job?

[–] [email protected] 2 points 1 year ago

I failed in sarcasm.