• frongt@lemmy.zip
    link
    fedilink
    English
    arrow-up
    9
    ·
    5 hours ago

    Also, this was found by an audit years ago. Doesn’t mean it was fixed, but doesn’t mean it was still the same during or after the theft.

    • FuglyDuck@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      4 hours ago

      At least it wasn’t the default password.

      I’ve known clients that have never removed the default admin account, with a default admin password… and looked at me like I had a horn growing out my ear…

      • frongt@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 hours ago

        I’ll admit it, I have systems at work with weak or default passwords. But they don’t handle any sensitive information, and exploiting them wouldn’t get you any additional privileges on the network.

        • FuglyDuck@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 hours ago

          that’s just it… any vulnerable system lets them get their nose in the door, then the camel starts snooping around the tent for whatever it can get. Eventually, they find away to something juicy.

          The thing is, whether we’re talking about digital or physical security, the weakest thing in any system is the humans. The sloppy passwords (c’mon it should have been Louvre25! lol.) is a human thing. clicking that phising scam is a human thing. kipping off to the egyption bedroom for tryste with receptionist is a human thing.

          the simple password isn’t the problem. The people being complacent is.

        • comrade_twisty@feddit.org
          link
          fedilink
          English
          arrow-up
          2
          ·
          4 hours ago

          Until someone figures out how to use this non critical system to exploit other parts of your network. An ssh shell on an internet connected coffee machine in a bank would make a great starting point to gain access to more critical systems for example.