Company says it doesn't know how long it will take to restore its Microsoft environment.
See full article...
See full article...
Attacking organization like this is the modern equivalent of burning farms and looting storehouses in the ancient world. They serve no purpose other than to make the innocent suffer or hope to demoralize the enemy at all costs.
Burning farms and looting storehouses is something the invaders do, not the defenders.I have multiple Stryker implants in my body from a major shoulder reconstruction last year. These devices have restored my ability to use my arm and return to all the activities I love. The devices they make serve to better the life of millions across this globe. Attacking organization like this is the modern equivalent of burning farms and looting storehouses in the ancient world. They serve no purpose other than to make the innocent suffer or hope to demoralize the enemy at all costs.
No, they just bomb schools, hospitals and medical facilities, and sink warships "for fun".Burning farms and looting storehouses is something the invaders do, not the defenders.
To paraphrase a quote M*A*S*H:War is hell.
For everyone on the front and back lines. I hope that's universally understood.
How does this work for the same app if, say, you had OneDrive or Outlook used in a managed environment but also wanted a personal or school copy? The last time I checked, that wasn’t supported.
Similarly, Apple at least used to have a way to convert unmanaged apps to managed. That’s the kind of thing I’d worry about someone not understanding or missing that an updated policy prompt has greater implications than 90% of the prompts they see.
While I don't disagree, there's a difference between MDM and MAM management, and both come from Intune. An MDM-managed device will be fully wiped, including all personal data. An MAM-managed device will only wipe the managed work content (work email, OneDrive, etc), and the personal data and apps are left untouched. Sounds like they might have been requiring MDM, which is dumb, and this is one of the big reasons why, and why we moved away from it. If someone leaves the company, we don't want to have to make them delete all the pictures of their kids or whatever.I heard on the rumor mill that the hackers took over Styker's MDM system and used it to wipe all of the devices on the company's network. This includes employees who installed Microsoft Intune on their personal phones.
And that's why you should never "bring your own device" to work. Make the company pay for a work phone or pager if they want to reach you outside of business hours.
In modern MAM, if you wipe the work content, it only wipes the work content, not the app. So, for example, if you had your work email, gmail, and proton mail all signed in in Outlook or Mail app, and an MAM wipe was commanded, your work account disappears from those apps. That's it. Your gmail and proton would remain and continue to work as expected. Same with OneDrive. Your work OneDrive content goes away, personal OneDrive content (using a personal account sign-in) stays and remains functional.How does this work for the same app if, say, you had OneDrive or Outlook used in a managed environment but also wanted a personal or school copy? The last time I checked, that wasn’t supported.
Similarly, Apple at least used to have a way to convert unmanaged apps to managed. That’s the kind of thing I’d worry about someone not understanding or missing that an updated policy prompt has greater implications than 90% of the prompts they see.
Everyone has such things. On a list if not stupid. (Some companies are.) But getting them to the top means bumping something else. So things move slowly.but may have been aware that there were risks that they should be working on mitigating.
Killing over a hundred girls in school still sounds much much worse.I have multiple Stryker implants in my body from a major shoulder reconstruction last year. These devices have restored my ability to use my arm and return to all the activities I love. The devices they make serve to better the life of millions across this globe. Attacking organization like this is the modern equivalent of burning farms and looting storehouses in the ancient world. They serve no purpose other than to make the innocent suffer or hope to demoralize the enemy at all costs.
No security is absolute. Attacks from state sponsored groups are constant and continuous and, unlike criminals, they don't have to make money. Iran and their ilk can comfortably afford to buy someone with 1 million is freshly mined bitcoin or blackmail someone for their credentials. Even if their pishing attempts only have a 1 in 100,000 chance of success its worth it for the disruption they can cause.The post-mortem breakdown of this attack will be interesting. My guess would be that they had not yet implemented some aspect of enhanced security, due to budgeting, scheduling, or both -- but may have been aware that there were risks that they should be working on mitigating. If they weren't aware of the risks/hadn't done a risk assessment in the past year, then they were lax on due diligence. We'll have to wait and see what comes out.
At this point if Iran retaliates it wouldn't be terrorism. It would be an act of war, because we are at war with Iran. Even if they get a proxy group to perform it, like Hezbollah and/or the Houthis. Calling it terrorism is a politically motivated label, not an accurate one.I guess we can expect more of this - and other terrorism - thanks to the psychopaths* running the shitshow that is the US these days.
* For those that haven't heard: https://www.msn.com/en-in/news/worl...ains-why-us-sank-46-iranian-ships/ar-AA1XTSQW
...okay?Killing over a hundred girls in school still sounds much much worse.
I mean, you have to remember the international conversion rate; 200 Iranian children is, what, maybe equal to 1/5 of a western child?Killing over a hundred girls in school still sounds much much worse.
retreating armies on the defense have done this for ages.Burning farms and looting storehouses is something the invaders do, not the defenders.
agreed this is not terrorism it is asymmetric warfareAt this point if Iran retaliates it wouldn't be terrorism. It would be an act of war, because we are at war with Iran. Even if they get a proxy group to perform it, like Hezbollah and/or the Houthis. Calling it terrorism is a politically motivated label, not an accurate one.
I'm not being nitpicky just to "well, actually", it's to remind everyone how serious repercussions can be. It is a war with consequences. Iran may not be Russia or China, but they're above North Korea in strength and ability. Iran is in the top 20 in global military power, coming in at 16th place on the GMP. With estimations putting them between Israel at 15th and Australia at 17th in capabilities.
We know they're experts at making drones and cyber warfare. I doubt this will be the end of it.
Intentional murdering 10,000+ protestors is even worse. https://www.theguardian.com/global-...ll-disappeared-bodies-mass-burials-30000-deadKilling over a hundred girls in school still sounds much much worse.
Is your friend not depressed enough already by current events?Does anyone know of a good science fiction book that transposes Crusades-era conflict between two religions each absolutely convinced God is on their side and committed to the destruction of the other to a modern or near-future scenario? Bonus points if it focuses on the ways neither side truly represents, or even cares about, its own people other than as fodder for the conflict and if one side isn't even run by a religious zealot but by a craven narcissist who is only aligned with them for political convenience. Asking for a friend.
Wars, like elections, have consequences. The issue is that the current occupant of the Oval Office does not understand consequences, having never faced them forI have multiple Stryker implants in my body from a major shoulder reconstruction last year. These devices have restored my ability to use my arm and return to all the activities I love. The devices they make serve to better the life of millions across this globe. Attacking organization like this is the modern equivalent of burning farms and looting storehouses in the ancient world. They serve no purpose other than to make the innocent suffer or hope to demoralize the enemy at all costs.
My friend thinks that if they are going to wallow in it anyway, they might be better off doing it with a book than a few bottles of bourbon.Is your friend not depressed enough already by current events?
Spot on. The current administration does not understand the concept of consequences, nor do they care about the suffering they might cause others. The clerical leaders in Iran see the consequences as a necessity to accomplish righteousness and rid the world of the great Satan.Wars, like elections, have consequences. The issue is that the current occupant of the Oval Office does not understand consequences, having never faced them forallany of the awful things he has done.
Wars, like elections, have consequences. The issue is that the current occupant of the Oval Office does not understand consequences, having never faced them forallany of the awful things he has done.
True. We do the same where I work.There’s different levels of BYOD and the point at which you are installing an MDM and managing your device is the point too far. We use Microsoft’s Outlook and Exchange rules and can only remotely erase the data in the one app. I don’t think that poses a risk to the personal device.
In an era of escalating ransomware attacks and APTs, there seems to be a surprisingly generous share of larger enterprises which have yet to really harden their environments. I know it's costly in terms of both time and purchase/licensing/support costs plus time and cost just to deploy. But based on some contacts we've had with various reps and support teams, despite cybersecurity companies steady marketing, there's a considerable swath of enterprises that are moving slowly to adopt more advanced protections -- slower than threats are advancing.No security is absolute. Attacks from state sponsored groups are constant and continuous and, unlike criminals, they don't have to make money. Iran and their ilk can comfortably afford to buy someone with 1 million is freshly mined bitcoin or blackmail someone for their credentials. Even if their pishing attempts only have a 1 in 100,000 chance of success its worth it for the disruption they can cause.
This attack wiped every Stryker-controlled computer/phone that was online at the time of attack. It has already caused case cancellations at the hospital my wife works at. It seems to be a big deal (tm) to the bone docs who are now trying to figure out how to reschedule Stryker cases when Stryker can’t tell them when they’ll be up and running again.Fuck. I have surgery scheduled in a month. It's actually quality of life improving surgery I'm looking forward to as well.
For those of us ignorant of Stryker as a company, would this situation apply globably or would certain regions be more likely to be affected than others in this particular regard?
If America is the great Satan then Iran is the great Iblis. This war was not started last week or last month or even in the last 100 years. this is an extension of the Shia vs Sunni vs Jew grudge that has been going on for 1400 years. It is unfortunate the US has stuck its nose in the middle of it all.Well.. given The Great Satans (Trumpistan and Israel) started the war and have targeted hospitals and killed people inside these hospitals then you get what you pay for.
Eye for an Eye and all that.
So all I have is crocodile tears for your kind...totally self absorbed and oblivious to the suffering The Great Satans have wrought on millions of innocent people over the decades.
Bluck
So, did / do you actually role out such tests on devices in your fleet?
Let's say on your own personal devices?
The Jew vs Muslim thing isn't really a religious thing (Islam recognizes Judaism and Christianity as being related predecessors, with itself as the enlightened successor). Of course, there's no question every group has religious bigots. But the Middle East is a war about land. Propagandists (on both sides) find religion a convenient tool to manipulate their target audience.If America is the great Satan then Iran is the great Iblis. This war was not started last week or last month or even in the last 100 years. this is an extension of the Shia vs Sunni vs Jew grudge that has been going on for 1400 years. It is unfortunate the US has stuck its nose in the middle of it all.
Thanks for your answer!Yes. I do. I've also tested what happens during remote wipes.
This isn't some side feature that doesn't get used. It's literally the default configuration for most BYOD enterprises now.
Look, I'm all about "trust but verify" and am highly suspicious of Microsoft, but if you have evidence that this segmentation doesn't do what it says on the box - especially because the segmentation actually has nothing whatsoever to do with Microsoft, and was built by Google and Apple for their respective operating systems - then just show us. Otherwise it's just FUD.
agreedThe Jew vs Muslim thing isn't really a religious thing (Islam recognizes Judaism and Christianity as being related predecessors, with itself as the enlightened successor). Of course, there's no question every group has religious bigots. But the Middle East is a war about land. Propagandists (on both sides) find religion a convenient tool to manipulate their target audience.
Thanks, wish I could upvote you more.At this point if Iran retaliates it wouldn't be terrorism. It would be an act of war, because we are at war with Iran. Even if they get a proxy group to perform it, like Hezbollah and/or the Houthis. Calling it terrorism is a politically motivated label, not an accurate one.
I'm not being nitpicky just to "well, actually", it's to remind everyone how serious repercussions can be. It is a war with consequences. Iran may not be Russia or China, but they're above North Korea in strength and ability. Iran is in the top 20 in global military power, coming in at 16th place on the GMP. With estimations putting them between Israel at 15th and Australia at 17th in capabilities.
We know they're experts at making drones and cyber warfare. I doubt this will be the end of it.
Yes, but look at the bright side: If you work hard and long enough, you may be one of the few in the country who can afford a basic level of healthcare.The US is so fucked.
I mean, I know that can apply in myriad situations and circumstances... but imagine having no job security, and fearing losing your job because the business is too cheap/lazy/whatever to provide you with device(s) [presumably] essential to carrying out your work.
It certainly sounds like an Intune admin's credentials were compromised, and then the account was used to wipe endpoints. IIRC, Microsoft recently implemented a feature in Intune where certain actions were held in a queue until a second admin approved them. Wonder if that would have helped here...I'll toss in my two cents' worth as a longtime MS systems admin... From what what's known/been described so far this looks like an Intune (MDM) wipe. Intune doesn't manage servers -- only endpoint devices like desktop/laptop Windows clients and mobile phones.
So at this point, what's down is likely the end-user devices. The servers and Active Directory/EntraID (formerly Azure AD) are likely still running -- it's just that no one can access them. It's like losing your house keys or the fob to your car. Everything may be fine inside, but you have no access with no functional endpoint devices to let you in. At least with server infrastructure, you should be able to achieve physical access somehow. Even an all-virtual server environment has a "physical" console available from the hypervisor. And even if your virtual infrastructure is hosted in an off-site datacenter, your management provider should be able to rig up a way to get to the console which is normally "theirs" alone -- even if it has to be over a Teams/Zoom/Whatever remote sharing session. There's always a way; it's just more cumbersome the further you go away from your own local physical server setup.
It's supremely annoying and inconvenient, but admins will be able to get back in by initially logging on locally to a server (Preferably a utility server that's not running critical services) and first begin the process of containing and controlling access to Intune and other Microsoft services. Global and Enterprise admins will be busy with a lot of password-changing and checking (and potentially further limiting/locking down) rights and delegations. Then the process will begin of verifying the Intune configuration and finally beginning to re-configure machines that desktop support staff and Intune can reach.
I'm going to assume that this being a medical products and services company, that they're rather conservative and are sticking to traditional AD-joined endpoint computers, which means that the computer needs to be joined (or re-joined) to AD before Intune can take over. (The other option is "Cloud-Joined" which connects to Intune first and then to AD, but that's often not desirable in an older AD environment that's been around since before "The Cloud," which Stryker very much would be.) Recovery will begin on-premises first. Remote workers and people like sales and support reps who are almost always traveling will be impacted for longer -- they may have to either bring in their devices to be re-configured or wait to have newly-imaged devices sent out to them. It's fundamentally a massive logistics problem that affects restoring access to the AD and network environment.
I agree that how someone got into the system is probably due to some form of phishing. Someone's credentials were compromised enough to get in, and further forays into the system may have allowed more to be harvested. Or they got lucky with a spear-phishing campaign against an administrator.
There will be much re-evaluation of which accounts are assigned particular rights and access, how pervasive any forms of MFA are, and what kinds of administrative credentials management are in place and how they're used.
Where I work, we've fundamentally separated everyday credentials for admins from the ones used to log on to servers and Active Directory/EntraID/Intune. And then the real admin-level accounts' passwords are heavily randomized and frequently rotated by a management system; we can't even log into servers without first authenticating (with MFA) onto a management platform which then issues a password to our "real" administrative accounts for the day. Hacking that system would require knowing the "normal" account password and spoofing the MFA, and having remote access into the system over our secured tunnel system in the first place, which is locked to company-owned devices only. No BYOD here at all. Are there potential holes and attack vectors? Sure there are. But it's always an escalation game of making more and more hoops for the attacker to jump through in order to limit their chances of getting in, even if they have managed to harvest credentials through simple phishing.
The post-mortem breakdown of this attack will be interesting. My guess would be that they had not yet implemented some aspect of enhanced security, due to budgeting, scheduling, or both -- but may have been aware that there were risks that they should be working on mitigating. If they weren't aware of the risks/hadn't done a risk assessment in the past year, then they were lax on due diligence. We'll have to wait and see what comes out.