Bonum Certa Men Certa

Unwarranted Media Hysteria Over (Allegedly) China Almost Sneaking Compromised xz Into Stable, Production Operating Systems (It Failed) While the US Government Blames Microsoft for Allowing China to Break Into Vital Government Systems Via Windows

posted by Roy Schestowitz on Apr 03, 2024

Shifting attention much, Microsoft-funded media? Microsoft: my dog ate my homework. So what if our whole internal infrastructure and all of Azure got compromised? "LOOK OVA' THAR!"

Beautiful white and brown dog lying under the table

THIS morning we wrote about how nearly 2 decades ago rms (Richard Stallman), who had given public talks about GNU since the mid-80s, warned that proprietary operating systems like Windows were a "back door" threat and, to make matters worse, you would not even know, no matter if that got detected or not (this already happened to Microsoft) [1, 2].

The "mainstream" (corporate, advertisers-funded and typically oligarch-owned) media won't mention any of this and instead it has helped distract from severe Microsoft Exchange issues. There is now a follow-up (see [1-4] below), but the media is shifting attention to "Linux" and it blames "Open Source" because some random user on Microsoft's GitHub (proprietary) pulled off a social engineering attack, aided by Microsoft systemd (also GitHub) and made "famous" by a Microsoft employee.

"Not only is there the 17k Microsoft Exchange server problem," an associate notes this morning, "but there is also the recent report excoriating Microsoft over its mishandling of the China-origin breach of its infrastructure."

See the links below.

"Allegedly" in the title of this post is because (while China is confirmed for the Microsoft breach) we don't even know what happened to xz. GitHub (Microsoft) makes it harder by hiding the evidence. The issue here or the culprit remains unattributed, an associate has said. "Red China is as likely as Israel, Russia, Netherlands, or US."

"However, in the other break-in [Microsoft], it is directly attributable to Red China."

Funnily enough, the corruptible media portrays the source of the FUD, Microsoft, as the saviour here. As if a campaign of misinformation or strategically-timed drama is something to be commended/praised for.

We're collectively paying the price for having very bad media/press. Media standards in the West have fallen closer to Red China's levels.

  1. Scathing federal report rips Microsoft for shoddy security, insincerity in response to Chinese hack

    In a scathing indictment of Microsoft corporate security and transparency, a Biden administration-appointed review board issued a report Tuesday saying “a cascade of errors” by the tech giant let state-backed Chinese cyber operators break into email accounts of senior U.S. officials including Commerce Secretary Gina Raimondo.

    The Cyber Safety Review Board, created in 2021 by executive order, describes shoddy cybersecurity practices, a lax corporate culture and a lack of sincerity about the company's knowledge of the targeted breach, which affected multiple U.S. agencies that deal with China.

  2. Cyber review board blames cascading Microsoft failures for Chinese hack

    The CSRB lays the blame for the incident squarely on Microsoft: “The Board concludes that this intrusion should never have happened. Storm-0558 was able to succeed because of a cascade of security failures at Microsoft.”

    The report represents the conclusion of a seven-month review and comes against the backdrop of growing concern in Washington that a series of severe breaches at Microsoft has made the company a national-security liability at a time when the federal government is increasingly relying on that company for a raft of cloud computing services. In January, Microsoft disclosed the latest such incident, in which Russian hackers were able to access emails belonging to senior company officials and company source code.

  3. Microsoft slammed for lax infosec that led to Exchange crack

    A review of the June 2023 attack on Microsoft's Exchange Online hosted email service – which saw accounts used by senior US officials compromised by a China-linked group called "Storm-0558" – has found that the incident would have been preventable save for Microsoft's lax infosec culture and sub-par cloud security precautions.

    The review, conducted by the US government's Cybersecurity and Infrastructure Security Agency's Cyber Safety Review Board (CSRB), calls for "rapid cultural change" at Microsoft. Among the Board's recommendations: [...]

  4. Review of the Summer 2023 Microsoft Exchange Online Intrusion [PDF]

    In May and June 2023, a threat actor compromised the Microsoft Exchange Online mailboxes of 22 organizations and over 500 individuals around the world. The actor—known as Storm-0558 and assessed to be affiliated with the People’s Republic of China in pursuit of espionage objectives—accessed the accounts using authentication tokens that were signed by a key Microsoft had created in 2016. This intrusion compromised senior United States government representatives working on national security matters, including the email accounts of Commerce Secretary Gina Raimondo, United States Ambassador to the People’s Republic of China R. Nicholas Burns, and Congressman Don Bacon.

    Signing keys, used for secure authentication into remote systems, are the cryptographic equivalent of crown jewels for any cloud service provider. As occurred in the course of this incident, an adversary in possession of a valid signing key can grant itself permission to access any information or systems within that key’s domain. A single key’s reach can be enormous, and in this case the stolen key had extraordinary power. In fact, when combined with another flaw in Microsoft’s authentication system, the key permitted Storm-0558 to gain full access to essentially any Exchange Online account anywhere in the world. As of the date of this report, Microsoft does not know how or when Storm-0558 obtained the signing key.

    This was not the first intrusion perpetrated by Storm-0558, nor is it the first time Storm-0558 displayed interest in compromising cloud providers or stealing authentication keys. Industry links Storm-0558 to the 2009 Operation Aurora campaign that targeted over two dozen companies, including Google, and the 2011 RSA SecurID incident, in which the actor stole secret keys used to generate authentication codes for SecurID tokens, which were used by tens of millions of users at that time. Indeed, security researchers have tracked Storm-0558’s activities for over 20 years.

Other Recent Techrights' Posts

European Patent Office (EPO) Illegally Turning to Slop Behind Closed Doors, Staff Objects to This Hidden Catastrophe
Who stands to gain from all this and at whose expense?
After US Government Funding Cuts the Centralisation of the Web (Especially Certificate Authority Let's Encrypt) is at Risk
They try to pull the plug on open protocols with decent encryption available (unless it is outsourced to third parties)
When Microsoft Folks Who Literally Strangle Women Try to Strangle Microsoft Critics
Speaking to Court staff yesterday, they too are shocked about those SLAPPs
Martinique: Windows Down to All-Time Low
we cannot expect Windows to ever recover
Press Reports Say Almost 10,000 Western IBMers Laid Off
We've been trying to verify/corroborate this somehow
Days Ago yewtu.be Found a Workaround That Made Invidious Work Again. Then Google Broke All the Instances (Again).
"Youtube changed something again, so if a video does not play, it's because of that."
 
Growing Poverty Rates in the United States of America (or Elsewhere) Beneficial to GNU/Linux Adoption
Toxic politics around the world, including the US, may mean weaker economies
Gemini Links 25/03/2025: Relaxation, Literary "Movements", and Gemini Mentions
Links for the day
Links 25/03/2025: Putin Sends Children to Battle, 23andMe Drowns as People's Highly Personal DNA Data Floats
Links for the day
Anticipated in 2018: Lilie James & Location tracking, Googlists complained
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, March 24, 2025
IRC logs for Monday, March 24, 2025
IBM (and Red Hat) on a Fast Train to Nowhere
What is the future of Fedora when IBM keeps removing its leadership?
Gemini Links 24/03/2025: "Live Off the Land" and Life Without YouTube
Links for the day
Planet Ubuntu (or Ubuntu Planet) is LLM Slop
Reading chatbots' output is bad use of time
The European Patent Office (EPO) is Slowly Killing Its Own Staff; All It Cares About Is Money
The Office hasn't been run by a scientist for about 18 years already
Links 24/03/2025: US Detaining Innocent People, F-35 Contracts Suspended Due to Hostilities
Links for the day
Cellphones (Mobile Phones) in Classrooms
A recent study confirmed that people's intelligence has dropped in recent years/decades
Is the FSF Being 'Trolled' by Microsofters Pushing C# (Microsoft)?
Who stands to benefit from training people to use and spread Microsoft?
Matthew J. Garrett is "Former Microsoft Researcher", According to Microsoft's Serial Strangler
Their argument is something along the lines of, "what Roy published damaged my career prospects, so I want Roy to pay me...
Links 24/03/2025: Political Catchup and Environmental Concerns
Links for the day
Windows Has Now Fallen to Rather Ridiculous 3% "Market Share" in Iraq (Windows Was Measured at 100% Back in 2010)
Iraq is not a place where Windows can make a comeback
Gemini Links 24/03/2025: Working With Music and Unconscious Influence
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, March 23, 2025
IRC logs for Sunday, March 23, 2025
Critics of IBM's Strategy Aren't Racists, But...
the situation is saddening as it serves to obscure the severity of the problem
Mauritania: Windows Falls to All-Time Low of 6% (It Used to be Over 99%)
Windows is 0% in mobile
New USPTO Memo Makes Fighting Patent Trolls Even Harder
The U.S. Patent and Trademark Office (USPTO) just made a move that will protect bad patents at the expense of everyone else
Outline of Open Source Initiative Coverage to Come (Now That Consensus is Changing)
Policing Wikipedia and attacking critics is not a sustainable strategy
An "EU OS" Would Need European Components
There are many European (or Europe-led) distros of GNU/Linux. EU OS developers ought to look at those.
Gemini Links 23/03/2025: "Connor of the Cats" and CSS Naked Day
Links for the day
Links 22/03/2025: Science and Antoine Beaupré on "Losing the War for the Free Internet"
Links for the day
We Probably Served Close to 100 Million Gemini Requests
Many of these requests probably came from bots, but it's hard to distinguish (to block them) ... This coming summer Gemini Protocol will turn 6
Just Because Microsoft Resents Techrights Doesn't Mean SLAPPs Will Silence Techrights
To confront lies the best solution is to speak truth
Windows at New Low Levels in Madagascar (Population About 33 Million)
Madagascar does not need Microsoft
Slop Images Are Bad Optics, Including for Perl.org
Slop devalues one's genuine work
What Happened to the Open Source Initiative (OSI) Elections: Proprietary Software Companies in Control, the Scandals Cannot be Hidden Anymore
We'll talk about it later this month and next month
Slopwatch: Fake News About Security Using LLMs That Make Fake 'Articles' About "Linux" (With Slop for Images)
This cannot end well
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, March 22, 2025
IRC logs for Saturday, March 22, 2025