当前位置:网站首页>Because the employee set the password to "123456", amd stolen 450gb data?
Because the employee set the password to "123456", amd stolen 450gb data?
2022-07-27 17:43:00 【Big data V】

Reading guide : Reality tells us , In many cases, life will be far more outrageous than the joke : Because the employee set the password to “123456”, The company leaked 450Gb data —— This sounds very “ Bizarre ” Things about , It actually happened to the chip giant AMD The body of .
Authorized by official account. CSDN(ID:CSDNnews)
Arrangement : Zheng Liyuan
In recent days, , A group called RansomHouse The blackmail organization claims , From AMD Stole 450Gb data , And everything “ Thanks to AMD Weak password set by employees ”.

01 No “ Blackmail software organizations ”, It is “ Professional mediator ”
RansomHouse As early as 2021 year 12 The month began to be active , At that time, it leaked the alcohol and gambling administration of Saskatchewan, Canada (SLGA) The data of , thus “ An instant hit ”.
Compared with other cyber criminal organizations ,RansomHouse There are some “ special ”. It doesn't think of itself as a “ Blackmail software organizations ”, Instead, define yourself as “ Professional mediator ”, It also said that it had never produced blackmail software or encrypted data :
We have nothing to do with any violations , Nor does it produce or use any blackmail software . Our main goal is to minimize possible damage to interested parties .RansomHouse Members prefer common sense 、 Good conflict management and wise negotiation , In an effort to fulfill the obligations of all parties , Instead of an unproductive argument . These are all to promote friendly agreements 、 Even the necessary and sufficient principles necessary for fruitful friendly cooperation .
Despite this self introduction, no matter how “ Fresh and refined ”,RansomHouse The behavior of invading companies to steal data is still one after another : Forefoot just claimed that from Africa's largest retailer Shoprite To obtain the 600 GB data , The hind foot is still in the mood to disclose the next invaded company , stay Telegram Post riddles on :

We have prepared a new surprise ! First , Here is a little puzzle for you : The first person to unlock it will get relevant links . that , Please say the name of this company :
1) Almost everyone knows
2) Name by 3 Letter composition
3) The first letter is A
Just write your guess on this channel , Then you can get a link in your private email .
Then a week later ,RansomHouse Published the answer :AMD, And added “ You will be amazed at how they protect their security ”.

02 “ All thanks to these passwords ”
According to the RansomHouse Express , As early as 2022 year 1 It has successfully invaded in August AMD The internal network of , Stole “ exceed 450 Gb” The data of . So ,RansomHouse A data sample was also released as evidence , This includes network files 、 System information and weak password documents :

RansomHouse Write... On its website :
This is a high-tech 、 An era of progress and high security , This sentence is of great significance to people . But when like AMD Such technology giants use simple passwords , If used “password” To protect its network from intrusion , This sentence seems to remain only on the surface of beauty . It's a pity , This is it. AMD The real password used by employees , Yes AMD It's even more humiliating for the security department , Because of the documents we stole , They also received a large amount of construction funds —— All this is due to these weak passwords .
Originally thought RansomHouse The statement of is just “ Exaggerate ”, But according to TechCrunch The analysis results of its public data samples show that ,RansomHouse It's not a joke : part AMD The password used by employees is indeed too simple , Such as “password”、“123456” and “Welcome1” wait —— For hackers , intrusion AMD The internal system is as easy as a palm .
But this is also more confusing :AMD Such a big chip giant , There is no security check on its system to ensure that employees use strong passwords ? Or say , Get into AMD No other steps are required for the internal system , Just need a password ?
“AMD And any high-tech company should require multi factor authentication against phishing for all logins . If you can't use MFA, It also requires a strong and unique password .” One from the safety awareness training platform KnowBe4 Expert Roger Grimes Express :“ Ironically ,AMD Employees are still using things like ‘password’ Such a password to access critical Networks , This is really incomprehensible .”
03 AMD: An investigation is under way
stay RansomHouse Declare “ The mystery ” That day ,AMD In response :
AMD Know that some lawbreakers claim to have from AMD Stolen data , An investigation is under way .
But about whether the ransom is required 、 Which systems have become targets 、 Whether customer data is accessed 、 Whether password security measures are set ,AMD All refuse to answer .
take the reverse into consideration RansomHouse The home page “ The victim ” list , add AMD Then there are six , The last two are Shoprite and AMD:

Besides , from RansomHouse From the description of this list , The main purpose of stealing data is for money :
These companies either believe that their economic interests outweigh the interests of entrusting data to others , Or choose to hide the fact that their data has been leaked .
But according to BleepingComputer reports ,RansomHouse No direct contact AMD Asking for ransom , Instead, they intend to sell data to other entities or their competitors , Because it will “ More valuable ”.
Last , You are right about AMD What's your opinion on the event of data disclosure caused by employees' weak passwords ?
Reference link :
https://restoreprivacy.com/ransomhouse-group-amd-advanced-micro-devices/
https://www.bleepingcomputer.com/news/security/amd-investigates-ransomhouse-hack-claims-theft-of-450gb-data/
https://techcrunch.com/2022/06/28/amd-extortion-ransomhouse/

Live broadcast announcement

Extended reading

《 Red and blue attack and defense : Build a practical network security defense system 》
Dry goods go straight to
What is the most difficult thing about enterprise digital transformation ? Just these two words
2022 In the first half of the year, it was spread by the circle of friends 10 This book , eureka
Good reptile , I'm fed up ? this 3 The bottom line must not be touched !
According to statistics ,99% The big coffee is concerned about the official account
边栏推荐
- 记一次 .NET 某智慧物流 WCS系统 CPU 爆高分析
- Cow! His secret is to reproduce the paper in 2 hours——
- 国产新冠口服药为什么是治艾滋病的药
- WebView basic use
- The whole process of neural network construction is finally completed! Can't you come to me~
- 笔试缺考者入围教师招聘面试?河南祥符:个别考生成绩统计错误
- Interviewer: what is scaffolding? Why do you need scaffolding? What are the commonly used scaffolds?
- General process of background management system permission setting
- 选择体育场馆的LED显示屏时应该注重哪些方面
- Motion capture system for end positioning control of flexible manipulator
猜你喜欢

基于STM32的智能鱼缸设计

KMP模板——字符串匹配

Explain the pile of binary trees in detail

Kubernetes第七篇:使用kubernetes部署prometheus+grafana监控系统(Kubernetes工作实践类)

二舅的外甥和他的学生们

Technical practice dry goods | from workflow to workflow

Hidden iframe design details of SAP ui5 fileuploader

Functions of C language

Kubernetes Chapter 8: deploy NFS system with kubernetes to complete database persistence (kubernetes work practice class)

Big manufacturers finally can't stand "adding one second", and companies such as Microsoft, Google meta propose to abolish leap seconds
随机推荐
Hegong sky team vision training Day7 - vision, Jetson naon and d435i
运行loam_velodyne实时建图
.net core with microservices - what is a microservice
Switch and router technology-03-basic configuration of switch
Hidden iframe design details of SAP ui5 fileuploader
【单片机】2.2 AT89S52的引脚功能
面试官:什么是脚手架?为什么需要脚手架?常用的脚手架有哪些?
Bit band operation of semaphore protection
Database hyperphone (I)
Basic use and optimization of uitableview
交换机和路由器技术-03-交换机基本配置
Gartner 权威预测未来4年网络安全的8大发展趋势
Dense optical flow extraction dense_ Flow understanding
每条你收藏的资讯背后,都离不开TA
High cost, difficult to implement, slow to take effect, what about open source security?
【数据库系统概论(王珊)】第5章——数据库完整性
小于n的最大数
What should we pay attention to when choosing the LED display screen of the stadium
Gradient ring progress bar
#yyds干货盘点# 面试必刷TOP101:链表内指定区间反转