TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

After Boeing declines to pay up, ransomware group leaks 45 GB of data

560 pointsby turtlegridsover 1 year ago

30 comments

cosmojgover 1 year ago
As someone who works in the defense industry, I can assure you that 45 GB of unencrypted emails is next to worthless from a commercial standpoint and a total non-event from a national security standpoint. This is probably more of a threat to individual employees than it is to anybody else.<p>To put it another way, if this data had value, the ransomware group wouldn&#x27;t be leaking it for free.
评论 #38361838 未加载
评论 #38360950 未加载
评论 #38363744 未加载
评论 #38361720 未加载
评论 #38359985 未加载
评论 #38362132 未加载
评论 #38360438 未加载
npalliover 1 year ago
For an external party, having access to the 45 GB is the easy part. Now, you will need to create a company and supplier base the size of Boeing to make any use of this :-)
评论 #38358645 未加载
评论 #38357037 未加载
评论 #38357426 未加载
评论 #38356590 未加载
评论 #38360975 未加载
评论 #38359606 未加载
评论 #38357214 未加载
评论 #38356368 未加载
评论 #38358179 未加载
ThinkBeatover 1 year ago
My memory is not the greatest and simple Google searches are not helping right now.<p>Have there ever been massive problems from one of these leaks for the targeted company?<p>I seem to remember quite a lof of similar leaks over the past two years where the market and public shrug it off.<p>Clearly 45gig is a lot. I would think if there was a major horrible thing to find that Boeing would have paid the ransom (and told no one).<p>Will it have any real negative consequences for Boeing?<p>It is a black mark against them that they were vulnerable. I guess it is favorable point for many that they didn&#x27;t pay.
评论 #38359174 未加载
评论 #38356330 未加载
评论 #38360903 未加载
评论 #38356195 未加载
评论 #38358383 未加载
strangattractorover 1 year ago
Didn&#x27;t a ransomware gang just renege on a deal and release the data anyway. Seems like they are killing their own business model. If company X cannot depend on the gang delivering why pay in the first place. Boeing will have to pay for any fallout form the data breach - why have the added expense of paying the criminals for the privilege?
评论 #38357053 未加载
评论 #38354825 未加载
评论 #38353631 未加载
kramergerover 1 year ago
Is there anything &quot;useful&quot; in this dump?<p>The article mentions citrix and emails, but that could be anything
评论 #38354848 未加载
评论 #38356091 未加载
arsover 1 year ago
The US should make it illegal to pay ransom, with a penalty of prison for anyone paying a ransom or authorizing payment.<p>The purpose of the law is that now ransomware gangs will be less likely to target US companies because companies are unlikely to risk paying them.
评论 #38354021 未加载
评论 #38354282 未加载
评论 #38354221 未加载
评论 #38354817 未加载
ceejayozover 1 year ago
I wonder if this counts as an ITAR violation on Boeing&#x27;s part.
评论 #38354138 未加载
Xcelerateover 1 year ago
The government should just make it illegal for companies to pay ransomware groups. There, now the ransomware business model evaporates and companies have to actually focus on security rather than hoping they can pay their way out of a potential problem. It’s short-term pain for society in exchange for a better long-term solution.
评论 #38364771 未加载
2OEH8eoCRo0over 1 year ago
Being a Russian-linked cyber gang, anything sensitive in there should be treated as public information now anyway. Why bother paying then?
gehwartzenover 1 year ago
Out of curiosity how do you guys mentally interpret the data size when reading about a hack&#x2F;leak story? 45GB? Do you think 10s of millions of text files? A few DVD rips? a server backup?<p>It seems so useless but is always portrayed as the &quot;wow look at that number!&quot; part of any leak&#x2F;hack story
评论 #38360113 未加载
评论 #38360493 未加载
评论 #38360934 未加载
freedudeover 1 year ago
45GB of data could be like a dozen employees&#x27; or less Outlook PST files. For this to be astounding we would need to know the quality of the data. Otherwise it is a bunch of hype and hoopla.
评论 #38356149 未加载
评论 #38355650 未加载
评论 #38359448 未加载
评论 #38359750 未加载
评论 #38363190 未加载
评论 #38356212 未加载
legitsterover 1 year ago
I struggle to see how this business model would work in the first place. They pay you and you pinky swear not to release it? All you are doing by negotiating is to buy the victim time to harden their systems.<p>This sounds liked a failed ransomware attack. They encrypted the systems - Boeing says &quot;no thank you, we have backups&quot;. There were no valuable zero-days to sell to GRU, so give a last ditch offer to try to salvage something.
评论 #38353912 未加载
评论 #38354609 未加载
评论 #38353881 未加载
评论 #38354984 未加载
评论 #38354642 未加载
评论 #38356322 未加载
评论 #38354707 未加载
评论 #38356068 未加载
gistover 1 year ago
A writer contacted me about my thoughts (unrelated and separate from this event) about how the disclosure of vulnerabilities and methods of hacking (of all types and in almost all situations) aids bad actors vs. helps companies protect their systems (by knowing vulnerabilities that are often so obscure they would reasonably never be exploited).<p>Point is what is the upside of disclosure (I think) vs. the downside. Nobody is suggesting no disclosure but the writer seemed to think that the security industrial complex has lawmakers believing that everything should be open and there should be constant white hat hacking which seems to feed and benefit the security industry.<p>I am curious if anyone has a thought on this topic.
worthless-trashover 1 year ago
I have grown respect for boeing after not paying this.
runeksover 1 year ago
New security-through-obscurity tactic: make sure to automatically send lots of fake emails between employees, containing importantly-sounding words such as &quot;classified&quot;, &quot;secret&quot; and &quot;important&quot; — with some identifying characteristic that makes the employees&#x27; email clients ignore them.<p>Then an email dump of 45 GB of useful information could instead be 4.5 TB (with 1% useful information), and wading through all the non-information to find something useful will not be worth the time of the adversary. The more important information you have in emails the more you need to increase the misinformation-to-information ratio.
1-6over 1 year ago
The moment a company pays good money, that legitimizes the hacking group and emboldens them to keep going. You can’t trust that they’ll not leak even after they get paid.
pcurveover 1 year ago
The market seems to think this is inconsequential.
workfromspaceover 1 year ago
<a href="https:&#x2F;&#x2F;archive.is&#x2F;LUqeb" rel="nofollow noreferrer">https:&#x2F;&#x2F;archive.is&#x2F;LUqeb</a>
carabinerover 1 year ago
When Boeing can&#x27;t match the salaries of Seattle tech companies, this is what happens.
评论 #38354244 未加载
评论 #38355288 未加载
chakintoshover 1 year ago
I wonder if anything here is related to the MCAS disasters
augustulusover 1 year ago
we should be careful making the assumption that this is all the data they exfiltrated. this could easily just be the first tranche to prove that they’re serious
Spk-17kekover 1 year ago
What if it is false information to harm opportunists?
m3kw9over 1 year ago
lol no sht man, pay up and they’d still sell it behind their backs. Someone always have a copy
newuser94303over 1 year ago
The bigger problem for Boeing will be that they probably have fraud evidence in the 45G.
monkeydustover 1 year ago
LLM training fodder?
kh49over 1 year ago
The never ending cost of low quality outsourced digital transformation. Pathetic how many large corps have been hit. And tax payer has to foot the ever growing bill to investigate and defend these useless orgs.
评论 #38354267 未加载
评论 #38353905 未加载
评论 #38353814 未加载
评论 #38354078 未加载
评论 #38354197 未加载
SahAssarover 1 year ago
Can we stop using disk size as a measure of leaked data?<p>There are bluray movies larger than this leak and there are files smaller than 10kb a lot more critical in most businesses.<p>It&#x27;d be nice if there was some sort of scale for data leaks like (just spitballing here):<p>1. Leak destroys all core company functions (crypto-exchange leaks all wallet keys, CA leaks all root keys and becomes banned from all trust stores, etc.)<p>2. Leak causes regulatory issues criminal enough to shut down company<p>3. Leak severely hinders core company functions (deploy keys for a cloud computing SaaS are deleted which stops all new deployments until all infra is reconfigured)<p>4. Leak severely looses company competitive advantages (new products leak that are replicable by competitors)<p>5. Leak causes severe PR disaster<p>6. Leak shows embarrassing internal company communication without any of the above
评论 #38355649 未加载
评论 #38355569 未加载
评论 #38355394 未加载
评论 #38355626 未加载
评论 #38355960 未加载
评论 #38355556 未加载
评论 #38355703 未加载
评论 #38356408 未加载
评论 #38356079 未加载
评论 #38355983 未加载
评论 #38355421 未加载
评论 #38355686 未加载
评论 #38356039 未加载
incahootsover 1 year ago
I&#x27;m at an en-passe here, on the one hand I think Boeing sucks as it&#x27;s primary business is now hyper focused for defense purposes. On the other, ransomware generally hurts companies and municipalities that generally don&#x27;t deserve it.<p>Boeing, Lockheed Martin, Facebook, etc...deserve it
评论 #38355610 未加载
评论 #38360667 未加载
评论 #38355651 未加载
评论 #38356059 未加载
whatever1over 1 year ago
Like how can one download so many files from a company network and no alarm is set off ? What do the useless IT departments set up? Just employee spyware ?
评论 #38355281 未加载
评论 #38354665 未加载
评论 #38354631 未加载
评论 #38355428 未加载
评论 #38355104 未加载
评论 #38354678 未加载
评论 #38354727 未加载
评论 #38355031 未加载
extheatover 1 year ago
The best way to mitigate attacks like this is simple: don&#x27;t hold the data in the first place. Beyond that, encrypting and limiting who has access to what, and logging who opens what when makes it much harder for attacks like these to go under the radar. Obviously, not every company is Google and having super sophisticated security practices is both hard to do from an engineering standpoint (requires lots of infra) _and_ requires staff to have a security focused mindset. This is not something a lot of places have, not even tech companies by trade. The cost benefit analysis isn&#x27;t high, so you end up with orgs that do things akin to dumping all corporate code into one Github account and then wonder how things went wrong when something bad happens.<p>Boeing Co, as a government contractor being hacked is obviously more concerning than a breach at $x company. It&#x27;s a shame. I&#x27;d say this is a learning opportunity, but it likely won&#x27;t be. Onto the next round of &quot;cybersecurity&quot; speak...
评论 #38359356 未加载