TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The xz attack may be bad, but trusting Microsoft certs is worse

59 pointsby standapartabout 1 year ago

6 comments

haunterabout 1 year ago
The submission title is editorialized (easy karma bait), the tweet doesn&#x27;t say anything like that, not even mentioning xz or the word trust. And also it&#x27;s an entirely different type of security incident.<p>You can make the first sentence of the tweet fit the HN submission word limit<p>&quot;CISA and review board torches Microsoft response about the 2023 compromise&quot;
评论 #39920214 未加载
评论 #39919926 未加载
_tk_about 1 year ago
The CISA report is definitely worth a read and so is questioning Microsoft&#x27;s security posture. Comparing the incident to the xz attack doesn&#x27;t make a whole lot of sense though.
评论 #39920105 未加载
评论 #39919668 未加载
xystabout 1 year ago
Haven’t trusted Microsoft in a long time. So at least that’s not changing.
评论 #39919826 未加载
austinoneabout 1 year ago
I&#x27;m in cyber threat intelligence, not someone known or anything, but I&#x27;ve got a decent bit of experience in both building exploits and mitigating them through controls before starting to write about them. I actually created this account to comment on this, after lurking here forever.<p>It&#x27;s possible to have both things be true at once. XZ shows that the FOSS ecosystem is uniquely vulnerable and the Storm-0558 and Midnight Blizzard attacks show that cloud security and proprietary software &quot;security through obscurity&quot; is still as flawed as it has always been.<p>That said, I find significant deficiencies in yesterday&#x27;s report. The panel of stakeholders that were consulted includes all of Microsoft&#x27;s cloud competitors, a threat intelligence firm owned by one, and Palo Alto Networks - which has had significant breaches of its own. I don&#x27;t like how Microsoft has enterprise environments by the short hairs on the Windows environment and leverages that to push its SaaS offerings (especially in security). I think it&#x27;s ridiculous that the technical indicators for the initial compromise were paywalled behind logs that the US government had to pressure them to make open for everyone. That said, their threat landscape is not at all similar to PAN and Google Cloud&#x27;s. The entire federal government works on Microsoft&#x27;s stack, especially for Office and Windows. State-sponsored hackers will dedicate more resources to compromising Microsoft than any of their peers. AWS has GovCloud, which is the next closest thing that an adversary may want, but the intelligence value of getting the Secratary of ___&#x27;s email vs. an S3 bucket or an EC2 instance isn&#x27;t comparable.<p>It&#x27;s clear from their blog posts and press releases that they themselves have no idea what caused the loss of the MSA key. The lack of logging to confirm their preferred theory is bad. Throwing it out as if they had evidence of it and then posting a silent update to their blog post last month admitting they had no clue is worse. The flaw in their IAM that allowed a key from 2016 to sign enterprise tokens is an oversight that a company with the trust Microsoft has shouldn&#x27;t allow.<p>The CSRB could have made a great report on the above and let the facts speak for themselves. Instead, the pointed jabs at MSFT - especially during the Findings section where they spend several pages showing Microsoft&#x27;s failings and then follow with how their cloud platforms happen to do so much better - risk the effort landing as a smear campaign.
rustcleanerabout 1 year ago
Either Stallman-esque principles will need to be implored for products in commerce with very heavy profit-killing taxes on non-compliance, or we&#x27;ll need to start requiring PEs and liability bonds&#x2F;insurance, etc.<p>Downvote me all you want, but take your pick: Either be Stallman-esque in openness of design and intent (but not distribution) at risk of heavy end-product sales tax, or your product must be signed off by a software PE in order for you to legally charge money in any way for it or its use (or even pester for donations). Trust me, fall on the Stallman sword, it&#x27;s smaller.<p>See post history for a better write-up of what I mean by proprientary-tax and the national security threats of not being able to understand and replace all your firmwares.
pieratabout 1 year ago
Sure the response can be excoriating, but the US government isn&#x27;t giving up on Microsoft shit.<p>The USG is Linux-hostile, with exceptions like the NSA doing SELinux, Gidra, and other toolchains.<p>Linux would be the absolute best, along with things like OpenOffice and other FLOSS tools. The difference is to take the money you pay to MS and redirect them to FLOSS devs.<p>But, that&#x27;ll never happen.