TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

N. Korean hackers breached 10 defense contractors in South for months

65 pointsby hassanahmadabout 1 year ago

6 comments

everdriveabout 1 year ago
That's the primary thing a contractor does: get breached. They also cost the same as an employee, but are usually less talented or at least less integrated within the organization. Somehow, the moment you become an executive, contractors become an appealing option due to some unknowable black magic.
评论 #40148483 未加载
评论 #40148487 未加载
评论 #40148523 未加载
评论 #40148743 未加载
评论 #40148495 未加载
spxneoabout 1 year ago
despite being allies, big reason why Americans do not trust or share sensitive information with South Korea-whatever they share always ends up in North Korea and China<p>but perhaps the biggest enablers of these security lapses aren&#x27;t just the shoddy cybersecurity management but the political environment<p>anytime you try to fix or address an issue, the opposition party will take contrarian stance without merit.<p>no political party in america will disagree with the events of 9&#x2F;11 yet in south korea disagreeing&#x2F;contrarian stance is the default because they have premature understanding of what democracy is (ex. <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;ROKS_Cheonan_sinking" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;ROKS_Cheonan_sinking</a> - imagine if a major American political party started refuting the events of 9&#x2F;11 and defending Al Qaeda!)<p>so its no wonder that stuff like this will result in no arrests and waste valuable tax dollars.
评论 #40149058 未加载
评论 #40149974 未加载
评论 #40149128 未加载
resource_wasteabout 1 year ago
I have no idea what to do about tech security. The holes will seemingly always exist unless we go back to safety critical code.<p>Its far easier to be a hacker than a programmer of the same economic&#x2F;political influence. You can take the second or third tier of programmers and they will be able to get you into a system.<p>My only thought is to only prevent non-anonymous entry, require some real world presence, and have capachas between commands... This doesnt scale.
评论 #40148767 未加载
HenryBemisabout 1 year ago
&gt; ..outsourcing relationships with them..<p>One of my latest gigs was on Third-Party Security. For years and years companies (especially banks) were giving little to no attention to third-party security&#x2F;privacy. I&#x27;ve happily seen that over the past 5 years most (mega-big) banks have taken it &quot;all the way up to 11&quot;.<p>Hackers are smart people, why hack company X with 50 people on their SOC and not hack a vendor that is lazy and clumsy? (and in some cases it&#x27;s 5 guys with laptops behind a cheap never-hardened router in some random country)
评论 #40148728 未加载
评论 #40148603 未加载
vondurabout 1 year ago
Serious question, how hard would it be to block all data from North Korea, or do they piggy back on other networks?
评论 #40148784 未加载
评论 #40148879 未加载
评论 #40148721 未加载
verisimiabout 1 year ago
So simple for police to establish the location of hackers....
评论 #40148590 未加载
评论 #40148428 未加载