rainkid wrote:
In that case - how did the attacker(s) gain this level of access? How do we know that they no longer have this level of access? If those credentials are no longer valid, how do we know that the attacker cannot acquire new credentials and wreak more havoc?
Essentially, all we are told is 'someone had access, and did bad things. we removed said access.'
Not very informative.
I suspect finding out exactly how the attackers stumbled upon those credentials will take some more research. But it not reasonable to assume every single credential is also vulnerable. If someone gains unauthorized access to my system using credentials one of my users had written down somewhere, I would, as a system administrator, not then assume the login credentials of every account had become vulnerable. If the attackers did have more extensive access than a simple login credential, then it seems foolish to go through a process where their actions are immediately obvious and logged when they could simply just do whatever they wanted directly.
So either they're so smart they've been able to gain some kind of superprivileged access to the system, yet dumb enough to not use it, or this is simply a case of one login credential getting used by the wrong people. My money would be on the latter.
Why does everyone go out of their way to construct a movie plot threat out of this?
