• JohnAnthony@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    10
    ·
    11 hours ago

    but at least Abilene was insured against such an attack

    Oh, well that’s great. I hope the people, whose identity, medical records, or whatever else was stolen will be compensated accordingly. Would be a shame if the money went into building a new, just as unsafe system.

    Not that anyone gives a fuck. At this point the argument is “your data had probably already been stolen somewhere else”…

  • dumples@midwest.social
    link
    fedilink
    English
    arrow-up
    39
    ·
    16 hours ago

    The national guard here is looking around for men in black masks in front of computers throughout the city. Its crazy

  • sp3ctr4l@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    47
    ·
    edit-2
    20 hours ago

    https://techxplore.com/news/2025-07-fbi-national-st-paul-cyber.html

    https://www.reuters.com/world/us/minnesota-calls-national-guard-after-st-paul-slammed-by-digital-attack-2025-07-29/

    https://techcrunch.com/2025/07/30/minnesota-activates-national-guard-as-cyberattack-on-saint-paul-disrupts-public-services/

    So, this actually was first detected on Friday July 25, escalated all the way up to the Emergency Operations Center on July 28 (Monday), state of emergency / near total intranet shut down (they are quarantineing the whole system) on July 29 (Tuesday).

    It seems to me that some kind of rather sophisticated threat actor managed to get into the core … this techxplore article calls it a ‘VPN’, but it isn’t technically a VPN, its a secure access tunnel system that city-gov systems and employees use to talk to each other, it almost certainly is not intended to be geared toward broad internet access/usage, beyond accepting user input from public facing government web portals, such as say, people paying their utliity bills online or trying to submit a business liscense application online, things like that.

    This system is sounding like it got fully compromised (as in, low level/high privilege level access was secured), and was either sending data out/in through improper IP addresses, and/or was possibly being hijacked to do some kind of DOS attack … on itself?

    I am having a really hard time finding any exact details on this, but this is my best guess.

    Given that the EOC essentially immediately shutdown everything and called in a National Guard Cybersecurity team, it seems to me that there is a high chance this was done by basically a nation-state level threat actor.

    It also at least seems like the systems, the data, the hardware, have at least not yet been locked down in a ransomware style move, which… could be largely due to their just quickly pulling the whole thing offline, or could be because that wasn’t the goal of the attackers… or some combination of both.

        • SheeEttin@lemmy.zip
          link
          fedilink
          English
          arrow-up
          2
          ·
          8 hours ago

          The primary purpose of a VPN is to create a tunnel between two networks, hence the name “virtual private network”. I’m very familiar with them as I work with these systems for a living.

          • L3s@lemmy.worldM
            link
            fedilink
            English
            arrow-up
            5
            ·
            edit-2
            5 hours ago

            I’m guessing some people don’t know (or forgot) that site-to-site and remote access VPN’s are a thing, and was the initial purpose of VPN’s. Masking or hiding your location became a benefit after the fact, and todays more common client VPN is technically a remote access VPN with a new purpose.

            Remote access VPN’s are a very common attack vector for companies, look up companies compromised with Fortinet gear and its typically through the firewalls VPN.

            In fact, a primary purpose of a VPN, spoofing your IP/geolocation, pretending you are someone you aren’t… is pretty much antithetical to a highly controlled system of users with varying levels of access to specific, private areas of that system.

            Most modern remote access VPN’s do exactly that, so it is not antithetical at all and is how most client VPN’s keep you from accessing other users data. I would encourage you to read up on WireGuard and the like, they are fun to learn about and awesome tools when configured properly.

            Also, we removed the above comment because the last sentence was fairly rude and violates rule 3 @[email protected]

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    90
    arrow-down
    5
    ·
    24 hours ago

    Oh wonderful. Replacing all IT because they were hacked? Let me guess, they will use Windows, Exchange, and MS Office again on the new system. The software triumvirate screaming “please hack me”.

      • sp3ctr4l@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        1
        ·
        14 hours ago

        Entirely seriously, yes.

        Most project managers I’ve ever met or known or worked with are basically incompetent technically, and very insecure / in denial about that, and thus vastly prefer the ‘safe’ option of someone else being responsible over the ‘risk’ of… hiring actual quality people that can make/support their own quality product.

        • Saleh@feddit.org
          link
          fedilink
          English
          arrow-up
          4
          ·
          12 hours ago

          Did you consider that project managers often have to follow all sorts of company standards, have to figure out a way to get a dozen departments with conflicting standards together, on top of that have to catch the stupid ideas from the upper-management and marketing without telling the upper-management that they have no idea what they are talking about, on top of getting something actually done in the project?

          Because often the level of tech competency has very little to do with the decision corridor that the project manager has, given everything else.

          • sp3ctr4l@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            7
            ·
            11 hours ago

            Yep.

            I’ve been one.

            Thats how I know what I am saying.

            Like you’re not even challenging what I’m saying really, you admit that most PMs are technically incompetent, because their job is mainly playing office politics.

            It didn’t used to be this way.

            And it still doesn’t have to be.

            A good PM is someone who actually knows their relevant field, and can also do some office politics, but much more importantly, is a responsible and helpful team leader.

            A person with only an MBA just has a degree in how to play office politics and gaslight people.

            • SheeEttin@lemmy.zip
              link
              fedilink
              English
              arrow-up
              1
              ·
              8 hours ago

              It’s always been that way, and always will be. Most people are mediocre at most things.

    • CallMeAnAI@lemmy.world
      link
      fedilink
      English
      arrow-up
      13
      arrow-down
      52
      ·
      edit-2
      21 hours ago

      🤣 should we get a list of foss projects that have had security issues? Or how about how someone slips some shit in upstream every few weeks it seems?

      Stop this nonsense. You can hate Microsoft for legitimate reasons.

      • trolololol@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 hours ago

        Mate have a look at the SharePoint vulnerability. It’s embarrassingly bad. Like really really bad, and btw so bad that it’s very easy to understand and exploit. And prevent too, if a jr in my team did this I’d get them in trouble.

      • toothpaste_ostrich@feddit.nl
        link
        fedilink
        English
        arrow-up
        23
        arrow-down
        2
        ·
        20 hours ago

        I mean… For real, I’ve never heard of Linux systems being hacked this way. I’m sure it’s possible, but it certainly seems rarer.

        Slipping shit in upstream also certainly doesn’t happen "that* often. It takes effort to become recognised enough as a developer to be allowed access to the upstream code, meaning you can’t automate those kinds of attacks. (I imagine. Correct me if I’m wrong.)

        • sp3ctr4l@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          14 hours ago

          It does happen occasionally, from time to time, but, because everything is gasp open source, it tends to get caught, identified, blocked/quarantined and then fixed considerably more rapidly, with decent fallback instructions/procedures in that interim period.

          Like apparently it actually just recently happened with some asshole uploading bs malware libs/sources to the AUR… even still, got caught pretty quickly.

          Also, you can basically describe the entire CrowdStrike fiasco as exactly this kind of upstream oopsie doopsie.

          Doesn’t really matter in the big picture if it was intentionally malicious or not, when you Y2K 1/4 of the world’s computer systems.

        • CallMeAnAI@lemmy.world
          link
          fedilink
          English
          arrow-up
          11
          arrow-down
          8
          ·
          19 hours ago

          Absolute opposite. The majority of successful attacks you see today are identity management and supply chain attacks. If you walk into any OCIO office supply chain will be a top 3 concern.

    • JaymesRS@piefed.world
      link
      fedilink
      English
      arrow-up
      15
      ·
      edit-2
      17 hours ago

      Minneapolis and St Paul (Cross-River sister cities, St Paul is the State Capital) both have mayoral elections on November 4, 2025. The one you’ve been seeing mentioned more likely is the Minneapolis one where the DFL (State Democratic Party) endorsed a candidate for the first time in a bit and it was the challenger to the incumbent Democratic candidate, so it’s been in the news.

  • justlemmyin@lemmy.world
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    2
    ·
    23 hours ago

    Had to read the article to realise st Paul is a city name. 😅

    Also, could it be a 'the call is coming from inside the house " situation?

    I remember pedo party hating this mayor. It was all over lemmy during simpler times.

    • Chulk@lemmy.ml
      link
      fedilink
      English
      arrow-up
      7
      ·
      16 hours ago

      Also, could it be a 'the call is coming from inside the house " situation?

      I think this is far more likely than China, North Korea, Iran or Russia having a sudden interest in St Paul Minnesota (a city that most people in the US don’t even think about).

      Who benefits more from the crippling of city-level liberal governments and stealing their data, Trump or China? If we see ICE conducting surgical raids within St Paul in the coming months, I think we’ll have our answer.

    • JaymesRS@piefed.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      17 hours ago

      Probably not the mayor, the governor of the state was the VP candidate for Kamala Harris.

  • Hegar@fedia.io
    link
    fedilink
    arrow-up
    9
    arrow-down
    7
    ·
    23 hours ago

    With no ransom demand it’s gotta be a state actor probing defenses and testing responses, right? I think first guesses would be Russia, China, Iran or maybe North Korea.

    • setsubyou@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      arrow-down
      2
      ·
      1 day ago

      The article says it started on a Friday morning in Minnesota. It’s clear that that’s when the attack started and not a case of the first guy starting work that day discovering that it happened, because the article also says that they tried to contain it as it was going on, but ultimately failed.

      Minnesota is at UTC-5 and China is at UTC+8, meaning when it’s morning in Minnesota, it’s already 13 hours later in China, i.e. middle of the night.

      • Nimrod@lemmy.world
        link
        fedilink
        English
        arrow-up
        23
        arrow-down
        3
        ·
        24 hours ago

        I don’t see anything in the article that states the attack started that morning. It says that i was “first noticed” early Friday morning:

        According to remarks by St. Paul Mayor Melvin Carter, the attack was first noticed early in the morning of Friday, July 25.

        I’m not arguing it’s China, just that I didn’t see anything indicating they know when the attack started