Anonymous ID: 159f75 Dec. 15, 2020, 6:21 p.m. No.12045309   🗄️.is 🔗kun   >>5323 >>5401 >>5425 >>5457 >>5576 >>5665 >>5666

>>12044972

This ALL looks like a smokescreen.

 

You're tellin me Key Sensitive MIL Nets got infiltrated thru SolarWinds = Which IN 2019 was shown, by a techie dude, to have a dirt-simple "Backdoor" using a password of: (solarwinds123)?

 

Not buying it.

 

(savebreach.com Dec 14, 2020)

SolarWinds exposed FTP credentials in Public Github Repo: US Government Breach

 

SolarWinds exposed their FTP server credentials in a public Github repo, which was identified by cybersecurity expert Vinoth Kumar who reported it to SolarWinds in 2019. Did some poor security practices lead to the US Government breach?

 

Complex Attack or, a Case of Weak Credentials?

 

Vinoth further mentions in the tweet that the password was *123. Our guess is that, the password of that FTP server was solarwinds123, leaving the redacted part, which is a very weak credential. solarwinds123 is an example of the weakest credentials one can think of. Credentials of the FTP download server which was exposed on the SolarWinds GitHub repo are as follows – solarwindsnet: solarwinds123

 

https://savebreach.com/solarwinds-credentials-exposure-led-to-us-government-fireye-breach/