Anonymous ID: eeba72 July 31, 2024, 2:24 a.m. No.21326053   🗄️.is đź”—kun   >>6116 >>6359

>>21326042

The longer the confusion around this event drags on then the more plausible the New York Post's original reporting becomes. Somehow those in control of the flow of information mistakenly allowed that tidbit to slip through the cracks and be reported. And the report remained up for one hour and twenty minutes before being taken down. And the fact that nobody seems to be talking about it (see above reference to controllers of the flow of information) is going to eventually be recognized by the masses. Big distraction called for here. And that is exactly what we have been seeing.

Anonymous ID: eeba72 July 31, 2024, 2:43 a.m. No.21326090   🗄️.is đź”—kun   >>6116 >>6359 >>6407 >>6508 >>6541 >>6555

Microsoft Confirms New Outage Was Triggered By Cyberattack

Kate O'Flaherty

Senior Contributor

Cybersecurity and privacy journalist

Jul 31, 2024,03:26am EDT

A Microsoft Azure outage on July 30 was triggered by a distributed denial of service cyberattack, the tech giant has confirmed.

It comes after users started complaining they couldn’t access several Microsoft services yesterday, including Microsoft 365 products such as Office and Outlook and Azure.

The incident—which lasted nearly 10 hours—took place less than two weeks after a CrowdStrike update caused Microsoft Windows machines to crash. Companies affected by the new outage include U.K. bank NatWest, according to the BBC.

What Happened At Microsoft?

The incident started at approximately at 11:45am UTC and was resolved at 19:43pm, according to Microsoft’s Azure status history page. According to Microsoft, a “subset of customers may have experienced issues connecting to a subset of Microsoft services globally.”

Impacted services included Azure App Services, Application Insights, Azure IoT Central, Azure Log Search Alerts, Azure Policy, as well as the Azure portal itself and “a subset of Microsoft 365 and Microsoft Purview services.”

Microsoft says the “initial trigger event” was a DDoS attack, which sees adversaries flood services with traffic in order to bring them to a standstill.

Microsoft describes an “unexpected usage spike” which resulted in Azure Front Door and Azure Content Delivery Network components “performing below acceptable thresholds, leading to intermittent errors, timeout and latency spikes.”

Most firms have protection in place to prevent DDoS from having an impact. The initial DDoS attack had activated the firm’s DDoS protection mechanisms, but an error in the implementation of defenses “amplified the impact of the attack rather than mitigating it,” Microsoft admits.

It appears that the outage was caused by DDoS attack—despite the fact Microsoft had protections in place, says Sean Wright, head of application security at Featurespace. “Similarly to the CrowdStrike issue a few weeks ago, it appears that an error occurred in the software that was used to protect against DDoS attacks,” Wright says.

This is highlights the importance of testing software thoroughly, he says.

What’s Next?

The CrowdStrike incident had already—and unfairly—created bad optics for Microsoft, so the timing of this new outage is unlucky. Microsoft knows this and has communicated clearly throughout the outage, saying it will publish a Preliminary Post Incident Review within approximately 72 hours, to share more details on what happened and how it responded.

To get notified when that happens and to stay informed about future Azure service issues, Microsoft advises you configure and maintain Azure Service Health alerts.

For now, it looks like Microsoft services are back up and running.

https://www.forbes.com/sites/kateoflahertyuk/2024/07/31/microsoft-confirms-new-outage-was-triggered-by-cyberattack/

Anonymous ID: eeba72 July 31, 2024, 4:26 a.m. No.21326205   🗄️.is đź”—kun   >>6226

>>21326195

 

https://en.wikipedia.org/wiki/United_States_bombing_of_the_Chinese_embassy_in_Belgrade

 

The Sword-10 is the first type of ground-to-ground cruise missile developed by China and the first missile in the Sword series. The successful development of Sword-10 made China the third country in the world to independently develop, manufacture and equip cruise missiles after the United States and the Soviet Union.

 

Reports of uncertain reliability claimed in the late 1990s that China was working on several advanced ground-based LACMs: the Changfeng ["Long Wind"] CF-1 and CF-2 [also termed Chang Feng and Chang Feng-JIA], and Hong Niao (HN)-1 and HN-2 missile, with a range between 400 km and 1,800 km, with conventional and possibly nuclear warheads. The ground-launched Hong Niao missiles were said to be fitted with tandem solid-rocket boosters.

 

In 1995 it was reported that China was funding Israeli development of an air-launched cruise missile based on the Israeli Delilah anti-radiation attack drone, with a 230-mile range. The new missile reportedly was to be larger than the Delilah, while retaining its basic configuration. The range and CEP of the Chang Feng air-launched LACM are claimed to be 600km and 15m, respectively, and Chang Feng -JIA 1300km and 5m. Similar accuracy claims are made for the Hong Niao family of missiles, though these would appear to be rather optimistic.

https://www.globalsecurity.org/wmd/world/china/lacm-history.htm>vulnerable to tampering by Chinese repair ships