Garmin services and production go down after ransomware attack | ZDNet
Smartwatch and wearable maker Garmin planning multi-day maintenance window to deal with ransomware incident.
www.zdnet.com
When I played with firewalls for a living, you better believe that shit was locked down hard.Ransomware lol. Employees are so damn stupid. The only way to (hopefully) stop shit like this is to lock down the computer hard. You hire people who can do one thing sufficiently well and they are usually idiots otherwise.
The problem is half the damn software developed for us doesn't work with all the restrictions they put on our computers. It's a never ending cycle of stuff that doesn't work (that is supposed to). My latest fight was with remote voicemail retrieval, since we are not in the physical office. There's supposed to be 3 ways, one of which is online, to get it, but 0 out of 3 worked. The online way doesn't work with how our browers are locked down and IT can't figure out how to make it work. It's a miracle anything works for us.When I played with firewalls for a living, you better believe that shit was locked down hard.
I got so much "unofficial" flack because people could not play games or listen to streaming music "at lunch" etc etc.
But between me and the GroupPolicy guys, we were able to keep on top of it.
(mostly )
I think @canadmos is now fighting the good fight.
The number of days I've spent having to trouble-shoot our software because McAfee BS is breaking it hurts my head.The problem is half the damn software developed for us doesn't work with all the restrictions they put on our computers. It's a never ending cycle of stuff that doesn't work (that is supposed to). My latest fight was with remote voicemail retrieval, since we are not in the physical office. There's supposed to be 3 ways, one of which is online, to get it, but 0 out of 3 worked. The online way doesn't work with how our browers are locked down and IT can't figure out how to make it work. It's a miracle anything works for us.
they've replaced devices out of warranty for me before. twice.Garmin's answer to this will be that your product is out of warranty and you need to buy their newest device.
Would depend on the device, I can probably fit a few thousand rides on my 830 without uploading.have they stated anywhere how long activities will remain on a given device without being synched before they are lost/deleted?
my watch (vivoactive HR) stores maybe a weeks work that i can access on the device. not sure if they're stored longer and not displayed or whatWould depend on the device, I can probably fit a few thousand rides on my 830 without uploading.
I think by now we can safely assume that any personal data in the cloud is not safe and as the value of data goes up and up it will be stolen even more.I am concerned about a loss of my personal data. Common Garmin...
Some people have years worth of logged activities, myself included. That being said, I think it's definitely a shortcoming of the system that it won't sync and store on a local device before being pushed to the cloud, especially in the event of a server outage.Wow, imagine if they'd made it so you could upload your data to your phone locally rather than having to rely on the Garmin cloud thingy.
There are usually two/three problems here:Back in 2000 when I used to sell back up systems we would always tell the customer to back up critical data on WORM media. You may lose today's crap but you could find a prior safe point and restore.....
Our techs did the installs and tested the back ups. only way we would guarantee the systems. Now if they declined the service contract it was on them after that. Our stuff went into the National Reconnaissance Office, Experian, The Fed. the big boys..There are usually two/three problems here:
1) no amount of backups will save you, if you backed up shitty or "infected" information.
2) even if you do have backups, have they ever been tested and will it work? A lot don't actually know.
3) your reputation as a business is now tarnished, even if you recover, people will (and should) look at you differently.
There are usually two/three problems here:
1) no amount of backups will save you, if you backed up shitty or "infected" information.
2) even if you do have backups, have they ever been tested and will it work? A lot don't actually know.
3) your reputation as a business is now tarnished, even if you recover, people will (and should) look at you differently.
$10 million ransom demand. Ouch.
Will Garmin Pay $10 Million Ransom To End Two-Day Outage?
Garmin is reportedly being asked to pay a $10 million ransom to free its systems from a cyberattack that has taken down many of its services for two days.www.forbes.com
Not for me. :/ but I don't really care. I'm not sure why I use Strava, other than to keep a log of my rides and put pictures up sometimes. On the other hand, I find I'm compulsively checking my Strava now... maybe this is a wakeup call?activities appear to be synching again. i saw online that they are restoring basic functionality.
Looking at strava and posting pictures is way better than other social media things. At least you're actually doing something when you post...Not for me. :/ but I don't really care. I'm not sure why I use Strava, other than to keep a log of my rides and put pictures up sometimes. On the other hand, I find I'm compulsively checking my Strava now... maybe this is a wakeup call?
Many of these high-profile attacks are often targeted, sophisticated hacks, and they tend to compromise employees who actually have the access that they need.Ransomware lol. Employees are so damn stupid. The only way to (hopefully) stop shit like this is to lock down the computer hard. You hire people who can do one thing sufficiently well and they are usually idiots otherwise.
Agreed. I like seeing everyone's activities and pics. Plus it's fun to earn free shit for completing challenges, when the challenges are things I was going to do anyway.Looking at strava and posting pictures is way better than other social media things. At least you're actually doing something when you post...
Internal email:Many of these high-profile attacks are often targeted, sophisticated hacks, and they tend to compromise employees who actually have the access that they need.
0-days come out all the time, and at a certain point, people need write-access to things.
Obviously we don't know exactly how this one occurred so it may have just been stupidity. But designing systems at this scale that don't have single points of failure is really hard, and a failure like this is as likely to be big architectural problems as dumb users with admin access to their laptops.
It'd be interesting if Garmin releases a post-mortem of more detail than, "lol sry guys, we'll do better in the future."
You are pretty smart with this stuff. Do you think they've already identified the access point and how it was compromised?Many of these high-profile attacks are often targeted, sophisticated hacks, and they tend to compromise employees who actually have the access that they need.
0-days come out all the time, and at a certain point, people need write-access to things.
Obviously we don't know exactly how this one occurred so it may have just been stupidity. But designing systems at this scale that don't have single points of failure is really hard, and a failure like this is as likely to be big architectural problems as dumb users with admin access to their laptops.
It'd be interesting if Garmin releases a post-mortem of more detail than, "lol sry guys, we'll do better in the future."
The implications for security and safety are huge, given aerospace's reliance now on garmin for navigation (databases, navigation information, etc.)Many of these high-profile attacks are often targeted, sophisticated hacks, and they tend to compromise employees who actually have the access that they need.
0-days come out all the time, and at a certain point, people need write-access to things.
Obviously we don't know exactly how this one occurred so it may have just been stupidity. But designing systems at this scale that don't have single points of failure is really hard, and a failure like this is as likely to be big architectural problems as dumb users with admin access to their laptops.
It'd be interesting if Garmin releases a post-mortem of more detail than, "lol sry guys, we'll do better in the future."
It's very likely, otherwise they probably would have not opened up services again. Most breach response playbooks would require either that you identify the original entry point or do some major risk mitigation prior to re-establishing production access.You are pretty smart with this stuff. Do you think they've already identified the access point and how it was compromised?
Yep. That, to me, is way more interesting than ten million Strava tracks not syncing.The implications for security and safety are huge, given aerospace's reliance now on garmin for navigation (databases, navigation information, etc.)
And less assholes doing this crap for nefarious purposes.You need better tools and better architecture.