You would be surprised how many companies don’t even have something fundamental like a custom SSID and password, or a backup, etc.
Comment on In search of riches, hackers plant 4G-enabled Raspberry Pi in bank network
halcyoncmdr@lemmy.world 8 months agoAlso our bank had some kind of port security so if it wasn’t a recognized MAC address, the port just switched off.
And serious company will have this as basic security. It’s a fundamental function even available on your consumer grade router at home. While it’s overkill for that use, it’s basic security for a company.
Vinstaal0@feddit.nl 8 months ago
halcyoncmdr@lemmy.world 8 months ago
Oh I wouldn’t be surprised at all, most businesses are pretty small. I would be surprised if a Bank was that irresponsible, although not very surprised.
pupbiru@aussie.zone 8 months ago
i’d argue that any serious company wouldn’t really bother with MAC identification… they’re so easy to spoof that it adds to operational overhead far more than the benefit it brings
more likely with these things you’d have a VLAN mapped to a physical port, and if that port were disconnected you’d instantly get a notification and send someone to check it out
halcyoncmdr@lemmy.world 8 months ago
Spoofing a MAC is easy but it still requires knowing both what an existing valid address is, and ensuring that it’s not already connected to the network. It’s only operational overhead when a new device is onboarded, after that the impact is minimal.
A policy that requires sending a tech is fine, but if you have hundreds or thousands of individual locations then you aren’t going to have a tech onsite at every one of them to quickly check and fix an issue, and you don’t really want to have to trust an end user to verify and/or make physical changes on site if you can avoid it.
lazynooblet@lazysoci.al 8 months ago
This is still trivial. A Pi with 2 NICs and a Linux bridge. Using the 2 ports, effectively put the Pi in between the device you want to spoof and the rest of the network. Now you can see the traffic, the MAC addresses etc.
FauxLiving@lemmy.world 8 months ago
Port security prevents this. As soon as the switch detects a physical disconnect it disables the port.
You could, with some electrical engineer-level tools and hardware, passively read the traffic to determine the MAC and then splice into the wire without disrupting the physical connection. But it would be very hard to do covertly or quickly.
Zorsith@lemmy.blahaj.zone 8 months ago
Don’t really need to send a tech immediately. More efficient to get a gas station clerk (or whoever works where the ATM may be located) to verify nobody is trying to fuck with it on-site and they didn’t lose power/internet at their location, before escalation.
AreaKode@lemmy.world 8 months ago
… Which financial company do you work for?
A major one.
TheRagingGeek@lemmy.world 8 months ago
Any of the major banks consider breaches as cost of doing business at their scale compared to smaller banks. My bank prides itself on never having a breach, and it is insufferable to develop code for, but I guess it’s the price of security
TropicalDingdong@lemmy.world 8 months ago
That’s why it’s not surprising at all that a bank didn’t bother to do that. Banks have some of the most egregious security issues.
FauxLiving@lemmy.world 8 months ago
Same as anywhere else. Complacency, lax auditing, temporary fixes which are in place for years, non-technical people making technical decisions (choosing convenience over security, generally).
Lost_My_Mind@lemmy.world 8 months ago
Remember when John Stewart only had SOME grey hair?
Hey, no judgement. 2020 had my hair looking like santa claus.
sys110x@feddit.nl 8 months ago
Don’t stress mate. We’ve all aged in the 20 years between 2019 and 2025.
jubilationtcornpone@sh.itjust.works 8 months ago
And really shitty auditors apparently. A good one would have at least spot checked for unsecured ports.