These fake cisco devices might be less vulnerable than the real devices.
Counterfeit Cisco gear ended up in US military bases, used in combat operations
Submitted 6 months ago by jeffw@lemmy.world to technology@lemmy.world
Comments
Daqu@lemm.ee 6 months ago
s7ryph@kbin.social 6 months ago
Love the sentiment but they were flashing old devices so the likely had lots of vulnerabilities.
Jas91a@lemmy.world 6 months ago
That’s capitalism with a military contractor increasing their profits.
RememberTheApollo_@lemmy.world 6 months ago
But capitalism good!
lud@lemm.ee 6 months ago
Or it’s a surveillance attempt by someone.
bravesilvernest@lemmy.ml 6 months ago
I read this as “counterfeit Costco gear” and the only think I can think is that they’ll at least have plenty of giant bags of chips
jeffw@lemmy.world 6 months ago
At one point I had Cisco and Costco in my stock portfolio and that was pretty confusing lol
possiblylinux127@lemmy.zip 6 months ago
That’s… Bad. Like really bad.
Why is this allowed by the DoD?
randombullet@programming.dev 6 months ago
Because the DoD isn’t as organized as many perceive. Source: me
BaroqueInMind@lemmy.one 6 months ago
How are you your own source? Doesn’t make sense.
CyberDine@lemmy.world 6 months ago
The DoD will soon be requiring itself and Contractors to start following Rev 5 of the NIST SP 800-53 Risk Management Framework. In this revision are more robust controls for Supply-side security, which the DoD has been trying to incorporate for over 10 years.
Americans should know that the military and DOD and it’s contractors do their best to purchase authentic hardware from reputable vendors, but there are exceptions and alternate procurement allowances if the need is great and the standard more secure lines are unavailable or simply on back order.
It’s usually then that some of the fake hardware makes it into use
naticus@lemmy.world 6 months ago
800-53 Rev 5 is such a pain in the ass to implement fully but holy shit is it much needed. Bad actors out there everywhere and if followed to the letter, those controls will save you almost every step of the way. “Almost” because there will always be a new method to infiltrate an organization or agency, but the damage control built into these controls should lessen the impact regardless.
henfredemars@infosec.pub 6 months ago
It’s big and complicated. Keeping track of where supplies are coming from is a difficult task. You can’t police every employee at all times let alone every purchase.
possiblylinux127@lemmy.zip 6 months ago
You can at least avoid Amazon
catloaf@lemm.ee 6 months ago
It’s not.
tearsintherain@leminal.space 6 months ago
$$$$$ “The 2022 audit, released in November, marked the fifth year the Pentagon had failed its audit (the process started in 2017).”
Jon Stewart blasts ‘corruption’ in Pentagon spending
“Now, I may not understand exactly the ins and outs, and the incredible magic of an audit. But I’m a human being who lives on the Earth and can’t figure out how $850 billion to a department means that the rank and file still have to be on food stamps,” Stewart said. “To me, that’s fucking corruption. And I’m sorry. And, if like, that blows your mind and you think that’s like a crazy agenda for me to have, I really think that that’s institutional thinking, and that it’s not looking at the day-to-day reality of the people that you call the greatest fighting force in the world.”>
umbrella@lemmy.ml 6 months ago
this almost 100% means someone was gathering inteligence.
counterfeit or otherwise messed with hardware wont just pop up on military operations.
lud@lemm.ee 6 months ago
I wonder why they can’t just buy straight from Cisco, surely they are big enough and the equipment is sensitive enough for that to make sense.
pewgar_seemsimandroid@lemmy.blahaj.zone 6 months ago
nortel 2.0.
tal@lemmy.today 6 months ago
This sounds like a lot of things were going wrong. Okay, first you had the guy committing fraud.
But why is the military sourcing its network hardware from random small resellers off Amazon? Like, even if the hardware were authentic, that seems like a route for potential trouble.
And it sounds like questionable stuff is getting into Cisco’s official supply chains, too:
RobotToaster@mander.xyz 6 months ago
There are often companies that specialise in sourcing obsolete hardware, who just buy shit off Amazon/eBay and issue the correct paperwork.
Transporter_Room_3@startrek.website 6 months ago
It’s insane to me all the different ways the government procures things.
Just get it straight from the manufacturer. Then if anything ever goes wrong there isn’t the “who is REALLY to blame on this long chain of people” it’s “hey this shit is broken, YOU are responsible for it”
Of course sometimes they do it as a form of opsec, if you distribute parts across many small time sellers it’s easier to hide something than one big order from the primary source.
kent_eh@lemmy.ca 6 months ago
Only if proper vetting of the contractor isn’t done. That part of the process should happen regardless of who the contractor is.
rottingleaf@lemmy.zip 6 months ago
I’m sorry, but such things happen in countries with no preference to small businesses and veterans etc.
I’m almost confident that somebody involved in choosing that supplier got a cut.
After all, US military budget is so ridiculously big that not having such kinds of corruption would be weird.
JJROKCZ@lemmy.world 6 months ago
I’ve bought Cisco equipment from verified vendor partners before, put in legit Cisco SFPs, route bricked itself and when I opened the TAC case they said it was mimic device and sent me a new one to arrive within 4 hours since it had been ordered from an approved partner. This shit happens somehow
just_another_person@lemmy.world 6 months ago
Probably a fairly sophisticated espionage operation.
No_Eponym@lemmy.ca 6 months ago