Started By
Message

re: LA State Computers Hacked (Confirmed)

Posted on 11/19/19 at 8:40 am to
Posted by teke184
Zachary, LA
Member since Jan 2007
103101 posts
Posted on 11/19/19 at 8:40 am to
That matches what I heard about other agencies.

People are basically being told to show up and pray it works but are otherwise being told nothing and really can’t do much.
Posted by ForeverLSU02
Albany
Member since Jun 2007
52497 posts
Posted on 11/19/19 at 8:48 am to
We were told about an hour ago that things were up and running and good to go. 30 minutes later several people came scrambling through our office asking everyone to shut everything down again.
Posted by teke184
Zachary, LA
Member since Jan 2007
103101 posts
Posted on 11/19/19 at 8:55 am to
It’s persistent? This is my fricking shocked face.

Not an IT security expert but I would think you would want the system offline for a day or two cleansing as much as possible then slowly start adding users back to see if problems emerge.

Sounds like they put everyone right back on and took them right back off, meaning they are back at square one.
Posted by FieldEngineer
Member since Jan 2015
2540 posts
Posted on 11/19/19 at 9:34 am to
quote:

It’s persistent? This is my fricking shocked face.

Not an IT security expert but I would think you would want the system offline for a day or two cleansing as much as possible then slowly start adding users back to see if problems emerge.

Sounds like they put everyone right back on and took them right back off, meaning they are back at square one.


The proper response is to assume everything is infiltrated and rebuild, but that's very expensive and time consuming. Although, I suspect it's potentially more expensive to NOT rebuild.
This post was edited on 11/19/19 at 9:36 am
Posted by PureMetairie
Metairie
Member since May 2017
1012 posts
Posted on 11/19/19 at 10:44 am to
Find out the entry point. Likely email. Search your email trace to identify everyone who received said email. Remove mail from inboxes. Slap user upside the head for opening malicious attachment. Also slap the email filter vendor for allowing attachment to make it through.

Identify systems that executed the malware and remove them/isolate them.

Pray you have good backups and begin restoring backups. Takes a little time but that is your best option. Otherwise, pay the ransom and hope you get all your shite back.
Posted by teke184
Zachary, LA
Member since Jan 2007
103101 posts
Posted on 11/19/19 at 10:47 am to
They supposedly traced this back to a VPN portal into the LA systems used by a contractor.
Posted by Hunter_H_Helmsley
Member since Feb 2019
112 posts
Posted on 11/19/19 at 11:02 am to
Still a lot of questions the state has to answer on how long a bad actor had access. The fact that the systems were compromised as a whole completely nullifies the " you can't just the gap" fallacy.

The application that counts the votes on the state's system was compromised.
Posted by Tempratt
Member since Oct 2013
14888 posts
Posted on 11/19/19 at 11:07 am to
There will be heads rolling for this. 2nd time? I mean really, WTF.
Posted by Tigeralum2008
Yankees Fan
Member since Apr 2012
17604 posts
Posted on 11/19/19 at 11:37 am to
quote:

There will be heads rolling for this. 2nd time? I mean really, WTF.


It's actually quite common.

You restore a backup, send some GPO updates or other scripted commands to clients addressing the vulnerability. Some clients do not receive them and blammo, you get a newly infected machine.

The scale of things really complicates your restoration efforts.
This post was edited on 11/19/19 at 11:38 am
Posted by yatesdog38
in your head rent free
Member since Sep 2013
12737 posts
Posted on 11/19/19 at 11:37 am to
Russians.
Posted by BallsEleven
Member since Mar 2019
6163 posts
Posted on 11/19/19 at 11:44 am to
I assume eparish and latap is all involved in this since they have been jacked up the past few days.

Just in time for sales tax deadline.
Posted by Hunter_H_Helmsley
Member since Feb 2019
112 posts
Posted on 11/19/19 at 11:55 am to
Honestly, i think ransomware attack is unlike most I've read about or heard from experienced IT consultants. JBE claims they didn't pay a ransom, and then we hear rumors that we moved to a new platform to back our state domain services. And all the website domains for the state are back online. But no one can work still? Doesn't compute.

Second, that's a pretty big decision that is never made fast by any financial organization in the country. Mainly because a quick decision like that loses a lot of data. And to equate data to money, we just closed out an entire account but we lost history instead of money. So why in the hell is the state making such a risk decision with alot of syslog activity that its so willing to lose so fast.

That's not allowed in any regulated industry. Another convenient happening for those involved.

I think it's just a cover to buy more time while they wrap up whatever they destroyed at his house yesterday(probably the actual election results). Especially that he is rumored to retire soon. this is the only valid coincidence presented thus far. Still incredibly convenient.

Reason i think this is because this reeks of buying time to destroy physical backups(only possible last records of data collected on Saturday. Since the voting machines basically just collect tallies, we just move the hard drive of each machine to the central system for counting most likely. This is why the gap fallacy does not matter, voting machine is just a medium and we put the results in an infected system. Explain that state IT.

The above paragraph should be asked of every person involved. They can't prove that the systems were infected during the collection. Therefore how can they assure the election is accurate.

And if they lose all the data, the public should not accept that bullshite excuse.

We also run an outdated system and if its alleged that the cloud backups are corrupted then they have to destroy whats backed up constantly throughout the day(hence why fire specifically is so goddamn suspicious). If he reports that any hard drive was damaged then the man should be under arrest until questioned what was on them. He needs to confirm what was on there. He collected a large enough check from the state long enough that his arse could answer those questions.

Call me wild, call me a nerd, call me Al(RT, what FU)

But I'll give layman's examples all day if the people ask the questions.
This post was edited on 11/19/19 at 11:58 am
Posted by crewdepoo
Hogwarts
Member since Jan 2015
10879 posts
Posted on 11/19/19 at 12:00 pm to
quote:

Call me wild, call me a nerd, call me Al(RT, what FU)

You’re an idiot
Posted by Klark Kent
Houston via BR
Member since Jan 2008
72818 posts
Posted on 11/19/19 at 12:05 pm to
Does the Louisiana State IT Department not practice disaster recovery or a “Red Button scenario“?

That’s some real poor planning if not.
Congrats on being a use case for IT Departments around the country.
Posted by Tempratt
Member since Oct 2013
14888 posts
Posted on 11/19/19 at 12:16 pm to
I heard that the Ortho clinic in Monroe has been hit with ransom ware in the past.
Posted by Motorboat
At the camp
Member since Oct 2007
23889 posts
Posted on 11/19/19 at 12:20 pm to
quote:

Just in time for sales tax deadline


you do know that state purchases are tax exempt?
Posted by BruslyTiger
Waiting on 420...
Member since Oct 2003
4760 posts
Posted on 11/19/19 at 1:52 pm to
quote:

I think it's just a cover to buy more time while they wrap up whatever they destroyed at his house yesterday(probably the actual election results). Especially that he is rumored to retire soon. this is the only valid coincidence presented thus far. Still incredibly convenient.

You do realize that he is the CIO for the Division of Admin under the Governor and has absolutely nothing to do with the SOS?
Posted by cleeveclever
Baton Rouge
Member since Aug 2008
2046 posts
Posted on 11/19/19 at 1:55 pm to
quote:

You do realize that he is the CIO for the Division of Admin under the Governor and has absolutely nothing to do with the SOS?


Shhhh....

he's having his moment.
Posted by BeepNode
Lafayette
Member since Feb 2014
10005 posts
Posted on 11/19/19 at 2:04 pm to
quote:

They supposedly traced this back to a VPN portal into the LA systems used by a contractor.


I’m not hearing that at all. In fact most of what’s being posted on this board is questionable. They’re deleting the virus off PCs and are restoring anything that was encrypted. It just takes time.
Posted by BoredOne
North LA
Member since Mar 2012
246 posts
Posted on 11/19/19 at 2:15 pm to
I heard that in my department there are 2,300 infected computers and they can’t restore access to the server until those are reimaged.
first pageprev pagePage 6 of 9Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on X, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookXInstagram