- Jan 23, 2021
- 6,532
- 7,439
- 1,938
Rampant incompetence. The DoD had to be informed by a third party that they were effectively publishing sensitive data to anyone who found the IP address of this server. Not even password protected. Was exposed for two weeks.
"USSOCOM spokesperson Ken McGraw said in an email on Tuesday that an investigation, which began Monday, is under way. “We can confirm at this point is no one hacked U.S. Special Operations Command’s information systems,” said McGraw."
Yeah Ken, browsing the content of an unprotected server isn't hacking, so you might technically be correct, asshat. We know that at least this Shodan search engine found it. It sat out there completely unprotected, not even a password, for two weeks. Our enemies certainly found it.
Even my home network lets me know when I have a vulnerability.
"USSOCOM spokesperson Ken McGraw said in an email on Tuesday that an investigation, which began Monday, is under way. “We can confirm at this point is no one hacked U.S. Special Operations Command’s information systems,” said McGraw."
Yeah Ken, browsing the content of an unprotected server isn't hacking, so you might technically be correct, asshat. We know that at least this Shodan search engine found it. It sat out there completely unprotected, not even a password, for two weeks. Our enemies certainly found it.
Even my home network lets me know when I have a vulnerability.
Sensitive US military emails spill online | TechCrunch
A security researcher told TechCrunch that a government server was exposing military emails to the internet because no password was set.
techcrunch.com