The response from the company spokesperson doesn't reflect well on the
organization.

The comments are often more enlightening than the article itself:

================================================
Yeah, like I just said.

https://www.ssllabs.com/ssltest/analyze.html?d=www.eventid.net

HTTP server signature Microsoft-IIS/6.0

Windows Server 2003 on the Internet almost two years after it became
unpatchable because it went EOL.

But it’s got a SHA256 cert on it so we’re good, right?

================================================

After further reading, the man himself commented on the article:

I am the owner of the site that Brian is highlighting in his blog entry. He
sent me an email on Feb 9 asking for details about our security notice. I
was preparing an answer, though RSA had not yet released their article and
I was under NDA with them and I had to think about can be disclosed. This
morning I received another email from Brian: “contact me today or else” – I
was adding more info to my response for his Feb 9 email and I did a quick
check to see if RSA made their whitepaper public (it wasn’t a few days ago)
when I found that Brian went ahead and published this, though I think it is
still “today”. I doubt that any answer would’ve made any difference.

We worked with RSA and provided a relevant part of the information in their
Kingslayer whitepaper . I’ve been in contact with the author and discussed
many aspects of the attack and its aftermath. We didn’t make any “deal”
with RSA, they asked us to sign an NDA about their research and volunteered
not to mention the company name though anyone can easily find it by
searching some of the details in their document (and this blog post is
living proof). I was asked to review the whitepaper before being published
and I had no problem with it – what happened, happened. If Brian did talk
to the authors, he didn’t mention that we fully cooperated with RSA and did
all that’s been asked from us (but that would’ve been against the spirit of
this blog post). The notification on the site is what RSA recommended. We
don’t keep a list of EvLog users, anyone can download it. It is easy for a
bank, for a social site, etc. to identify their users. Not so easy when
your software is free to download. How many of us are using Linux and when
is the last direct email that we received about a security problem with it?

Other software is mentioned in the blog as “potentially” compromised. It
was not compromised – is there a notification? No. This was an attack
strictly directed at EvLog from what RSA estimated to be a state-sponsored
threat actor.

Of course we were not perfect in handling this. In hindsight is much easier
to criticize. Should we now start plastering our sites with pop-ups about
EvLog being the victim of an attack in 2015? Brian thinks that unless you
do this, you are trying to “bury” an attack. Maybe he is right, maybe not.
I don’t see any notices on Yahoo’s main page, on Target, on government
sites, etc. RSA itself was breached – can anyone navigate to a security
notice from their main page? Unless you heard about it and Google it you
cannot find any notification. Is there a complain about this? On our site,
the security notice is surely not buried. It is on the EvLog home page with
an IMPORTANT label next to it. We didn’t have to do this.

Whoever feels like throwing the first stone, good for you, you are a better
company. We are still learning from our mistakes.

On Wed, Feb 22, 2017 at 9:24 AM, Micheal Espinola Jr <
[email protected]> wrote:

> Eye openingly scary.
>
> --
> Espi
>
>
> On Tue, Feb 21, 2017 at 10:37 PM, Kurt Buff <[email protected]> wrote:
>
>> https://krebsonsecurity.com/2017/02/how-to-bury-a-major-brea
>> ch-notification/
>>
>
>

Reply via email to