CISA tries to contain data leak(krebsonsecurity.com)

247 分 | 作者 speckx 1天前

13 条评论

  • niwtsol 20小时前
    What an egregious mistake. "exhibits a pattern consistent with an individual operator using the repository as a working scratchpad or synchronization mechanism rather than a curated project repository" - isn't is git 101 to not put creds in git? What pattern do they think this is consistent with?
    • apnorton 20小时前
      They're not defending it as an established workflow pattern or some kind of best practice.

      The usage of "exhibit a pattern consistent with..." is just describing what it looks like the repository was used for. i.e. it's not a set of government sourcecode for an internal project, it's not something indicative of intentionally leaking large amounts of data, etc.

    • nkrisc 19小时前
      > What pattern do they think this is consistent with?

      They clearly stated what pattern this usage is consistent with: using it as a sort of personal scratch pad.

      You’re assigning more meaning to the statement than there is. They are simply stating an observation.

    • nacozarina 3小时前
      not at all a mistake; the us govt is fully-compromised by foreign intelligence and this ‘breach’ was fully intentional
      • throwaway27448 2小时前
        Worse—it may even be compromised by domestic interests
    • irishcoffee 18小时前
      If I had a dollar for the amount of secrets committed to public repositories I could probably retire. No, that isn’t an excuse. Pretending the US govt isn’t made up of people just like you or I is quite silly.
      • joleyj 1小时前
        “Experts who reviewed the exposed secrets said the commit logs for the code repository showed the CISA contractor disabled GitHub’s built-in protection against publishing sensitive credentials in public repos.”

        This makes it seem more intentional to me. Regardless of what the ultimate purpose were use of the repository was it says to me, the person knew what they were doing and it wasn’t just an innocent oversight like anybody could’ve made.

      • Terr_ 17小时前
        Hold up, I think we have some sort of math denominator problem here.

        You'd be rich if you got a dollar for every worldwide murder too, but that doesn't make murder a common workplace occurrence.

        • irishcoffee 17小时前
          ‘Tis a lot different mentality typing git commit/git push than it is to murder someone in cold blood, I guess?
          • Terr_ 16小时前
            I was thinking more purely in terms of frequency. For a dollar a pop, you can be "rich" for worldwide events that are actually very rare things.
      • Arubis 17小时前
        If I had a dollar for each secret I’ve committed to a public repo, I could probably buy a couple of sandwiches. I’m not smarter and my opsec probably isn’t any better than most old devs, but I also don’t have a treasure trove of government secrets on disk and—crucially!—_I would make different decisions if did_.

        The nuance here: when I’ve slipped and committed secrets, it’s typically a relative nothing burger: most common case is API keys to some third-party service. I’ve worked across a bunch of regulated industries and, within those, not caused a breach—because being in that space you know to be more careful, and because the companies in those spaces (wisely!) tend to support good security practices, more so than the industry average.

  • fragmede 21小时前
    > “Ultimately, this is a thing you can’t solve with a technical control,” Boileau said on this week’s podcast. “This is a human problem where you’ve hired a contractor to do this work and they have decided of their own volition to use GitHub to synchronize content from a work machine to a home machine. I don’t know what technical controls you could put in place given that this is being done presumably outside of anything CISA managed or even had visibility on.”

    More competent technical control means a random contractor doesn't have passwords from mid-2025 to copy to their home machine that even still work after 30 days, if not 5.

    • xoa 19小时前
      This. In fact I thought the government had long since gotten pretty serious about using smartcards and HSMs for everything? Why let anyone take any sort of accessible credential at all vs handing out hardware they can use but that cannot have the credentials taken off? At some organizations the extra cost would be a concern of course but that wouldn't be the case here.

      Or maybe that'd have been the sort of project and standard CISA would have formerly done before the Republicans gutted it last year I guess, and this is just another symptom of rot? But yeah to your point technology certainly can absolutely help with this sort of thing. It's not some inevitable act of nature.

      • mpyne 4分钟前
        > In fact I thought the government had long since gotten pretty serious about using smartcards and HSMs for everything?

        They do use it for a lot, but there are a lot of things that need to authenticate to each other in a modern ecosystem, especially if you're trying to replace security based on network boundaries as trust boundaries with zero trust (as the government is).

        I worked with more than a few IL4 systems where the PKI/smartcard stuff was simply shoved into an F5 that did TLS termination and then everything on the internal VPC just used HTTP headers without even a crypto signature to convey which user had actually logged in.

        As with anything else, the more you make it easy to the do the right thing, the more often you tend to see the right thing being done. So agencies that make it easy to request server PKI certs see increased uptake, other agencies just have server-to-server auth done by PSKs / API keys instead.

        So the concern isn't usually cost but compliance, if it's nearly impossible to get those little developer experience affordances ATO'd themselves, agencies will instead just focus on getting the mission system itself ATO'd come hell or high water and the devs just get told to piece it together however...

      • acdha 16小时前
        I think you have to look at it against the backdrop of so many people being fired and new employees being tasked with “urgent” projects across the government. It’s very plausible that the people who used to enforce all of the policies which would’ve preceded or contained this were either fired for political reasons or didn’t think they could tell someone to follow policy if it slowed them down.
      • andrewflnr 14小时前
        I worked for a bit in an org that was agglomerated into CISA. Let's just say PKI integration continues to be infeasibly difficult for most projects, especially small ones. (And cost is very, very much a concern. Be honest, do you want your taxes going into a project where it isn't?)
      • nonameiguess 4小时前
        Not all "government" systems are the same. They're rated in terms of impact level and data classification. Classified systems can't be logged into outside of SCIFs anyway and have no outgoing connection to the Internet. Unclassified systems at IL5 require certificate auth with a government-issued smart card. IL4 requires endpoint attestation but can otherwise use normal username/password auth. Lower impact levels are not as heavily secured. I would have expected they at least require MFA to access the AWS API, but even that depends. A lot of times accounts will be split between production and non-production with MFA required on the production accounts, but work done purely for experimentation, platform development, or other non-user facing things that don't touch real data might not even be in GovCloud since the commercial accounts are cheaper.
    • dylan604 17小时前
      I don't work with national secrets, but I do have access to sensitive/valuable to the client data. The thought of downloading anything directly to my device is just beyond me. I don't even like downloading log files with something like "aws s3 cp s3://client/file - | less". I'd much rather fire up a cheap instance and view the data within their VPC.
  • imglorp 20小时前
    It's almost like gutting the agency of experts diminishes their opsec capacity among many others.

    In 2020 Chris Krebs contradicted stolen election claims. In 2025, Trump sacked Krebs and revoked his clearance, leaving CISA without a director. https://en.wikipedia.org/wiki/Chris_Krebs

    In March 2025, the cuts began. https://techcrunch.com/2025/03/11/doge-axes-cisa-red-team-st...

    In 2026, it was still without a director and running on fumes. https://techcrunch.com/2026/02/25/us-cybersecurity-agency-ci...

    This activity is consistent with intentionally weakening a country's defenses from within and sowing chaos.

    • wnevets 20小时前
      If a foreign adversary was in charge would we know the difference?
    • andrewflnr 17小时前
      Let's be real, it's more directly consistent with aggressive incompetence and hiring/firing based on loyalty. As for how the relevant fools ended up with the power to hire or fire, I'll grant that's a more complicated question...
    • bink 18小时前
      Krebs was fired in 2020, not 2025.
      • imglorp 17小时前
        Correct, thank you, I can't edit now though. Fired in 2020, clearance revoked in 2025.
  • omgJustTest 17小时前
    Seems senators had questions about why CISA was scaling back efforts related to election security[1]. Tulsi's resignation today seems interestingly timed to when this became public.

    [1]https://www.padilla.senate.gov/newsroom/press-releases/padil...

    • da_chicken 15小时前
      I don't know why US senators are up in arms about this. Trump was extremely clear when he gave them his budget that he wanted CISA's budget drastically cut. He also specifically directed CISA to shut down their election security office.

      This is the "who killed Hannibal" meme. If Padilla and Warner didn't know about this, then they're incompetent themselves. Especially because they reported on it last year:

      https://www.padilla.senate.gov/newsroom/news-coverage/cnn-tr...

      Why did you forget this happened, Padilla?

      • N2yhWNXQN3k9 15小时前
        > Why did you forget this happened, Padilla?

        because behind any senator there is a propaganda team, not a brain

        • tardedmeme 9小时前
          It takes brains to run successful propaganda.
          • mapt 9小时前
            It takes brains to run propaganda that successfully changes minds.

            Propaganda that just confirms preexisting mass delusions is actually pretty easy to run if you have a lot of support from similar actors running adjacent campaigns.

  • 0xbadcafebee 18小时前
    > CISA, which lost more than a third of it workforce and almost all of its senior leaders after the Trump administration forced a series of early retirements, buyouts, and resignations across the agency’s various divisions
  • 0x59 20小时前
    Reminds me of the enshittification of public transit. Reduce funding, service level decreases, negative sentiment follows.

    Eventually, paths like that may lead to increased privatization through security contractors.

    • mrtesthah 17小时前
      It was a security contractor who leaked the creds. So this is already the increased privatization end-game.
  • bandrami 16小时前
    I remember when they leaked a million SF-86s. You know, the form we fill out with a ton of highly personal information so they can decide if we can be trusted with sensitive data.
    • browsingonly 16小时前
      That wasn't a leak, it was a breach (perpetrated by Chinese state security).
      • fhn 14小时前
        with a breach, the data ends up in one group's hand but a leak means everyone gets access. Which would you rather have?
        • r_lee 14小时前
          I think logically you'd want the former. with a leak the group will get their hands on it anyways, might as well try to limit reach
    • dgacmu 14小时前
      Wasn't that OPM, not CISA?
      • bandrami 11小时前
        Yes, multiple times IIRC (my "they" was more general than a specific agency)

        CISA, however, was the administration whose head was caught using an unauthorized commercially-hosted LLM for government data a few months ago:

        https://cyberpress.org/cisa-public-chatgpt/

      • acquacow 13小时前
        Yeah, that was OPM...twice.
  • fhn 18小时前
    Lawmakers want answers but they never provide answers themselves. Who watches the so-called watchers? Corruption on a massive scale on by lawmakers but when a key gets published, heads will roll? Keys are mistakenly published all the time by very smart people. Ever ran rm -rf *? Every destroy a production db? Ever power off the wrong server? Yes.
    • verisimi 11小时前
      Their watching is about control not care. It is covertly adversarial; "care" is a justification, not the reality.
  • pianopatrick 16小时前
    If these guys who are supposed to be the experts cannot really be secure on the internet, I'm not sure how anyone else is supposed to be secure on the internet.
    • quantified 13小时前
      This is post-Doge. Doge did its thing well. Sadly, a lot of other people parrotted Doge's lies.
  • immanuwell 7小时前
    the real kicker here isn't just the leaked aws govcloud keys - it's that a contractor manually disabled github's secret scanning protection
  • Cider9986 20小时前
    Maybe Massie was right when he didn't want to fund CISA.
    • water-data-dude 19小时前
      Maybe this is what happens when you fill roles based on loyalty to one person rather than competence
  • m3047 23小时前
    CISA said “there is no indication that any sensitive data was compromised as a result of the incident.”

    Oh wow. Except for those secrets.

    • bandrami 16小时前
      Unfortunately "sensitive" has a specific meaning that they may be being legalistic with. PII, for example, is generally not "sensitive".
    • shakna 17小时前
      Well, "Sensitive" is the second lowest data label. It must all just be above that.
    • InsideOutSanta 20小时前
      Except for all the leaked data, absolutely no data was leaked.
      • hsbauauvhabzb 18小时前
        See the trick is to not consider your data sensitive, no SENSITIVE data was leaked.
        • Terr_ 17小时前
          There is no data leakage from the application where the front-fell-off, because we towed the data outside the environment.

          https://m.youtube.com/watch?v=3m5qxZm_JqM

          • hsbauauvhabzb 17小时前
            ‘Logs do not indicate hackers access any sensitive data, because we did not implement logging and did not look very hard for auxiliary evidence’
    • oofbey 14小时前
      Willful ignorance. "No indication" meaning they haven't seen any evidence anything was compromised. Could be because they've been working very hard not to look at any evidence or analysis of what happened. "I'm not aware of X" is very different from "X is not true".
      • stephbook 8小时前
        They probably don't have systems in place to even detect that data was snorkeled off.

        So "no indication" is completely correct.

    • unethical_ban 16小时前
      Didn't RTFA, was any actual secret data or any IOC, log tampering, etc. found?
  • iluvcommunism 4小时前
    [dead]