I think it's outrageous, the way these workers are treated like slaves just to make shiny stuff for decadent Westerners.
Sent from my iPhone
It had to happen eventually. Controversial hardware manufacturer Foxconn was reportedly hacked late on Wednesday and a heap of staff email log-ins and intranet credentials posted online which could allow third parties to lodge fraudulent orders. In a lengthy message posted to Pastebin, hacking group Swagg Security claimed the …
I'm not aware of any free or purchased scripts which can compromise a firewall-based system such as Foxcon's without major penetration testing and refinement (usually noticeable) or being run internally.
I know it makes shit-tier sysadmins (such as many Reg ACs) feel cool to think they're somehow skilled beyond the people who make them look like idiots so perhaps this unwarranted name-calling is related?
I love how you say firewall-based as if that, instantaneously makes the site more secure. It doesn't, they still need to open ports to the outside world and you can distribute the penetration test across a bot net to avoid detection.
There are several worms and general attack tools that try multiple attack vectors such as common php/iis/asp programming errors and password guessing on any open port (ssh, ftp, smtp-sasl,pop3) that takes a password. My server logs are stuffed full with the resulting warnings even though each host can only try 4 times before being blocked.
Agreed completely, and that's kind of the point. Any competent admin will do their best to lack that shit down as far as is possible given the company's requirements.
In suggesting that those who cracked Foxcon simply bought or downloaded a script, our AC above is actually mocking their network, not the crackers. And the thing is, if Foxcon were THAT easy to crack, somebody (likely some environmental group or ethical labour campaigners) would have done it long ago.
A firewall is like any other wall. If it stays up for a long period of time without any unauthorized individuals getting through, you've done it well. If you've done it well, getting past it is not trivial (from the outside).
However, according to their Twitter feed the hackers gained access to Foxconn’s systems via an “outdated vulnerability” in a version of Internet Explorer which was being used internally by the company.
So they are using IE6 and Active X in the management suite then?
Unfortunately the Active X bit is likely to be true, as historically, this was the preferred login mechanism for East Asian banks.
I take it you have no idea what pastbin is. Pastbin is for quickly passing around large amounts of text for cases such as support requests and if they took the time to accept or deny things then it would be useless for the task it was designed for.
Given their history you can bet they will take down the logs as soon as they find out about them but complaining they didn't block them in the first place is just unreasonable.