• Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
  • Users were struggling to access Truth Social in the early morning following the alleged hack.
  • As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
  • theherk@lemmy.world
    link
    fedilink
    English
    arrow-up
    35
    arrow-down
    1
    ·
    1 day ago

    Disabling network security and edge devices to change the properties of ingress can absolutely be a component of an attack plan.

    Just like overwhelming a postal sorting center could prevent a parcel containing updated documentation from reaching the receiver needing that information.

    • Kazumara@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 hours ago

      I haven’t heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.

      But maybe there is a different mechanism I’m not aware of. How would the DDoS change the properties of ingress?

      • theherk@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 hours ago

        By denying access to resources in a primary region, one might force traffic to an alternate infrastructure with a different configuration. Or maybe by overwhelming hosts that distribute BGP configurations. By denying access to resources, sometimes you can be routed to resources with different security postures or different monitoring and alerting, thus not raising alarms. But these are just contrived examples.

        Compromising devices is a wide field with many different tools and ideas, some of which are a bit off the wall and nearly all unexpected, necessarily.