this post was submitted on 06 Nov 2025
366 points (99.7% liked)

World News

50674 readers
2923 users here now

A community for discussing events around the World

Rules:

Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.


Lemmy World Partners

News !news@lemmy.world

Politics !politics@lemmy.world

World Politics !globalpolitics@lemmy.world


Recommendations

For Firefox users, there is media bias / propaganda / fact check plugin.

https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/

founded 2 years ago
MODERATORS
all 48 comments
sorted by: hot top controversial new old
[–] thesohoriots@lemmy.world 73 points 16 hours ago (2 children)

“This next heist will be far more daunting. It will take years of planning and—oh no way, it was changed to ‘Louvre1’”

[–] toy_boat_toy_boat@lemmy.world 11 points 13 hours ago

"okay, i'm gonna need about five min- oh!"

[–] WhatsHerBucket@lemmy.world 60 points 17 hours ago (2 children)

Proving once again that humans are the weakest link in your security chain. No firewall or other security protocol matters when people are too lazy to use more secure passwords (or just click on random links in their email).

[–] SaraTonin@lemmy.world 27 points 14 hours ago (4 children)

I once read an interview with a white hat hacker. He said that people expect him to try to remotely connect to their network and try to brute force his way in. The first thing he actually does is put on a suit, visit the company’s headquarters, walk in the front door, start a conversation with the receptionist, and see how far he can get.

[–] Mikina@programming.dev 11 points 11 hours ago

I've done exactly that, worked as a Red Team Lead, and the success rate is pretty disturbing. That, and vishing - calling people from the company you find on Linkedin from a spoofed number of their IT that they fucked something up and need to download and run this .exe to fix it before The Audit that's currently happening notices it.

Even if we do internal infrastructure tests where they let you in, switch AVs to "detect mode" instead of "block mode" and the goal is to find as many unpatched systems/vulnerabilities as you can (instead of, well, testing the AV solution), what we usually do is run a password spray for all domain accounts with a combinations (you can try like 3 to not lock the accounts) of "" we every single time got at least few accounts.

Fortunately this kind of tests are getting more popular, and passwords such as this should've definitely been caught in some kind of security test. But it is also pretty depressing, when you repeat the same test next year, and 80% of the passwords are still the same, and vulnerabilities are still not patched.

[–] AnarchistArtificer@slrpnk.net 4 points 8 hours ago

This reminds me of an excellent episode of Dark Net Diaries, "Jeremy from Marketing". https://pca.st/episode/52252c9e-e4a8-42f6-85f5-f162ec3f6b40

[–] IsoKiero@sopuli.xyz 2 points 7 hours ago

I've done quite a bit of freelance work and visited various office spaces with multiple companies in a single building. It was pretty common just to call to the building reception and tell them that I'm working for this-and-that-company upcoming weekend for their network stuff and I'd need access to network cabinets and whatnot and they'd have keys ready for me with very little (if any) verification if I'm actually doing what I'm supposed to or if I am who I claim to be. Some of the locations just handed me keys with access to practically everything, including shared server rooms hosting their CCTV setup, key managing servers and all.

So, just get a name tag with a local operator logo and clothes to match and ask nicely. You'll get access to a lot more than you think.

[–] Sunschein@piefed.social 2 points 7 hours ago

In marching band, I learned you can get pretty much everywhere with a white polo, black slacks, and (optionally) an instrument. The same usually holds true for a hi-vis vest and jeans.

[–] 20cello@lemmy.world 3 points 16 hours ago

Not the onion?

[–] Thadrax@lemmy.world 28 points 11 hours ago (2 children)

Not surprising tbh.,I've been in a security meeting before where the owner of the company just said outright his password was written in big letters on the outside of the building we were sitting in. Some people really have zero sense for security or just don't care.

[–] jubilationtcornpone@sh.itjust.works 17 points 10 hours ago (1 children)

One time I got written up for stating that "failing to take cyber security seriously creates a massive potential liability" for the company. Apparently that was "out of line."

Well you know what else is out of line? Critical infrastructure organizations (i.e. utilities) that don't take security seriously.

I do not miss that dumpster fire.

[–] mcv@lemmy.zip 5 points 9 hours ago

I would really like to see companies held more accountable for their data security. If data gets leaked through some security breach, regardless of the criminality of the perpetrators of that breach, if it contains sensitive data like unhashed passwords, credit card or other personal data, and other potentially even more sensitive stuff (medical, financial), the company that was supposed to secure that data needs to be held liable too.

Any company that stores any of that kind of data, needs to have real security experts on board and listen to them. If you can't, don't store that kind of data.

[–] ameancow@lemmy.world 9 points 7 hours ago* (last edited 7 hours ago)

I grew up having to learn everything about network security at home, on a windows PC, in a family with no regard for the concept of internet security because basically the idea didn't exist yet. I was the one who scrubbed the PC every week and removed the 1300 toolbars and spyware apps, I was the one who had to repair the registry every time a sibling downloaded a file sent to him by a "hot girl" claiming it was a picture of her boobs.

So it's maddening now working in a company of adult humans who are so bad at safety and security that our workstations have even had their settings menus neutered because everyone is so bad at security. Yesterday someone asked how to install the file they received in email titled "security update, please install asap!" from "rnicrosoft. com."

[–] stoy@lemmy.zip 25 points 17 hours ago (3 children)

Ok this sounds bad, but I have a question...

Was the camera system accessible from the internet?

If not, this issue is far too overblown.

[–] FuglyDuck@lemmy.world 19 points 16 hours ago* (last edited 16 hours ago) (3 children)

Usually, there's a network for IP cameras, with a central server holding the video. There's then, usually, a firewall to anything outside that, and frequently just a hardline to a monitoring system. (another computer with lots of monitors, typically.)

Most modern systems can VPN to the firewall and run a client there via remote desktop, and then access the monitoring system that way; but the server itself is not.

As to the complexity of the password, typically there's different levels of permissions. The basic ones would just let you monitor real time, probably review recordings, and maybe rip those recordings. (but not change settings, or otherwise delete anything.) A place like the Lourve would have multiple guard stations connecting in on the local network; with dozens of guards watching cameras at any given time; and would each need their own account/logins if you wanted to make the password actually complex.

a large part of the problem is just the sheer amount of people that would need to have acounts- the lourve says they have ~1300 'reception and security' staff. (for the record, reception would also be part of the security envelope... though they probably wouldn't need the password.)

anyone dialing in from off sight would likely have their own password (and have elevated permissions to allow that.). Frequently, by remote desktoping into a system on the local network.

You'll also notice theyre not saying the security system was actually compromised- even if the cameras were pointed the right way, they'd still have gotten in and out because the windows were a point of vulnerability. They might have been able to respond faster, but they were in and out in ten minutes. a camera wouldn't be able to stop that, if you account for normal human reaction times... if they'd even notice the 'contractors'.

[–] frongt@lemmy.zip 11 points 16 hours ago (1 children)

Also, this was found by an audit years ago. Doesn't mean it was fixed, but doesn't mean it was still the same during or after the theft.

[–] FuglyDuck@lemmy.world 7 points 15 hours ago (1 children)

At least it wasn’t the default password.

I’ve known clients that have never removed the default admin account, with a default admin password… and looked at me like I had a horn growing out my ear…

[–] frongt@lemmy.zip 1 points 15 hours ago (2 children)

I'll admit it, I have systems at work with weak or default passwords. But they don't handle any sensitive information, and exploiting them wouldn't get you any additional privileges on the network.

[–] FuglyDuck@lemmy.world 4 points 13 hours ago

that's just it... any vulnerable system lets them get their nose in the door, then the camel starts snooping around the tent for whatever it can get. Eventually, they find away to something juicy.

The thing is, whether we're talking about digital or physical security, the weakest thing in any system is the humans. The sloppy passwords (c'mon it should have been Louvre25! lol.) is a human thing. clicking that phising scam is a human thing. kipping off to the egyption bedroom for tryste with receptionist is a human thing.

the simple password isn't the problem. The people being complacent is.

[–] comrade_twisty@feddit.org 3 points 14 hours ago (1 children)

Until someone figures out how to use this non critical system to exploit other parts of your network. An ssh shell on an internet connected coffee machine in a bank would make a great starting point to gain access to more critical systems for example.

[–] SaraTonin@lemmy.world 4 points 14 hours ago (1 children)

There was a story a few years back about a casino getting hacked through a smart thermometer in a fish tank.

[–] FuglyDuck@lemmy.world 2 points 14 hours ago

the Target hack went in through the HVAC system.

Usually, there’s a network for IP cameras, with a central server holding the video. There’s then, usually, a firewall to anything outside that, and frequently just a hardline to a monitoring system. (another computer with lots of monitors, typically.)

I hate to say it man, but this assumes someone is going above and beyond to lock down the cameras.

I used to have a milestone implementation where I work. There was a security PC in a security office that has the cameras on and always logged in but nobody shuts down requests for camera access for other users. The flimsiest of justification is all that is necessary for the highest level of leadership to give the go ahead. We do manufacturing and everyone thinks these low quality grainy security cameras are a replacement to going on the floor and actually watching how things are working so dozens of non-security people had access.

When I started everybody was using the same local account to log in. I migrated us to AD authentication (with exception of the security PC) but anybody could still technically reach the camera system from the network.

Absolutely anybody could just enter the IP of a camera on the network though and view what it sees. Every camera had default passwords. We even had some fun brands like Hikvision that were banned in 2022 by the FCC. We had a firewall from the outside world, but a guest network that was not isolated at all.

We've migrated to a different solution that cost hundreds of thousands of dollars and over a year of replacing cameras, but still probably a third of people in the org have access to the cameras for bullshit reasons and leadership doesn't care to shut it down. Thankfully none of them are admins and nobody but myself and a couple of others have any kind of admin level permissions now, but my point is that it's the wild west out there in terms of IT processes... and often Shadow IT from groups like a security team that isn't truly tech-savvy ends up running something like this.

If money didn't flow like water due to a total lack of purchasing controls and nobody complaining about expenditure at the time, we'd still be using the same old security cameras. I can't imagine the Lourve having much of a budget. museums are run like shitty nonprofits and are held together with string and bubblegum in the US.

[–] Ziggurat@jlai.lu 1 points 11 hours ago

You’ll also notice theyre not saying the security system was actually compromised- even if the cameras were pointed the right way, they’d still have gotten in and out because the windows were a point of vulnerability. They might have been able to respond faster, but they were in and out in ten minutes. a camera wouldn’t be able to stop that, if you account for normal human reaction times… if they’d even notice the ‘contractors’.

This, Camera are useless at stopping/preventing crime. Thanks to the Camera 5 persons have been charged and wait their trial in jail but camera won't prevent a jackasss to steal something in a museum

[–] Mikina@programming.dev 7 points 11 hours ago (2 children)

It depends on how well segmented is their network, but all you might need for that is a Raspbery PI with ethernet and GSM.

I've done some engagements where we sent someone into the company to get in as an air conditioning tech, and when they got in he planted that device between a printer and the network. It was set up to forward all traffic, but also allowed us to connect through GSM and get into the network.

It takes like a few seconds to plant it.

Or if it's really bad, then you might be able to reach it from the WiFi.

[–] uniquethrowagay@feddit.org 1 points 4 hours ago (1 children)

If your network does not have NAC and just lets unknown devices plugged into a random wall outlet inside, you might as well get rid of passwords alltogether.

[–] Mikina@programming.dev 1 points 1 hour ago

There are some ways how to get around NAC. If it's older 802.1x, you can use https://github.com/s0lst1c3/silentbridge, but what usually works for us is simply cloning the printer MAC, because older printers can't do authentication and rely on MAC whitelisting.

Making a MITM device that just clones the MAC when you plug it between the printer and the network isn't that difficult.

But I agree, NAC is important!

[–] kent_eh@lemmy.ca 1 points 7 hours ago

Or if it's really bad, then you might be able to reach it from the WiFi.

Or some employee might have dropped their own wifi access point onto the Lan for their own convenience.

I found 2 of those on the same floor during one sweep...

[–] PetteriPano@lemmy.world 17 points 16 hours ago (4 children)

I use my dog's name as password for my WiFi.

Ed&1e.78x!

We call him Eddie for short.

[–] Hupf@feddit.org 15 points 16 hours ago

Little Eddie Tables

[–] jordanlund@lemmy.world 6 points 11 hours ago

fourwordsalluppercase

[–] motor_spirit@lemmy.world 4 points 15 hours ago

you got your dog from elon and the one chick and kept the name

[–] ook@discuss.tchncs.de 4 points 16 hours ago (1 children)

Haha you fool. I'm in.

Now what...

[–] frongt@lemmy.zip 9 points 15 hours ago

Look at a bunch of weird stuff on social media to screw up the targeted ads for their IP address

[–] cosmicrookie@lemmy.world 15 points 17 hours ago

That is crazy. At the nursery that I work at we have to type in 3 passwords + a 6 digit key generator just to type in what kind of poop they've made.

[–] jordanlund@lemmy.world 9 points 11 hours ago

They also apparently had another system developed by a company called Thales, and the password for it was "THALES".

https://www.vice.com/en/article/louvre-heist-fallout-reveals-museums-video-security-password-was-louvre/

[–] SkyezOpen@lemmy.world 5 points 6 hours ago
[–] HugeNerd@lemmy.ca 4 points 7 hours ago (1 children)

Not even in verlan? Vrelou would have been at least amusing.

[–] Witchfire@lemmy.world 3 points 6 hours ago (1 children)

Verlan is one of my fav French gimmicks, je le trouve drôle

[–] Wav_function@lemmy.world 4 points 5 hours ago

Ledrô even

[–] OhStopYellingAtMe@lemmy.world 3 points 11 hours ago

lol I louvre it!

[–] myfunnyaccountname@lemmy.zip 2 points 50 minutes ago

No 1 at the end of it. Rookies.

[–] monogram@feddit.nl 1 points 15 hours ago (1 children)

Biometrics plus Fido key is the way to go.

[–] ms_lane@lemmy.world 4 points 15 hours ago* (last edited 15 hours ago) (2 children)

Just hand over all your biometric data to a private company that definitely won't sell them on, Promise!

No. It's my biology.

[–] SomethingBurger@jlai.lu 1 points 7 hours ago* (last edited 7 hours ago)

Hardware keys use biometics as a password to unlock a key or OTP code. Your fingerprints never leaves the device.

[–] monogram@feddit.nl 1 points 13 hours ago* (last edited 13 hours ago)

I was mostly talking about the yubi key bio.

Further reading the fingerprint is still relying on you remembering a numeric pin. (Which is usually someone’s birth year)