Chris BingVerified account

@Bing_Chris

cyber reporter. Covers nation state hacking. 📧email: [at] tr [dot] com. : 2O2-51O-O174. More contact info:

Washington DC
Joined February 2012

Tweets

You blocked @Bing_Chris

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @Bing_Chris

  1. 1 minute ago

    ON REUTERS WIRE - another SolarWinds/RU hacking op victim: Department of Homeland was compromised through the Russian hacking op we reported yesterday. Added alongside Treasury and Commerce. First reported by Reuters. Third agency now.

    Undo
  2. Good insight here from a former top USG cyber official:

    Undo
  3. Undo
  4. eh I know kinda obvious. But worth pointing out. The FireEye blog says the attacker usually deleted the backdoor and established persistence after compromise.

    Show this thread
    Undo
  5. Something I think that is getting a bit lost is there's no easy fix for SolarWinds. There is no magic trick to reverse all those compromises. Doesn't matter if you patch or w/e. The attacker is in your network and it's going to be an uphill, individual battle to get them out.

    Show this thread
    Undo
  6. Retweeted
    3 hours ago

    That’s it, the first vaccine doses are in.

    Undo
  7. 2 hours ago

    Always a good sign for a company when they remove their entire customer page

    Undo
  8. Retweeted
    7 hours ago

    “The NSC is working closely with , , the intelligence community, and affected departments and agencies to coordinate a swift and effective whole-of-government recovery and response to the recent compromise.” – NSC spokesman John Ullyot

    Undo
  9. 3 hours ago

    SolarWinds claims here: -they are unsure if the government hacks are their fault -interesting mention of 0365 without directly saying that was the initial infection vector?

    Undo
  10. 3 hours ago

    SolarWinds SEC breach disclosure form. Posted this morning:

    Undo
  11. 3 hours ago

    On the Reuters wire minutes ago (via ): IT COMPANY SOLARWINDS SAYS THAT 'FEWER THAN 18,000 CUSTOMERS' HAD POTENTIALLY VULNERABLE SOFTWARE

    Undo
  12. Retweeted
    3 hours ago

    New: Election tech company Smartmatic has issued a retraction letter to , demanding it withdraw allegations made by guests & and hosts & . "This, for us, is existential," its CEO told me.

    Show this thread
    Undo
  13. 3 hours ago

    Russian Embassy responds to Reuters reports over USG hacks and Solar Wind compromise.

    Undo
  14. 3 hours ago

    A note on the Solar Winds/USG hack re: attribution-> -Reuters initially had "nation state" only -Investigation is early days -While others have reported it is APT29, we haven't. -Sources have told us early indication is threat group is Russian in origin. But again, early days

    Undo
  15. Retweeted
    3 hours ago

    New from & team: The scope of the SolarWinds breach is potentially enormous, but cyber investigators across the industry say signs suggest the hackers honed in on relatively few targets: "They are using this like a scalpel," one told me.

    Show this thread
    Undo
  16. 3 hours ago
    Undo
  17. Retweeted
    17 hours ago

    SolarWinds is currently hiring for a vice president of security, according to LinkedIn. Spotted by

    Undo
  18. Retweeted
    17 hours ago

    FinCEN , OFAC, OIA, BIS: Treasury and Commerce help carry out core national security and intelligence functions for the U.S. government.

    Undo
  19. "I'd say we've been hacked!," according to a SolarWinds video of men in lab coats. "guys we run our lab on a VM, I'll just restore" "the reality is they probably hacked us weeks ago"

    Show this thread
    Undo
  20. Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·