7 Comments

Terrifying

Expand full comment

Aa

Bb

Cc

Dd

Ee

Ff

Gg

GANG

Expand full comment

Why do both of these articles exist with same or overlapping content but different titles?

https://cyberintel.substack.com/p/doge-exposes-once-secret-government

Expand full comment

You mentioned an "investigation," but I'm not seeing the details, analysis, or logical walk-through of an "investigation." I would also note that all the US Department of Energy Lab facilities and the EoE have a vulnerability reporting process. If you find something, report it.

I know this works from past "tripping over a risk" in a DoE facility, reporting it, and seeing it resolved ASAP.

Suggestion: Limit your investigation to Shodan by using one lens on the exploration. Expand out. There are a suite of tools, all looking at that risk with different lenses. For example, plug the Shadowserver Foundation (www.shadowserver.org). Check out their public Dashboard (https://dashboard.shadowserver.org/) and some YouTube videos (https://www.youtube.com/@Shadowserver-Foundation).

If you are worried about the unpatched vulnerabilities, you can get details from the Shadowserver Dashboard (overview, not the specifics - subscribe your ASN, IPs, and domain to get your specifics).

For example, you can see who is still exposed to Fortinet CVE-2024-55591 here:

https://dashboard.shadowserver.org/statistics/combined/map/?map_type=std&day=2025-02-09&source=exchange&source=exchange6&source=http_vulnerable&source=http_vulnerable6&tag=cve-2024-55591%2B&geo=all&data_set=count&scale=log

Expand full comment