What's new

Network client list Unknown Client

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

"But that’s just what U.S. investigators found: The chips had been inserted during the manufacturing process, two officials say, by operatives from a unit of the People’s Liberation Army. In Supermicro, China’s spies appear to have found a perfect conduit for what U.S. officials now describe as the most significant supply chain attack known to have been carried out against American companies."

https://www.bloomberg.com/news/feat...ny-chip-to-infiltrate-america-s-top-companies

:)

OE
I remember reading that story at the time, and frankly I was very sceptical. It was large on hyperbole and thin on facts. Lots of columns inches dedicated to unconfirmed accusations but only a passing mention of Amazon and Apple flatly denying it was true. I see the consensus now is that Bloomberg got it wrong.
 
I remember reading that story at the time, and frankly I was very sceptical. It was large on hyperbole and thin on facts. Lots of columns inches dedicated to unconfirmed accusations but only a passing mention of Amazon and Apple flatly denying it was true. I see the consensus now is that Bloomberg got it wrong.

I don't know if the story is true or not, I don't have the resources to follow the money to find the truth, but a second, hardwired IP is real.

I would be replacing that equipment asap. I would be disconnecting it pronto.
 
, but a second, hardwired IP is real.
I'd be more inclined to suspect that there's some software running on the PC that has created a virtual interface on the physical interface and is using a randomly generated MAC address. Similar to what wireless repeaters do. Either way, if it happens again he could do an "ipconfig /all" to see where it's coming from.
 
I'd be more inclined to suspect that there's some software running on the PC that has created a virtual interface on the physical interface and is using a randomly generated MAC address. Similar to what wireless repeaters do. Either way, if it happens again he could do an "ipconfig /all" to see where it's coming from.

I have hinted at that too, in the posts above. :)

But it doesn't stop the possibility that this is an unwanted intrusion.
 
I would be replacing that equipment asap. I would be disconnecting it pronto.

Cisco products were found to have embedded bugs as well (I believe they were inserted in transit, at least according to the original report), yet I don't see everyone ditching Cisco just yet.

Interesting how the US market gets paranoid with anything from China, yet when something similar happens in their own backyard, they conveniently "forget" about it.
 
Cisco products were found to have embedded bugs as well (I believe they were inserted in transit, at least according to the original report), yet I don't see everyone ditching Cisco just yet.

Interesting how the US market gets paranoid with anything from China, yet when something similar happens in their own backyard, they conveniently "forget" about it.

Thank you! One more reason for me to stay away from Cisco as I have been doing so far. :)
 
Thank you! One more reason for me to stay away from Cisco as I have been doing so far. :)

Scratch Juniper as the alternative then - backdoors were found in their code a year or two ago...

What this amounts to is: if you are trying to find issues with any manufacturer, you WILL find some. And oddly enough, the US market seems to be great at pointing out issues with foreign products, yet they turn a blind eye on their own backyard issues. The mass surveillance from the NSA, all the software holes the NSA kept for themselves and actively exploited... Nobody talks about them anymore. But hey, let's block Huawei from providing us with 5G products, even if their technology might be better than ours. Actually, ESPECIALLY because it's better. Gotta protect our market, rather than drive ourselves to improve. So, let's accuse them of MAYBE spying on us, while we ignore that the NSA is already doing it as a matter of fact.

I better stop there, because I could keep going on this for a very long time...
 
Scratch Juniper as the alternative then - backdoors were found in their code a year or two ago...

What this amounts to is: if you are trying to find issues with any manufacturer, you WILL find some. And oddly enough, the US market seems to be great at pointing out issues with foreign products, yet they turn a blind eye on their own backyard issues. The mass surveillance from the NSA, all the software holes the NSA kept for themselves and actively exploited... Nobody talks about them anymore. But hey, let's block Huawei from providing us with 5G products, even if their technology might be better than ours. Actually, ESPECIALLY because it's better. Gotta protect our market, rather than drive ourselves to improve. So, let's accuse them of MAYBE spying on us, while we ignore that the NSA is already doing it as a matter of fact.

I better stop there, because I could keep going on this for a very long time...

RMerlin, I agree and see the point(s) you are making, but those manufacturers have never been on my purchasing or recommendation list, at least not seriously (after a few months of research and cost-benefit analysis).

My only point here is what is being transferred and to who this approximately 5 to 6 MB of 'data' every few days? I don't think I'm being over-paranoid here? Am I?

I haven't seen anything like this in any network I've worked on, or my own. This seems at least a little alarming at this time. Can you shed any further thoughts on this aspect of the thread?
 
Could just be the Trend Micro DPI mis-identifying the service as Checkpoint when it's a Supermicro MAC.

He'll need to check the inbound/outbound connections while it occurs to see what's the remote endpoint - that would probably allow to identify the trafic.
 
Could just be the Trend Micro DPI mis-identifying the service as Checkpoint when it's a Supermicro MAC.

He'll need to check the inbound/outbound connections while it occurs to see what's the remote endpoint - that would probably allow to identify the trafic.

And the actual data stream? What would be the best way to see what is being transferred?
 
And the actual data stream? What would be the best way to see what is being transferred?

If it's over TLS, you can't.
 

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top