It seems that you're using an outdated browser. Some things may not work as they should (or don't work at all).
We suggest you upgrade newer and better browser like: Chrome, Firefox, Internet Explorer or Opera

×
avatar
Lexor: Even if GOG's users are safe, GOG should at least inform them that they are safe.
Exactly. "Do not be alarmed, GOG has not been affected by the recent CDP hack" (if that is indeed the case) would also be a statement worth making. And if that is not the case, well then they definitely should let their users know rather than assume they all follow CDP on twitter/will find this thread.
Post edited February 10, 2021 by Breja
avatar
Lexor: Even if GOG's users are safe, GOG should at least inform them that they are safe.
avatar
Breja: Exactly. "Do not be alarmed, GOG has not been affected by the recent CDP hack" (if that is indeed the case) would also be a statement worth making. And if that is not the case, well then they definitely should let their users know rather than assume they all follow CDP on twitter/will find this thread.
I'm pretty sure we're not. I don't want to go into details, though. They're just not threatening us. GOG has been holding the world alot, the past few hours, so either gog just gog really popular, is getting DDoSed, or CDP has been sharing servers for some of these purposes, or some of the gog specific servers have been compromised. But there's another painfully obvious detail that i dont' want to enumerate, incase perhaps they haven't figured it out yet.
avatar
.Keys: You've made some serious considerations there, sir. Specially the part about how students are graduating with incomplete formation in a necessary area such as security.
I've read it patiently and pleasantly, as a studant myself, so, I thank you for the shared knowledge.
I'm glad you felt inspired, it is important :).

It won't help with the technical bits, but books by Bruce Schneier are a great introductory read to get into the security mindset (which is half the battle really). He's published more books since, but 'Secrets & Lies: Digital Security in a Networked world' is a great read.

avatar
Darvond: The problem with IntSec teams is that they're a lot like IT teams; they're best when they're invisible as that means all is well, which to idiot management teams & bean counters raises the question of, "What are we paying you for?" to which most engineers have trouble kneeling down to their semi-sentient simian counterparts to say in lay terms in a summarized cliff notes what they do.

But as many have repeatedly said in this thread, the weakest link isn't your firewall, but that receptionist who chews bubblegum on a phone call who gets socially engineered into letting someone past the gates who so happens to be carrying an outside USB stick.

And nobody thinks to manage the groups or wheel to prevent content not specifically from within the building from even being allowed to execute (though I'm not even sure Windows has such fine grain control, even with group policies because it's that backwards at times.)

I don't even work in InfoSec or IT and these are just some basic things that came to mind.
That is less of a problem where I am (there is no non-technical person with any kind of access to the systems we are building, but that being said, even technical people are not foolproof), but you're right, it social engineering is a big issue in several places. You need to train people to realize protocols are there to prevent a breach, not just to make your work more difficult.

And as previously stated, it is also good to just give people as little access as you can (which you will do to protect against malicious employees, but which incidentally also help if an employee is compromised) and assume that some attacks will come from within. For example, even developers should not be able to impact a production system without first having to go through code reviews by their peers. The whole gitops methodology takes this concept further: Not only application artifacts, but all system operations should go through code, which among other things will force peer reviews and make everything auditable (ie, everything is preserved in the Git history).

In your example above, it greatly reduces the attack surface when you don't give the receptionist with a bubble gum any kind of meaningful access in the first place. Hopefully, your developers will know better, but if they don't, code reviews are very likely to catch a lot there. Also, most developers should not have access to the production system or production data. The few who do should understand that they have been entrusted with a special responsibility and be downright paranoid.

And yes, some engineering resources need to be beyond the reach of end-user facing product owners who won't understand the direct consumer benefit of several things that get done in an IT system (the benefits only become obvious once something goes wrong). That's why its a good idea to have product teams that are separate from other teams that operate deeper into the system.

Otherwise, on the technical side of things, it goes way deeper than the firewall. That is the security "outside wall" poster child, but most attack vectors don't need to do anything at all to the firewall. They attack various layers of your application through traffic your firewall will allow.
Post edited February 10, 2021 by Magnitus
avatar
Breja: Exactly. "Do not be alarmed, GOG has not been affected by the recent CDP hack" (if that is indeed the case) would also be a statement worth making. And if that is not the case, well then they definitely should let their users know rather than assume they all follow CDP on twitter/will find this thread.
Not to mention that as a company that is in a EU member state, there's legal obligation not only as per the greater GDPR regarding disclosure; but Poland itself has surprisingly strict laws regarding breaches of privacy. And given that one of their prized dogs has shat the proverbial bed and then widdled on the breadbox, I can't imagine the investigators are in a good mood currently.

My broad shotgun guess is that as GOG itself is an entity of the CDPR Group, they think it's enough to say that the whole covers the sum of the parts.
Post edited February 10, 2021 by Darvond
avatar
Breja: Exactly. "Do not be alarmed, GOG has not been affected by the recent CDP hack" (if that is indeed the case) would also be a statement worth making. And if that is not the case, well then they definitely should let their users know rather than assume they all follow CDP on twitter/will find this thread.
Would you honestly believe them if they did release a statement?
avatar
Breja: Exactly. "Do not be alarmed, GOG has not been affected by the recent CDP hack" (if that is indeed the case) would also be a statement worth making. And if that is not the case, well then they definitely should let their users know rather than assume they all follow CDP on twitter/will find this thread.
avatar
paladin181: Would you honestly believe them if they did release a statement?
That's a separate matter, not a reason to not release one. It's not like remaining silent makes them look more trustworthy for the future.
Cyberpunk 2077 maker CD Projekt Red has GWENT source code leaked after ransomware attack
Wow, CD Projekt Red was hacked?!? Now imagine if they had an entire nation state going after them. I'll be on the same side they were. In other words, expect my complete indifference.
Post edited February 10, 2021 by BitLiz
now the concern is, will those leaked documents containing the "offenses" of CDPR will bring down CDPR and CDP and GOG as a whole.

I would start backing up installers people, we could be looking at the beginning of the end here.
Possibly.
Maybe.

I am being a bit doom and gloom here. just a bit.
Post edited February 10, 2021 by Lord_Kane
ROFL
avatar
Abishia: i always wonders why critical data is stored on servers or anything remoted to internet!. only ask for trouble.
always have critical data on a remote drive (one that's not connected to internet) it's not like external SSD are that expensive and they comes within tera bytes
Airgapping is a hard concept to explain to most people, especially the part about "One Way Transfer" or "Do not connect this machine under any circumstances."
low rated
What the HelloKitty is going on there?
avatar
Lord_Kane: will those leaked documents containing the "offenses" of CDPR will bring down CDPR and CDP and GOG as a whole.
Notes of chaos and internal villainy in a company that grew a bit too fast? Why I'm sure nobody was expecting any of that!
avatar
Darvond: Airgapping is a hard concept to explain to most people, especially the part about "One Way Transfer" or "Do not connect this machine under any circumstances."
That's an idealised circumstance. Sure, in some cases, you can do that, but in most use-cases where users have expectations of timely interaction with their data, this isn't really an option.

You can start from a state where the system was built only using local copies of all the dependencies you require, but ultimately, it will need to be accessible via the internet in some way.

Btw, keeping/managing a local copy of every dependencies you have is small fries in larger companies, but for smaller operations, its a non-trivial time investment. Everybody would like to do this. Not everybody can.
Post edited February 10, 2021 by Magnitus
As I am a total layman in these matters, could someone bottom line what this really means for the game and CDPR?
Post edited February 10, 2021 by Breja