Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I was not sure if this was mere speculation on your part, but I think you might be onto something here.

https://www.muellershewrote.com/p/the-epstein-cover-up-at-th... | https://archive.is/RZqU0

> The process of reviewing the Epstein and Maxwell files was chaotic, and the orders were constantly changing - sometimes daily. One person I spoke to on the condition of anonymity said that many agents spent more time waiting for new instructions than they did processing files. But here’s what caught my attention: the files were stored on a shared drive that anyone in the division could access. Normally, access is only granted to those working on a project, but because of the hurried nature of the exercise, the usual permission restrictions were not in place. Additionally, the internal SharePoint site the bureau ended up using to distribute the files toward the end did not have the usual restricted permissions. This left the Epstein and Maxwell files open to viewing by a much larger group of people than previously thought.



So how does this work for someone to know what server to use the exploit? Do companies make their Sharepoint servers accessible to WWW? Do hackers need to use this on a network they've already pwnd? Finding out the FBI put something like this on a server open to the WWW would be classic. That much larger group just got a wee bit larger than they previously thought on their previously thought number.


> Do companies make their Sharepoint servers accessible to WWW?

Microsoft was pushing companies to use its Azure cloud services. Now everything is in the cloud. And accessible to WWW.


The post says it only applies to on-prem servers, not cloud ones like Microsoft 365.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: