Fascinating - iMessage phishing now includes specific instructions to get around iOS Lockdown Mode restrictions.

The replies about how people "should" notice the funky URL are distressing. Why should they?

If you expect people to become experts on esoteric naming conventions in order to use technology safely and securely, you're the problem, not them.

@mattblaze If the fate of the company rests on whether or not I clicked on a single link, I’m not the one who fucked up.
@maxleibman @mattblaze this is a very interesting take. I've not thought of it that way before. 🤔

@mattblaze point #4 from someone who forgot far more about security than they will ever know https://hachyderm.io/@shortridge/111784865253206399 I’m in a reflective mood this week and it’s kind of wild to me that I’m known as a “provocateur” in #cybersecurity for takes like:

💡 don’t shame victims

💡 UX matters, a lot

💡we should understand what we’re supposed to protect

💡 if someone clicking a thing on the thing-clicking machine leads to security failure, they are not the foolish one

💡 the best things a security program can invest in aren’t in the RSAC vendor hall

💡 maybe we should start actually proving outcomes??????????

¯\_(ツ)_/¯

Kelly Shortridge (@[email protected])

I’m in a reflective mood this week and it’s kind of wild to me that I’m known as a “provocateur” in #cybersecurity for takes like: 💡 don’t shame victims 💡 UX matters, a lot 💡we should understand what we’re supposed to protect 💡 if someone clicking a thing on the thing-clicking machine leads to security failure, they are not the foolish one 💡 the best things a security program can invest in aren’t in the RSAC vendor hall 💡 maybe we should start actually proving outcomes?????????? ¯\_(ツ)_/¯

Hachyderm.io
@mattblaze I promise to start paying attention to bizarre domain names the day my banks all stop creating domains like “account-online.com”
@adamshostack @mattblaze Not to worry, even if they do, they'll still send you emails with some weird-ass third-party click-tracking URLs that have no obvious connection to anything, although you might recognize that your HR department uses the same spamcannon service.
@wollman @adamshostack @mattblaze I would be happy if I could get the groups in my org to agree on 2-3 mailcannon services.
@Oobleck @adamshostack @mattblaze Oh, you've run into the length limit on SPF records too?

@wollman @Oobleck ticket came in to setup marketing.domain dkim/spf/dmarc records.

And two other groups are putting in records for different spam cannons on the top domain. At least marketing knows to get a subdomain setup. Just a few days left for https://dmarcian.com/yahoo-and-google-dmarc-required/

Understanding Gmail and Yahoo DMARC Requirements - dmarcian

Starting February, 2024, long established email authentication best practices—DMARC, SPF, DKIM—will become a requirement.

dmarcian
@becomingwisest @wollman And that subdomain is what I’m pushing to get set up. That link is appreciated! I can use it to help my case.

@Oobleck I use the free version of them for my personal domain.

Work kicked off with https://sendgrid.com/en-us/blog/gmail-yahoo-sender-requirements for my group.

Gmail and Yahoo’s New Sender Requirements: A Closer Look

Learn about Gmail and Yahoo!'s new sender requirements and what you should do to become compliant and protect your sending.

Sendgrid
@mattblaze @VulpineAmethyst and that's is before I have seen legitimate emails using things like bitly url shortened uris :(
@mattblaze The real problem is the black and white URLs 🙄

@mattblaze I just don't know how to square this with requirements coming from the business that significant actions occur from a single click on a link in an SMS. I barely got them to let me do the GET -> JavaScript -> POST dance that will at least prevent preview/prefetch from breaking things.

Users have to read and understand before triggering something significant (i.e. clicking), right?

@mattblaze Lots of corporate O365 subscribers are signing up for MicroSoft "safelinks", which makes it pretty much impossible for normal people to have any idea where a plaintext message URL is going.
@dan131riley @mattblaze
"The link was safe!"
"How do you know that?"
"It looked like the same gibberish it always is!"
@mattblaze the UPS has an online form for reporting these scams, I've just been doing that when they come in.

@mattblaze I've done a lot of different (and popular) security awareness training classes, and most of them spend a bunch of time explaining how to recognize a phishing URL.

I always roll my eyes, because I've been working in security/exploits for years and years, and I'm not sure I could recognize 100% of malicious URLs (not to mention the various ways to hide URLs, open redirects, etc etc)

@mattblaze Considering that practically all legit e-mails use weird redirectors (presumably for gathering statistics), it's practically impossible to figure out if a URL will lead you to a phishing site or not by just looking at it even if you're an expert in cybersecurity.
@mattblaze
My work tells me to check the IP address of links in my email, but they all start with the address of the verification tool they use and the rest looks like a hash.
So, not exactly something i get to interrogate then
@mattblaze Specially because so many genuine links are pretty much undistinguishable from phishing URLs (typically due to either vanity short domains and/or insane link tracking).
And also many legitimate websites tell people to disable safety measures, most of those being horribly uninformative about what's going on (when they're not full on FUD like browsers certificate errors).
@mattblaze Exactly. I've been keeping an eye on the tracking for a parcel I'm sending from here in Australia to a friend in America. I don't know about how the US postal system works or what websites they use. I think I formatted the address on the label correctly but I'm not entirely sure so its believable something needs correcting. If I was distracted or tired I could easily assume it related to the parcel I'm sending and mindlessly click through.
@mattblaze I half agree shaming people for not catching the URL isn’t going to work and it’s a shitty thing to do. That said we really need some sort of computer ed for the average person. People may not learn to drive but chances are they will use computers on a regular basis.

@mattblaze Complicated further by legit companies sometimes using shady-looking short links themselves. Someone in my house got a legitimate Australia Post delivery text that included a link to something like auspo.st and we all thought it was a scam because we'd never seen it before.

Looked it up online and it was their real shortened URL lol.

So even "shady-looking URL" isn't a consistently reliable heuristic on top of the usability problem you've brought up.

@mattblaze URLs and emails kinda just suck, huh?

@mattblaze
Don't get me started. Apart from the victim blaming this simply doesn't work because companies use the weirdest URL schemes for marketing purposes (to track click) and even security tools are contributing to the issue. E.g. ti find the real URL behind a Safe Link in Microsoft Defender for Office 365 isn't trivial

🤬​

@mattblaze that feels like the days when the dancing frog came to the mailbox as an enciphered zip with the password in the body.
@mattblaze looks like Google has already identified this URL as malicious https://urlscan.io/result/77123f5e-245d-4838-b62e-f997965951c2/
usps.bbbdjdhes.com - urlscan.io

urlscan.io - Website scanner for suspicious and malicious URLs

@deepthoughts10 @mattblaze
I mean, most Mastodonians would probably instantly realize it's not the real UPS URL due to the alphabet soup between "UPS" and ".com", but my 82-yr-old dad and other normies might not catch that. 🤓
@mattblaze received same this morning - getting so good at this that my elderly peeps might begin falling for it.

@mattblaze it’s never been clear to me if Lockdown mode suppresses linkable URLs. Does it?

My dad clicks every single one. I’ve had to set up screen time content restrictions and an allow list of URLs.

@skippy it does. It basically converts links to strings in iMessage (to prevent zero click attacks).
@mattblaze I got one of these today. It looked like it came from an email address even though I have the email gateway turned off. 🤷
@mattblaze This is becoming very common. I'm having to warn unsuspecting seniors to delete these messages.
@mattblaze that's like the old joke about the Linux virus asking you to execute it yourself, art imitating life and all that

@mattblaze

I enjoy the ones I get like this where they misspell words.

@mattblaze

I received the same message a week ago immediately after receiving a notice from Amazon that a package couldn't be delivered. Makes me wonder if spammers know more about Amazon deliveries than I know.

@mattblaze the domain is enough to stop one in one's tracks. I usually look up domains to see who registered them, but that information is getting harder to come by these days:

https://www.internic.ca/Whois.aspx

Internic.ca - WHOIS

We have everything you need to build a safe and secure website. Enhance your brand online today with Internic.ca.

@pcbeard https://hachyderm.io/@shortridge/111784865253206399 I’m in a reflective mood this week and it’s kind of wild to me that I’m known as a “provocateur” in #cybersecurity for takes like:

💡 don’t shame victims

💡 UX matters, a lot

💡we should understand what we’re supposed to protect

💡 if someone clicking a thing on the thing-clicking machine leads to security failure, they are not the foolish one

💡 the best things a security program can invest in aren’t in the RSAC vendor hall

💡 maybe we should start actually proving outcomes??????????

¯\_(ツ)_/¯

Kelly Shortridge (@[email protected])

I’m in a reflective mood this week and it’s kind of wild to me that I’m known as a “provocateur” in #cybersecurity for takes like: 💡 don’t shame victims 💡 UX matters, a lot 💡we should understand what we’re supposed to protect 💡 if someone clicking a thing on the thing-clicking machine leads to security failure, they are not the foolish one 💡 the best things a security program can invest in aren’t in the RSAC vendor hall 💡 maybe we should start actually proving outcomes?????????? ¯\_(ツ)_/¯

Hachyderm.io
@pcbeard @mattblaze
Not if you are older and non techy and have no idea what a domain even is.

@RHW @mattblaze of course. That’s why we have to teach non-technical people how to cope with phishing. I wouldn’t expect non-technical people to know about whois searches. If a web address doesn’t end with .gov but purports to be from USPS, that’s a valuable red flag. The other difficulty is typo squatting. Not every URL points where you think it does.

https://en.m.wikipedia.org/wiki/Typosquatting

Typosquatting - Wikipedia

@pcbeard @RHW Or perhaps we should design systems where hopelessly esoteric, useless "education" like this isn't required to use technology safely.
@mattblaze @RHW you’ll get no argument from me on that point. This is just the current world we live in.
@mattblaze does android have anything like the lockdown mode?
@mattblaze links from unknown senders aren’t tappable anymore. This isn’t specific to Lockdown Mode
@mattblaze Gotten multiple of these recently. One coincided with an actual missing USPS shipment which made me double take.

@mattblaze I'm reminded of Last Week Tonight's episode on Ransomware, where apparently Ransomware deliverers had a whole support system to help get people to buy cryptocurrency to send it to the ransoming party to unlock their device.

Only now, it's included in the main text?

@mattblaze
These things fill me w rage, they catch out some older more trusting and vulnerable people.
Itreat all unexpected messages as scams and block.
This one came today, Medicare is meant to be trustworthy so it could catch someone out. It recurs often, please warn families.
@mattblaze amazes me that iMessage even delivers this kind of spam