enterprise grade security vs. human the weakest link in the chain πŸ˜‚
@nixCraft lol
it doesn't help that some bad operating systems hide the file extension.
nor that people are really fucking stupid lol

@bazkie @nixCraft

prevent users from executing files inside user writeable directories is the first, admins should do. applocker or Software restriction policies. choose your weapon

@DigitalInfinity @bazkie @nixCraft
Companies don't want to pay for skilled admins that know this is a reasonable thing to do (or even possible!)

Management failure

@bazkie @nixCraft or decide a file is executable based on extension.
@bazkie @nixCraft there's stupid, but there's also not giving one tenth of a shit about the company. I suspect it's mostly the latter.

@bazkie The targets don't even know, what a file extension is.

This "company" has no IT security, that's the problem. Security costs money and is invisible to the management.
Why the fuck does the mail server accept EXE?
Why the fuck has the mail client no filter?
Why the fuck are there no execution restrictions?

It's not the users fault.
@nixCraft

@bazkie @nixCraft

I personally blame operating systems hiding file extensions sometimes and keeping it visible other times.

@nixCraft I still blame Windows for this one, not user error
@nixCraft
Well I guess "Thanks Windows for masking file extensions by default" ? πŸ€·β€β™‚οΈ
@sebsauvage @nixCraft And using the extension (that is the name of the file) to decide it is executable.
@sebsauvage @nixCraft Also Apple, though a .exe would not have worked on macs.

@nixCraft laugh

I'm not surprised. A few years ago I heard someone say, "My most successful attacks are still just poorly written powershells."

If users don't care, no amount of security will protect them.

@jackryder @nixCraft It's not users job to care. It's IT's job to deliver secure systems. Do not blame users for Microsoft's inability to deliver.
@nixCraft
our biggest problem is in human shaming
especially in #CyS
no one asks why the systems are so badly designed and worse implemented forget about tested
any of the bait shall be filtered in the first place,
and nothing should happen when clicked
above all the need to know principle still exercised by many in #CyS keeps the good people in the dark and the dark people in front
who actually knows what happened at JLR no one, it's kept internal πŸ€ͺ
@nixCraft imagine a company email system that doesn't block executable attachments 🀣
@nixCraft "Everyone likes candy." --Tony, Lock In
@nixCraft People forget that Kevin Mitnick largely used social engineering - he was less hacking computers than hacking people. Because stuff like that works often enough.
@nixCraft Far more people would have clicked on it if it had been called 2026_Salary_Decrease.
@nixCraft Well, there is no incident response without an incident.
So give them their well deserved salary increase already.
@nixCraft That is some snappy social engineering right there.
@nixCraft Cybersecurity once again blaming users for deficiencies in software. They should put the blame where it belongs: the operating system having an too-simple trust model for files.
@nixCraft Would probably do that too. I need to recreate the environment of my colleagues to be able to properly support them :3
@nixCraft it's really like that scene from Mr. Robot

"there are no exploits!"
"I see 3 walking around"

@nixCraft

And that's why we're introducing a weaker link with agentic AI tools

@nixCraft These people are the reason that I constantly have to do stupid security trainings and get test phishing mails. It's so annoying but I guess it's needed. Even though I am not sure how well they even work.

@nixCraft

Nix, I have a couple legit questions.
Do you know this guy? (Don't have to answer)
How many of the guys had Linux?
Would it made a difference if they had Linux.

Just things to sate my curiosity

@nixCraft addressing the lower instincts allways work, allways bypasses intellect.
@nixCraft "incidence" response??
@nixCraft "IT Department, this is your fault! You're supposed to make sure we're not vulnerable to technology stuff! Now, go think about what you did wrong and how you could have prevented it, I have a cruise to go on."
@nixCraft if it was labeled salary reductions might get more engagement?
@nixCraft i would simply not click on this because i know that salary increases are fake in this day and age
@xan @nixCraft ..sending it again, but this time renamed to "2026_Salary_Cut.pdf.exe" πŸ˜†
*double click noises++*
@nixCraft tbf incident response is β€˜t incident prevention πŸ˜‚
I see a lot of people replying to this post who are confident that they would not have clicked on that pdf.
@nixCraft
@nixCraft hmm "IR - wizards" rename the file from *.PDF.exe to *.PDF and can open an v-card of an Nigerian prince, with heritage - problems
@nixCraft Many of these Cyber-security wonks are self-appointed. Aggressive grifters who have bamboozled skinflint senior mgt. into thinking they are needed. In reality they are gaslighting the users and blaming them for their own, and managements, clusterfucks.