Christina Lekati

@ChristinaLekati@infosec.exchange
858 Followers
119 Following
192 Posts
#SocialEngineering, #Psychology, & #OSINT intertwined for the sake of security. Exec Board Member @osintcurious

In January, I wrote about a vast China-based cloud CDN called Funnull that catered to cybercriminals in China and Russia seeking to route their traffic through US-based Cloud providers, particularly Microsoft and Amazon.

https://krebsonsecurity.com/2025/01/infrastructure-laundering-blending-in-with-the-cloud/

I did not expect this, or so quickly, but it looks like Treasury just sanctioned Funnulll, calling it a major scam distributor.

https://home.treasury.gov/news/press-releases/sb0149

January's story was based on research by Silent Push, which found a large number of domains hosted via Funnull promoting gambling sites that bear the logo of the Suncity Group, a Chinese entity named in a 2024 UN report (PDF) for laundering millions of dollars for the North Korean Lazarus Group.

In 2023, Suncity’s CEO was sentenced to 18 years in prison on charges of fraud, illegal gambling, and “triad offenses,” i.e. working with Chinese transnational organized crime syndicates. Suncity is alleged to have built an underground banking system that laundered billions of dollars for criminals.

The rise of Agentic AI has opened new frontiers for adversaries looking to automate and scale social engineering attacks. We are entering a phase where Agentic AI systems will be able act autonomously, make decisions, adapt based on feedback, and complete goal-oriented operations with minimal human intervention.

I wrote an article explaining what Agentic AI really is, and how it can shape the future of social engineering attacks. ⬇️

https://christina-lekati.medium.com/when-ai-goes-rogue-how-agentic-ai-will-reshape-social-engineering-attacks-b795838c1aaa

#AgenticAI #SocialEngineering #cybersecurity

When AI Goes Rogue: How Agentic AI Will Reshape Social Engineering Attacks

Cyber criminals are rarely late to the game when it comes to new technologies. In fact, they’re often among the first ones to experiment with emerging technologies. They do not have the limitations…

Medium

Surprise! Really excited to announce that the next "𝑺𝒐𝒄𝒊𝒂𝒍 𝑬𝒏𝒈𝒊𝒏𝒆𝒆𝒓𝒊𝒏𝒈 & 𝑶𝒑𝒆𝒏-𝒔𝒐𝒖𝒓𝒄𝒆 𝑰𝒏𝒕𝒆𝒍𝒍𝒊𝒈𝒆𝒏𝒄𝒆 𝒇𝒐𝒓 𝑺𝒆𝒄𝒖𝒓𝒊𝒕𝒚 𝑻𝒆𝒂𝒎𝒔" open class will be happening at x33fcon in Gdynia, Poland!!

This is an intensive, 2-day training. We will cover:

🔹 Timeless Social Engineering Attack Scenarios: The tricks that keep working (and why).

🔹 The Psychology behind social engineering (we will go well beyond influence tactics!!)

🔹 Hybrid & advanced attack techniques that combine multiple attack verticals.

🔹 The use of AI in all phases of the social engineering kill-chain.

🔹 OSINT: How to conduct reconnaissance on a target (business / person) and what to look for.

🔹 Highly practical open-source intelligence (OSINT) tools & techniques that facilitate attack scenarios.

🔹 Blue Team Countermeasures: How to disrupt social engineering attacks & create a defense strategy.

...but there will also be some surprises 🤫 ✨ ✨

If you're attending #x33fcon this year I look forward to seeing you there!

Class Details & Registration: https://www.x33fcon.com/?fbclid=IwAR2B-2KwiZ3dJeKl-#!t/SE_OSINT.md

#SocialEngineering #OSINT #x33fcon #RedTeam #BlueTeam

x33fcon

If you are using HUMINT techniques in your cyber threat intelligence process, this is a talk worth watching!
Eliska and Julien do a very good job in breaking down some important concepts including the risks, benefits and analytical aspects of using HUMINT tactics in a CTI workflow and provide some of their own experiences in an easy to understand way.

As a side note, HUMINT in CTI is not meant to replace the technical analysis, but to complement it. It is meant to fill in some gaps with intel that cannot be found through a technical analysis or other passive intelligence collection disciplines. That may include a threat actor's motives, future targets, skill/group developments, future plans, etc.

Happy watching!

https://youtu.be/o1TTO5d1DXQ?si=ScY3uyG63ixNl2Zs

It's so overt it's covert: leveraging classic HUMINT tactics in CTI investigations

YouTube

Surprise! Really excited to announce that the next "𝑺𝒐𝒄𝒊𝒂𝒍 𝑬𝒏𝒈𝒊𝒏𝒆𝒆𝒓𝒊𝒏𝒈 & 𝑶𝒑𝒆𝒏-𝒔𝒐𝒖𝒓𝒄𝒆 𝑰𝒏𝒕𝒆𝒍𝒍𝒊𝒈𝒆𝒏𝒄𝒆 𝒇𝒐𝒓 𝑺𝒆𝒄𝒖𝒓𝒊𝒕𝒚 𝑻𝒆𝒂𝒎𝒔" open class will be happening at x33fcon in Gdynia, Poland!!

This is an intensive, 2-day training. We will cover:

🔹 Timeless Social Engineering Attack Scenarios: The tricks that keep working (and why).

🔹 The Psychology behind social engineering (we will go well beyond influence tactics!!)

🔹 Hybrid & advanced attack techniques that combine multiple attack verticals.

🔹 The use of AI in all phases of the social engineering kill-chain.

🔹 OSINT: How to conduct reconnaissance on a target (business / person) and what to look for.

🔹 Highly practical open-source intelligence (OSINT) tools & techniques that facilitate attack scenarios.

🔹 Blue Team Countermeasures: How to disrupt social engineering attacks & create a defense strategy.

...but there will also be some surprises 🤫 ✨ ✨

If you're attending #x33fcon this year I look forward to seeing you there!

Class Details & Registration: https://www.x33fcon.com/?fbclid=IwAR2B-2KwiZ3dJeKl-#!t/SE_OSINT.md

#SocialEngineering #OSINT #x33fcon #RedTeam #BlueTeam

x33fcon

DeepSec 2024 Keynote – The Mind Bomb

DeepSec 2024 ended on 22 November 2024. We took a week off to post-process the event in terms of video material and dialogues. Usually only participants get first access to the video recordings, but because of the threat of disinformation from nation states, we published the keynote early and freely. Randahl Fink explained his take on manipulation of elections and entire

https://blog.deepsec.net/deepsec-2024-keynote-the-mind-bomb/

#Conference

DeepSec 2024 Keynote - The Mind Bomb

International Political Commentator Randahl Fink presents the latest frontier of the modern security war: attacking the minds of millions.

DeepSec In-Depth Security Conference

Sooo may reasons to love @deepsec and here is just another one: getting the green light from everyone in the organizing team to let my dog tag along this one time... She got lots of petting and was even treated to some leftover meatballs by the kitchen personnel at the venue. 🐶🍗

You can see her here wondering why she has to sit for a photo when we could be at the registration desk getting love and treats. 😋

How can Human Intelligence be leveraged in Cyber Threat Intelligence?
The Dark Overlord investigation is an interesting report (together with all the resources it includes), showcasing how HUMINT can help to better understand threat actor activities, and even infiltrate the inner circles of these groups and uncover their true identities.

Note that:
🔹 HUMINT is utilized in CTI to help collect information that is not readily available through the observed threat actor TTPs or OSINT. The goal is to collect intelligence through direct communication with threat actor accounts (and their affiliates) regarding future plans, targets, motives, etc. In this report, there was also an additional effort to collect information on the identities, activities, and aliases.

🔹 OSINT and SOCMINT monitoring was ongoing and supported the HUMINT collection efforts. This is a generally recommended practice.

🔹 I particularly like the reference to the communication and personality of the group members. The report notes that the communication style of the TheDarkOverlord members is overall arrogant, impatient, and eager to demonstrate superiority - traits that ultimately lead them to their own demise. (feeling untouchable can make one pretty careless when disclosing details, especially when this is paired with the need to demonstrate superiority.)

Overall, this report is worth a read.

#HUMINT #Socialengineering #OSINT #opensourceintelligence #threatintelligence #cti

https://nightlion.com/wp-content/uploads/2020/12/The-Dark-Overlord-Investigation-Report-Night-Lion_v1.01.pdf

"𝑾𝒆𝒍𝒍, 𝑰’𝒎 𝒏𝒐𝒕 𝒓𝒆𝒂𝒍𝒍𝒚 𝒔𝒖𝒑𝒑𝒐𝒔𝒆𝒅 𝒕𝒐 𝒔𝒉𝒂𝒓𝒆 𝒕𝒉𝒊𝒔, 𝒃𝒖𝒕…"
Have you ever heard someone utter this phrase? There is a chance that they could be on the verge of revealing something sensitive—possibly without realizing the implications. And they could be brought to this point, intentionally.

Used in social engineering, intelligence gathering, and even corporate environments, elicitation is the art of extracting valuable or sensitive information during a seemingly regular conversation.

The techniques are usually subtle, non-threatening, easy to disguise, deniable, and effective.

My new article dives into:
🔹 What elicitation is and why it works.
🔹 The psychological tendencies that make us vulnerable.
🔹 3 highly effective elicitation techniques (plus a bonus one).

Understanding these techniques isn’t just about learning how they work; it’s also about recognizing when they’re being used against you. Whether you’re in security, law enforcement, negotiations, or simply someone who wants to protect sensitive information, this is a skill worth knowing about.

And before you go, think: have you ever witnessed (or been part of) a situation where someone unknowingly shared too much? How did it play out?

#Elicitation #SocialEngineering #HumanBehavior #InformationSecurity #Awareness #CyberSecurity

https://christina-lekati.medium.com/elicitation-techniques-74be36e212f8

ELICITATION TECHNIQUES - Christina Lekati - Medium

„Well, I’m not really supposed to share this, but…” Plentiful social engineering and HUMINT attempts that aim at information collection lead the subject to share a phrase like this (followed by…

Medium

The new year has come around, and we kick it off with 2 new live online classes from Digital Trails Academy!

🔹 On the 21st of January, I will be giving a 4-hour online class on #Elicitation 𝗧𝗲𝗰𝗵𝗻𝗶𝗾𝘂𝗲𝘀.
Elicitation is about making people volunteer information without asking a single question.
It is part of most social engineering attempts that involve information collection and an integral part of HUMINT operations (including threat intelligence vHUMINT).
Join us to learn how to build rapport and trigger sources to disclose information they otherwise wouldn't!

Want more for your investigative toolkit?

🔹 On the 28th of January, the talented Samuel Lolagar will be teaching his online class on #Telegram 𝗜𝗻𝘃𝗲𝘀𝘁𝗶𝗴𝗮𝘁𝗶𝗼𝗻𝘀.
In this class, Samuel will discuss the types of criminal activity that leverage Telegram, as well as important investigative tools & techniques to help you maximize your information collection from the platform while maintaining appropriate OPSEC. (link in comments)

All relevant information including the class content and the registration, can be found in the links ⬇️

For the truly dedicated ones: there is also a bundle offer for both classes with a discount!

We both look forward to e-seeing you in a few days! 🙌 🤓

#OSINT #Opensourceintelligence #HUMINT #SocialEngineering #Training

https://digital-trails.academy/

Homepage