Adam Stasiniewicz 

51 Followers
496 Following
201 Posts
Just another nerd, interested in cybersecurity, cryptography, and any other random thing that might cross my feed. Day job is in consulting, helping organizations solve complex cybersecurity challenges. Opinions/views/toots/boosts/reblogs/favorites/etc are my own. 
Homepagehttps://www.adamstas.com
Keyoxidehttps://keyoxide.org/wkd/adam@adamstas.com
GitHubhttps://github.com/AdamStasiniewicz
LinkedInhttps://www.linkedin.com/in/adamstasiniewicz
PGP Key3270D15169357D8177EC914EF51948C9DB5B8297
iMessage CKVAPKTIDrc33iKNWyFiGmUG5Sai-3UCAMR4RpfehUIC5Pl7DdQF-eQ

New, by me: The Kimwolf Botnet is Stalking Your Local Network

Today's story is a long overdue series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it’s time for a broader awareness of the threat. The short version is that everything you thought you knew about the security of the internal network behind your Internet router probably is now dangerously out of date.

https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/

Please Use DNSSEC

The other day I was reading about yet another DNS vulnerability. Vulnerabilities in DNS have been well known since 2008, and since 2010 we’ve had an excellent solution, DNSSEC. DNSSEC addresses many of the most common DNS vulnerabilities on the internet today (including this most recent vulnerability). For most, setup is very simple. Unfortunately, DNSSEC is an opt-in technology. So, it’s a good time to remind all my Internet friends that today’s a good day to double-check if you have DNSSEC enabled, and if you don’t, to make plans to enable it.

For home users, the simple fix is to switch to a DNSSEC aware DNS provider. Quad9, CloudFlare, and NextDNS are all great choices. In addition to supporting DNSSEC, they all also support DOT/DOH and filter out malware domains for additional privacy/security. Setup is painless for every major OS. A secure provider can also be configured on your home router, to ensure every home device gains the benefits.

For businesses and organizations, you’ll need to look in two places. First, ensure your enterprise DNS resolvers are using an upstream provider that supports DNSSEC (see above) and/or ensure your enterprise DNS resolvers have DNSSEC validation enabled. For virtually every modern enterprise DNS resolver, it’s a simple switch to enable DNSSEC validation. But often, it’s off by default.

Second, ensure your public DNS zones are DNSSEC signed. If your DNS zone is hosted with your registrar, this is often a single click to enable (again, this is often disabled by default). Once enabled, nothing else to do, and any existing automation/APIs/etc will continue to work as expected. If your DNS is hosted by someone other than the registrar (like Azure DNS, Windows Server DNS, etc), it’s a two-step process. First, enable DNSSEC signing on your hosting provider (again, usually just a single click). That will then give you one or two records to upload to the registrar. Second, upload those DNSSEC records to your registrar. Again, if your using any modern DNS cloud hosting or on-premises server product, it’s very easy to setup and existing automation/APIs/dynamic updates/etc don’t break. Unless you’re still manually editing BIND text files, long gone are the days of managing crypto keys and hand-signing zone files.

In total, it’s a fairly small lift for an organization or tech-savvy individual to set up. Similar to antivirus software, most days it sits there quietly, seemingly doing nothing… except that one time when it saves you from a very bad day. So don’t delay, deploy DNSSEC today!

https://www.adamstas.com/please-use-dnssec/

Please Use DNSSEC

The other day I was reading about yet another DNS vulnerability. Vulnerabilities in DNS have been well known since 2008, and since 2010 we’ve had an excellent solution, DNSSEC. DNSSEC addresses many of the most common DNS vulnerabilities on the internet today (including this most recent vulnerability). For most, setup is very simple. Unfortunately, DNSSEC is an opt-in technology. So, it’s a good time to remind all my Internet friends that today’s a good day to double-check if you have DNSSEC enabled, and if you don’t, to make plans to enable it.

AdamStas.com - Home of Adam Stasiniewicz
@cloudflare has posted an amazingly detailed and informative blog on the current state of Post Quantum Cryptography. It’s long, but very much worth the read. Check it out: https://blog.cloudflare.com/pq-2025/
State of the post-quantum Internet in 2025

Today over half of human-initiated traffic with Cloudflare is protected against harvest-now/decrypt-later with post-quantum encryption. What once was a cool science project, is the new security baseline for the Internet. We’re not done yet: in this blog post we’ll take measure where we are, what we expect for the coming years, and what you can do today.

The Cloudflare Blog
Overview of NTLM auditing enhancements in Windows 11, version 24H2 and Windows Server 2025 - Microsoft Support

Summary of new auditing features and deployment details

AT&T widely launched its Wireless Account Lock feature Tuesday, aiming to strengthen customer protection against account takeovers and SIM-swapping attacks, Cyberscoop writes.

"The Wireless Account Lock, which had been rolling out in waves since earlier this year, is widely accessible for both individual and business customers. The feature follows similar options from competitors such as T-Mobile, Verizon, and Google Fi, which have already moved to bolster protections against SIM swapping and similar attacks."

"The feature is accessed exclusively via the company’s app on a device tied to the account. If the registered device is inaccessible or lost, users must undergo extra authentication steps via AT&T’s customer support to regain or restore control."

https://cyberscoop.com/att-wireless-account-lock-sim-swapping-protection/

AT&T deploys new account lock feature to counter SIM swapping

AT&T has launched a feature to help prevent SIM swapping and unauthorized account changes, offering added security for both individual and business wireless customers.

CyberScoop

About a decade ago, Apple and Google started updating iOS and Android, to make them less susceptible to “juice jacking,” a form of attack that could surreptitiously steal data or execute malicious code when users plug their phones into special-purpose charging hardware. Now, researchers are revealing that, for years, the mitigations have suffered from a fundamental defect that has made them trivial to bypass.

https://arstechnica.com/security/2025/04/ios-and-android-juice-jacking-defenses-have-been-trivial-to-bypass-for-years/

iOS and Android juice jacking defenses have been trivial to bypass for years

New ChoiceJacking attack allows malicious chargers to steal data from phones.

Ars Technica

China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-called “Smishing Triad” mainly impersonated toll road operators and shipping companies. But experts say these groups are now directly targeting customers of international financial institutions, while dramatically expanding their cybercrime infrastructure and support staff.

The pace of innovation coming from these phishing groups is something to behold, as are their success rates. And thousands of US financial institutions are sitting ducks.

https://krebsonsecurity.com/2025/04/china-based-sms-phishing-triad-pivots-to-banks/

China-based SMS Phishing Triad Pivots to Banks – Krebs on Security

New, by me:

A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is facing questions about his credentials and an inquiry from the Federal Bureau of Investigation (FBI). Legal experts say the inquiry could be grounds to reopen a number of adjudicated cases in which the expert’s testimony may have been pivotal.

From the story:

In an interview this week, Harrington said court documents reveal that at least two of Lanterman’s previous clients complained CFS had held their data for ransom over billing disputes. In a declaration (PDF) dated August 2022, the co-founder of the law firm MoreLaw Minneapolis LLC said she hired Lanterman in 2014 to examine several electronic devices after learning that one of their paralegals had a criminal fraud history.

But the law firm said when it pushed back on a consulting bill that was far higher than expected, Lanterman told them CFS would “escalate” its collection efforts if they didn’t pay, including “a claim and lien against the data which will result in a public auction of your data.”

“All of us were flabbergasted by Mr. Lanterman’s email,” wrote MoreLaw co-founder Kimberly Hanlon. “I had never heard of any legitimate forensic company threatening to ‘auction’ off an attorney’s data, particularly knowing that the data is comprised of confidential client data, much of which is sensitive in nature.”

In 2009, a Wisconsin-based manufacturing company that had hired Lanterman for computer forensics balked at paying an $86,000 invoice from CFS, calling it “excessive and unsubstantiated.” The company told a Hennepin County court that on April 15, 2009, CFS conducted an auction of its trade secret information in violation of their confidentiality agreement.

“CFS noticed and conducted a Public Sale of electronic information that was entrusted to them pursuant to the terms of the engagement agreement,” the company wrote. “CFS submitted the highest bid at the Public Sale in the amount of $10,000.”

https://krebsonsecurity.com/2025/03/cyber-forensic-expert-in-2000-cases-faces-fbi-probe/

Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe – Krebs on Security

Reupping this request for help from someone at Facebook to help restore a journalist's hijacked account. As mentioned before, he has sent Facebook a scan of his driver license on multiple occasions and received a reset links, but they always fail to work. Please boost for reach.

Open-source software used by more than 23,000 organizations, some of them in large enterprises, was compromised with credential-stealing code after attackers gained unauthorized access to a maintainer account, in the latest open-source supply-chain attack to roil the Internet.

https://arstechnica.com/information-technology/2025/03/supply-chain-attack-exposing-credentials-affects-23k-users-of-tj-actions/

Large enterprises scramble after supply-chain attack spills their secrets

tj-actions/changed-files corrupted to run credential-stealing memory scraper.

Ars Technica