62 Followers
144 Following
15 Posts
Recovering security researcher, vul disclosure nerd, DFIR, CTI, leader, loves hacking all the things. My words are my own and not my employer etc, etc.

PUBLIC SERVICE ANNOUNCEMENT:

There is an increase of account takeovers due to insiders at telco firms simply giving control to people paying them/compromised support staff accounts. Do a check on systems where this single factor would permit an account compromise. And change the configuration. These are opportunistic trawling attacks. This is becoming more common as attackers replicate the success.

The attacker uses other channels (like people search websites) to enumerate and guess the phone number attached to an online account and then checks against the telco they have control over.

The insider only briefly temporarily forwards the victim number to a 3rd party then switches it back to normal once they’re in. This is how they stay quiet since most victims will not have leverage or telemetry to understand how they got hacked.

It was their cell phone provider.

Make it so account recovery systems require multiple factors and remove telephony-based recovery for VIP accounts entirely.
Go check your systems now. Go try to access all your stuff like you forgot your password.

I am very serious. This is based on private knowledge but is compelled by the compromise of the SEC. This is common now.

@claushoumann @infosystir @anton_chuvakin been following this - love the series thus far!
@claushoumann @infosystir can’t wait to see it! Watched the video from hack.lu - open source end of this year or early next right?
@claushoumann @infosystir nice! I think the attack path modeling is really key, I was also really interested in this idea of "chokepoint mapping" where you align the procedures in order and overlay them across groups or campaigns to identify the most impactful procedure to detect or mitigate to stop the most attacks
@claushoumann @infosystir Let me know if you have questions, it's very much a POC but we ripped through around 350 procedures thus far for our DE team to use

CISA KEV added a “used in ransomware" field a short while ago. It's a big help to defenders (or, should be, if you're defending the way you should be).

We've got a short blog post out this week —
https://www.greynoise.io/blog/getting-a-leg-up-on-initial-access-ransomware-with-cisa-kev-and-greynoise-tags — highlighting our ~75 🏷️ that align with KEV ransomware tags.

All are Initial Access-related.

The attached chart is Good News™ for a change, in that it shows both CISA & @greynoise increasingly have your back the day one of these super nefarious CVEs is released.

Getting A Leg Up On Initial Access Ransomware With CISA KEV and GreyNoise Tags | GreyNoise Blog

Discover the latest enhancement in CISA's KEV catalog! This blog post explores the newly added field indicating ransomware involvement in KEV CVEs. Coupled with GreyNoise Tags, this update proves invaluable for defenders.

@GossiTheDog Congrats! Well deserved. If you want to chat transition to that role DM me…I’ve done it and can maybe share some wisdom
@GossiTheDog finally. This is going to make it much easier to prioritize patching. KEVs weakness was that it included the rare exploited vulns (Nation state?)
If any CTI folks are looking for a new role, take a look here: https://careers.northwesternmutual.com/corporate-careers/job/sr-dfir-analyst-milwaukee-wi-corporate-jr-38992/AmpJob/
Great team and company - ping me if you have questions
Sr DFIR Analyst

The Senior DFIR Threat Intelligence analyst is an advanced and highly trusted role supporting the enterprise cybersecurity program. Additionally, the SR DFIR analyst serves across all areas of threat intelligence to help inform and defend the business and protect brand reputation. The SR DFIR analyst monitors application, host and network threats, including malicious cyber threat actors and various forms of malware. As a trusted member of the cybersecurity team, the analyst works closely with…

Northwestern Mutual Careers
@atluxity thank you!