Dante Mercurio

176 Followers
497 Following
1.1K Posts
Technology nerd, infosec leader, husband, dad, skeptic though not in that order. Human rights are non-negotiable. Love all things #infosec, #scifi, #motorcycles, #hiking, animals, #technology and #science related. 
Director for MSSP services at a security vendor though views here are solely mine.

#MSSP #cybersecurity #fedi22

Something tells me we're about to be reminded that here in the US we have something like 18,000+ distinct policing jurisdictions. i.e., plenty of potential "constitutional sheriffs."

https://www.nbcnews.com/news/us-news/constitutional-sheriff-tried-seize-voting-machines-2020-officials-are-rcna177906

A 'constitutional sheriff' tried to seize voting machines in 2020. Officials are bracing for a repeat.

Sheriff Dar Leaf and other "constitutional sheriffs" have become prominent figures in the election denial movement, and among the most dangerous, critics say.

NBC News

I’m absolutely gonna cry when the election is decided. Either because we win and my family and friends and so many vulnerable groups and I are safe, and I’m just so, so horribly exhausted from working and constantly facing horrible online abuse and fighting. Or because my country, that I served my whole youth, is gone to fascism for the rest of my life - and I have to leave. Either way I’ll cry.

I hope you all cared enough to #vote, if you can.

Breaking out my copy and rereading to get through the next few days. Should be required reading in high school.

#sagan #science #misinformation #election2024

So managers are starting to spew the whole "well I didn't do anything wrong, it affected everyone else, so we're not liable" bullshit.

Did you allow a third party vendor to have the highest privilege access to all of your systems AND let them run Remote Code Execution on your systems whenever they want?

You didn't have a test environment set up to test each update or patch that is applied to your systems before you push them to prod? No? Just let it auto-update?

Yeah, that "Risk Transference" didn't work so well as your GRC policy seemed to think it would, huh? I know they're a security company and they SHOULD have tested it, but they didn't, did they?

I know everyone else does it, but if everyone else jumped off a bridge, would you?

Just because everyone else fucked up, doesn't mean you didn't fuck up.

There's gonna be a lot of deep discussions in this post-mortem and hopefully orgs will change. Those that don't will just be hit again... and again... and again.

#crowdstrike

So this, from Firefox, is fucking toxic: https://mstdn.social/@Lokjo/112772496939724214

You might be aware Chrome— a browser made by an ad company— has been trying to claw back the limitations recently placed on ad networks by the death of third-party cookies, and added new features that gather and report data directly to ad networks. You'd know this because Chrome displayed a popup.

If you're a Firefox user, what you probably don't know is Firefox added this feature and *has already turned it on without asking you*

Lokjo - EU's Gmaps replacement (@[email protected])

Attached: 1 image Firefox is just another US-corporate product with an 'open source' sticker on it. Their version 128 update has auto checked a new little privacy breach setting. If you still use a corporate browser, at least do some safety version! We mainly use @[email protected] based on firefox. (yes, we know, a stable european or even non-US browser is still considered 'futuristic' in europe) #eu #browser #firefox #meh

Mastodon 🐘
If growing up drinking from the hose was good enough for me, then it’s good enough for them.
#genx #dogsofmastodon #goldenretriever
Allow me to interrupt your doomscrolling with a huge crowd in Detroit chanting "WE GOT YOUR BACK! WE GOT YOUR BACK!" to Joe Biden during his fiery speech. MORE OF THIS PLEASE. Tell the brunchlord opinion columnists at the New York Times and the New Yorker to BUGGER RIGHT OFF. We're busy fighting Nazis here. https://www.threads.net/@acynig/post/C9V5pQNSUTj?xmt=AQGz_i3TnXgERZePHubjlkf743osGq0G1Po3yQYaW95edg
Acyn (@acynig) on Threads

Crowd chanting “we got your back”

Threads
"Ok, I've heard about phreaking and 2600Hz, but how did it really work?"
This video from @connections has your answers:
https://www.youtube.com/watch?v=8PmkUPBhL4U
2600? How Phreaking Really Worked

YouTube

Let's breakdown how the AT&T breach will impact us at home and at work and what we can do to protect ourselves.

The AT&T breach includes numbers called and texted, the number of call and text interactions, the call length, and some people had cell site identification numbers leaked (which leaks the approximate location of person at the time that the call or text was placed).

How does this breach increase risk for us at home and at work?

1. Social Engineering Risk
The believability of social engineering attacks will increase for those affected because attackers know which phone numbers to spoof to you.
Attackers can pretend to be a boss, friend, cousin, nephew etc and say they need money, password, access, or data with a higher degree of confidence that their impersonation will be believable.

2. Threaten, Extort, & Harm Risk
This stolen data can reveal where someone lives, works, spends their free time, who they communicate with in secret including affairs, any crime based communication, or typical private/sensitive conversations that require secrecy. This is a big deal for anyone affected.

For celebrities and politicians, this information getting leaked greatly affects their privacy, physical safety, sensitive work, potentially even national security because the criminals have a record of who is in contact with whom, when and sometimes where.
The criminals could extort those people who are trying to keep that information (rightly) private, they could threaten their physical safety at the locations revealed in the metadata, they could pretend to be the people they called and texted often and ask for money, sensitive details, and increase the likelihood of successfully tricking that victim.

For those experiencing abuse or harassment, the impact of this breach is terrifying for their physical security and beyond as they need to keep their communications private to those that can help them get out of their abusive situation.

3. Increased Believable Phishing Attacks via Call, Email, Text, and Social Media Risk

If a criminal knows your phone number has regularly called a phone number belonging to a specific Bank, Doctor's Office, Government Office, etc then they know exactly who to pretend to be when contacting you and attempting to trick you.

For example, the criminal could pretend to be the bank that you interact with, spoof the bank phone number with an app from the app store, and say there is a problem with your account and suggest money is transferred to "protect the account" (a common scam), or could "help change a password" (another common scam) to gain access to the account and drain the funds.

In short, if a criminal knows WHO you interact with -- then they know WHO TO PRETEND TO BE to be when they try to trick you in a phishing phone call, email, text message, or social media direct message.

When criminals impersonate people or organizations that are trusted by their victim, the criminal is more successful in their attack.

4. Link Sensitive Political, Business, and Interpersonal Interactions Risk

When a criminal has a list of which phone numbers interact with whom, they are able to link sensitive interactions, communications, deals, crime, etc together.

This will impact those in national security, defense, policy, government officials, celebrities, politicians, everyone whose privacy is affected here.

Because phone numbers are linked to people's names and jobs via data brokerage sites, data breaches, LinkedIn, etc it's easy for criminals to start to associate phone numbers in the breach to people those victims have communicated with.

This of course creates risk for anyone in sensitive communication with other government officials, can leak sensitive business deal communications and timing, leak someone's potential involvement in a sensitive situation, etc.

*So, what can I do to keep myself, my family, and my organization safe and secure in the wake of this massive breach?*

- Be Politely Paranoid: recognize that your contacts and phone/text message interactions could be publicly available and increase the risk of social engineering, phishing, etc. Use 2 methods of communication to confirm people are who they say they are before sending money, sharing sensitive data, etc.

- Stop Reusing Passwords: if criminals know who we trust then they are able to pretend to be those people or companies to us, increasing phishing believability (when the criminal knows which bank we use, their phish is more relevant). Using a long, random, and unique password for each account helps ensure that you protect your accounts, even if one gets hacked/tricked out of you due to this breach.
Additionally, criminals can look up which companies we contact and trust from this breach then look up our phone number in other data breaches to gather passwords breached previously then use those stolen & reused passwords against current accounts to steal data/money without ever needing to phish folks in the first place.

- Turn on MFA (Multi-Factor Authentication): communications and companies we trust are less private now because of this breach so we need to protect our accounts with a second factor when logging in even more. This ensures the criminals can't just find or phish passwords then gain access to take over the account immediately -- I recommend app based MFA at the very least for many high threat model folks. If your family has lower comfortability for added technology, SMS 2FA is much better than nothing. If your threat model is extra high (in the public eye, etc): move toward a FIDO solution like YubiKey, etc.

- Use Encrypted Communications: encrypted communication help us avoid this specific type of data leakage in the future. There are many encrypted communication options including Signal, etc. Choose the one that is right for you.

Thank you @lorenzofb @techcrunch for chatting with me about how this breach impacts risk for everyday folks, celebrities, politicians, and more: https://techcrunch.com/2024/07/12/what-the-att-call-records-data-breach-means-for-you/

What the AT&T phone records data breach means for you | TechCrunch

The giant U.S. telco lost the information of around 110 million customers. Here’s what you need to know.

TechCrunch
Young adults used to have some of the greatest life satisfaction scores and least despair. Now those patterns have changed dramatically, and it's not just COVID. See the graphics here: https://www.scientificamerican.com/article/young-adulthood-is-no-longer-one-of-lifes-happiest-times/
Young Adulthood Is No Longer One of Life’s Happiest Times

The U-shaped curve that pegged youth and old age as the happiest times of life has changed

Scientific American