David Penfold 

@davep@infosec.exchange
1.9K Followers
257 Following
21.8K Posts

Does IT stuff. Vegan and anarchism curious.

Likes permaculture, infosec, Tranmere Rovers. But mainly bad jokes stolen from https://www.justthetalk.co.uk/thehaven/17468/urgent-i-need-a-good-joke-right-now

Also unreasonably fond of BPMN.

Officially not right in the noggin #Κ˜β€ΏΚ˜

likewhatever
SignalDave.14
CO2 ppm at birth321.37
What would a Manhattan Project-scale initiative for building open-source appropriate technology, guided by critical technical practice (Agre) and tools for conviviality (Illich) be like

Hi! I'm currently looking for jobs and just learned about #GetFediHired . I'm trained as a linguist with lots of experience in R+D project management and administrative tasks.

I'm a great fit if your company needs someone to fill the role of an Executive Assistant, who is in charge of the logistics, budgeting, indirect purchases, and keeping the lights on while the team is developing the next product or concept.

I'm also familiar with programming, FOSS, and SysAdmin, which makes me knowledgeable in the needs that development teams might have.

If interested or you know someone who might, I'll be very delighted to have a meeting to discuss my profile, experience, and how I may meet your and your company's needs.

#fedihire

The Met Office (UK) invites you to suggest names for future storms

https://lemmy.zip/post/41958593

@cstross @leyrer Ringtones in filenames? I was so preoccupied with whether or not I could, I didn't stop to think if I should.

πŸ”Š Sound on!

P.S: The delay added by ansi music would also allow animated gifs. With sound!

#SorryNotSorry #ANSI

Splashing paint on a plane is terrorism and killing 20,000-plus children is self-defence

Welcome to upside-down world

Council Estate Media
Interesting series of events
Medications that may interact with heat (This seems important β˜€οΈβ˜€οΈβ˜€οΈ)
Turns out I was channeling Jerry Pournelle's Iron Law of Bureaucracy: "In any bureaucracy, the people devoted to the benefit of the bureaucracy itself always get in control and those dedicated to the goals that the bureaucracy is supposed to accomplish have less and less influence, and sometimes are eliminated entirely". https://en.wikipedia.org/wiki/Jerry_Pournelle#Pournelle's_iron_law_of_bureaucracy
Just finished my weight training. I'm feeling great! Also like a wobbly jelly, but a great one!
Γ—

My favorite way to hack in my ethical hacking is phone call based hacking with impersonation. Why? Because it has the highest success rate. This is what we're seeing in the wild right now, too.
Let's talk about how phone call attackers think and how to catch Scattered Spider style attacks for Insurance companies (that are heavily targeted right now, Aflac recently):
1. *Impersonating IT and Helpdesk for passwords and codes*
They pretend to be IT and HelpDesk over phone calls and text message to ask for passwords and MFA codes or credential harvest via a link
2. *Remote Access Tools as Helpdesk*
They convince teammates to run business remote access tools while pretending to be IT/HelpDesk
3. *MFA Fatigue*
They will send many repeated MFA prompt notifications until the employee presses Accept
4. *SIM Swap*
They call telco pretending to be your employee to take over their phone number and intercept codes for 2 factor authentication

Let's talk about the types of websites they register and how to train your team about them and block access to them.
Scattered Spider usually attempts to impersonate your HelpDesk or IT so they're going to use a believable looking website to trick folks.
Often times they register domains like this:
- victimcompanyname-sso[.]com
- victimcompanyname-servicedesk[.]com
- victimcompanyname-okta[.]com
Train your team to spot those specific attacker controlled look-alike domains and block them on your network.

What mitigations steps can you take to help your team spot and shut down these hacking attempts? Especially if you work in Retail or Insurance and are heavily targeted right now, focus on:
Human protocols:
- Start Be Politely Paranoid Protocol: start protocol with your team to verify identity using another method of communication before taking actions. For example, if they get a call from IT/HelpDesk to download remote access tool, use another method of communication like chat, email, initiating a call back to trusted number to thwart spoofing to verify authenticity before taking action. More than likely it's an attacker.
- Educate on the exact types of attacks that are popular right now in the wild (this above thread covers them).
Technical tool implementation:
- Set up application controls to prevent installation and execution of unauthorized remote access tools. If the remote access tools don't work during the attack, it's going to make the criminal's job harder and they may move on to another target.
- Set up MFA that is harder to phish such as FIDO solutions (YubiKey, etc). Educate that your IT / HelpDesk will not ask for passwords or MFA codes in the meantime.
- Set up password manager and require long, random, and unique passwords for each account, generated and stored in a password manager with MFA on.
- Require MFA on for all accounts work and personal accounts, move folks with admin access to FIDO MFA solution first, then move the rest of the team over to FIDO MFA.
- Keep devices and browsers up to date.

@racheltobac all very good point!

The one I’d add is impersonating a user calling the helpdesk to get their MFA sorted because they got a new phone or whatever. Because MFA works!