Aaron Grattafiori

664 Followers
268 Following
192 Posts

AI Red Teaming and Safety/Responsibility.

Ex-Offensive Security/Red Team Lead in big tech. Ex-Principal Consultant @ NCC Group / iSEC Partners / Security Innovation.

Use the Defcon Wifi (new blog)

Many security professionals, especially on social media, have an unfortunate tendency towards what we might call performative security. It’s where people broadcast their security measures to show how aware they are, and they suggest others follow their lead. It’s the inverse of security theater where ineffective security is imposed on us by organizations. It’s often ineffective, inconvenient, or both.

And today’s bad advice is “Don't use the defcon wifi.”

The #Defcon and #Blackhat networks are some of the most monitored networks anywhere. No one's going to blow an 0-day by using it on either network. This assumes everything's up to date and fully patched, and that you join the official networks, which are listed on signage around the venues. It also assumes that all your apps are using TLS everywhere. In contrast, there is a never-ending parade of warnings about malware in telecom infrastructure. There are routinely reports of extra base stations around Las Vegas. (I’ve heard numbers on the order of an extra 50, of which I’d guess many are simply just-in-time capacity from authorized suppliers.) The lack of authentication of base stations is apparently a ...feature... that’s never going to be fixed.

Now, there’s another way to interpret this, which is to put your devices in airplane mode or a Faraday cage, and that’s not awful advice. Disconnect. Be present. Enjoy the events. Talk to the people around you. If you want to disconnect, a well-constructed Faraday cage is safer than airplane mode, which let bluetooth and wifi work.

When I was at Microsoft, some of my co-workers made a big deal of how they locked down their laptop, or bought a burner for Defcon. Me? I asked why our products weren’t safe enough to use in that environment, given that they’re certainly used in more dangerous places.

https://shostack.org/blog/use-the-defcon-wifi/

Shostack + Friends Blog > Use the Defcon Wifi

Why it’s ok to use the Defcon wifi

MSMQ QueueJumper (RCE Vulnerability): An In-Depth Technical Analysis

Unpack the remote code execution vulnerability impacting the Microsoft Message Queueing service — CVE-2023-21554, a.k.a. QueueJumper.

Security Intelligence

Just to loop this thread into this thread - I took a look at the attack path used in the M365 customer data breach.

A key part of the attack chain was documented by Microsoft at BlackHat in 2019.

https://cyberplace.social/@GossiTheDog/110736594147931759

Kevin Beaumont (@[email protected])

Attached: 2 images Been looking at Microsoft 365 email breach some more - it looks like Microsoft were aware of issues in same token validation space in Exchange Online 4 years ago. MS did a talk at BlackHat about it, after somebody external pointed out an invalid token allowed any email box to be accessed via consumer Outlook.com. They fixed that issue - but still allowed any valid MS token to access any email, so the threat actor stole one of the MSA certs. Talk: https://www.youtube.com/watch?v=KN6e1mqcB9s

Cyberplace

While I applaud the move from Microsoft to finally expose more logging to users, it’s kind of silly that it takes years before having some logs accessible while such logs were easily accessible on on-premises software…

I remember some discussions in incident response where we could not get logs because “Microsoft knows better than you how to analyse those logs”.

Maybe it’s time to finally get access to logs from all those SaaS and cloud vendors who usually deny you access as a customer to your own logs. Even if some customers lack the capabilities to analyse their own logs, having the logs help to spot specific attacks or better response to incidents.

I bet it will again take times to have logging capabilities in default entry-level cloud services.

#logging #dfir #incidentresponse

https://www.microsoft.com/en-us/security/blog/2023/07/19/expanding-cloud-logging-to-give-customers-deeper-security-visibility/

How Microsoft is expanding cloud logging to give customers deeper security visibility | Microsoft Security Blog

Today we are expanding Microsoft’s cloud logging accessibility and flexibility even further. Over the coming months, we will include access to wider cloud security logs for our worldwide customers at no additional cost.

Microsoft Security Blog

Sources: ~700K TikTok accounts in Turkey were hacked before Turkey's election in May via a flaw TikTok knew in 2022; TikTok admits "unusual activity" in April (Emily Baker-White/Forbes)

https://www.forbes.com/sites/emilybaker-white/2023/07/18/turkey-tiktok-hack-presidential-election/
http://www.techmeme.com/230718/p30#a230718p30

As Many As 700,000 Turkish TikTok Accounts Were Hacked Before The Country’s Presidential Election

A UK security agency warned TikTok about the exploited vulnerability more than a year earlier, but the company chose not to fix it.

Forbes
Microsoft quietly snuck out a blog yesterday to say that Office 365 got compromised by China and used to steal emails. Thread follows. https://msrc.microsoft.com/blog/2023/07/microsoft-mitigates-china-based-threat-actor-storm-0558-targeting-of-customer-email/
Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email | MSRC Blog | Microsoft Security Response Center

Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email

A lot of the anti-Threads posts here sound like a guy who almost convinced everyone at the party to play his overly complex German board game. But while he was setting up, someone turned on Mario Kart in the other room, and he’s pretty salty about it.

Over the last several months, our team at the Stanford Internet Observatory has been exploring the phenomenon of self-generated child sexual abuse material (SG-CSAM), the commercial sale of CSAM created by or with the assistance of teenagers themselves.

We explored a network of hundreds of sellers and tens of thousands of buyers. The most important platform for this trade is Instagram, as well as Twitter, Dropbox, Telegram and gift card trading sites.

Our blog post: https://cyber.fsi.stanford.edu/news/addressing-distribution-illicit-sexual-content-minors-online

Addressing the distribution of illicit sexual content by minors online

I spent a year digging into the SolarWinds hack - talking with SolarWinds/Mandiant/Microsoft and others -- to bring you this detailed story of how the hackers pulled off the boldest, most sophisticated supply-chain hack in history ... and how they got caught. https://www.wired.com/story/the-untold-story-of-solarwinds-the-boldest-supply-chain-hack-ever/
APT41 feeling left out this time