Max Maass 

@hacksilon@infosec.exchange
427 Followers
122 Following
1.1K Posts

Sr. Security Specialist at iteratec // @seemoo alumni // Member of CCC // Crypto means cryptography.

tfr.

Bloghttps://blog.maass.xyz
GitHubhttps://github.com/malexmave
Pixelfedhttps://pixel.infosec.exchange/@hacksilon
Pronounshe/him
I received a response, documented here: https://infosec.exchange/@hacksilon/114782534325988895
Max Maass :donor: (@hacksilon@infosec.exchange)

Update: I heard back from the people running the system. Apparently it isn’t a geoblock, but the specific IPs my requests were coming from were blocked because of abuse from that CDN (bunny.net). The error has been fixed. (Now I wonder if Fraenk hosts their stuff on Bunny.net, or if it’s the DNS resolver I am using 🤔) Anyway, in the future, access to the warnings should be possible. Also, they saw this toot and referenced it in their reply 😅. https://infosec.exchange/@hacksilon/114765561556000011

Infosec Exchange

Update: I heard back from the people running the system. Apparently it isn’t a geoblock, but the specific IPs my requests were coming from were blocked because of abuse from that CDN (bunny.net). The error has been fixed. (Now I wonder if Fraenk hosts their stuff on Bunny.net, or if it’s the DNS resolver I am using 🤔)

Anyway, in the future, access to the warnings should be possible.

Also, they saw this toot and referenced it in their reply 😅.
https://infosec.exchange/@hacksilon/114765561556000011

Max Maass :donor: (@hacksilon@infosec.exchange)

Attached: 1 image Today in #ITSecurity gone wrong: I am in Austria as a German. I just received a notification via cell broadcast about a fire in the area. The broadcast contains a URL - but this URL is only accessible from an Austrian IP address. My LTE roaming IP isn’t allowed. So… I guess I just suffocate because I have the wrong IP address, then? 😅

Infosec Exchange
Great article. And has this gem as a closing statement: „Somewhere, a protocol is being used exactly as intended. This is deeply suspicious.“
https://darmstadt.social/@claudius/114766051184046904
Claudius (@claudius@darmstadt.social)

This blog entry about #MCP[1] is very true, and we've seen almost the same thing in the early 2000s ("Web 2.0", no not the "social media" thing that everybody associates with it now) Web 2.0 was all about APIs. For a brief moment, everything had a relatively open API. Twitter - that's where all the clients came from. Flickr. Delicious. Maps. YouTube. They all were relatively open. And people built the coolest stuff with it. [1]: https://worksonmymachine.substack.com/p/mcp-an-accidentally-universal-plugin

darmstadt.social

This blog entry about #MCP[1] is very true, and we've seen almost the same thing in the early 2000s ("Web 2.0", no not the "social media" thing that everybody associates with it now)

Web 2.0 was all about APIs. For a brief moment, everything had a relatively open API. Twitter - that's where all the clients came from. Flickr. Delicious. Maps. YouTube. They all were relatively open.

And people built the coolest stuff with it.

[1]: https://worksonmymachine.substack.com/p/mcp-an-accidentally-universal-plugin

MCP: An (Accidentally) Universal Plugin System

Or: The Day My Toaster Started Taking Phone Calls

Works on My Machine
Sent them an email requesting to have my IP range allowlisted and questioning the general assumption such a service should be limited to in-country IP ranges. Let’s see what happens.
Today in #ITSecurity gone wrong: I am in Austria as a German. I just received a notification via cell broadcast about a fire in the area. The broadcast contains a URL - but this URL is only accessible from an Austrian IP address. My LTE roaming IP isn’t allowed. So… I guess I just suffocate because I have the wrong IP address, then? 😅

Back in the day, Twitter used to be really good if I set up a thread to connect freelancers with clients. Let's see if Mastodon can do it.

Clients: if you're looking for freelancers/contractors, get in the comments

Freelancers/contractors: get in the comments

Everyone else: boosts appreciated.

The market is *dead* for freelancers and a big part of that (in my opinion) is fragmentation. Let's get that network effect *back*.

#FediHire

Ultra spicy post claiming to be from UK retailer employee (M&S or Co-op) about their experience with TCS on their security incident. https://www.reddit.com/r/cybersecurity/comments/1ll1l6c/scattered_spider_tcs_blame_avoidance/?utm_source=share&utm_medium=mweb3x&utm_name=mweb3xcss&utm_term=1&utm_content=share_button
Looking forward to being at #KeyConf25 and meeting all the interesting people there! My colleague Tim and I will be presenting our #Keycloak config auditor tool, #kcwarden, that helps you keep your server configuration secure. https://github.com/iteratec/kcwarden
https://fosstodon.org/@ahus1/114753988086598591
GitHub - iteratec/kcwarden: Keycloak Configuration Auditor

Keycloak Configuration Auditor. Contribute to iteratec/kcwarden development by creating an account on GitHub.

GitHub
I assume that when you stare in to THIS void, there's audio description.
×
Ultra spicy post claiming to be from UK retailer employee (M&S or Co-op) about their experience with TCS on their security incident. https://www.reddit.com/r/cybersecurity/comments/1ll1l6c/scattered_spider_tcs_blame_avoidance/?utm_source=share&utm_medium=mweb3x&utm_name=mweb3xcss&utm_term=1&utm_content=share_button

Marks and Spencer’s CEO says half of their online ordering is still offline after their ransomware incident, they hope to get open in next 4 weeks.

They are also rebuilding internal systems and hope a majority of that will be done by August.

Lesson: mass contain early. M&S didn’t. Co-op did.

https://www.reuters.com/business/retail-consumer/ms-ceo-most-cyberattack-impact-will-be-behind-us-by-august-2025-07-01/

@GossiTheDog this doesn't surprise me, in india TCS is seen as a spring board job. You join to gain experience. Stay for a few months maybe a year or two(if you're really desperate). grit your teeth deal with a horrible boss and then move to a better paying job. They have pretty high turnovers so training new staff is probably super low on the priority.

@GossiTheDog I'd be very curious to know what the breakdown is between TCS dropping the ball and lying about it and M&S/Co-op not actually insisting on adequate procedure.

It's not terribly uncommon for people to only care about time-to-resolution with some lip service to user satisfaction when it comes to helpdesk metrics; and tacitly discourage things that are slow and unpleasant like hassling people for ID, at least until that becomes a visibly terrible idea.

@GossiTheDog fun that this is the same TCS who are working on the DWP Child Maintenance Scheme and run the Teachers Pension Scheme for the DfE.
@RichBartlett @GossiTheDog TCS has not yet taken over TPS ops, another year+ before Capita is gone
@grievousangel @GossiTheDog thanks, feels a bit like frying pan > fire moving from Capita to TCS!
@RichBartlett yes, very likely. Many in DfE would say TPS likely to be an upgrade in this instance but the bar is desperately low.

@GossiTheDog

"M-SThrowaway" might indicate M&S?

Or is that too obvious or deliberate obfuscation? 🙂🤷‍♂️

@GossiTheDog as someone who has been subjected to Tata on multiple occasions going back over a decade?

This isn't nearly spicy enough. I don't even describe them as a 'body shop' because they'd gladly route you to a corpse and try to charge extra for '24x7 coverage.'

When one employer did a basic security audit of their helpdesk services, Tata failed so severely that the contract was pulled for cause before the audit was even completed. They moved it all back in-house.

@GossiTheDog and lo, I found my notes! And, hooboy, hang onto your hats kiddos. Things they failed at (which caused me work):

- resetting passwords without verifying identities
- removing 2FA from accounts (not allowed period; there was a procedure)
- removing or updating 2FA without verifying identities (so a LOT of 2FAs had to be assumed compromised)
- adding users to groups directly instead of directing them to the appropriate request

@GossiTheDog The root problem here isn't that TCS are shockingly bad (they are, just about everyone knows that).

The root problem is that "management decisions" constantly overrule those that raise concerns about their service and tell any remaining internal IT and security staff to "deal with it as best you can."

I'm very much of the view that, yes, the outsourced provider can be the cause of an incident, they can provide a shockingly bad service, they can cost your business millions of pounds. But the decision to continue to use them when you already know this is a real possibility - that's a decision by senior management within the company. That's on you.

@Cyberoutsider @GossiTheDog Totally agree. You can outsource the work but never the accountability.

Here is (yet another) example of risk management failures, the management under cost pressures find affordable solutions, celebrated for cost savings but the implicit risks are not understood nor uncovered during sourcing process.

There are ways to compensate however there is any way a significant risk trade off that needs to be made consciously, rather than implicitly like today.

(Experience from enterprise offshore outsourcing +15 years)

@GossiTheDog ATOS in the past have operated in a similar way (my experience). But if a post mortem investigation finds that the IT contractor was at fault and created an attack vector, as perhaps is being implied here, then I believe that any current business insurance policy might not cover the financial losses. I guess that the affected businesses might need to pursue legal action. What a mess 🤦
@GossiTheDog
This is epically bad for TCS. Good work.

@GossiTheDog Interesting. I don't have the background on this specific attack, but I'm reminded of the Target credit card theft. An HVAC company near me was the point of entry for the attackers; they had high-access keys to Target's intranet because they install and maintain shopping-mall-grade HVAC and can remote-override it for maintenance and schedule reasons (nation-scale chain stores with giant footprints save not-inconsequential money on things like "Don't power up the HVAC to normal capacity on days nobody is here").

They had the keys on the same machine running their webserver.

(Meanwhile, Target actually did get an SEC slap-on-the-wrist for one specific thing: the HVAC intranet piece wasn't firewalled from the financial transactions and cash register source code pieces).

@GossiTheDog @tdp_org

If it is the case then the leaders of businesses like M&S who outsource these services to the lowest cost providers should also be held to account

It’s typical of British business management to know the cost of technology but not the value of it

@GossiTheDog

I do not work for either company. Nevertheless, I can corroborate these comments, but not on a public forum. Not much interested in a private forum either. I'll just say that insider threat analysis and mitigation is VERY important when TCS is something you are forced to use.

@Spartan_1986 @GossiTheDog same same, from both the red team side and the incident response side.
@GossiTheDog I wonder what the liquidated damages cap is in the contract.
@GossiTheDog And who brought them in and kept them? Culpa in eligendo.

@GossiTheDog K. Krithivasan, also known as Krithi, aka the face of quality IT, that you can trust.

Hash tag

These Indian, "IT", call centers probably do double time as scamming operations.

Hilarious twist would be that it was an inside job, faked to look like a compromise.