24 Followers
129 Following
54 Posts

Detection Engineer. Ostensibly.

Irony Engineer. Passionately.

People love me @redcanary. Probably.

(but they don't endorse my ramblings. Surely.)

Nobody:

Me: changes the language setting on networked storage to Russian to avoid them getting ransomed.

I can't take credit for the title, or for the talented writing. I just clicked the big, red, "this is evil" button. https://redcanary.com/blog/bitsadmin/
Diary of a Detection Engineer: Blown to BITSAdmin - Red Canary

The combination of the BITSAdmin tool with Veritas backup software pointed our detection engineers to an attempted ransomware attack.

Red Canary
Anthropic AI announced that their latest release has 2x fewer hallucinations. I played around with it this morning and I am pleased to say it has reached "random commenter on reddit, but like, one with insanely negative levels of karma to the point where you're pretty sure it's just a troll account" levels of trust. Which honestly is fun.
When you throw an exploit in the test environment but it’s actually prod.
My friends and I recently replaced "LOL" in our group chat with LAMP (laughing at my phone) and it improved every conversation 500 percent
@fbarton that’s typically what I tell people. “I’m less concerned about what you’re looking at so long as it doesn’t involve downloading an infostealer, ransomware, etc.”

I’ve noticed something when I meet a person. They ask what I do, I say cybersecurity blah blah, and their response is almost always one of the following:

1: Interesting, my company/school/church/city/bank got ransomed recently (they proceed to tell me about lost data, how painful it was, etc)

2: Oh cool, I use duck duck go

3: So, do you catch people watching porn a lot?

@suspicious_link if I were stranded on a desert island operating system and could only bring three commands with me, grep would probably be one

@RyanStalets that’s the part I’m trying to figure out, having never worked in a big Fortune company. Because I would have assumed that, the bigger you get, the more an IT/security team would break up their baseline to say “the west coast development department uses X software, A-F IP addresses, and logs on between these times. But if the east coast sales team is using that software, or logging in at Y hours then we have a potential issue”

But, that’s a lot of work. So do these companies just give up on any idea of a baseline and resort to using overly general, false positive-prone concepts? If they outsource their security to an MSSP or MDR, how much input do they give to help those outside orgs build a good baseline? Or is everyone just resorting to generalities?

More and more, I’ve been hearing the sentiment that knowing your baseline isn’t practical, though it’s core concept I’ve been raised on. So maybe my methodology is outdated compared to what companies are doing today

@BagheeraAltered how much input does the org give the EDR/XDR/etc as far as feedback in saying what’s allowed? Or do they let it run in a vacuum determining its own thresholds then dealing with the False Positives as they come? Obviously every org is different in how hands on they get with this, I’m wondering what the average level of engagement is.