Marcus Hutchins 

@malwaretech@infosec.exchange
78.6K Followers
92 Following
973 Posts
Cybersecurity
Websitehttps://marcushutchins.com
Security Bloghttps://malwaretech.com
Microsoft really doesn't like RC4 encryption apparently 😆

In the process of re-working and re-launching my beginner reverse engineering labs. You can test them out here: https://malwaretech.com/labs

More coming soon!

MalwareTech Labs - Learn Reverse Engineering & Malware Analysis – MalwareTech

As much as I love the job security, someone is going to have to stop these AI bros before they have us watering the crops with Brawndo.
Soviet Union style planned economy, but make it so that no one involved has any idea what planning or an economy is.
Close enough, I guess

This is the kind of high quality cybersecurity content you only get on X dot com. "People support the cybersecurity guy who said the election wasn't rigged because cybersecurity is full of leftists & sexual perversion"

(Note: Chris Krebs is a lifelong Republican & Trump nominee, not even remotely left-wing).

I bought $200 worth of stuff from Costco this week and they bought $0 worth of stuff from me. To resolve this deficit I will be charging myself $50 every time I go to the store. With this extra income I will build toasters, which I will attempt to sell to my local Costco for $200 each.

DDoS attacks almost always originate from hacked devices. The country/countries that the traffic originates from has never been an indicator of who's behind the attack. Musk's implication that Ukraine was responsible for the Twitter DDoS attack based on seeing some traffic originating from Ukrainian IPs is just dangerous speculation.

I've mapped botnet professionally for a decade, and all that looking at IP addresses locations tells you is the geographical distribution of compromised devices. When you plot this kind of data of chart, you typically just get a heat map of population density, slightly skewed by economic factors. Nations with larger populations tend to have more devices, but developing nations tend to have a higher percentage of older less secure devices, which are more likely to be hacked and recruited into botnets.

Interesting statement filed in the case against the Treasury and DOGE which gives us some cybersecurity insights. Here's the key takeaways:

- Only a single DOGE employee (25 year old engineer Marko Elez) has direct access to the Treasury payment systems.
- The DOGE employee was only allowed to access the systems from an encrypted government issued laptop.
- The government issued laptop is equipped with monitoring software, data loss prevention, and tools to block internet access, and use of removable storage devices.
- Strict instructions were given that no data could leave this laptop for the duration of the engagement.
- The employee was meant to only have read access to treasury systems, but was accidentally granted write access.
- Following the accident, the employee's laptop was examined and it was concluded that no data had been written during the mistake.
- After the employee temporarily resigned over racist Twitter posts, all access was revoked, and all government issued equipment was recovered.
- The DOGE employee shared updates about his work with another DOGE employee, which "may have occasionally included screenshots of payment systems data or records"

My take:
If true, it seems that unlike other instances at different agencies, the Treasury abided by strict security protocols.

My only real cybersecurity question here are:

1) They document claims screenshots of payment records were shared with another DOGE employee. It doesn't specify how they were shared. Was it just the authorized employee showing his screen to someone, or were they transmitted outside of the laptop? If it's the latter, then it calls much of the claims made in the article into question.

2) This statement isn't clear "The Bureau enabled enhanced monitoring on his laptop, which included the ability to monitor and block website access, block the use of external peripherals (such as USB drives or mass storage devices), monitor any scripts or commands executed on the device, and block access to cloud-based storage services."

The use of the phrase "included the ability to" isn't really clear on if those security controls were actually being enforced. The phrasing could simply mean they enabled software that had those capabilities, but they weren't being used.

Now, cybersecurity aside, the bigger question is what was the purpose of any of this? To audit something as complex as a treasury payment systems, you'd need teams of forensic accountants.

A single 25 year old software engineer with no prior treasury experience poking around some files on a laptop is not an audit. The entire DOGE operation seems like a charade. The organization consists almost entirely of young engineers pulled from Musk's other companies, has produced no plan for how they intend to audit any of these systems, and lacks any oversight at all.

https://www.documentcloud.org/documents/25521978-gov/

gov

Lol, Florian is big mad because I called him out for defending a Nazi salute and spreading AfD (German Neo-Nazi party) propaganda.

It's true though, I do dislike him for other reason. I've disliked him ever since 2020 when I had to unfollow him for posting MAGA nonsense. I then disliked him even more when he decided not to respect my decision to leave Twitter and kept reposting my posts there without my permission while simultaneously mocking my choice to leave, and now that he's gone full blown mask-off neo-Nazi, I dislike him close to the maximum amount I can dislike a person.

×

Interesting statement filed in the case against the Treasury and DOGE which gives us some cybersecurity insights. Here's the key takeaways:

- Only a single DOGE employee (25 year old engineer Marko Elez) has direct access to the Treasury payment systems.
- The DOGE employee was only allowed to access the systems from an encrypted government issued laptop.
- The government issued laptop is equipped with monitoring software, data loss prevention, and tools to block internet access, and use of removable storage devices.
- Strict instructions were given that no data could leave this laptop for the duration of the engagement.
- The employee was meant to only have read access to treasury systems, but was accidentally granted write access.
- Following the accident, the employee's laptop was examined and it was concluded that no data had been written during the mistake.
- After the employee temporarily resigned over racist Twitter posts, all access was revoked, and all government issued equipment was recovered.
- The DOGE employee shared updates about his work with another DOGE employee, which "may have occasionally included screenshots of payment systems data or records"

My take:
If true, it seems that unlike other instances at different agencies, the Treasury abided by strict security protocols.

My only real cybersecurity question here are:

1) They document claims screenshots of payment records were shared with another DOGE employee. It doesn't specify how they were shared. Was it just the authorized employee showing his screen to someone, or were they transmitted outside of the laptop? If it's the latter, then it calls much of the claims made in the article into question.

2) This statement isn't clear "The Bureau enabled enhanced monitoring on his laptop, which included the ability to monitor and block website access, block the use of external peripherals (such as USB drives or mass storage devices), monitor any scripts or commands executed on the device, and block access to cloud-based storage services."

The use of the phrase "included the ability to" isn't really clear on if those security controls were actually being enforced. The phrasing could simply mean they enabled software that had those capabilities, but they weren't being used.

Now, cybersecurity aside, the bigger question is what was the purpose of any of this? To audit something as complex as a treasury payment systems, you'd need teams of forensic accountants.

A single 25 year old software engineer with no prior treasury experience poking around some files on a laptop is not an audit. The entire DOGE operation seems like a charade. The organization consists almost entirely of young engineers pulled from Musk's other companies, has produced no plan for how they intend to audit any of these systems, and lacks any oversight at all.

https://www.documentcloud.org/documents/25521978-gov/

@malwaretech I was going to say "wow, great writeup, friend" and then I saw who this post was from and thought "Oh, that's why it's a great writeup."

Seems you may have done this before!
😉
@malwaretech But still. None of those dogebags should have access to anything. It's an illegal agency with criminals at the helm.
@T2R @malwaretech Just because some of them belonged to The Com and sold CSAM does not mean that they are not reliable.
@T2R @malwaretech if the filing is true.
@malwaretech I wouldn't be surprised if "screenshot" here means a picture of the screen taken by a phone.
@malwaretech I fully assume this whole thing essentially boils down to a pissing contest, with Musk aiming at demonstrating to trump who really is in charge. Trump exclusively responds to perceived strength (see Putin, Xi or Un) so that would presumably allow Musk to dictate his demands to Trump while giving trump just enough to project strength to the world
@malwaretech And did it stop him booting to BIOS or EUFI, did they have something in place to lock the machine if the case was opened? IF not, then any security they had in place is absolutely useless.

@malwaretech

DOGE. If any formal audit occurred ,or fraud data or actions identified(forensic audit), a formal report and incidents should be made public.

If not done, this is Federal crime of data theft and/or illegal access to confidential Federal data. No Secretary, appointed or acting, get ignore Federal data access laws...period.

@malwaretech Yeah, I'm fairly certain this part is what is known in the legal profession as a "lie": "The employee was meant to only have read access to treasury systems, but was accidentally granted write access."
@msbellows @malwaretech The whole statement is likely lies to downplay the severity of what they're doing.

@malwaretech

If they only said that they had monitoring/logging solutions installed and didn’t note what was active then none of them were active (or possibly not even installed altogether) and this is just post hoc CYA.

They even gave themselves another out for any leaks that might occur by saying “some screenshots might have been shared”. If your monitoring software was active show us the redacted screen shots that were shared.

@malwaretech Having worked with folks in some of these agencies before, my money is on a cellphone photo of the screen, shared over unencrypted channels like Gmail or SMS/MMS.
@malwaretech Does it say whether this dude had any sort of background check? I know Trump gave them all security clearances, no questions asked...
@malwaretech Wait. Are you saying that Elon Musk would lie?

@malwaretech

"The organization consists almost entirely of young engineers pulled from Musk's other companies...."

Musk has a fiduciary duty to other shareholders not to raid employees from Musk's other companies.

@malwaretech useless for an audit, just right for a witch hunt.
@malwaretech I assume they used their phone camera to take screenshots

@malwaretech Some of this is legal boilerplate. 1) "which may have occasionally included . . ." likely means everything after that clause is either speculation, or they're not ready to share details. All they're saying with certainty here is that he shared "updates."

2) They say they "enabled," not "installed" so I read "which included" means In addition to what they enabled, there may well be other "enhanced monitoring" methods not described (or they'd like to give that impression).

@malwaretech Dont the US have an army cyber defence division?
@malwaretech It would be interesting to know the provenance of this information. We're any witnesses or affidavits cited in the statement?
@malwaretech select * from transactions;
„Oh shit too much data!!“
*frantically hitting CTRL+C*
@malwaretech Why do I get a feeling the “screenshots” might have been taken with a phone of the actual screen and then shared?
@malwaretech Remember, this is Musk. He has the expertize of a 15 y/o in anything but entrepreneurship. And if these guys are famous for anything, it’s their utter disregard for realistic assessments of the efforts involved to accomplish a technical hurdle.

@malwaretech

Just in case there were any doubt about the mental & physical health awareness &/or status of #GQP #cult Congress...

Welcome to the 'great again' Middle ages, with feudal Lords, alchemists, and only official proclamations (no "news"). Only change, instead of leeches (they'll still be there in abundance in D.C. swamp, no worries), now we'll be deifying #BrainWorms thanks to the Stable Genius Sir #TrumpVirus of #Muskville

@malwaretech all that security can't stop the kid pulling out his iPhone and taking a photo of the screen lol

@malwaretech
This article offers a pretty well documented theory on the whole mess - the USA is or is about to experience post-democratic governance.

https://open.substack.com/pub/mikebrock/p/the-plot-against-america?utm_source=share&utm_medium=android&r=i0l1d

The Plot Against America

How a Dangerous Ideology Born From the Libertarian Movement Stands Ready to Seize America

Notes From The Circus
@malwaretech what was up with TPM saying there have been many changes written by Marko?
https://talkingpointsmemo.com/edblog/musk-cronies-dive-into-treasury-dept-payments-code-base
Musk Cronies Dive Into Treasury Dept Payments Code Base

Overnight, Wired reported that, contrary to published reports that DOGE operatives at...

TPM - Talking Points Memo

@malwaretech You don't "accidentally" grant externals write access to Treasury systems.
Especially not when those externals are subordinates of a greedy psychopathic billionaire from a so-called unconfirmed "Department of Government Extraction" ("DoGE") with close ties to the Chinese & Russian dictators & their felonious soulmate now in White House.

#RuleOfLaw #DoGE #Espionage #DataBreach #DataTheft #Treason #Law #Justice #NationalSecurity #Democracy #RuleOfThePeople #USPol #USPolitics #ElonMusk #NationalSecurityThreat #RussianAsset #ChineseAsset #ExpelMusk

@malwaretech
Lies. People there saw them copying files onto hard drives.

@malwaretech
"Accidentally granted write access" yeah, right.

"Audit" == 'where payeeName like "*DEI*" '

Clowntown

@malwaretech Can we please call him a "software engineer" or "software developer" and not an "engineer"?

He doesn't have a P.Eng.

He doesn't have a B.Eng or M.Eng.

"he studied software development and distributed systems" from Rutgers, and the github to match, according to Wikipedia/Wired.

@malwaretech

« temporarily resigned »

So #dogebag rehired the racist.

Of course he did.

@malwaretech I'd also suspect that the "accidental" write access was not an accident. Either way given that the 25 year old was granted access that differered from the intended claim, it makes one wonder if other things were circumvented or "accidentally" given