pdp11hacker

114 Followers
252 Following
31 Posts

Security Consultant @ CrowdStrike. My opinions are my own.

Abortion is healthcare. Black Lives Matter. Trans rights are human rights.

Twitterhttps://twitter.com/pdp11hacker

A terrifying bill was just dropped in the late night hours in Oklahoma that would medically detransition all trans people up to age 26.

I called this would happen months ago - states are moving towards outright elimination.

Subscribe to support my work.

https://erininthemorn.substack.com/p/oklahoma-could-force-trans-people

#trans #transrights #transgender #translegislation #lgbt #lgbtq #lgbtqia

Oklahoma Could Force Trans People Under 26 Years Old To Detransition Medically

A new bill has been filed in Oklahoma that would ban gender affirming care under age 26. Republican states are moving towards banning transition entirely.

Erin In The Morning
The bit about a lawyer being stopped from entering a music hall in the US because its facial recognition system picked up that she's part of a law company that's suing them is even crazier than I thought.

The law company isn't suing the music hall - it's suing a restaurant, in another state, which is owned by the hall's parent company MSG Entertainment. MSG gone ahead and harvested photos of all the lawyers in the firm and fed it to an image recognition system to ban them from every MSG Entertainment owned location.

People always tell me that if you've got nothing to hide then you've got nothing to fear. She's got nothing to hide and they still went after her.

If this doesn't start making people worried about facial recognition then there's serious trouble coming.

https://arstechnica.com/tech-policy/2022/12/facial-recognition-flags-girl-scout-mom-as-security-risk-at-rockettes-show/
MSG defends using facial recognition to kick lawyer out of Rockettes show

MSG Entertainment began using facial recognition at venues in 2018.

Ars Technica

Multiple BitKeep crypto wallet users reported that their wallets were emptied during Christmas after hackers triggered transactions that didn't require verification.

https://www.bleepingcomputer.com/news/security/hackers-steal-8-million-from-users-running-trojanized-bitkeep-apps/

Hackers steal $8 million from users running trojanized BitKeep apps

Multiple BitKeep crypto wallet users reported that their wallets were emptied during Christmas after hackers triggered transactions that didn't require verification.

BleepingComputer

Many of you have been asking for my thoughts on the #LastPass breach, and I apologize that I'm a couple days late delivering.

Apart from all of the other commentary out there, here's what you need to know from a #password cracker's perspective!

Your vault is encrypted with #AES256 using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). #PBKDF2 is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only #KDF that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.

Using #Hashcat with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the < 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule.

Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:

1. users for which they have previously-compromised passwords (password reuse, credential stuffing)
2. users with laughably weak master passwords (think top20k)
3. users they can phish
4. high value targets (celebs, .gov, .mil, fortune 100)

If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.

I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know?

A proper mitigation would be to migrate to #Bitwarden or #1Password, change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.

For more password insights like this, give me a follow!

Violent Night is better than it has any right to be. Is it ridiculous and over-the-top violent? Yes. Is it a great Christmas movie? Also yes.
T-Mobile hacker gets 10 years for $25 million phone unlock scheme

Argishti Khudaverdyan, the former owner of a T-Mobile retail store, was sentenced to 10 years in prison for a $25 million scheme where he unlocked and unblocked cellphones by hacking into T-Mobile's internal systems.

BleepingComputer
Happy Hanukkah
Wishing everyone who celebrates a joyous and safe holiday season.
My little buddy ❀️
I wrote a blog post for work recently about how to prioritize vulnerabilities so you can meaningfully improve your security posture even without fixing all-of-the-things.
https://www.crowdstrike.com/blog/how-to-leverage-crowdstrike-falcon-spotlight-to-prioritize-vulnerabilities/
How to Leverage CrowdStrike Falcon Spotlight to Prioritize Vulnerabilities

This blog highlights the importance of effectively prioritizing vulnerabilities and shows how Falcon Spotlight can be used to do so effectively and with minimal effort.

crowdstrike.com
Twitter permanently suspended @taylorlorenz tonight apparently because she’s reporting on Elon Musk https://taylorlorenz.substack.com/p/elon-musk-banned-me-from-twitter
Elon Musk banned me from Twitter

πŸ˜΅β€πŸ’«πŸ˜΅β€πŸ’«πŸ˜΅β€πŸ’«

Taylor Lorenz's Newsletter