sekoia_io, to random

We are sharing some additional (and associated threat context) linked to the recent critical vulnerabilities (CVE-2023-46805 & CVE-2024-21887) exploitations collected by our ⤵️
https://github.com/SEKOIA-IO/Community/blob/main/IOCs/CVE-2023-46805_CVE-2024-21887/Ivanti_iocs_20240124.csv

jtk, to random
esm, to random
@esm@wetdry.world avatar

I THINK THE MATRIX CHAT PROTOCOL SUCKS

kkarhan,

@hexaheximal @esm @hexaheximal

So yeah, don't trust any #WebApp where it's trivial to siphon away credentials.

And don't trust any #Service, because they WILL LIE TO YOU just like the #Honeypots of #ANØM and @protonmail did/still do.

Keep your keys in self-custody and encryption as well as decryption locally or don't even bother at all!

And I'd certainly not do critical comms from an insecure device where I don't have full control!

http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/547af5650b3853a3b24e

davidrevoy, to linux
@davidrevoy@framapiaf.org avatar
kkarhan,

@alcea @davidrevoy I guess @protonmail is utterly useless because even shitty #honeypots like #DNMX allowed that...

marcel, to random German
@marcel@waldvogel.family avatar

#Bern begrüsst seine Besucher des #SwissCyberStorm #SCS23 mit einem kleinen #Rainstorm.

marcel,
@marcel@waldvogel.family avatar

#Honeypots are often too obvious about being a #Honeypot:
#SheilaABerta looks at error messages and their differences between the emulated service and the honeypot's version. She requires only a single message to expose the fake service.

Honeypot writer need to improve their "compatibility".
#SCS23

itnewsbot, to news

This Week in Security: Blastpass, MGM Heist, and Killer Themes - There’s yet another 0-day exploit chain discovered as part of NSO Group’s Pegasus ... - https://hackaday.com/2023/09/15/this-week-in-security-blastpass-mgm-heist-and-killer-themes/

remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

: "Imagine being able to sit behind a hacker and observe them take control of a computer and play around with it.

That’s pretty much what two security researchers did thanks to a large network of computers set up as a honeypot for hackers.

The researchers deployed several Windows servers deliberately exposed on the internet, set up with Remote Desktop Protocol, or RDP, meaning that hackers could remotely control the compromised servers as if they were regular users, being able to type and click around.

Thanks to these honeypots, the researchers were able to record 190 million events and 100 hours of video footage of hackers taking control of the servers and performing a series of actions on them, including reconnaissance, installing malware that mines cryptocurrencies, using Android emulators to conduct click fraud, brute-forcing passwords for other computers, hiding the hackers’ identities by using the honeypot as a starting point for another attack, and even watching porn. The researchers said a hacker successfully logging into its honeypot can generate “tens of events” alone.

“It’s basically like a surveillance camera for RDP system because we see everything,” Andréanne Bergeron, who has a Ph.D. in criminology from the University of Montreal, told TechCrunch.

Bergeron, who also works for cybersecurity firm GoSecure, worked with her colleague Olivier Bilodeau on this research. The two presented their findings on Wednesday at the Black Hat cybersecurity conference in Las Vegas."

https://techcrunch.com/2023/08/09/researchers-watched-100-hours-of-hackers-hacking-honeypot-computers/

risottobias, to homelab

I forgot if I was dumb and already asked this.

What would the nuances of starting a "homelab" / "fediverse" be? Yes, it's not an industry, but a lot of hobbyist and volunteer systems exist...

I guess maybe ISAC/ISAO it isn't the word I'm looking for, more than threat intel, you know how provides other services? Like... hardening guides, shared threat intel, IR writeups, limited pentest services provided in bulk to the group / en-masse to every mastodon host... compliance guidance, tutorials, stuff like that.

https://english.ncsc.nl/get-to-work/publications/publications/2019/juli/02/ncsc-guide-isac
https://github.com/MISP/misp-compliance/blob/master/setting-up-ISACs/guidelines_to_set-up_an_ISAC.md
https://www.grf.org/build
https://www.isao.org/resources/published-products/

something to help make sure all the weird custom home-grown mastodon (and other hobbyist VPS weirdness) setups get set up more rigorously.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • mdbf
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • JUstTest
  • GTA5RPClips
  • tacticalgear
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • ethstaker
  • anitta
  • Leos
  • cisconetworking
  • provamag3
  • lostlight
  • All magazines