tzkuat, to random French
5am, to random
@5am@fosstodon.org avatar

I made good progress on #LetsDefend tonight. I'm hungry for more after getting three more badges, but my brain needs rest! 🐟🔍🛡️ #cybersecurity #blueteam #soc #phishing

maxleibman, to infosec
@maxleibman@mastodon.social avatar

Last week, I received a phishing test email that was mocked up to appear to be from HR, sharing some bullshit policy change.

I couldn’t help but to reflect that fewer employees would fall for these if they weren’t accustomed to inconvenient and rage-inducing material flowing freely from HR.

#infosec #phishing #HR

0x58, to infosec

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #19/2023 is out! It includes, but not only:

‣ New Phishing-as-a-Service Platform Lets Cybercriminals Generate Convincing #Phishing Pages
#Netgear Routers' Flaws Expose Users to #Malware, Remote Attacks, and Surveillance
‣ 🇮🇹 🏎️ #WordPress Plugin Vulnerability Exposed #Ferrari Website to Hackers
‣ 🇯🇵 🚗 #Toyota Japan exposed data on millions of vehicles for a decade
‣ 📨 #Microsoft patches bypass for recently fixed Outlook zero-click bug
‣ 🇺🇸 🇺🇦 IRS gives #Ukraine tools to expose Russian oligarchs hiding riches in #crypto exchanges
‣ 🇨🇭 Multinational tech firm #ABB hit by Black Basta #ransomware attack
‣ 🐥 #Twitter Finally Rolling Out Encrypted Direct Messages — Starting with Verified Users
‣ 🇺🇸 Cybersecurity firm #Dragos discloses cybersecurity incident, extortion attempt
‣ 🇰🇵 North Korean hackers breached major hospital in Seoul to steal data
‣ 🇺🇸 #Google Now Lets US Users Search #DarkWeb for Their Gmail ID
‣ 🇺🇸 #IBM Delivers Roadmap for Transition to Quantum-safe #Cryptography
‣ 🇪🇸 Spanish police dismantle phishing operation linked to crime ring
‣ 🇺🇸 Microsoft #PatchTuesday: 40 Vulnerabilities, 2 Zero-Days
‣ 🇺🇸 🇷🇺 Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by #Russia's Federal Security Service
‣ 🇺🇸 Feds seize 13 more DDoS-for-hire platforms in ongoing international crackdown
#MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web
‣ 🇮🇷 Microsoft: Iranian hacking groups join #Papercut attack spree

📚 This week's recommended reading is: "The Pentester BluePrint: Starting a Career as an Ethical Hacker" by @phillipwylie and @crowgirl

#security #data #databreach #surveillance #hospital

Subscribe to the #newsletter to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-192023

circatee, to random

Does anyone here use iCloud email? Worth it?
Spam growth on Outlook Dot Com, is a serious pain. Hence, my question, time to move I think...

#iCloud #Email #Spam #Phishing #Junk

mjgardner, to infosec
@mjgardner@social.sdf.org avatar
Rairii, to random
@Rairii@haqueers.com avatar

from what i've seen about the new wave of DM spam:

another cryptocurrency based advance fee fraud, the threat actor appears to be chinese this time (terms are used on the site that are typically used on chinese sites, like "VIP" levels for paid membership)

this time you're given creds to an account with lots of assets; you can't "withdraw" without a password you don't have, you can "transfer out" but only to another paid account

i reported it to google safe browsing and to MS equivalent

#phishing #ThreatIntel

mjgardner, to infosec
@mjgardner@social.sdf.org avatar

Over the past year, I’ve received dozens of spear / SMS text messages pretending to be from my employer’s CEO or another executive. Today I got my first one marked as an (’s exclusive messaging service—the “blue bubbles” in your Messages app).

This is pretty troubling—it means are getting past Apple’s defenses in addition to abusing the porous patchwork of SMS providers and networks.

AAKL, to random
@AAKL@noc.social avatar
AAKL, to random
@AAKL@noc.social avatar
taylorparizo, to random

Evilginx 3.0 is finally here!!!
One feature I'm excited for is embedding phishing pages within iFrames. For those familiar with the BITB technique from MrD0x a while back, the same feature is now in Evilginx.

https://breakdev.org/evilginx-3-0-evilginx-mastery/
#Phishing

Sentry23, to random

Nasty #phishing trick:

using a (now seemingly fixed) redirect hole in the Citi bank website to send victims to malicious #office365 login page.

phish url= https://l[.]info16[.]citi[.]com/rts/go2.aspx?h=4009490&tp=i-1NGB-Q4L-lWT-C1jVeU-1r-3KyZzS-1c-C1fuSq-l8roiBjasA-NupOi&x=filedn[.]com/l0KWBcNXzlKQBIHN1fMjRk4/fmfJfxJdq.html

final redirect:
https://njsnr9mpv56441484f69432[.]newfiles[.]ru/087da7a55f8f3f967e773cdd999165176454a814cc560LOG087da7a55f8f3f967e773cdd999165176454a814cc563

good copy of office 365 signin page, hosted at newfiles.ru

epixoip, to random

Happy !

I've cracked billions of from tens of thousands of in the past 12+ years, and because of this, I likely know at least one for 90% of people on the Internet. And I'm not alone! While I primarily crack breached passwords for research purposes and the thrill of the sport, others are selling your breached passwords to criminals who leverage them in and attacks.

How can you keep your accounts safe?

  • Use a ! I recommend @bitwarden and @1password

  • Use a style - four or more words selected at random - for passwords you have to commit to memory, like your master password!

  • Enable MFA for important online accounts, including cloud-based password managers!

  • Harden your master password by tweaking your password manager's KDF settings! For , use Argon2id with 64MB memory, 3 iterations, 4 parallelism. For and other PBKDF2 based password managers, set the iteration count to at least 600,000.

  • Use unique, randomly generated passwords for all your accounts! Use your password manager to generate random 14-16 character passwords for everything. Modern password cracking is heavily optimized for human-generated passwords, because humans are highly predictable. Randomness defeats this and forces attackers to resort to incremental brute force! There's no trick you can do to make a secure, uncrackable password on your own - your meat glob will only betray you.

  • Use an ad blocker like Origin to keep you safe from password-stealing and other browser based threats!

  • Don't fall for attacks and other social engineering attacks! Browser-based password managers help defend against phishing attacks because they'll never autofill your passwords on fake login pages. Think before you click, and never give your passwords to anyone, not even if they offer you chocolate or weed.

  • : require ad blockers, invest in an enterprise password management solution, audit password manager logs to ensure employes aren't sharing passwords outside the org, implement a Fine Grained Password Policy that requires a minimum of 20 characters to encourage the use of long passphrases, implement a password filter to block commonly used password patterns and compromised passwords, disable authentication and disable RC4 for , disable legacy broadcast protocols like LLMNR and NBT-NS, require mandatory signing, use Group Managed Service Accounts instead of shared passwords, monitor public data breaches for employee credentials, and crack your own passwords to audit the effectiveness of your password policy and user training!

ct_Magazin, to random German

heise+ | Ausprobiert: Phishing trotz Zwei-Faktor-Authentifizierung

Phishing bleibt für Hacker die erste Wahl, um fremde Zugangsdaten abzugreifen und den zweiten Faktor zu umgehen. Wir beschreiben, wie so ein Angriff abläuft.

https://www.heise.de/ratgeber/Ausprobiert-Phishing-trotz-Zwei-Faktor-Authentifizierung-8981919.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

#ZweifaktorAuthentisierung #Cybersecurity #IdentityManagement #Phishing #Security #news

vlrny, to random
@vlrny@disabled.social avatar

Question:

Anybody else get this kind of creepy chat up out of the blue with no other interaction? Bot? Or just socially inappropriate?

Mostly just need to decide between ignore, block, or report.

vlrny,
@vlrny@disabled.social avatar

Pfft! I just remembered when I was on #wattpad I got these so often I engaged in full conversations out of curiosity and amusement.

Say hello to Jerry in Raptures, for example...

#spam #scam #phishing #mastodon

https://www.wattpad.com/1007782435-bot-or-human-with-weird-day-job-jerry-in-raptures

anthonyhove, to random

Worst #phishing email I've ever received.
The content doesn't make sense and does not even entice to open attachment

fosserytech, to opensource
@fosserytech@mstdn.social avatar

is a great tool to limit network activity of programs and websites. It can even block and domains completely. And it also protects against and attacks.

mle, to Cybersecurity

🌊 #introduction HI! I'm a security researcher interested in weird things on the Internet. In particular, I love following rabbit holes around phishing emails and infrastructure, C2s, and botnets.
I got my start in tech in data science, where I helped colleagues find users who were doing "weird" and "interesting" things with our company's software. They wanted to find users who were pushing the boundaries of the software, not doing nefarious things, necessarily.
TL;DR I've spent most of my career looking for weird stuff in data.
Now, I'm especially interested in applications of data science methods–including but NOT limited to AI/ML–to problems in the infosec space.
Excited to see the community here and get to know others with similar interests!
#phishing #c2 #botnet #cybersecurity #ai #machinelearning

blog, to random
@blog@shkspr.mobi avatar

Scammers registering date-based domain names
https://shkspr.mobi/blog/2020/01/scammers-registering-date-based-domain-names/

Yesterday, January 2nd, my wife received a billing alert from her phone provider.
An SMS saying there's a problem with your phone bill.

Luckily, she's not with EE - because it's a pretty convincing text. That domain name is specifically designed to include the day's date.

If you're stood up on a crowded train, with your phone screen cracked, would you notice that a . is where a / should be? A quick look at the URl shows a trusted domain at the start - followed by today's date.

It starts with https:// - that means it's secure, right? Is .info even recognisable as Top Level Domain?

Scammers know these domains get blocked pretty quickly - so there's no point registering a generic name like billing-pdf.biz only to have it burned within a day. By the time I'd fired up a VM to inspect it, major browsers were already blocking the site as suspicious.

Is there any way to stop this? No, not really. Domain names are cheap - you can buy a new .info for a couple of quid. The https:// certificate was freely provided by Let's Encrypt. The site was probably hosted somewhere cheap, and whose support staff are asleep when abuse reports come in from the UK.

And that's the price we pay for anyone being able to buy their own domain and run their own secure site.

Money and technical expertise used to be strong barriers to prevent people from registering scam domains. But those days are long gone. There are no technical gatekeepers to keep us safe. We have to rely on our own wits.

https://shkspr.mobi/blog/2020/01/scammers-registering-date-based-domain-names/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • InstantRegret
  • rosin
  • modclub
  • Youngstown
  • khanakhh
  • Durango
  • slotface
  • mdbf
  • cubers
  • GTA5RPClips
  • kavyap
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • osvaldo12
  • tester
  • tacticalgear
  • ethstaker
  • Leos
  • thenastyranch
  • everett
  • normalnudes
  • anitta
  • megavids
  • cisconetworking
  • lostlight
  • All magazines