Show more

The MGM attackers claimed they used one of the easiest ways to breach/ransom a company, a method I use often in my hacking:
1. Look up who works at a org on LinkedIn
2. Call Help Desk (spoof phone number of person I’m impersonating)
3. Tell Help Desk I lost access to work account & help me get back in

While we wait for attack method confirmation, I’ll say that the attack method they claim worked for them does indeed work for me. Most orgs aren’t ready for phone based social engineering.

Most companies focus on email based threats in their technical tools and protocols — many are not yet equipped with the social engineering prevention protocols necessary to catch and stop a phone based attacker in the act. Teams need protocols to verify identity before taking action.

The 1st teams I go after when hacking are the folks who deal with requests from people constantly — IT, Help Desk, Customer Support, etc.
I often pretend to be an internal teammate to convince them to give me access, and I usually start with phone attacks bc they work fast.

Email phishing attacks can get caught in good spam filters and reported.
The soft spot for many teams are the folks who handle the phone call requests.
There’s a perfect storm: lack of verification protocols, easy spoofing, compensation tied to how fast they handle requests.

Questions to ask internally to see if your team is prepared to catch this attack:
- Do the folks who handle requests from team/customers use identity verification protocols?
- Do we rely on knowledge based authentication? DOB + caller ID matches ☎️ number in system, for example.
- Are our IT/Help Desk/Support teams compensated or promoted on the speed of saying yes to requests? Have we incentivized time for security protocols in Support?
- How do we verify identity first?

Remember, most folks at work want to do a good job and often times “good work” means “fast work”. We can’t expect every employee to be able to come up with their own identity verification protocols on the fly — it’s our job to provide the right human protocols to catch this fast.

We’ll need to wait to learn the details of the attack and get confirmation.
In the meantime, I can tell you I compromise orgs w/ the exact phone attack the attackers claim to use and many orgs don’t have phone call based identity protocols to catch it yet.

Update your phone based identity verification protocols to catch account takeover attempts!
You know your org best & there’s no one size fits all.
You can move from KBA (like DOB) to OTP on 2nd verified comm channel, call back to thwart spoof, service codes, pins, and much more.

After hacking & educating orgs on how they can catch me, the biggest task I spend my time on is updating verification protocols to spot me next time. It’s maddening to get caught on their new identity verification protocol on the next pentest but there’s also nothing I love more.
More details here: x.com/RachelTobac/status/17018

Until all are free: the trial statement of Ray Luc Levasseur (libcom, posted 2015, reprinted from Attack International October 1989) 

Check out the Burning Planet Reading List

Save 40% on select titles to understand and fight climate change with coupon code LIST until 10/1.

See them all blog.pmpress.org/2023/09/04/st

Piñata Economics, I like it, I will now dedicate my life and entire personality to it

If Usenet is making a comeback, I'll have to see if there's anything useful to read on my Eternal September account. Anyone know of active FOSS or SWE newsgroups?

USENET, one of the original -- and always decentralized -- social networks, never completely went away. Now it may be on the verge of a comeback. theregister.com/2023/08/30/use

David Davis & Caroline Lucas MPs are supporting an amendment to the Online Safety Bill that would seek to protect the end-to-end encrypted services. Many parents rely on these apps to safely and securely share family pictures. #onlinesafetybill #encryption #privacy #E2EE

1/3 of the junior class at the school in NYC where my daughter works was out with #covid yesterday. Mask up, #boston: we're likely next.

The only legitimate use of privilege is to help bring about the kind of world where you would not have had it to begin with.

#privilege

Driving back from a camping trip yesterday, I was wondering why people were flying US flags from overpass bridges.
Finally saw sign that said, 9/11, and (Always Remember or Never Forget). Made me wonder what lesson we were suppossed to have learned...consequences of imperialism?...USA will kill millions over oil?...even the little guys can strike back?...

Dozens of fraudulent public comments urging the state of #Ohio to allow fracking in state parks were sent in the names of people without their knowledge or permission. One was a 9-yr-old girl.

Republicans did this.

The story gets even deeper from there. Great reporting by #Jake_Zuckerman

cleveland.com/open/2023/09/the

On September 11, 1973, Chile was robbed of its democracy in a CIA-backed coup

I still can't fucking believe we have a Department of Homeland Security, I mean, Jesus, that's sort of thing you catch a glimpse of in a headline in the background and immediately realize oh, yeah, this is an alternate timeline episode, wonder how they'll ever get back.

Show more
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml