- John Hammond
- Posts
- Cybersecurity Shenanigans š
Cybersecurity Shenanigans š
#002
š Hey there,
Hereās attempt #2 at making a semi-decent newsletter! š
Thanks to everyone who left feedback on the first one. Sounds like youāre mostly here for cybersecurity news summaries and commentary as well as tools, tips, and educational resources. Iāll try to lean more in those directions!
What a shame that July was such an incredibly slow month for cybersecurityā¦ </sarcasm>
So, uh, anyway, letās get to it! Thanks for being here!
ā JH
Cool Tools!
Okay, before we dive into anything, I need to say that the latest tool release from TrustedSec looks incredibly cool.
Specula basically turns the Outlook email client into a C2 framework. š¤Æ
Your āimplantā is just a few changes to the Windows Registry. So cool.
I really hope to make a video or livestream playing with it.
News & Commentary
Soā¦ the CrowdStrike thingā¦
Letās start at the beginning.
During the overnight hours of July 19, well-known security vendor CrowdStrike pushed out code for their Windows endpoint agent. But this change was unique in thatā¦uhā¦it was faulty. š
Once the bad āchannel fileā was deployed to Windows computers around the globe, it (predictably) broke everything. As a result, nearly 9 million Windows devices lit up their respective rooms with the dreaded Blue Screen of Death (BSOD).
Given that CrowdStrike is practically second only to Microsoft in the endpoint protection space, this was kind of a really really huge deal. The outage took down airlines, banks, emergency services ā you name it.
And of course, threat actors were fast to the punch, too. It wasnāt long before they took advantage of the chaos, spinning up fake phishing websites and posing as CrowdStrike employees with offers to help āfixā the problem.
I made a video when everything was just starting to catch fire, which you can watch here:
I also tried to break it down in laypersonās terms on CNN! š
Jumped onto CNN to chitchat about the CrowdStrike shenanigans -- cheesy picture but quite a treat, thank you for letting me join you š
Hug ops to all the folks still fighting fires for this thing. š«
ā John Hammond (@_JohnHammond)
4:30 AM ā¢ Jul 20, 2024
If youāve spent any amount of time on LinkedIn during this fiasco, youāve likely been inundated with tHoUgHt lEaDeRs who have something to say about the whole ordeal. Iām going to try and steer clear from this approach and instead focus on some casual questions floating around in my head while neck-deep in this thing.
Q: How do we prevent this from happening again?
A: Thatās a tough question. I donāt know if I have a good answer!
One analogy thatās stuck with me over the years comes from Huntressā CEO, Kyle. Working to come up with a foolproof plan to prevent an incident is much like working to prevent a hurricane in Florida. To be frank, youāre wasting your time.
Instead, what you can do is prepare just before hurricane season hits. Stock up on gas, grab some non-perishable food, and buy those jugs of water. Protect your perimeter by installing hurricane shutters. When (not if) that hurricane hits, youāll at least be prepared. You can try with all your might to prevent this type of thing, but you wonāt ever have a 100% foolproof plan.
In security, thatās where disaster recovery comes in. For businesses, that looks like having a plan in place with key players assigned who can mitigate damage and get everything back up and running ASAP.
In the end, we can try to prevent these incidents all we wantā¦but arguably, itās even more important to have a plan ready to go for when the worst-case scenario happens. Because it could be only a matter of time before a nightmare scenario comes to life.
Q: How far has cybersecurity crept into the real world?
A: Cybersecurity isnāt dipping its toes into reality anymore. It is reality.
When the world operated by pen and paper, cybersecurity seemed far less tangible. But now, if a hospital is ransomed, real people may die. When the right āSoftware as a Serviceā (SaaS) platform is hit, car dealerships might come to a standstill. And when bad code is deployed, air traffic may come to a halt.
Cybersecurity is part of our world now, and I donāt think thereās any going back. Sure, small businesses might be able to operate by pen and paper, but even thatās a huge ask. It becomes an impossible ask for enterprises. Not to mention humans will always need banks, hospitals, credit cards, and airlines.
When we deal with anything in cybersecurity, weāre addressing real-world issues with different consequences. And as a security researcher, thatās as exciting as it is terrifying. š
KnowBe4 accidentally hires a North Korean threat actor
Speaking of āwhoopsieā stories, a North Korean threat actor posing as a software engineer was able to sneak past KnowBe4ās (rather intense) hiring process and land a gig there. And this guy did his homework to get hired, mind you. He passed background checks, gave suitable references, and even participated in FOUR video interviews! š
Soon after starting his new role, the threat actor got to workā¦just not in the way his new employer was hoping he would.
According to KnowBe4, the threat actor āperformed various actions to manipulate session history files, transfer potentially harmful files, and execute unauthorized software.ā The good news is no real harm was done, and KnowBe4 was able to contain the activity pretty soon after it started.
Notably, AI played a pretty big role in helping the threat actor land his sweet gig. He stole an identity and paired it with a believable stock image of a person edited with AI. To KnowBe4ās credit, their endpoint detection and response (EDR) software flagged the image. š
Threat actors are actively exploiting ServiceNow vulnerabilities
Never known to let a good vulnerability go unexploited, threat actors are wreaking havoc via newly discovered vulnerabilities in ServiceNow, a popular IT service management platform.
These vulnerabilities could allow attackers to gain unauthorized access, escalate privileges, and execute malicious actions. Security experts urge organizations using ServiceNow to apply patches and updates promptly to mitigate the risks and protect their systems from potential breaches.
This begs the questionā¦could we actually save the entire universe if we just dedicate our lives to patching?
Sponsor
DevSecCon is back!
Join Snyk for a virtual summit on October 8, 2024 to learn about DevSecOps strategies and how to maintain trust in AI-powered development.
Latest Content
YouTube Videos
July 31 // See the exact moment when these machines were compromised via infostealer malware. š |
July 24 // Using your Google or Microsoft account to connect to other services is mighty convenientā¦ but threat actors can set out to ruin it with Illicit Consent Grant attacks. |
July 22 // My good friend Eric Capuano recently posted about some forensics artifacts that appear on a victim machine of PsExec lateral movement. |
July 16 // A fellow security researcher sent over an infected Minecraft mod he stumbled upon. We unravel some obfuscated Java code! |
the eighth layer of hell is just forever waiting for your vm to come back after you took a snapshot while it was running
ā John Hammond (@_JohnHammond)
1:47 AM ā¢ Jul 28, 2024
This was a really cool find, big props to the SOC crew for digging into this whole thing.
ā John Hammond (@_JohnHammond)
1:14 AM ā¢ Jul 27, 2024
Sponsor
Scale securely with minimal, hardened, and 0 CVE container images to run your workloads with Chainguard.
Upcoming Content
Hereās a snippet of my to-do list for content you might see soon! š
āMark of the Webā Metadata Forensics
Decompiling AutoIT binaries
Canary tricks to detect Entra ID lateral movement
Initial access vectors from something as dumb as copy-and-paste
Events
I will be at Hacker Summer Camp this year in Vegas! Itās going to be a very long week (very busy šš) but I hope to see you there... please say hi if you see me!
August 5: The Diana Initiative
August 6: Bsides Las Vegas
August 7 - 8: Blackhat USA
August 8 - 11: DEFCON ā Iām super stoked to serve as a judge for the Social Engineering Villageās vishing competition this year, and Iāll be a team captain for Tiberiusā new āHacker Family Feudā -style event š
Life Updates
Iāve been out on a boat load of travel these past many weeks.
Itās exhausting. š
We did squeeze in a sweet vacation, but I've been bouncing back and forth between the east coast and west coast of the States.
Oh, and I was actually on a boat ā at least for a little bit, we were cruising down one of those New York rivers and I got a cool pic š
Give Me Your Feedback (Pretty Please š)
Cybersecurity Shenanigans FeedbackAny advice on how to make this thing better? Let me know! Select an option below, and then write in your comments on the next screen. :) |
Social