• John Hammond
  • Posts
  • Cybersecurity Shenanigans #005: Happy Cybersecurity Awareness Month!

Cybersecurity Shenanigans #005: Happy Cybersecurity Awareness Month!

This month's cybersecurity scoop.

šŸ‘‹ Hey there,

Itā€™s Cybersecurity Awareness Month! Iā€™m kicking off a brand-spankinā€™-new project to celebrate, which you can learn more about below. Iā€™m also celebrating over at Huntress with our Capture the Flag event, running now through November 1. Itā€™s not too late to join in on the fun!

Hope youā€™re enjoying the last few months of 2024. (How?!) Letā€™s get to it!

ā€” JH

Secretā€™s out: Introducing Just Hacking Training! šŸ¤“

Just Hacking Training is a new venture from me and my friend, Don Donzal, to offer hands-on, affordable training with tons of all-star practitioners, such asā€¦

We just launched on October 1 with 4 courses, 2 Upskill Challenges (UCs), 2 Hack-Alongs (HALs), and 1 Capture the Flag (CTF) event. There are FREE and Name Your Price options to provide focused technical training for all levels.

Here are the 4 courses available right now:

Iā€™ll announce new courses during the first week of each month on my socials. Iā€™ll also give you a heads-up in these newsletters about new UCs, HALs, and CTFs.

Please tell us on Discord what you think as well as what courses you'd like to see. You can engage with the instructors and other students and get support there as well.

Weā€™re in the very early stages of adding courses and content, but I was going to burst if I had to wait any longer to announce the news. šŸ˜

News & Commentary

Microsoft tricks hackers, lures them into honeypots to learn more about them šŸŽ£ 

Okay, I know we take a lot of playful (ā€¦?) jabs at Microsoft, but this is actually really cool.

The company created fake Azure tenants and used them to lure would-be phishers into honeypots. From there, Microsoft quietly collected intelligence on the ā€œvictimsā€ (are unethical hackers ever really victims, though?) to learn more about the tactics and techniques they use during their hacks. And those phishers were none the wiser. šŸ˜Ž

Now, let me tell you about these Azure tenants. These things looked legit. They had domain names, user accounts, and activity ā€” all primed and ready for hackers to explore. And explore they did! In fact, Microsoft claims that theyā€™ve been able to learn more about state-sponsored groups like Midnight Blizzard, which has set Microsoft in its crosshairs multiple times.

Howā€™s that for karma?

Introducing Sir Isaac Newton, Professor of Physics at MIT šŸ¤“

Google Scholar officially recognizes Sir Isaac Newton as a ā€œProfessor of Physics, MITā€ ā€” even noting his verified .edu email! Turns out, Newton was even further ahead of his time than we thought, as he died in 1727 and Google Scholar wasnā€™t created til some 277 years later. šŸ¤£

Sir Isaac Newton, Professor of Physics, MIT. Who knew?

Okay, jokes aside, how the heck did this happen? Well, as it turns out, itā€™s not quite as difficult to become a Google Scholar as you might think. Google states that there are 5 steps to creating an author profile, and the only stipulation required to appear in Google Scholar search results is to ā€œenter your university email address.ā€

So for funsies, I started the process. And, uh, Iā€™m kind of seeing how this happened.

Anyway, this made me think about identity verification and how it works on social media these days. Remember back in the olden days, what the process was like to get verified on Twitter? You all but had to submit a blood sample of your firstborn to get that coveted blue checkmark. Now, you just kind ofā€¦pay for it. And apparently, itā€™s not terribly hard to become a Google Scholar.

Do easy verification processes cheapen the experience? Or do they make it easier to be verified while still requiring some form of identification (e.g., an active university email address), which (arguably) upholds the integrity? šŸ¤”

Bad actors introduce infostealer malware to ā€œfixā€ Google Meet ā€œerrorsā€ āŒ

If you use Google Meet, thereā€™s a new social engineering tactic to beware of: ClickFix.

Bad actors are spinning up fake Google Meet pages, displaying an error and directing victims to run malicious PowerShell code. From there, hackers deliver various infostealer malware, such as StealC and Atomic Stealer. And because the end user is tasked with running the code, this attack often evades even solid security tools.

Donā€™t copy and paste shady-looking code into the PowerShell terminal, folks. šŸ˜…

Sponsor

Empowering the Next Generation of Cybersecurity Experts

Project Cyber is a non-profit committed to closing the gender gap in cybersecurity. By providing comprehensive resources and career pathways, Project Cyber empowers girls to excel in the cybersecurity field, building a more diverse and prepared workforce.

Learn more and get involved at Project Cyber.

Latest Content

YouTube Videos

// Ever wonder whatā€™s said during a chat with a ransomware operator (while simultaneously hoping you never find out the hard way šŸ˜…)? Letā€™s find out.

// I spin up an Android application written in Java and attempt to exfiltrate sensitive information in three different ways.

// Letā€™s go on an insane malware journey together, courtesy of one of Hack the Boxā€™s Sherlock labs.

Social

Events

Wild West Hackinā€™ Fest Recap šŸ¤ 

Giddy up, friends, and let me tell yā€™all about the hootenanny that was Wild West Hackinā€™ Fest.

(Okay, going a lil off brand there. Iā€™ll stop. šŸ˜…)

Wild West Hackinā€™ Fest was awesome. Itā€™s such a stand-out conference to begin with because it takes place in Deadwood, South Dakota ā€” obviously the first place that comes to mind when you think cybersecurity training. šŸ˜†

I gave a presentation called When I Grow Up, I Wanna Be a Script Kiddie, where we chatted about why tooling doesnā€™t really matter.

And then, I got the surprise of my life: I won this yearā€™s Rita Award. šŸ„¹ And what a snazzy-looking award it is.

Iā€™m still shocked about this, but more than anything, Iā€™m honored. It truly warmed my heart to take this home with me. I appreciate this so much!!

Give Me Your Feedback (Pretty Please šŸ™)

Love this thing? Have some pointers on how I can make it better? Please reply to this email and let me know. I really want these newsletters to be worth reading to you, and your feedback makes that possible!

Hereā€™s what Iā€™m wondering this week: Do you prefer news items that are strictly l33t and n3rdy, or do you like more entertaining cybersec news (think ā€œSir Isaac Newton, Professor at MITā€)? Let me know!