- John Hammond
- Posts
- Cybersecurity Shenanigans #005: Happy Cybersecurity Awareness Month!
Cybersecurity Shenanigans #005: Happy Cybersecurity Awareness Month!
This month's cybersecurity scoop.
š Hey there,
Itās Cybersecurity Awareness Month! Iām kicking off a brand-spankinā-new project to celebrate, which you can learn more about below. Iām also celebrating over at Huntress with our Capture the Flag event, running now through November 1. Itās not too late to join in on the fun!
Hope youāre enjoying the last few months of 2024. (How?!) Letās get to it!
ā JH
Secretās out: Introducing Just Hacking Training! š¤
Just Hacking Training is a new venture from me and my friend, Don Donzal, to offer hands-on, affordable training with tons of all-star practitioners, such asā¦
Yours truly š
We just launched on October 1 with 4 courses, 2 Upskill Challenges (UCs), 2 Hack-Alongs (HALs), and 1 Capture the Flag (CTF) event. There are FREE and Name Your Price options to provide focused technical training for all levels.
Here are the 4 courses available right now:
Script-Based Malware Analysis by yours truly
Beginner Level OSINT by Mishaal Khan
Mastering Active Directory Security Volume 1 - Credentials by Slavi Parpulev
Ease Me into Cryptography by Ellie Daw
Iāll announce new courses during the first week of each month on my socials. Iāll also give you a heads-up in these newsletters about new UCs, HALs, and CTFs.
Please tell us on Discord what you think as well as what courses you'd like to see. You can engage with the instructors and other students and get support there as well.
Weāre in the very early stages of adding courses and content, but I was going to burst if I had to wait any longer to announce the news. š
News & Commentary
Microsoft tricks hackers, lures them into honeypots to learn more about them š£
Okay, I know we take a lot of playful (ā¦?) jabs at Microsoft, but this is actually really cool.
The company created fake Azure tenants and used them to lure would-be phishers into honeypots. From there, Microsoft quietly collected intelligence on the āvictimsā (are unethical hackers ever really victims, though?) to learn more about the tactics and techniques they use during their hacks. And those phishers were none the wiser. š
Now, let me tell you about these Azure tenants. These things looked legit. They had domain names, user accounts, and activity ā all primed and ready for hackers to explore. And explore they did! In fact, Microsoft claims that theyāve been able to learn more about state-sponsored groups like Midnight Blizzard, which has set Microsoft in its crosshairs multiple times.
Howās that for karma?
Introducing Sir Isaac Newton, Professor of Physics at MIT š¤
Google Scholar officially recognizes Sir Isaac Newton as a āProfessor of Physics, MITā ā even noting his verified .edu email! Turns out, Newton was even further ahead of his time than we thought, as he died in 1727 and Google Scholar wasnāt created til some 277 years later. š¤£
Hereās a snapshot of Professor Newtonās Google Scholar profile:
Sir Isaac Newton, Professor of Physics, MIT. Who knew?
Okay, jokes aside, how the heck did this happen? Well, as it turns out, itās not quite as difficult to become a Google Scholar as you might think. Google states that there are 5 steps to creating an author profile, and the only stipulation required to appear in Google Scholar search results is to āenter your university email address.ā
So for funsies, I started the process. And, uh, Iām kind of seeing how this happened.
Anyway, this made me think about identity verification and how it works on social media these days. Remember back in the olden days, what the process was like to get verified on Twitter? You all but had to submit a blood sample of your firstborn to get that coveted blue checkmark. Now, you just kind ofā¦pay for it. And apparently, itās not terribly hard to become a Google Scholar.
Do easy verification processes cheapen the experience? Or do they make it easier to be verified while still requiring some form of identification (e.g., an active university email address), which (arguably) upholds the integrity? š¤
Bad actors introduce infostealer malware to āfixā Google Meet āerrorsā ā
If you use Google Meet, thereās a new social engineering tactic to beware of: ClickFix.
Bad actors are spinning up fake Google Meet pages, displaying an error and directing victims to run malicious PowerShell code. From there, hackers deliver various infostealer malware, such as StealC and Atomic Stealer. And because the end user is tasked with running the code, this attack often evades even solid security tools.
Donāt copy and paste shady-looking code into the PowerShell terminal, folks. š
Sponsor
Empowering the Next Generation of Cybersecurity Experts
Project Cyber is a non-profit committed to closing the gender gap in cybersecurity. By providing comprehensive resources and career pathways, Project Cyber empowers girls to excel in the cybersecurity field, building a more diverse and prepared workforce.
Learn more and get involved at Project Cyber.
Latest Content
YouTube Videos
// Ever wonder whatās said during a chat with a ransomware operator (while simultaneously hoping you never find out the hard way š )? Letās find out. |
// I spin up an Android application written in Java and attempt to exfiltrate sensitive information in three different ways. |
// Letās go on an insane malware journey together, courtesy of one of Hack the Boxās Sherlock labs. |
Not gonna lie I am pretty stoked for this year's SANS Holiday Hack Challenge, starting Nov 7th -- I have been playing since 2015, but this year it is with rolling releases! I am especially excited because this means content and video demos can come just after each part š¤©
ā John Hammond (@_JohnHammond)
9:37 PM ā¢ Oct 4, 2024
Events
October 21: From The Source, hosted by The Volatility Foundation. Iāll give a presentation called Malware ExtravaScamza. š
October 29-31: Security BSides Cayman Islands
Wild West Hackinā Fest Recap š¤
Giddy up, friends, and let me tell yāall about the hootenanny that was Wild West Hackinā Fest.
(Okay, going a lil off brand there. Iāll stop. š )
Wild West Hackinā Fest was awesome. Itās such a stand-out conference to begin with because it takes place in Deadwood, South Dakota ā obviously the first place that comes to mind when you think cybersecurity training. š
I gave a presentation called When I Grow Up, I Wanna Be a Script Kiddie, where we chatted about why tooling doesnāt really matter.
And then, I got the surprise of my life: I won this yearās Rita Award. š„¹ And what a snazzy-looking award it is.
Iām still shocked about this, but more than anything, Iām honored. It truly warmed my heart to take this home with me. I appreciate this so much!!
Give Me Your Feedback (Pretty Please š)
Love this thing? Have some pointers on how I can make it better? Please reply to this email and let me know. I really want these newsletters to be worth reading to you, and your feedback makes that possible!
Hereās what Iām wondering this week: Do you prefer news items that are strictly l33t and n3rdy, or do you like more entertaining cybersec news (think āSir Isaac Newton, Professor at MITā)? Let me know!
Social