- John Hammond
- Posts
- Cybersecurity Shenanigans #007: Merry all the things & happy new year! 🍾
Cybersecurity Shenanigans #007: Merry all the things & happy new year! 🍾
This month's cybersecurity scoop.
👋 Hey friend,
I don’t understand how we’re at the end of December, but…here we are. 😅 I gotta say, this year has been wild. Hectic, busy, exciting, challenging, rewarding, fun…and humbling.
Everyone’s entitled to a sappy recap of their year. Here’s mine. 😁
Getting that cheesy Golden Creator Award for 1M YouTube subscribers 🙏 (with a dumb haircut to boot)
Making it to the DEFCON main stage! (Even if it was for being part of the Hacker Family Feud Game Show or helping with Hacker Jeopardy. 🤪)
Hopping on CNN live news to cover the CrowdStrike incident, gamer chair and all 🕶️
Being part of a $1B unicorn company at Huntress 🦄!
Winning the extremely special and sentimental RITA award from infosec saint John Strand and co 💙
Launching Just Hacking Training with Don Donzal!
And last but not least, I’m so, so glad that you’re here and appreciate the fact that you’re willing to let me take up real estate in your inbox. 🙏 Hope you have a wonderful holiday season!
— JH
News & Commentary
Deep Dive: Cleo Software Exploitation 🔥
The holidays just wouldn’t be the holidays without stumbling across malware being exploited in the wild. 😅
This time, it’s Cleo in the hackers’ crosshairs — more specifically, their LexiCom, VLTransfer, and Harmony software. These products manage file transfers, making them prime targets for hackers interested in launching supply chain attacks. This vulnerability opens up the door for remote code execution.
Check out the writeup I contributed to over on Huntress’ website.
LockBit Developer Arrested and Charged 🚔
Authorities recently captured another LockBit ransomware operator.
Rostislav Panev is believed to be one of the more loyal members of the ransomware group, actively participating in attacks from the group’s founding in 2019 til earlier this year. Panev is currently waiting to be extradited to the U.S.
And jeez, was his computer incriminating. Authorities found some juicy stuff on his device, including admin creds for a dark web repo housing multiple versions of source code for the LockBit builder. They also found creds for the LockBit control panel as well as a data exfiltration tool called StealBit. Good luck talking your way out of that.
Panev also flat out admitted to participating in some illicit activities on behalf of LockBit — from developing code to printing ransom notes. (Hey, somebody’s gotta do it.)
It’s believed that LockBit earned at least $500 million by launching attacks against 2,500 entities in more than 100 countries. But wait! There’s more! Rumors are flying that LockBit is planning a comeback in February of next year with the release of LockBit 4.0. Stay tuned. 👀
BeyondTrust vulnerability being exploited in the wild 😞
A vulnerability in two BeyondTrust products is being exploited in the wild. And it’s a doozy — with a 9.8 CVSS score. ☹️
The Privileged Remote Access (PRA) and Remote Support (RS) products are vulnerable to CVE-2024-12356, a command injection flaw that allows bad actors to execute arbitrary commands.
If you use these products via the cloud, the vulnerability has already been patched. But if you operate on-prem, you’ll need to apply the patch(es) yourself.
Sponsor
Building the Next Generation of Cyber Leaders
Girls' participation in STEM drops sharply in middle school, fueling the talent and gender gap in cybersecurity. Project Cyber empowers K-12 girls with hands-on workshops, mentorship, and other programs to teach girls real-world cybersecurity skills like cryptography and threat analysis, as well as life skills such as leadership, critical thinking, and teamwork.
Sponsor Project Cyber to amplify our impact and strengthen the cybersecurity talent pipeline. Together, we can build the next generation of cyber leaders and shape the future of cybersecurity.
Latest Content
YouTube Videos
// Felt cute. Thought I’d steal my own Reddit account. 💅 |
// A walkthrough of a CTF challenge. (Credit to C4T BuT S4D for their work here!) |
Just Hacking Training Update 🤓
As JHT continues its plan to release new courses during the first week of every month and all other new training during the third week, here’s what we have for December — and hints for what’s to come in 2025!
Cyber Monday Deal Ends Soon!
Use Code CM2024 for 20% Off
ALL Non-Name-Your-Price Training
through Christmas Day
New Courses This Month
OpSec – Privacy for Security Professionals by Mishaal Khan
Mastering Active Directory Security (MADS) Vol 2 – Protocols and Permissions by Slavi Parpulev
Additional December Releases
Hack-Alongs (HALs) & Free Upskill Challenges (UCs)
HAL - M!$#'s geoINT Challenge 1 by Mishaal Khan
HAL - Data Recovery Basics (ShadowMe #3) by Ali Hadi
UC - Password Spraying by SecLilC
UC - Penetration Testing Methodology by Phillip Wylie
UC - Vulnerability Management by Eric Johnson
On Deck for January 2025 & Beyond!
Dark Web & Cybercrime Investigations Course by Yours Truly 🤓
Intro to Shellcode Loaders Course by Dahvid Schloss
CTF – Playable Archive of Snyk 2023 Fetch the Flag
HAL – OWASP API Top 10 Part 1 by Katie Paxton-Fear
Numerous Courses, HALs, UCs & CTFs every month throughout 2025!
Come hang out with us hackers in Discord and engage with me, our All-Star instructors, students, and the rest of our community.
I submitted Infected Mushroom.
Not as much Christmas, but moreso Hacking. 😅
It is track 30 on the playlist... hilariously wedged between Taylor Swift and Fall Out Boy. 😂
— John Hammond (@_JohnHammond)
7:20 PM • Dec 19, 2024
💡Course Spotlight💡Get more MADS!🤪Mastering Active Directory Security Vol 2 by Slavi Parpulev of eLS and HTB fame is available now w/ videos & web-based, dedicated labs. Ea Vol only $100 PLUS 20% off code CM2024. Don't wait!
Just Hacking Training (JHT)… x.com/i/web/status/1…
— Just Hacking Training (JHT) (@JustHackingHQ)
9:43 PM • Dec 16, 2024
bam bam was the imposter
— John Hammond (@_JohnHammond)
5:16 AM • Dec 15, 2024
it's 3am and i am at inbox zero
— John Hammond (@_JohnHammond)
10:44 AM • Dec 10, 2024
What I’m Listening To 🎧
Looking for a new podcast to get into to get a break from your in-laws this holiday season?
My friends Ali Diamond and Serena DiPenti just launched a brand new podcast called Breaking the Internet. I listened to the first episode on a roadtrip, and it was wonderful.
And to answer the question…no, tech is absolutely not okay. 😅
Give this one a listen! Or a watch, if you prefer.
Got feedback?
Love this thing? Have some pointers on how I can make it better? Please reply to this email and let me know. I really want these newsletters to be worth reading to you, and your feedback makes that possible!
Hope to hear from you soon!
Social