Posts
2700
Following
681
Followers
1504
"I'm interested in all kinds of astronomy."
repeated
repeated

The initial Post Incident Review is out from CrowdStrike. It’s good and really honest.

There’s some wordsmithing (eg channel updates aren’t code - their parameters control code).

The key take away - channel updates are currently deployed globally, instantly. They plan to change this at a later date to operate in waves. This is smart (and what Microsoft do for similar EPP updates).

https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/

2
7
0
repeated

Do I know anyone with a mail address on a mail server managed by barracuda networks who would help me with something? I'd like to test a few things (just sending you a few test mails and see if they arrive).

0
1
0
repeated

Wild, true story from the security awareness and training company KnowBe4 that details how they inadvertently hired a North Korean hacker who was posing as a Western tech worker.

Kudos to them for publishing this. If it can happen to a security awareness company, it can happen to anyone (full disclosure: they've been an advertiser on my site for ages).

https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us

4
19
0
repeated

I've published a little blog on binary patching Golang produced assembly to alter the stdlib net/http functionality. and frens maybe interested! https://pulsesecurity.co.nz/articles/golang-patching

0
2
0
repeated

We're proud our testing helps ensure the security of Thinkst's OSS Canary Tokens! As part of their transparency efforts, you can read the results of our latest round of testing here:

https://www.doyensec.com/resources/Doyensec_ThinkstCanaryTokensOSS_Report_Q22024_WithRetesting.pdf

1
4
1
repeated
Edited 1 year ago

CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog
Hot off the press! CISA adds two vulnerabilities to the KEV Catalog:

  • CVE-2012-4792 (CVSSv2: 9.3 "high") Microsoft Internet Explorer Use-after-free vulnerability
  • CVE-2024-39891 (5.3 medium) Twilio Authy Information Disclosure Vulnerability

cc: @iagox86 h/t: @hrbrmstr

0
1
0
repeated
repeated

Inspirational Skeletor💀

0
1
0
repeated

Blog posts should always include a first published date and a last edited date.

5
4
0
repeated

Was ILOVEYOU worse than CrowdStrike?

https://en.m.wikipedia.org/wiki/ILOVEYOU

Looks like more hosts were affected by ILOVEYOU (45 million in the first 24 hours) ... but the damage was somewhat more random because files were overwritten.

And now that there is a well-known CrowdStrike recovery procedure, as long as you follow it, you're okay -- but if you didn't have good backups, files overwritten by ILOVEYOU were unrecoverable.

0
1
0
repeated

Any event that makes the front page of a news outlet will be used as a phishing lure.

Any “threat intelligence” that alerts you to this is next to useless.

2
1
0
repeated

Email received a few days ago: "We need to know which version of SSH is installed on the server, as we want to ensure it is not vulnerable to external attacks." My response: "Don’t worry, SSH is accessible ONLY via VPN, and I am the only one with access to that VPN—activated only when needed—so there is no way for there to be any issues, regardless of the version used."

Email received this morning: "We’re not interested; you must provide the SSH version installed and, if it's not the latest, ensure us of the update date."
My response: "Sorry, could you explain the rationale? SSH is not exposed, it’s not listening on any public IP."
Their reply: "Provide the version."
My response: "OpenSSH_9.7, LibreSSL 3.9.0, on OpenBSD."
Their reply: "This is not considered secure. It must be OpenSSH_9.2p1 Debian-2+deb12u3."
My response: "It’s not Debian; it’s OpenBSD."
Their reply: "So the systems are insecure."

And they claim to be a cybersecurity company...

40
6
3
repeated
repeated

@masek we know a few other things:

The channel file update that caused this problem was for detecting malicious named pipe usage on the system by the CS kernel module

These channel file updates are pushed a few times per day.

The implication there, at least for me, is that the QA process is almost certainly entirely automated.

I have to believe that the release process probably doesn’t depend on someone doing a set of steps during the push process, including QA

I have two hypotheses:

a) the release pipeline doesn’t account for testing on a windows system that is crashed by an update and never comes back to life.

Or

b) the release pipeline doesn’t test channel file updates after they’ve been encoded for each customer, and it was some interplay between the content of the update, the encoding process, and a logic bug in the parser that resulted in the problem.

Also, on the topic of the terms and conditions preventing use for life safety situations - that is quite standard practice in the US, given how litigious we are. Most software and most services have some similar variation - I know we did at my prior employer, so I wouldn’t read too much into that.

1
1
1
repeated

🌪️ Our CEO @nrathaus had an engaging chat with our keynote speaker @yarden_shafir. They covered starting out in cybersecurity, tips for beginners, and future trends in the industry.

Watch now at: https://youtu.be/b51Ptn5K79U

0
1
0
repeated

Happy to announce @hyperdbg v0.10! 🎉🎊✨

This version comes with numerous bug fixes and stability improvements, plus new features like running assembly code directly in the events (VMX root-mode) and two new commands.

Check out the latest version: https://github.com/HyperDbg/HyperDbg/releases

For more information,

Assembly codes in conditions:
- https://docs.hyperdbg.org/using-hyperdbg/prerequisites/how-to-create-a-condition

Assembly codes in code sections:
- https://docs.hyperdbg.org/using-hyperdbg/prerequisites/how-to-create-an-action

Assemble virtual address:
- https://docs.hyperdbg.org/commands/debugging-commands/a

Assemble physical address:
- https://docs.hyperdbg.org/commands/extension-commands/a

0
2
0
repeated

On the birdsite​ there is a narrative whereby a Cobalt Strike¹ update "forced" to push out an update which caused the Falcon crash² .

Inevitably the usual crowd came out and we have statements such as:

> So, it’s Cobalt Strike’s success and popularity with threat actors that prompted CrowdStrike to rush out a signature for their agents, resulting in crashes on thousands of systems.
>
> Can someone add this to the balance sheet of damage caused by popular C2 frameworks?³

We therefore justify the complete lack of QA by blaming a C2 framework from a commercial company which, as many others, is used by baddies too.

The best bit is that Florian had to tell people it was said in jest (follow-up xeet) but… too late. He was quoting a xeet by Constantin Raiu but it was taken seriously.

We have just given something to blame in their narrative: "we were doing it to save the world from Cobalt Strike, they should not be allowed to exist!"

flan_molotov

__
¹ https://www.cobaltstrike.com
² https://x.com/craiu/status/1814566308056318381
³ https://x.com/cyb3rops/status/1814944503498678678

1
1
0
repeated

A offensive summary (update):

* we know Flacon updates are not verified prior to being enabled
* we know that they don't do staged updates
* we know a lot of large customer names
* we know the DR plans (or lack thereof) of said large customers
* we know the systemic reactivity

Learned opinion: it does not look good.

For those involved with the darker side of cybersecurity this is a monstrously useful set of data points.

0
6
0
repeated
Edited 1 year ago

It's quite funny that in the midst of the crowdstrike thing yesterday, someone tweeted - afaict as a shitpost - that Southwest Airlines were unaffected due to running windows 3.1. Then digitaltrends published that claim using the tweet as a source, and are now being quoted themselves as a source.

AFAICT, it's entirely bollocks. Same with the claim they still run Windows 95, that's from the same lazy digitaltrends article, misquoting another misquote from 2 years ago.

3
2
0
Show older