首页
24 条评论
cookiengineer4 个月前
After the takedown of APT28, I continued to receive spam from IP ranges that were associated with APT29's malware campaigns.<p>Turns out there's a lot of fake shell companies that act either as hosting companies specifically for malware campaigns from Russia and China or specifically as a company that tries to fraud people, e.g. their CEO being on the FBI most wanted list or the company being sanctioned by the UN.<p>I'm currently creating some sort of cyber map of these spam/phish/malware campaign overlaps, as part of my antispam [1] effort.<p>I got tired of LLM based targeted spam where they have a system in place that is trained on my social media profiles, because they are very hard to identify as being spam.<p>Blocking specific domains is a useless effort because they keep on spawning new fake company domains that are either copies of legit ones or are generated fake profiles. They are so automated that they also create staff members and fake profiles on LinkedIn, specifically for that spam effort. Nobody at LinkedIn gives a shit about those fake avatars, I reported hundreds by now and they did absolutely nothing.<p>Anyways, long story short, here's the blocklist of those ASNs and companies. I'm working on the map at the moment and don't wanna publish it until I can prove its correctness:<p>[1] <a href="https://github.com/cookiengineer/antispam">https://github.com/cookiengineer/antispam</a>
评论 #42865330 未加载
评论 #42865505 未加载
评论 #42865202 未加载
评论 #42864564 未加载
评论 #42864697 未加载
indymike4 个月前
When I was in the US Navy, I learned most of the time, the weak points in security were usually people. Attackers know this and exploit it. And it usually wasn't movie plot style "do this or your wife gets it" exploits. Those seemed to get blown up easily. It was mundane things. Distracting a watch stander with something that was actually stupid. Making someone late for duty. Putting something really gross in the garbage hoping the inspector would skip that bag. So many little lapses in human judgement. Most completely innocent. This was with vigilant, uniformed people subject to military discipline, and those thing happened.<p>So you have to focus on process and systems. Some easy stuff:<p>* Never ask customers/employees for a password. If someone does it's a scam.<p>* Refund money only to the payment method used to pay for the product/service.<p>* 2FA is your friend no matter how much the VP of Sales whines about it.<p>* have a way to expire tokens and force reset of passwords.
评论 #42865786 未加载
评论 #42874677 未加载
评论 #42869576 未加载
评论 #42864460 未加载
chinathrow4 个月前
> People connecting through our VPN have access to an internal-only SMTP gateway machine that doesn't require SMTP authentication.<p>Time to clean that up while you're at it.
评论 #42863229 未加载
BLKNSLVR4 个月前
Seems like a lot of effort to just send spam. Almost feels like their preparation outweighs their imagination by a large margin.<p>I'd have thought there would be a lot more that could be done with VPN access than immediately burn it by sending spam.
评论 #42864398 未加载
评论 #42863082 未加载
voytec4 个月前
> People connecting through our VPN have access to an internal-only SMTP gateway machine that doesn't require SMTP authentication.<p>This part sounds... not great. Even bad actor within org could send messages as someone else: president to payroll etc.
评论 #42868540 未加载
nonrandomstring4 个月前
TFA describes a perfect example of unwarranted implicit trust. Any
tunnel-in should terminate in an environment not unlike being outside
a regular perimeter, with internal per-host access control (perhaps by
RADIUS or some coordinated ACL - which would also have fixed the
parallel account problem )... especially to an unsecured Internet mail
server. I wish the misnomer "Zero Trust" were better crafted and
understood as a broad philosophy. I think it's psychologically
difficult to do the role-play and imagine "what if I couldn't trust
myself?"
评论 #42863238 未加载
NVHacker4 个月前
I don't know where is the tech ability bar for spammers but this doesn't strike me as unusually clever or well prepared.
评论 #42863220 未加载
评论 #42868036 未加载
评论 #42863719 未加载
altacc4 个月前
I see a lot of posts, articles, etc... stating that people are surprised by the complexity of a cyber attack or scam. It seems that most people haven't yet learnt that this is a full blown industry targeting countless businesses, institutions and individuals 24/7, not just some script kiddies in their bedroom. There are office blocks full of trained professionals with sophisticated tools working to compromise digital security and manipulate human nature to gain access to accounts, data and funds. Everyone needs to be adopting a form of zero trust or trust but verify to every digital interaction and every use of technology.
评论 #42863789 未加载
评论 #42864652 未加载
评论 #42864770 未加载
评论 #42864136 未加载
评论 #42863807 未加载
评论 #42865493 未加载
Scotrix4 个月前
No auth smtp server sounds like a very bad idea and the real culprit here. Security by obscurity (VPN in this case) never works.
ale424 个月前
That's why we have now 2FA enabled on most external access, VPN included.
评论 #42863194 未加载
dmurray4 个月前
This is a university. I expect they have a higher than normal proportion of attackers who know the system and exactly how they'd escalate having gained some access, and have the free time to prepare a customized attack.<p>On the other hand, those attackers are probably less malicious than the average Russian ransomware group.
1970-01-014 个月前
The invisible lesson here is to just use 2FA everywhere or accept the risk of this happening to you.
spogbiper4 个月前
In the comments, the author mentions this:<p>"As for information on our VPN setup (and our mail sending setups), it's on our support site (for obvious reasons) so we assume the attacker read it in advance."<p>That really changes the level of complexity for the attacker here
评论 #42882144 未加载
deckar014 个月前
I thought our unauthenticated SMTP got shutoff after switching to Office 365. I looped over the SMTP servers in the hop list in the headers of an email and one of the Microsoft domains accepted unauthenticated requests from within the network.
patcon4 个月前
> It seems extremely likely that the attacker had already researched our mail and VPN environment before they sent their initial phish spam, since they knew exactly where to go and what to do.<p>As someone else said, I would increasingly suspect that apparently targeted or seemingly highly-invested hacking behaviour is just a new breed of scripts that are puppeteer by phishing AI multi-agent systems (maybe backed by deepseek now).<p>Just like self driving cars that will never make the same mistake twice, these things will likely keep a catalog of successful tactics, and so always be learning obscure new tricks
toobulkeh4 个月前
Or you can ask a GPT, that has already indexed your publicly available support docs, to prioritize potential places for a user looking to keep access as a backup.<p>AI is available to everyone, and we’re not prepared.
hatly224 个月前
Sounds like it is possibly an automated script or agent doing most of this work accessing the VPN and SMTP server. Really shouldnt have any open mail servers anywhere.
nubinetwork4 个月前
I feel bad for cks, but I probably would have handled it a little differently...<p>- shut their accounts off network-wide<p>- drop all related network connections<p>- forcibly reset their password and make them choose a new one in person. They may have changed it earlier, but do it again<p>- increase logging to catch any potential reoccurrences against the same user or other users<p>- inspect ACLs and reduce access for all users if possible<p>- prevent users from connecting from areas outside of their usual network sphere<p>- let the user back on, and ask them to be more careful in the future<p>- better mail filtering would be nice, but they'll always find a way to beat the spam filter<p>- (i hate this option the most, but...) send fake scam emails internally to see if anyone else takes the bait<p>This is of course ignoring 2fa, but 2fa isn't perfect either with sim swapping... but I personally don't think changing the password is enough for an event like this.
bluGill4 个月前
I have concluded that I will eventually fall for a scam and pay a medical bill for some service I never received. All the bills look like scams, and for one service there are often 3 separate bills from different areas so it would be easy for someone to tack on one more and get some cash from me...
JayDustheadz4 个月前
> because they are very hard to identify as being spam.<p>Why not just use Duckduckgo's free e-mail protection? Generate a new forwarding address for a new service/website/account takes a second.
axus4 个月前
I've gotten emails with links "From" my parents names, but checking the addresses it was accounts on random .edu domains. The fact that separate emails came from two different names I knew really made me feel targeted.
评论 #42864679 未加载
sim7c004 个月前
ztna+ can help here. VPN give access to entire network, with all the rubbish services sysadmins have laying around like unauthenticated smtp servers (sounds total shit but it happen everywhere.... need to send email notifications from all sorts of shit and no one wants to manage these accounts... sadstory..)
ztna+ will for users kind of seem like vpn, good protection,but it only give access to services the user is allowed to access, not the entire vpn network.<p>it help alot against these type of scenarios.<p>also, how fast is fast? you can scan an internal network on a single port in the blink of an eye, so if u don't have good network IDS/IPS internally, u will not really see the scan and it seems like someone 'knows the network in advance' because they scan it in like 2 seconds and based on results automatically run scripts etc. - it doesn't need to be knowledge gained in advance.<p>- monitor internal network properly, asif its external network.
- use ztna+ if you can afford such solution
- do regular audits for things like unauthenticated services and use these kind of incident to in a friendly manner educate sysadmins about risks of such services. they will usually understand it, especially after an incident. aslong as you bring it friendly with a good explanation, not some demanding attitude.<p>- use a lot of mail filtering... more is better. it can be a bit tedious. at my company we have more than 4 solutions to scan all email and attachements etc. , still stuff slip through, but not a lot...
- also scan outbound or 'local' email. (BEC fraud etc.)<p>- do good post-incident reviews and use learnings each time something happens (sounds obvious, but this is often omitted, the learnings are only kept within sec teams, or turnt into one-off remediations rather than process etc. )<p>edit: oh.. and also monitor for logon anomalies. a lot of solutions support this. e.g. a user logs in from a unique new ip - alert on it, or even block it. , that action depends a bit on what's normal, so here actually ML and such solutions are great.. but basic statistical analysis etc. can also help if u can't pay or create ml solution. (its not too hard to create really, basic models will suffice.)
aaroninsf4 个月前
Maybe we just stop using email.