

Hugo van den Toorn
Manager, Offensive Security /*=$expert->feature_status*/ ?>
Outpost24
Comments Dotted :
11
October 14, 2020
Once an initial foothold is gained by adversaries, they want to try and elevate their privileges as quickly as possible.
This is typical behavior when new vulnerabilities and public exploits surface, underlining the importance of proper asset & vulnerability management and patch management. You can safely assume whenever a new vulnerability becomes publicly known, that a race starts to whomever can find a stable exploit and potentially chain it in further attacks. This goes for both the information security community, as well as adversarial hackers. The main difference is their motivation, to either disclose.....Read More

January 01, 2020
Looking at the global political situation, nation-state attackers are also likely to make some headlines next year.
What will be the top five cybersecurity threats to businesses in 2020? Will ransomware and BEC attacks still be the biggest threats or will any new ones come to light?
Supply chain attacks are a constantly developing threat. Although overall, they seem limited to more advanced and determined adversaries, the risk is evolving. What to do when you struggle to catch the big fish? Poison its bait! Target a supplier that has far less security control in place and from that ‘island’ you can jump .....Read More

November 28, 2019
Chances are the malware would execute itself again, change its appearances and persist on its host system.
"Even for end-points the defense in-depth method applies. Such polymorphic threats are, although a technical masterpiece, hard to eradicate from your systems. In this case the sudden increase in processing utilization cause by Dexphot should be a give-away that something is wrong with an infected host. However, also on the endpoints you want to be able to prevent and/or detect the malware at any of its stages.
The best thing would be to prevent the host of becoming infected. Either by having.....Read More

November 05, 2019
The big caveat with this breach is that this may leave the users vulnerable to sextortion attacks.
Unprotected systems directly accessible over the Internet are never a good thing. In this case, it seems that the logs being centrally collected, which from a security perspective is a good thing. Were it not left unprotected. Whenever possible, systems should be placed on the internal/trusted network and only accessible by individual users through a VPN. By maintaining such approach, it is difficult to accidentally deploy a system that is accessible by anyone with access to the Internet.
The.....Read More

October 31, 2019
If your customers are impacted, it is your organisation’s due diligence to also inform your customers about the breach.
Your organisation’s data is your responsibility, whether you are processing the data yourself or a third-party is handling the information. The same risk assessments and security measures should be taken to ensure it is protected at the appropriate level of security. If a third-party your business is utilizing is breach, such as this case, you should have an internal incident response process that is followed in your company. For example; changing credentials for the affected services,.....Read More

October 30, 2019
Make sure that any unique password you use for every website/service is sufficiently long and complex.
Sextortion, as indicated again with this kind of hacks, is often a strong enticement to sway users into paying the extortion fee. The overall advise would be the never reuse password, and make sure that any unique password you use for every website/service is sufficiently long and complex: Upper-, lower-case, special characters and numbers at least 8 characters long (but preferably longer). This can easily be solved by using a password manager that will generate and remember complex passwords.....Read More

October 22, 2019
“It’s especially dangerous if the cluster is connected directly to the Internet where anyone can connect without using a password”.
This is a typical example of a misconfigured system. It should have never been possible for anyone on the Internet, especially without authentication, to access the data stored in the database. Even Elastic themselves quote on one of their recent blogs on securing Elastiscsearch: “It’s especially dangerous if the cluster is connected directly to the Internet where anyone can connect without using a password”.
With the countless possibilities of ‘quickly deploying a system in the.....Read More

September 16, 2019
As datasets grow to these sized, the data is becoming increasingly valuable to our business and in some cases even more valuable than money.
This is a typical example of a misconfigured system. It should have never been possible for anyone on the Internet, especially without authentication, to access the data stored in the database. Even Elastic themselves quote on one of their recent blogs on securing Elastiscsearch: “It’s especially dangerous if the cluster is connected directly to the Internet where anyone can connect without using a password.
With the countless possibilities of ‘quickly deploying a system in the.....Read More

September 16, 2019
As datasets grow to this size, the data is becoming increasingly valuable to businesses and in some cases even more valuable than money.
This is a typical example of a misconfigured system. It should have never been possible for anyone on the Internet, especially without authentication, to access the data stored in the database. Even Elastic themselves quote on one of their recent blogs on securing Elastiscsearch: “It’s especially dangerous if the cluster is connected directly to the Internet where anyone can connect without using a password.
With the countless possibilities of ‘quickly deploying a system in the.....Read More

August 15, 2019
This is a classic example of what is described as Sensitive Data Exposure in the OWASP top ten.
This is a classic example of what is described as Sensitive Data Exposure in the OWASP top ten. It is not just at risk of being captured in-transit, but it could well be that this data is also stored in plain text on systems that process the request. Meaning the data could have been stored in for example logs, waiting for an attacker to find it.
