GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 26-Sep-2024 17:18:57 JST Kevin Beaumont Kevin Beaumont

    Telent have suffered a security breach of their managed internet and cyber unit, leading to misuse of the captive portal across UK train stations, NHS hospitals etc.

    They’ve contained their network for now. Thread to track situation.

    In conversation about 9 months ago from cyberplace.social permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 26-Sep-2024 17:37:20 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Pulled reference to network being contained as, well, it super isn’t.

      They have everything from Outlook Web App facing the internet to a Cisco AnyConnect box without MFA to Juniper management interfaces to documentation servers etc.

      In conversation about 9 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 26-Sep-2024 19:32:21 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The Telent incident is a simple web page defacement. The portal was internet facing on an Amazon EC2 box, which got owned.

      It was changed to far right propaganda.

      In conversation about 9 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 26-Sep-2024 20:06:08 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Here’s the Telent portal hack. The web page was public, along with the web server - it was a simple defacement. https://urlscan.io/result/fa1363df-f64b-474c-8223-21ecf310b4b5/

      In conversation about 9 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/113/203/527/735/211/826/original/a8015d38d7ab1fc9.png
      2. Domain not in remote thumbnail source whitelist: urlscan.io
        portals.odyssys.net - urlscan.io
        from urlscan.io
        urlscan.io - Website scanner for suspicious and malicious URLs
    • Embed this notice
      Fritz Adalis (fritzadalis@infosec.exchange)'s status on Thursday, 26-Sep-2024 20:44:19 JST Fritz Adalis Fritz Adalis
      in reply to

      @GossiTheDog
      Who's still using Telent when OpenSHS is free?

      In conversation about 9 months ago permalink
    • Embed this notice
      Fritz Adalis (fritzadalis@infosec.exchange)'s status on Thursday, 26-Sep-2024 21:06:46 JST Fritz Adalis Fritz Adalis

      @GossiTheDog
      Sorry, just making a joke at the expense of Telent because it sounds like Telnet. I shouldn't post while undercaffeinated.

      In conversation about 9 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 26-Sep-2024 23:25:54 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Telent have issued a statement saying somebody changed the captive portal page (just a website) using a legitimate administrator account, and police are investigating. I’m going to guess staff or former staff member.

      https://www.bbc.co.uk/news/articles/cr75znv47xpo

      In conversation about 9 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: ichef.bbci.co.uk
        Administrator account blamed for rail terror message hack
        People logging onto the Network Rail wi-fi were shown a message about terror attacks.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 26-Sep-2024 23:29:26 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • Graham Cluley

      How the media in the UK have been covering this, fuelled by cyber vendor outreach to media.

      For the record it never impacted departure boards.

      Here’s one of the press pitches somebody tried sending me: "UK train stations hit by 'Nightsleeper' cyber attack as chilling terror threat issued"

      HT @gcluley

      In conversation about 9 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/113/204/327/166/765/058/original/460d1b118da9183d.jpeg
      Ryan Castellucci :nonbinary_flag: repeated this.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 27-Sep-2024 16:47:19 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The train station WiFi captive portal defacement incident has lead to the arrest of somebody who works at the provider of the service. https://news.stv.tv/scotland/man-arrested-after-wifi-at-scotlands-busiest-train-stations-displays-islamophobic-messages

      In conversation about 9 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: news.stv.tv
        Man arrested after wifi at Scotland's busiest train stations displays Islamophobic messages
        from PA Media
        Systems across 20 stations, including those at Glasgow Central and Edinburgh Waverley, were among those impacted.

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.