GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 02-Apr-2025 21:55:44 JST Kevin Beaumont Kevin Beaumont

    The 2025 Sophos Active Adversary Report is out.

    I thread these every year as, personally, I think yearly IR and MDR reports are the best source of data for defenders on _real world_ threats.

    https://news.sophos.com/en-us/2025/04/02/2025-sophos-active-adversary-report/

    Key take aways for me:

    - Despite what you read from scare vendors, ransomware dwell time (initial access to deployment) is still measured days.

    It is not hopeless and by active monitoring you *can* stop attackers.

    In conversation about a month ago from cyberplace.social permalink

    Attachments


    1. https://cyberplace.social/system/media_attachments/files/114/268/471/173/532/870/original/2e2261a255c41905.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 02-Apr-2025 22:00:42 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Compromised credentials continue to drive a majority of incidents. Why? home PCs and infostealers.

      MS Recall got the shite kicked out of it because it would have been a disaster for exactly this reason, we don't need to pour petrol on that already raging and unsolved fire.

      Bruteforcing of VPNs and exploitation of network border vulnerabilities continues to be a major (and growing) problem.

      Bang for buck: Concentrate on MFA everything, patch everything internet facing, monitor bruteforce.

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/268/477/001/972/365/original/4f9e7c5d782aeef0.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 00:07:44 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Bruteforce and external remote access drives a significant portion of incidents, which also ties to compromised credentials (78% of cases is remote access with valid creds, infostealers go brrrr).

      CitrixBleed was 5% of all security incidents - may explain why I made an MSPaint.exe logo for it

      The long story short is you need really robust authentication - if you get it wrong, you are toast in 2025 - and really, really robust external services patching. Don't ever present RDP to the internet.

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/268/985/251/405/106/original/b56a028a2912c150.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 00:09:45 JST Kevin Beaumont Kevin Beaumont
      in reply to

      If you have a way of being able to block or at least alert on software, yeet these:

      - SoftPerfect Network Scanner
      - AnyDesk
      - mimikatz (lol 2025)
      - Rclone
      - WinRAR
      - Advanced IP Scanner
      - Advanced Port Scanner

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/268/995/801/228/130/original/3e670dbc98e71494.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 00:12:23 JST Kevin Beaumont Kevin Beaumont
      in reply to

      In 84% of cases - you know, almost all - attackers use RDP, aka Remote Desktop.

      Yes, you think attackers are hacking the matrix and using Generative AI to generate 31337 code... but in fact, almost all of them are using Remote Desktop to *point and click* hack you.

      There's some really good recommendations in that for monitoring internal RDP usage. It's by far one of the biggest ways to catch people internally being naughty. Why is somebody RDPing to a domain controller at 3am?

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/269/004/298/623/743/original/261720b193529c4f.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 00:15:24 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Notably, for the second year running (and same with all prior reports) (and the same across other IR and MDR providers), the report doesn't mention AI or Generative AI once.

      Absolutely not popular to say that and always get next to zero engagement on LinkedIn, but let me be super clear on this one:

      The threat to your business is foundational IT and security. The big incident that screws you over will be somebody pointing and clicking. Focus on what actually matters, not AI.

      In conversation about a month ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 00:17:12 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Finally, if you want the raw incident data to analyse, Sophos has it, anonymized: https://github.com/sophoslabs/Active_Adversary_Report/blob/main/sophos-aar2501-github-share.csv

      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
        Active_Adversary_Report/sophos-aar2501-github-share.csv at main · sophoslabs/Active_Adversary_Report
        Datasets from the Sophos Active Adversary Report. Contribute to sophoslabs/Active_Adversary_Report development by creating an account on GitHub.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 01:20:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      I should also point out there's a lot of infosec people at trillion dollar tech companies sat thinking quantum and AI is going to be the next big problem...

      ...when in reality SMBs make up a vast majority of the global economy - and are getting owned by people running this as they can't work out nmap parameters, while playing Call of Duty on their second monitor (this isn't even a joke, this was a ransomware deployment):

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/269/268/098/136/656/original/1f351dc552d9a58a.png
    • Embed this notice
      argv minus one (argv_minus_one@mastodon.sdf.org)'s status on Thursday, 03-Apr-2025 02:16:48 JST argv minus one argv minus one
      in reply to

      @GossiTheDog

      The solution to this problem is not MFA.

      When you have a problem with passwords getting compromised/phished/bruteforced, and you solve it with #MFA, now you have two problems.

      The solution to this problem is smart cards.

      #cybersecurity #infosec #IT

      In conversation about a month ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 02:21:39 JST Kevin Beaumont Kevin Beaumont
      in reply to

      100% on this one, seen all the time on real world incidents.

      Problem: somebody got a password for an account and nobody knows how.

      How: the business user signed into their personal Google account in Chrome at work, which synced all their bookmarks and saved passwords to Google. Then they switched on their home PC, Chrime synced, and infostealer took all the details

      Solution: Google Chrome ADMX, and set Group Policy to turn off personal account sign in with Chrome.

      https://infosec.exchange/@Walker/114268652560517693

      In conversation about a month ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        Walker (@Walker@infosec.exchange)
        from Walker
        @GossiTheDog@cyberplace.social The larger problem for corporations is browser sync for passwords, login cookies and tokens, and other sensitive data. Home PCs do not have advanced EDR and if it gets compromised that could expose corporate resources.
    • Embed this notice
      RaulV (raulv@cyberplace.social)'s status on Thursday, 03-Apr-2025 02:31:56 JST RaulV RaulV
      in reply to

      @GossiTheDog phishing only 2.6% is shocker.

      In conversation about a month ago permalink
    • Embed this notice
      argv minus one (argv_minus_one@mastodon.sdf.org)'s status on Thursday, 03-Apr-2025 02:44:03 JST argv minus one argv minus one

      @GossiTheDog@cyberplace.social

      1. We're talking about big orgs with zillion-dollar budgets. They can afford smart card infrastructure.

      2. Trusting random employees' smartphones to serve as authentication tokens is hilariously stupid.

      3. Employees who do know the first thing about security aren't gonna be thrilled installing Microsoft apps on their phones.

      4. MFA is the exact opposite of “minimal friction”.

      5. If you must use a phone as a hardware token, then at least do it properly: NFC, QR code, etc.

      In conversation about a month ago permalink
    • Embed this notice
      argv minus one (argv_minus_one@mastodon.sdf.org)'s status on Thursday, 03-Apr-2025 02:49:31 JST argv minus one argv minus one

      @GossiTheDog

      Wait, what? I wasn't under the impression that small orgs even think about any of this stuff.

      In conversation about a month ago permalink
    • Embed this notice
      T (curiousrobot@infosec.exchange)'s status on Thursday, 03-Apr-2025 03:12:22 JST T T
      in reply to

      @GossiTheDog I’ve seen this at orgs where they have a policy that they can’t touch anything or provide any advice for stuff that happens on user’s personal tech. So that’s hard to try to mitigate for security teams.

      In conversation about a month ago permalink
    • Embed this notice
      Jernej Simončič � (jernej__s@infosec.exchange)'s status on Thursday, 03-Apr-2025 03:14:23 JST Jernej Simončič � Jernej Simončič �
      in reply to

      @GossiTheDog You mean the policy that's been deprecated?

      In conversation about a month ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/269/664/457/600/600/original/872a30a985e0c81c.png
    • Embed this notice
      argv minus one (argv_minus_one@mastodon.sdf.org)'s status on Thursday, 03-Apr-2025 05:21:52 JST argv minus one argv minus one
      in reply to
      • Christoffer S.
      • John Shier

      @johnshier

      Which controls? MFA? The sum of two weak authentication methods does not add up to a strong authentication method. There's a reason security keeps getting breached despite all the flashy security theatrics of the last few years.

      @nopatience @GossiTheDog

      In conversation about a month ago permalink
    • Embed this notice
      John Shier (johnshier@infosec.exchange)'s status on Thursday, 03-Apr-2025 05:21:53 JST John Shier John Shier
      in reply to
      • Christoffer S.
      • argv minus one

      @nopatience @argv_minus_one @GossiTheDog Agreed. There are very robust defensive controls that exist before you get to smart cards.

      Over half of the orgs in the dataset are under 250 users. They don't have the time, money, or the expertise to deal with smart cards.

      In conversation about a month ago permalink
    • Embed this notice
      argv minus one (argv_minus_one@mastodon.sdf.org)'s status on Thursday, 03-Apr-2025 05:21:55 JST argv minus one argv minus one
      in reply to
      • Christoffer S.

      @nopatience

      > Smart cards has never, imho, been a realistic solution to almost any organisations; ever.

      Why not?

      @GossiTheDog

      In conversation about a month ago permalink
    • Embed this notice
      Christoffer S. (nopatience@swecyb.com)'s status on Thursday, 03-Apr-2025 05:21:55 JST Christoffer S. Christoffer S.
      in reply to
      • argv minus one

      @argv_minus_one
      Impractical, expensive, not especially user friendly. Sure they are secure, but there are so many other things (again, imho) that makes them not ideal to use for carrying user identities.
      @GossiTheDog

      In conversation about a month ago permalink
    • Embed this notice
      Christoffer S. (nopatience@swecyb.com)'s status on Thursday, 03-Apr-2025 05:21:57 JST Christoffer S. Christoffer S.
      in reply to
      • argv minus one

      @argv_minus_one @GossiTheDog

      I genuinely think that #Passkeys may be the first and only real solution in decades to have a chance at replacing the password/MFA issues.

      It will work for individuals as well as organizations and their employees.

      Until then we'll have to accept reality which is compromised private computers leaking credentials, and having enforced MFA will help in some instances.

      Smart cards has never, imho, been a realistic solution to almost any organisations; ever.

      In conversation about a month ago permalink

      Attachments


    • Embed this notice
      Nick Drage (sonofsuntzu@mastodon.social)'s status on Thursday, 03-Apr-2025 21:01:43 JST Nick Drage Nick Drage
      in reply to

      @GossiTheDog if you sync with any account in Chrome it will sync all the accounts "within" that browser to any other browser using the same account?

      In conversation about a month ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.