Hey there! Hope you had a great weekend. Let's get into it! 🩺Threat PulseChina’s Tacit Admission of Volt Typhoon Attacks At a December 2024 Geneva summit, China’s Ministry of Foreign Affairs cyber official Wang Lei made ambiguous remarks that U.S. delegates interpreted as a confession of Beijing’s role in the Volt Typhoon campaign—cyber intrusions on U.S. infrastructure tied to Washington’s support for Taiwan. Key Takeaways:
Spencer’s Thoughts: China is becoming more brazen, without a doubt. But as a defender or sysadmin what can we do? My advice is to focus on what you can control. Focus on improving a little bit each week, each month, each year. Secure that which is highest risk and absolutely be proactive about it. When it comes to LoTL (living off the land) DON’T rely on EDR alone to be your saving grace. I highly encourage you to look into Application Control technologies if you are not already. App Control for Business (formerly Windows Defender Application Control or WDAC) is great. Airlock is great. Neither are paying me to say that. The next thing I’d focus on if I didn’t already have a really solid solution is a SOC. Internal or outsourced, doesn’t matter right now. What matters is that SOC is 1) well funded 2) well trained and 3) well led. If you want help putting a SOC through it’s paces I would gladly help. We do it all the time with our purple team engagements. Phishers abuse Google OAuth to spoof Google in DKIM replay attack Attackers have discovered a way to trick Google into signing phishing emails with its own DKIM keys, making them appear legitimately sent from Key Takeaways:
Spencer’s Thoughts: Yeah this one is going to trick A LOT of people. Heck, even I would fall for something like this if I wasn’t being careful. Expect this technique to become more popular because of just how sneaky and devastatingly effective it is. Combine that with the fact that this is to some extent “expected” behavior and affects other platforms not just google. What should you do about it? Well, after the fact you could potentially spot suspicious oauth requests/grants/activity. Prior to that, really scrutinizing links and websites especially when it comes to oauth app requests and login pages is key. This is not an easy one. Stay vigilant, train your people! 🔐Securing the StackHow to Identify Insecure Delegated Permissions in Active DirectoryDelegation’s allow for assigning specific permissions to specific users to be able to perform specific tasks without requiring them to be a member of privileged security groups such as Domain Admins. The Hard Way 😟
The Easy Way 🙂 1) Copy and paste the code below into PowerShell, then press enter: (This downloads Invoke-Adeleginator.ps1 and ADeleg.exe, then runs Invoke-ADeleginator to find seriously dangerous delegated permissions in Active Directory)
2) Review the report and fix the misconfigured permissions 📰 Here’s a blog to go with this if you’d like more reading material on this. 💡By the way, these issues are something we look for on every internal pentest we do and we help multiple dozens of organizations fix every year. Many of these turn about to be critical vulnerabilities when we discover them and they are often trivial to exploit. If you’d like us to help you with your security, we’d love to work with you. Email me at spencer@securit360.com or book a meeting with me using the link below.
😆Memes & MayhemAs promised, freshly minted memes! 🤓😂
Prevention > Detection. No silver bullets. No such thing as 100% secure.
👨💻Behind the ConsoleYou may have noticed there was no newsletter the last two weeks. I hope you didn’t miss it too much, I was on vacation on the sunny shores of South Carolina. Wow was is perfect. But I’m excited to be back at it! I made another YouTube Video! I spoke with Jeff Hunter, Field CTO at NinjaOne about the current state of vulnerability management, including the challenges that sysadmins and security professionals often face. Jeff also shares a demo of NinjaOne’s new vulnerability remediation features. Although NinjaOne did sponsor this video, I can honestly say, this is the type of platform I wish I had 10+ years ago when I was doing vulnerability management on an internal IT Team. I’d love it if you’d check out the video (link below) and leave a comment so the NinjaOne folks can see others enjoy this type of content. 🙏🙏 All the best "Spirit of a hacker heart of a defender" |
Pentester/recovering sysadmin Self-proclaimed Ethical Threat Active Directory Security Connoisseur Offensive stuff — securit360.com Host Cyber Threat POV — offsec.blog SWAG — swag.ethicalthreat.com 📩 By subscribing, you’ll get exclusive access to industry insights, actionable tips for securing your environments, behind-the-scenes content from my pentests, and updates from someone who keeps a pulse on the ever-changing cyber threat landscape.
Hey there! Hoping you had an awesome weekend! It's cold and rainy here in NY and I am literally so over it. Hah. I hope you enjoy this weeks newsletter. Please hit reply and leave me some feedback or roast me. Would love to tune this and make it incredibly useful and valuable to you. I will consider ALL ideas. 🩺Threat Pulse GitHub expands security tools after 39 million secrets leaked in 2024 GitHub detected over 39 million leaked secrets, such as API keys and credentials, in repositories...
What's up everyone! Happy Monday. It's another great week over here because yes, I am again on another internal pentest engagement. This time the clients in the financial services industry. The last few before that have been law firms. Lot of exciting stuff in the works for me personally and with SecurIT360, so stay tuned. Have an awesome week! I appreciate you being a part of this newsletter community. 🙏 🩺Threat Pulse Microsoft’s killing script used to avoid Microsoft Account in Windows 11...
Happy Monday! For those following cybersecurity news, this past week has been a doozy! While I hope this newsletter helps you stay up to date I am really focused on the insights we can obtain from all that’s going on. If you get value and you’d like to reciprocate, the best way to do that is by sharing my newsletter subscribe link on social media. Truly appreciate you! Have an amazing week. 🙏 🩺Threat Pulse VSCode extensions found downloading early-stage ransomware Two malicious Visual Studio...