Hey there! Hope you had a great weekend. Let's get into it! 🩺Threat PulseChina’s Tacit Admission of Volt Typhoon Attacks At a December 2024 Geneva summit, China’s Ministry of Foreign Affairs cyber official Wang Lei made ambiguous remarks that U.S. delegates interpreted as a confession of Beijing’s role in the Volt Typhoon campaign—cyber intrusions on U.S. infrastructure tied to Washington’s support for Taiwan. Key Takeaways:
Spencer’s Thoughts: China is becoming more brazen, without a doubt. But as a defender or sysadmin what can we do? My advice is to focus on what you can control. Focus on improving a little bit each week, each month, each year. Secure that which is highest risk and absolutely be proactive about it. When it comes to LoTL (living off the land) DON’T rely on EDR alone to be your saving grace. I highly encourage you to look into Application Control technologies if you are not already. App Control for Business (formerly Windows Defender Application Control or WDAC) is great. Airlock is great. Neither are paying me to say that. The next thing I’d focus on if I didn’t already have a really solid solution is a SOC. Internal or outsourced, doesn’t matter right now. What matters is that SOC is 1) well funded 2) well trained and 3) well led. If you want help putting a SOC through it’s paces I would gladly help. We do it all the time with our purple team engagements. Phishers abuse Google OAuth to spoof Google in DKIM replay attack Attackers have discovered a way to trick Google into signing phishing emails with its own DKIM keys, making them appear legitimately sent from Key Takeaways:
Spencer’s Thoughts: Yeah this one is going to trick A LOT of people. Heck, even I would fall for something like this if I wasn’t being careful. Expect this technique to become more popular because of just how sneaky and devastatingly effective it is. Combine that with the fact that this is to some extent “expected” behavior and affects other platforms not just google. What should you do about it? Well, after the fact you could potentially spot suspicious oauth requests/grants/activity. Prior to that, really scrutinizing links and websites especially when it comes to oauth app requests and login pages is key. This is not an easy one. Stay vigilant, train your people! 🔐Securing the StackHow to Identify Insecure Delegated Permissions in Active DirectoryDelegation’s allow for assigning specific permissions to specific users to be able to perform specific tasks without requiring them to be a member of privileged security groups such as Domain Admins. The Hard Way 😟
The Easy Way 🙂 1) Copy and paste the code below into PowerShell, then press enter: (This downloads Invoke-Adeleginator.ps1 and ADeleg.exe, then runs Invoke-ADeleginator to find seriously dangerous delegated permissions in Active Directory)
2) Review the report and fix the misconfigured permissions 📰 Here’s a blog to go with this if you’d like more reading material on this. 💡By the way, these issues are something we look for on every internal pentest we do and we help multiple dozens of organizations fix every year. Many of these turn about to be critical vulnerabilities when we discover them and they are often trivial to exploit. If you’d like us to help you with your security, we’d love to work with you. Email me at spencer@securit360.com or book a meeting with me using the link below.
😆Memes & MayhemAs promised, freshly minted memes! 🤓😂
Prevention > Detection. No silver bullets. No such thing as 100% secure.
👨💻Behind the ConsoleYou may have noticed there was no newsletter the last two weeks. I hope you didn’t miss it too much, I was on vacation on the sunny shores of South Carolina. Wow was is perfect. But I’m excited to be back at it! I made another YouTube Video! I spoke with Jeff Hunter, Field CTO at NinjaOne about the current state of vulnerability management, including the challenges that sysadmins and security professionals often face. Jeff also shares a demo of NinjaOne’s new vulnerability remediation features. Although NinjaOne did sponsor this video, I can honestly say, this is the type of platform I wish I had 10+ years ago when I was doing vulnerability management on an internal IT Team. I’d love it if you’d check out the video (link below) and leave a comment so the NinjaOne folks can see others enjoy this type of content. 🙏🙏 All the best "Spirit of a hacker heart of a defender" |
Pentester/recovering sysadmin Self-proclaimed Ethical Threat Active Directory Security Connoisseur Offensive stuff — securit360.com Host Cyber Threat POV — offsec.blog SWAG — swag.ethicalthreat.com 📩 By subscribing, you’ll get exclusive access to industry insights, actionable tips for securing your environments, behind-the-scenes content from my pentests, and updates from someone who keeps a pulse on the ever-changing cyber threat landscape.
Admin due diligence crushes clickgrab tricks. Ethical Threat Insight: How to Spot and Stop Clickgrab Attacks Clickgrab isn’t just about tricking users, it’s about tricking you, the admin. The ClickGrab technique is super tricky because of the fake-CAPTCHA pages. The technique is centered around hijacking your clipboard with malicious PowerShell commands and then tricking you into pasting the malicious commands into the run dialog. But there is hope! PasteEater is a super cool utility that...
More isn’t better. Better is better. Quantity fades. Quality lasts. Ethical Threat Insights: Deception, the best ROI in Security There is a misconception that more security alerts == safer environment. The reality is that’s not true. Better alerts == more actionable evidence means you’re responding to what matters most, not when your server goes haywire because of a benign scheduled task. Deception is the best ROI in security because: It’s inexpensive (especially compared to “traditional”...
Attackers love certificates. They open doors most people forget to lock. Ethical Threat Insight: Certificate Abuse Attacks Think certificates only protect websites? Inside your network, they’re like digital ID cards for users, computers, web servers, and even domain controllers. But here’s the problem… A weak or misconfigured certificate can let attackers: Impersonate administrators Escalate privileges Persist quietly Simple tip: Start by auditing your AD Certificate Services (ADCS) using...