by epakai on 1/29/25, 8:43 AM with 127 comments
by cookiengineer on 1/29/25, 12:43 PM
Turns out there's a lot of fake shell companies that act either as hosting companies specifically for malware campaigns from Russia and China or specifically as a company that tries to fraud people, e.g. their CEO being on the FBI most wanted list or the company being sanctioned by the UN.
I'm currently creating some sort of cyber map of these spam/phish/malware campaign overlaps, as part of my antispam [1] effort.
I got tired of LLM based targeted spam where they have a system in place that is trained on my social media profiles, because they are very hard to identify as being spam.
Blocking specific domains is a useless effort because they keep on spawning new fake company domains that are either copies of legit ones or are generated fake profiles. They are so automated that they also create staff members and fake profiles on LinkedIn, specifically for that spam effort. Nobody at LinkedIn gives a shit about those fake avatars, I reported hundreds by now and they did absolutely nothing.
Anyways, long story short, here's the blocklist of those ASNs and companies. I'm working on the map at the moment and don't wanna publish it until I can prove its correctness:
by indymike on 1/29/25, 12:43 PM
So you have to focus on process and systems. Some easy stuff:
* Never ask customers/employees for a password. If someone does it's a scam.
* Refund money only to the payment method used to pay for the product/service.
* 2FA is your friend no matter how much the VP of Sales whines about it.
* have a way to expire tokens and force reset of passwords.
by chinathrow on 1/29/25, 9:37 AM
Time to clean that up while you're at it.
by BLKNSLVR on 1/29/25, 9:16 AM
I'd have thought there would be a lot more that could be done with VPN access than immediately burn it by sending spam.
by voytec on 1/29/25, 1:43 PM
This part sounds... not great. Even bad actor within org could send messages as someone else: president to payroll etc.
by nonrandomstring on 1/29/25, 9:33 AM
by NVHacker on 1/29/25, 9:26 AM
by altacc on 1/29/25, 11:23 AM
by Scotrix on 1/30/25, 9:10 AM
by ale42 on 1/29/25, 9:19 AM
by dmurray on 1/29/25, 12:16 PM
On the other hand, those attackers are probably less malicious than the average Russian ransomware group.
by 1970-01-01 on 1/29/25, 5:02 PM
by spogbiper on 1/29/25, 6:54 PM
"As for information on our VPN setup (and our mail sending setups), it's on our support site (for obvious reasons) so we assume the attacker read it in advance."
That really changes the level of complexity for the attacker here
by deckar01 on 1/29/25, 4:52 PM
by patcon on 1/29/25, 4:47 PM
As someone else said, I would increasingly suspect that apparently targeted or seemingly highly-invested hacking behaviour is just a new breed of scripts that are puppeteer by phishing AI multi-agent systems (maybe backed by deepseek now).
Just like self driving cars that will never make the same mistake twice, these things will likely keep a catalog of successful tactics, and so always be learning obscure new tricks
by toobulkeh on 1/29/25, 1:03 PM
AI is available to everyone, and we’re not prepared.
by hatly22 on 1/29/25, 12:06 PM
by Vampiero on 1/29/25, 12:07 PM
by nubinetwork on 1/29/25, 9:30 AM
- shut their accounts off network-wide
- drop all related network connections
- forcibly reset their password and make them choose a new one in person. They may have changed it earlier, but do it again
- increase logging to catch any potential reoccurrences against the same user or other users
- inspect ACLs and reduce access for all users if possible
- prevent users from connecting from areas outside of their usual network sphere
- let the user back on, and ask them to be more careful in the future
- better mail filtering would be nice, but they'll always find a way to beat the spam filter
- (i hate this option the most, but...) send fake scam emails internally to see if anyone else takes the bait
This is of course ignoring 2fa, but 2fa isn't perfect either with sim swapping... but I personally don't think changing the password is enough for an event like this.
by bluGill on 1/29/25, 3:20 PM
by JayDustheadz on 1/31/25, 7:07 AM
Why not just use Duckduckgo's free e-mail protection? Generate a new forwarding address for a new service/website/account takes a second.
by axus on 1/29/25, 12:46 PM
by sim7c00 on 1/29/25, 11:25 AM
it help alot against these type of scenarios.
also, how fast is fast? you can scan an internal network on a single port in the blink of an eye, so if u don't have good network IDS/IPS internally, u will not really see the scan and it seems like someone 'knows the network in advance' because they scan it in like 2 seconds and based on results automatically run scripts etc. - it doesn't need to be knowledge gained in advance.
- monitor internal network properly, asif its external network. - use ztna+ if you can afford such solution - do regular audits for things like unauthenticated services and use these kind of incident to in a friendly manner educate sysadmins about risks of such services. they will usually understand it, especially after an incident. aslong as you bring it friendly with a good explanation, not some demanding attitude.
- use a lot of mail filtering... more is better. it can be a bit tedious. at my company we have more than 4 solutions to scan all email and attachements etc. , still stuff slip through, but not a lot... - also scan outbound or 'local' email. (BEC fraud etc.)
- do good post-incident reviews and use learnings each time something happens (sounds obvious, but this is often omitted, the learnings are only kept within sec teams, or turnt into one-off remediations rather than process etc. )
edit: oh.. and also monitor for logon anomalies. a lot of solutions support this. e.g. a user logs in from a unique new ip - alert on it, or even block it. , that action depends a bit on what's normal, so here actually ML and such solutions are great.. but basic statistical analysis etc. can also help if u can't pay or create ml solution. (its not too hard to create really, basic models will suffice.)
by aaroninsf on 1/29/25, 6:06 PM