Dude where's my code?

Dude where's my code?

HackedIN: Dude where's my code?

Security extends beyond your office walls.

When you involve third parties in your business, your attack surface expands in ways you might not have accounted for.

Let's walk through a real-world example to unpack the risks.

The Case of InstaBook

InstaBook appeared to be doing everything right. They had Cloudflare set up and had seemingly robust cybersecurity measures in place.

They'd outsourced the development to an offshore agency, ACMEgency LLC.

However, they were quick to downplay the risk, arguing that only two offshore developers were involved, making it negligible to their broader business risk profile.

The Search Begins

Despite InstaBook's opinions, I decided to look into the broader picture.

Though I couldn't find any vulnerabilities in their production environment, my attention turned to ACMEgency—the offshore development team.

The Power of Professional Networks

A quick LinkedIn search led me to two offshore developers working both for InstaBook and ACMEgency.

The client's claim was correct; only two were involved. But as I was about to demonstrate, even that could be too many.

If It's Online, It's Prod

After some more digging, I found a subdomain—instabook.acmegency.com.

Unlike the heavily fortified InstaBook site, this subdomain had no Cloudflare Web Application Firewall (WAF).

Even worse, an exposed /.git file was the golden ticket to InstaBook's entire source code.

Many companies are unaware that it's common practice for dev agencies to host demo apps and staging environments on their own infrastructure.

This often-overlooked practice can inadvertently open new pathways for attackers.

The Unraveling

With the source code in-hand, I found a vulnerability that would allow an attacker to extract applications the database credentials.

Just like that, InstaBook's secure environment was compromised, all because of a third-party development team consisting of just two developers.

Key Takeaways

1. Assess Your Third Parties

You must scrutinise not just your own infrastructure but also that of any third parties involved in your operation.

2. Never Assume

The people you partner with might not have the same security standards or protocols that you do. Never assume; always verify.

3. Extend Your Scope

When assessing your security posture, consider not only your immediate environment but all the environments your operation touches.

Final Thoughts

Your security is as strong as your weakest link. The addition of third parties to your operations presents new risks that must be carefully managed to ensure your data's integrity and your operations' continuity.

To discuss further, reach out via email at [email protected] or connect on LinkedIn.

Nathaniel Shere

Delivering hands-on learning in the most secure way | Product Security Engineer at Skillable, where people learn by doing

1 年

Anyone with credentials to your environment or with permissions to add custom code to your programs represents some level of risk.

回复
Chris Mousley

I talk with businesses and Governments about Smarter Planning & Supply Challenges

1 年

When coding (and security) becomes a race to the bottom, so does your brand.

Matthew Zoljan

Senior Technical Engineer who builds tools | Expert in Idea Realization

1 年

Where your code, dude?

回复

要查看或添加评论,请登录

Jamieson O'Reilly的更多文章

  • HackedIN: Ghost in the wires ?? (in Australia, even criminal telcos have crappy APIs)

    HackedIN: Ghost in the wires ?? (in Australia, even criminal telcos have crappy APIs)

    Introduction In September 2024, GhostChat—an encrypted communication platform used by criminal enterprises—was taken…

    6 条评论
  • HackedIN: ?? Ticket-in Cash-out The 3.2 Million Dollar Question?

    HackedIN: ?? Ticket-in Cash-out The 3.2 Million Dollar Question?

    Disclaimer: This document presents a speculative analysis based on publicly available information regarding the…

    3 条评论
  • HackedIN: Double or nothin'

    HackedIN: Double or nothin'

    How I hacked two of Australia's largest Casino's (legally). Disclaimer: Both Casino's have long since patched these…

    9 条评论
  • HackedIN: Hack to the Future

    HackedIN: Hack to the Future

    In today's world, the very same features we rely on for integrity and security can be used against us by attackers…

    2 条评论
  • HackedIN: Poor man's SIM porting

    HackedIN: Poor man's SIM porting

    In today's world, where interconnectivity is not just a convenience but a necessity, the security of telecommunication…

    1 条评论
  • HackedIN: I See Dev People

    HackedIN: I See Dev People

    As someone who gets paid to break into companies legally - I've learned to take a step back and look at the whole…

    6 条评论
  • HackedIN: APT, easy as 1, 2, 3

    HackedIN: APT, easy as 1, 2, 3

    Having run 100s of red-team engagements on everything from federal government agencies to crypto exchanges, I've…

  • HackedIN: Thinking outside the phishing box

    HackedIN: Thinking outside the phishing box

    As we spend more time and resources towards technology and training with the goal of protecting our users from social…

    2 条评论
  • HackedIN: "You Shall Not Pass"—Unless You Exploit This Vulnerability

    HackedIN: "You Shall Not Pass"—Unless You Exploit This Vulnerability

    In an era where Large Language Models (LLMs) like those developed by OpenAI are becoming increasingly integrated into…

    2 条评论
  • Video Killed the Security Star

    Video Killed the Security Star

    Protecting your business online used to be more simple. You had your IPs, domains and devices; there wasn't much more…

社区洞察