HackedIN: I See Dev People

HackedIN: I See Dev People

As someone who gets paid to break into companies legally - I've learned to take a step back and look at the whole picture.

Why?

It's simple.

The bigger the picture, the more options you have to break in.

The Open Sores of Open Source

Online platforms like Stack Overflow have revolutionised the way developers work.

On the one hand, they enable real-time knowledge sharing and problem-solving, while on the other, the ease of access to this information poses new challenges for orgs safeguarding their data.

According to estimates, 70-90% of any modern software stack comprises at least one open-source component.

This makes the odds increasingly favourable for attackers.

As developers turn to online communities like Stack Overflow for assistance, attackers naturally follow suit.

Blurring the security boundaries

Ask any experienced security team or CISO what to lock down, and they'll have a long list of things to share.

Whether it's employee device security, external attack surface, or cloud infra, the lines were, for the most part clearly defined.

However, the rise of online communities where developers share information has complicated these boundaries, making security a more intricate puzzle.

Don't wander too far outside the castle walls

When you think about it, it makes sense for attackers to leverage communities like Stack Overflow.

As the castle walls of companies grow thicker, attackers are forced to change tactics.

In turn, the goalposts shift from breaking through the castle walls to waiting for the occupants to venture out and attack them.

With Stack Overflow boasting more than 20 million registered users, it's received over 24 million questions and 35 million answers.

That's a lot of data.

Given the volume, there's bound to be information that shouldn't be there.

Smart attackers know this.

Examples

One doesn't have to venture far to find exposure after exposure.

Here are but a few.

Don't worry - It's just "a test account"

Developers posting working credentials asking for help with their Python scripts

Gigaflaw

Developers posting database credentials while asking for help to debug why their code won't work

OK-TAke-my-access

Developer using public inbox for Okta development testing


The Takeaway

In essence, companies can secure all of their internal and external assets as much as they want, but in today's landscape, the very definition of "external assets" can change quicker than you think.

Now, more than ever, organisations must focus on educating their employees to be vigilant.

This involves recognising the risks associated with sharing information in online communities and treating every external party as a potential threat.



Tobie Jansen van Rensburg

Penetration Tester | Ethical Hacker

1 年

This is so true, just take a look what happend to 3CX a couple of months back (Don't wander too far outside the castle walls). Thanks for the great read Jamieson

要查看或添加评论,请登录

Jamieson O'Reilly的更多文章

  • HackedIN: Ghost in the wires ?? (in Australia, even criminal telcos have crappy APIs)

    HackedIN: Ghost in the wires ?? (in Australia, even criminal telcos have crappy APIs)

    Introduction In September 2024, GhostChat—an encrypted communication platform used by criminal enterprises—was taken…

    6 条评论
  • HackedIN: ?? Ticket-in Cash-out The 3.2 Million Dollar Question?

    HackedIN: ?? Ticket-in Cash-out The 3.2 Million Dollar Question?

    Disclaimer: This document presents a speculative analysis based on publicly available information regarding the…

    3 条评论
  • HackedIN: Double or nothin'

    HackedIN: Double or nothin'

    How I hacked two of Australia's largest Casino's (legally). Disclaimer: Both Casino's have long since patched these…

    9 条评论
  • HackedIN: Hack to the Future

    HackedIN: Hack to the Future

    In today's world, the very same features we rely on for integrity and security can be used against us by attackers…

    2 条评论
  • HackedIN: Poor man's SIM porting

    HackedIN: Poor man's SIM porting

    In today's world, where interconnectivity is not just a convenience but a necessity, the security of telecommunication…

    1 条评论
  • HackedIN: APT, easy as 1, 2, 3

    HackedIN: APT, easy as 1, 2, 3

    Having run 100s of red-team engagements on everything from federal government agencies to crypto exchanges, I've…

  • HackedIN: Thinking outside the phishing box

    HackedIN: Thinking outside the phishing box

    As we spend more time and resources towards technology and training with the goal of protecting our users from social…

    2 条评论
  • HackedIN: "You Shall Not Pass"—Unless You Exploit This Vulnerability

    HackedIN: "You Shall Not Pass"—Unless You Exploit This Vulnerability

    In an era where Large Language Models (LLMs) like those developed by OpenAI are becoming increasingly integrated into…

    2 条评论
  • Dude where's my code?

    Dude where's my code?

    HackedIN: Dude where's my code? Security extends beyond your office walls. When you involve third parties in your…

    3 条评论
  • Video Killed the Security Star

    Video Killed the Security Star

    Protecting your business online used to be more simple. You had your IPs, domains and devices; there wasn't much more…

社区洞察

其他会员也浏览了