HackedIN: Thinking outside the phishing box
Jamieson O'Reilly
Founder @ Dvuln. Hacker. T?h?i?n?k?i?n?g? Doing outside the box. Redteaming, Pentesting, DevSecOps.
As we spend more time and resources towards technology and training with the goal of protecting our users from social engineering, attackers are forced under pressure to find novel ways to attack them.
This week's issue of HackedIN details how, when hackers are backed into a corner with no options, they're forced to think outside the box.
Expect the expected
Australians lost a record $3.1 billion to scams in 2022. With this increase in scams, so does the awareness of the average user.
We're now at the point where even your grandma might be able to pick the odd scam.
The average user is becoming more and more aware of the typical ploys.
But as they are trained repeatedly to detect these attacks, it leaves them open to more novel ones.
Commercialisation of MFA Phishing tools
MFA has helped raise the bar for attackers in general, but this created a vacuum in which attackers were forced to adapt to the point where MFA phishing tools are now the norm, not the exception.
Tools like Evilginx2 have become commonplace in any decent hacker's toolkit.
The big boys fight back
Like most things in life, it's a constant back-and-forth; after a few years of MFA phishing tools like Evilginx2 being used en mass by almost every attacker on the internet, we saw service providers fight back.
领英推荐
Take, for instance, Okta and their release of Okta FastPass - a zero-trust authentication solution that leans heavily into trusted identities and devices, all while keeping the end-user experience smooth.
Then there's Google, implementing its stealthy analytics to pinpoint, track down, and block MFA phishing infra.
Pressure makes diamonds
Over the years, as AV and EDR got better at detecting traditional malware, we saw attackers move from Windows native C++/executable payloads to living off the land with PowerShell and, in more modern times, reflective in-memory DLLs.
This same logic caused me to switch tactics over the last 6 months.
I've been on multiple engagements recently where the organisations I assessed were utilising the best options available.
Okta, Auth0, MFA, FIDO2, you name it, they had it.
At first glance, it seemed sufficient, but many of these setups ended up being eggs (Hard outer shell with a soft gooey inside).
My Slack is your Slack, and your Slack is mine
Backed up against a wall, here's how I've used Slack on the last 4 engagements to bypass the best of the best when it comes to user security controls.
The Takeaway
The meetmagic platform is the missing link between B2B networking and real-world social impact.
1 年wow.. thanks for this.. incredible to think its that easy to set up slack that way..