Cybercrustacean's Avatar

Cybercrustacean

@cybercrustacean.bsky.social

USAF Retired, Cybersecurity/Technologist--retired. On sabbatical for now.

270 Followers  |  1,438 Following  |  6 Posts  |  Joined: 07.11.2024  |  1.8835

Latest posts by cybercrustacean.bsky.social on Bluesky

Preview
Pro-Ukrainian hackers take credit for attack that snarls Russian flight travel State-owned Aeroflot cancels dozens of flights, stranding travelers throughout Russia.

The two groups that took credit for the cyberattack say it was the result of a yearlong operation that penetrated Aeroflot's network, destroyed 7,000 servers, and gained control over the personal computers of the company's employees.

28.07.2025 20:31 β€” πŸ‘ 125    πŸ” 27    πŸ’¬ 3    πŸ“Œ 2
Preview
Seasoning email threats with hidden text salting Hidden text salting is a simple yet effective technique for bypassing email parsers, confusing spam filters, and evading detection engines that rely on keywords. Cisco Talos has observed an increase i...

Salting phish

blog.talosintelligence.com/seasoning-em...

24.01.2025 21:52 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Organizers for U.S. Pond Hockey Championships say ice conditions ideal after event cut short last year After unusually warm winter weather cut the event short last year, organizers for the U.S. Pond Hockey Championships say ice conditions are some of the best they've seen in years.

The U.S. Pond Hockey Championships on Lake Nokomis started today! With 2,700 players from around the world participating, it should be an incredible week of epic outdoor hockey.
www.cbsnews.com/minnesota/ne...

23.01.2025 00:39 β€” πŸ‘ 292    πŸ” 27    πŸ’¬ 16    πŸ“Œ 3
Preview
Russian ransomware hackers increasingly posing as tech support on Microsoft Teams Researchers at Sophos say they have seen more than 15 incidents in which two separate groups used Microsoft Office 365’s default service settings to socially engineer their way onto a victim’s system.

As recently as last year, social engineering for initial access was primarily confined to western based ransomware groups (LAPSUS & Scattered Spider). That is no longer the case.

via @alexmartin.bsky.social & @therecordmedia.bsky.social

21.01.2025 13:25 β€” πŸ‘ 8    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

-23 Fahrenheit on the lakes today. Sun dogs and ice fisherman on Detroit Lakes, MN.

20.01.2025 16:41 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

😏

18.01.2025 12:40 β€” πŸ‘ 304    πŸ” 36    πŸ’¬ 15    πŸ“Œ 5
Preview
Hackers leak configs and VPN credentials for 15,000 FortiGate devices A new hacking group has leaked the configuration files, IP addresses, and VPN credentials for over 15,000 FortiGate devices for free on the dark web, exposing a great deal of sensitive technical information to other cybercriminals.

A new hacking group has leaked the configuration files, IP addresses, and VPN credentials for over 15,000 FortiGate devices for free on the dark web, exposing a great deal of sensitive technical information to other cybercriminals.

15.01.2025 21:57 β€” πŸ‘ 21    πŸ” 11    πŸ’¬ 0    πŸ“Œ 0
Preview
The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year Privacy isn’t dead. While some information about you is almost certainly out there, that’s no reason for despair. In fact, it’s a good reason to take action.

Some data breaches include novel information about us, are the result of particularly noteworthy security flaws, or are just so massive they’re impossible to ignore. Here’s EFF’s list of some of the most egregious data breaches of 2024.

12.01.2025 17:04 β€” πŸ‘ 764    πŸ” 190    πŸ’¬ 19    πŸ“Œ 13
Preview
Enumerate Service Account Permissions - Hacking The Cloud Brute force the permissions of a service account to see what you have access to.

Want to see what permissions a GCP service account has? This guide walks through using the `testIamPermissions` method to enumerate access. All you need is a service account key or token. Check out the Python script that simplifies the process.

09.01.2025 15:00 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

I've been reading up on NAT traversal and how STUN and similar protocols work.

Very useful if you are interested in C2 or data exfiltration.

tailscale.com/blog/how-nat...

community.cisco.com/t5/collabora...

09.01.2025 10:51 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Truth

02.01.2025 21:56 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
AI-generated phishing emails are getting very good at targeting executives Hyper-personalized emails use β€œan immense amount” of scraped data.
02.01.2025 14:26 β€” πŸ‘ 63    πŸ” 18    πŸ’¬ 2    πŸ“Œ 4
Post image

β€œA Complete Unknown” is now out and I really liked it. A must-see for anyone who (a) loves Bob Dylan’s music and his story, (b) is from MN (as Dylan grew up in Hibbing), and (c) wants to see some fantastic performances by TimothΓ©e Chalamet actor and cast…

27.12.2024 20:34 β€” πŸ‘ 240    πŸ” 22    πŸ’¬ 12    πŸ“Œ 3
Preview
Former NSA cyberspy's not-so-secret hobby – Xmas light hacks Rob Joyce explains how it's done

A story about my Christmas obsession!

www.theregister.com/2024/12/25/j...

25.12.2024 21:26 β€” πŸ‘ 75    πŸ” 17    πŸ’¬ 2    πŸ“Œ 3
Preview
Ghostty Ghostty is a fast, feature-rich, and cross-platform terminal emulator that uses platform-native UI and GPU acceleration.

Merry Christmas and Happy Hanukkah, the first public release of #ghostty is here! ghostty.org

26.12.2024 20:27 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
TWISTED: The dramatic history of twisted-pair Ethernet
YouTube video by The Serial Port TWISTED: The dramatic history of twisted-pair Ethernet

This channel is so great. Watch for a history of #ethernet #networking and why most of us are using twisted-pair cables with RJ-45 connectors.

26.12.2024 19:52 β€” πŸ‘ 6    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Pain, hope, history share the ride as Dakota Exiles commemorate Mankato hangings A nearly 300-mile journey ends in Mankato this week to mark the 161st anniversary of one of the grimmest chapters in Dakota history, the hanging of 38 men after the U.S.- Dakota War. Riders hope their...

162 years ago, 38 Dakota men were hung in the largest mass execution in our nation’s history.

The sacrifice of these riders reminds us to recommit to accountability and healing for the Dakota people.

www.mprnews.org/story/2024/1...

26.12.2024 16:07 β€” πŸ‘ 12336    πŸ” 3149    πŸ’¬ 287    πŸ“Œ 124
Preview
Astrill VPN and Remote Worker Fraud - Spur In our ongoing efforts to help organizations protect against fraud and abuse, we're excited to announce the free release of a comprehensive list of IP

Security firm Spur has released a list of 2,400 IP addresses linked to Astrill, a VPN service often used by North Korean IT workers to hide their location

spur.us/astrill-vpn-...

26.12.2024 16:09 β€” πŸ‘ 47    πŸ” 17    πŸ’¬ 0    πŸ“Œ 1
Preview
Top 200 Most Common Passwords NordPass presents the 6th annual list of the 200 most common passwords. Discover the most common passwords used worldwide in both personal and corporate settings.

This may be useful as a starting point for a word list, but remember that the methodology does not and can not remove intentionally vulnerable targets. The best use of this list is likely as a starting point for your own honeypot


nordpass.com/most-co...

26.12.2024 15:00 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Preview
FBI attributes largest crypto hack of 2024 to North Korea’s TraderTraitor The biggest crypto heist of 2024 was conducted by seasoned cybercriminals working on behalf of North Korea’s government, according to the FBI.

I’m shocked, shocked I tell you, that North Korea is behind the largest cryptocurrency theft of 2024.

via @therecordmedia.bsky.social & @jgreig.bsky.social

26.12.2024 14:26 β€” πŸ‘ 21    πŸ” 7    πŸ’¬ 2    πŸ“Œ 1

The US state of Ohio has warned state employees that they might be held personally liable if they fall to online email scams

athensindependent.com/auditor-issu...

26.12.2024 12:36 β€” πŸ‘ 8    πŸ” 2    πŸ’¬ 3    πŸ“Œ 2
Preview
Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing U.K. investigators tell the story of how examining a cybercrime group's extortion funds helped to unravel a money-laundering network reaching from the illegal drug trade to Moscow's elite.

Based on interviews with NCA investigators, this is the story of how pulling at the thread of a ransomware group’s extortion funds ended up unravelling a Russian money-laundering network used by drug traffickers, cybercriminals, elites evading sanctions and even the Kremlin’s espionage operations.

23.12.2024 08:31 β€” πŸ‘ 17    πŸ” 12    πŸ’¬ 1    πŸ“Œ 0
Preview
People keep falling for fake 'drones over Jersey' videos It's never been easier to make AI-generated spoofs.

www.popsci.com/technology/f...

Misinformation alert 🚨

23.12.2024 23:22 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
NIST Quantum Standards: Security Experts Talk Hurdles As NIST's post-quantum standards roll out, tech firms are scrambling to future-proof their encryption, yet issues, both internally and externally persist

NIST Quantum Standards: Security Experts Talk Hurdles (I'm in article)

cybermagazine.com/articles/rac...

20.12.2024 13:06 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Malware Series: Process Injection Mapped Sections

For the next installment in his malware blog series, Principal Security Consultant Scott Nusbaum walks us through using shared memory sections to inject and execute code in a remote process. Read it now! trustedsec.com/blog/malware...

20.12.2024 18:12 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Relevant Skills for the Cybersecurity Job You Want Get the skills your future employer needsβ€Šβ€”β€Šfor free or nearly free

Relevant Skills for the Cybersecurity Job You Want ~~ Get the skills your future employer needs β€” for free or nearly free

medium.com/cloud-securi...

20.12.2024 14:36 β€” πŸ‘ 8    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
Rise of Crypto-Hackers: How North Koreans Steal $2.2 Billion Explore the alarming rise of North Korean hackers in the cryptocurrency realm, who have stolen an estimated $2.2 billion through sophisticated cyber attacks.

North Korean hackers escalate their crypto heists, netting an estimated $2.2B through advanced cyber attacks. Discover how they’re reshaping the digital threat landscape. Cybersecurity #Crypto #Hackers

Read more at -> innovirtuoso.com/cybersecurit...

20.12.2024 11:56 β€” πŸ‘ 6    πŸ” 2    πŸ’¬ 0    πŸ“Œ 2
Preview
Chainalysis: $2.2 billion stolen from crypto platforms in 2024 cyberattacks Researchers at Chainalysis tallied up the known thefts from cryptocurrency platforms in 2024, pegging the total at $2.2 billion, the fifth year in a row that the number topped $1 billion.

This is almost double the expected payments to ransomware groups this year. The amount of theft from cryptocurrency platforms is huge and much of it goes to fund North Korea weapons programs.

via @therecordmedia.bsky.social & @jgreig.bsky.social

19.12.2024 15:30 β€” πŸ‘ 27    πŸ” 12    πŸ’¬ 2    πŸ“Œ 3

This is your reminder that Exchange on-prem has effectively been put out to pasture by Microsoft and if you're continuing to use it, you're accepting a huge amount of risk.

You don't have to like it, but if you care about security, M365 is the way.

19.12.2024 13:59 β€” πŸ‘ 33    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0
Preview
Another major US hospital hacked, data on 1.4 million patients leaked A new ransomware player is already wreaking havoc

www.techradar.com/pro/security...

18.12.2024 23:00 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

@cybercrustacean is following 19 prominent accounts