Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Deep Dish Fuckfest
Sep 6, 2006

Advanced
Computer Touching


Toilet Rascal
ain't nothing more juche than "be your own bank"

Adbot
ADBOT LOVES YOU

Carthag Tuek
Oct 15, 2005

Tider skal komme,
tider skal henrulle,
slægt skal følge slægters gang



leper khan posted:

turns out doing this stuff successfully makes you feel pretty cool

ya I've cracked some trial stuff for my own use & injected new functionality and stuff

it's pretty badass in a hecka nerdy way

Carthag Tuek
Oct 15, 2005

Tider skal komme,
tider skal henrulle,
slægt skal følge slægters gang



also didn't read the article, but most ransomware generates an address per infection

exchanges normally wouldn't know if it was ransomware related, but with a hardcoded address it's super obvious and easy to block exchange into real money

also wtf counterfeit money better than real money sounds like an urban legend. better how???

darthbob88
Oct 13, 2011

YOSPOS

Powaqoatse posted:

also wtf counterfeit money better than real money sounds like an urban legend. better how???

From an NPR interview
, apparently they do finer engraving than the Bureau of Engraving and Printing. Thankfully we have other anti-counterfeiting tricks than just the fineness of the engraving.

Carthag Tuek
Oct 15, 2005

Tider skal komme,
tider skal henrulle,
slægt skal følge slægters gang



ah ok so it's worse than the real money by being engraved wrong

Munkeymon
Aug 14, 2003

Motherfucker's got an
armor-piercing crowbar! Rigoddamndicu𝜆ous.



today I got PII emailed to me from a random Austin woman (insurance info) and the Army Corps of Engineers (dam permit I guess?)

fishmech
Jul 16, 2006

by VideoGames
Salad Prong

Powaqoatse posted:



also wtf counterfeit money better than real money sounds like an urban legend. better how???

aside from the other thing that was said, the bills would also just look too new, despite often being of the previous series (which would always be easier to counterfeit yet still in high circulation especially outside the US) and thus a bit suspicious to be so new still.

Shifty Pony
Dec 28, 2004

Up ta somethin'


Powaqoatse posted:

also didn't read the article, but most ransomware generates an address per infection

exchanges normally wouldn't know if it was ransomware related, but with a hardcoded address it's super obvious and easy to block exchange into real money

I think that wannacry had a per-victim address generator but it was broken for some reason and defaulted to one of three hard coded addresses.

Shaggar
Apr 26, 2006

Munkeymon posted:

today I got PII emailed to me from a random Austin woman (insurance info) and the Army Corps of Engineers (dam permit I guess?)

I occasionally get PHI faxed to me.

Deep Dish Fuckfest
Sep 6, 2006

Advanced
Computer Touching


Toilet Rascal

Munkeymon posted:

and the Army Corps of Engineers (dam permit I guess?)

wait, so is this the answer to a permit request, or the actual request? if it's the latter then approve that dam and see how far it gets. keep us updated

vOv
Feb 8, 2014

Shifty Pony posted:

I think that wannacry had a per-victim address generator but it was broken for some reason and defaulted to one of three hard coded addresses.

yeah i could've sworn i heard that there was a race condition involved

Wiggly Wayne DDS
Sep 11, 2010



vOv posted:

yeah i could've sworn i heard that there was a race condition involved
there was, it had the functionality to do per-device addresses

the entire development of this (gleamed via older versions) was what made it so unusual

El Mero Mero
Oct 13, 2001

Shaggar posted:

I occasionally get PHI faxed to me.

When gmail was in beta I got a bunch of very generic gmail addresses. One of them consistently gets accidental email, and for a while there was an Iranian travel agency automatically cc'ing me on every visa application submitted with full copy scans of people's passports and resumes. Most of the resumes were engineers


im probably on a list

goddamnedtwisto
Dec 31, 2004

If you ask me about the mole people in the London Underground, I WILL be forced to kill you
Fun Shoe

fishmech posted:

aside from the other thing that was said, the bills would also just look too new, despite often being of the previous series (which would always be easier to counterfeit yet still in high circulation especially outside the US) and thus a bit suspicious to be so new still.

i've just remembered a weird detail from some documentary i watched years ago about how one bunch of counterfeiters would use washing machines and pumice stone to make their notes look used to get around this problem, and the secret service were eventually able to track them because the same machines and stones were used to stonewash counterfeit jeans that were being sold in new york. the 80s-est crime there's ever been.

aiui the "too good" problem with the superdollars wasn't that the forgers could print to a better quality than the official notes, just that because the presses were used far, far less the plates didn't get the same level of wear and tear so they looked notably better to an expert than other notes supposedly printed at the same time. there were similar problems with forged pound coins (a massive problem in the uk, as many as 1 in 20 according to some estimates), because when new they were an awful lot shinier than new original ones because they were electroplated lead.

Chris Knight
Jun 5, 2002

me @ ur posts


Fun Shoe
facebook to burned mods: oops

also lomarf at fb obsessed with using their personal accounts for the job

https://twitter.com/josephfcox/status/875626936612999168

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Has anyone done a proper security review of the Symantec Proximity logon feature for OSX? Because that poo poo is clearly saving the password somewhere and doing a keyboard injection to type it in to the standard logon field and I do not trust Symantec to be doing any of this without royally loving it up.

Munkeymon
Aug 14, 2003

Motherfucker's got an
armor-piercing crowbar! Rigoddamndicu𝜆ous.



Deep Dish Fuckfest posted:

wait, so is this the answer to a permit request, or the actual request? if it's the latter then approve that dam and see how far it gets. keep us updated

the former. the original application was included and the dude gave them my email so it was his fault not the Corps

Wiggly Wayne DDS
Sep 11, 2010



bit of a post-mortem from microsoft offensive security research on kernel mitigations vs eternalromance https://blogs.technet.microsoft.com...based-security/

Agile Vector
May 21, 2007

scrum bored



Munkeymon posted:

today I got PII emailed to me from a random Austin woman (insurance info) and the Army Corps of Engineers (dam permit I guess?)

lmk when they send the gently caress and poo poo permits

goddamnedtwisto
Dec 31, 2004

If you ask me about the mole people in the London Underground, I WILL be forced to kill you
Fun Shoe

Agile Vector posted:

lmk when they send the gently caress and poo poo permits

what a country, you need a piece of paper just to take a poo poo

RFC2324
Jun 7, 2012

http 418

goddamnedtwisto posted:

what a country, you need a piece of paper just to take a poo poo

What else are you gonna wipe with?

goddamnedtwisto
Dec 31, 2004

If you ask me about the mole people in the London Underground, I WILL be forced to kill you
Fun Shoe

RFC2324 posted:

What else are you gonna wipe with?

:thejoke:

Pile Of Garbage
May 28, 2007



can i talk about offshore vessel (oil/LNG drilling/pipelay/construction(surface/subsea)) info/op security? over the last 4 years i've been on a wide variety of offshore vessels with different functions operated by different corps and of differing ages yet they all had the same massive opsec/infosec issues:

  • no one locks their computers. ever. vessel operators or resident EPCs. i've never seen a computer lock itself from Group Policy enforced idle limits (other than our own)
  • no doors, cabinets, cupboards or lockers are ever locked, with the exception of the lock-out/tag-out master lock safe. everything else is accessible by anyone
  • of all the vessels i've been on only one has advised to having CCTV cameras however the chief sec officer admitted that the quality of the footage from these cameras was too poor to make out ppls faces.
  • you can use anyone's computer and no one says poo poo. say i'm the client and i walk up to one of the vessel operator's computers, which is on a different net, and try to use it. no one will say poo poo and i've had ppl politely wait until i was finished doing w/e i felt like
  • you can go wherever you want. offices, ops bridge, nav bridge/room, equipment/comms rooms. many of them have signs on them saying "no unauthorised entry" but all of those are accessible and no one will ask you any questions if you are there. the only places you cant really go are ones which involve a significant HSE component (mechanical/engine rooms and voids/confined space).
  • you can touch whatever you want. i've personally brought down primary VSAT comms for a vessel because i was allowed unattended into a core comms area and their poo poo was not properly labelled and i was not escorted by someone who was properly apprised as to the intricacies of the bs rats nest of cabling. sure i gone hosed up but despite my trying there was no one to escort me into this area or advise me that the cable i was janking was for the VSAT.
  • this is kinda a general housekeeping gripe but semi opsec related: patch panels are always unequivocally absolute loving messes. every single vessel i've been on has had absolute garbage patch areas with insufficient cable mgmt and poor prior cabling by the operators/fitters.
  • vessel operators rarely ever have an "IT" guy deployed on-board. usually they'll have a chief electrician with one or more underlings who are only versed in general Layer 1 Ethernet plus maybe single/multi-mode fibre plus more than likely only coax. normally the operators rely on someone onshore (usually several continents away) with Layer 2+3 and server experience to render support and apprise them as to the operability of IM&T systems onboard.
  • no one asks why you are in a space. you can be in server rooms/elec equip rooms with expensive gear that doesn't belong to you and no one will ever ask why you are in that space if they see you. i've been in situations where i'm enthusiastically unplugging poo poo and there are employees of the vessel operator in the same room and they do not care.
  • this is more HSE but as an expansion on the above, no one cares whether you have a permit-to-work or engages stop-work authority if you're doing "IT" stuff. this is an endemic problem across the whole industry where indoors IM&T activities are not usually considered to fall under ISSOW but fuckin hell they should because it's dangerous and gently caress you
  • PII is left everywhere. critical and important information is also left lying all over the loving place
  • Win XP is alive and well in vessel bridge systems, particularly Kongsberg DP systems (But prolly more, Kongsberg is a quite yet diverse and very important corp for offshore vessel poo poo)
  • the vessel operator networks rarely ever implement any Layer 2 security. at a minimum they'll do MAB with ACS. but usually it's no 802.1x, no BPDU guard and no DHCP snooping. i have seen serious issues arise from people bringing consumer network devices on-board and connecting them to the operator network

rant over but to clarify, every single one of those observations I have made on vessels both moored at shipyards for fit-out AND on vessels doing active operations in-field (operations like drilling for gas or installing well-heads/pipe). of course the sec posture is much worse when moored at a shipyard for fit-out but i have still observed every single one of those issues whilst offshore in-field. i have also observed all of these activities in MARSEC Level 1+2 conditions.

tl;dr: it's a complete and utter poo poo-show on offshore vessels and ripe for deliberate or inadvertent compromise of critical systems that may involve loss of life. we're talking a cyber piper alfa (my granddad worked offshore north sea for Schlumberger and after piper alfa he quit the industry):

https://www.youtube.com/watch?v=BdRcALtA8CE

edit: i forgot one thing specific to Mobile Offshore Drilling Units (MODUs):
  • MODU operators will often engage third-parties to provide MWD (Measurement While Drilling) services. this usually involves deployment of terminals which display drilling data in offices around the vessel (e.g. OIM offie, CSR office, tool pusher office, geo office, senior drilling supervisor (SDSV), etc.). the third-parties who deploy the MWD systems and the terminals often insist on establishing their own network which more often than not consists of a garbage netgear/tplink/belkin layer 2 unmanaged switch which the MWD feed (From either wireline unit or the drill) is connected along with the MWD terminals which display the data. there is zero security on this network and if someone got on it and injected lovely MWD data they could convince the SDSV to make an extremely dangerous decision. btw from what i've observed these MWD systems have no "secondary feeds" for providing a reference source.

Pile Of Garbage fucked around with this message at 16:41 on Jun 17, 2017

syscall girl
Nov 7, 2009

by FactsAreUseless
Fun Shoe
colonial fleet is hosed up

Notorious b.s.d.
Jan 25, 2003

by Reene

cheese-cube posted:

can i talk about offshore vessel (oil/LNG drilling/pipelay/construction(surface/subsea)) info/op security? over the last 4 years i've been on a wide variety of offshore vessels with different functions operated by different corps and of differing ages yet they all had the same massive opsec/infosec issues:

security costs money

how much money is the absence of security costing them?

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

RFC2324 posted:

What else are you gonna wipe with?
haha this guy doesn't know about the three seashells

Pile Of Garbage
May 28, 2007



Notorious b.s.d. posted:

security costs money

how much money is the absence of security costing them?

depends i guess. i can think of two scenarios: active sabotage to cause equipment damage/loss of life and subtle interference to reduce efficiency of operations. messing with MWD data to make the senior drilling sup make wrong decisions would be trivial. in fact you could even go as far as to trick the sdsv into causing a blow-out...

but yeah i see where you're going, sec is a cost centre, etc.

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

cheese-cube posted:

depends i guess. i can think of two scenarios: active sabotage to cause equipment damage/loss of life and subtle interference to reduce efficiency of operations. messing with MWD data to make the senior drilling sup make wrong decisions would be trivial. in fact you could even go as far as to trick the sdsv into causing a blow-out...

but yeah i see where you're going, sec is a cost centre, etc.

on a commercial vessel like that there's probably a tendency towards greater availability vs. more stringent auth*; if someone can't be trusted to not mess with something they shouldn't, they probably shouldn't be on board, while access controls can be seen as a dangerous hindrance in an emergency

Midjack
Dec 24, 2007



cheese-cube posted:

depends i guess. i can think of two scenarios: active sabotage to cause equipment damage/loss of life and subtle interference to reduce efficiency of operations. messing with MWD data to make the senior drilling sup make wrong decisions would be trivial. in fact you could even go as far as to trick the sdsv into causing a blow-out...

but yeah i see where you're going, sec is a cost centre, etc.

nobody will give a gently caress until one of the ships is attacked and it can't be explained away as a mistake.

some of the culture of easy access comes from the maritime emergency managent tradition of ensuring that anyone on the ship can do anything in case everyone else is firefighting or otherwise unavailable, but that doesn't excuse everything you describe above.

Deep Dish Fuckfest
Sep 6, 2006

Advanced
Computer Touching


Toilet Rascal

cheese-cube posted:

  • vessel operators rarely ever have an "IT" guy deployed on-board. usually they'll have a chief electrician with one or more underlings who are only versed in general Layer 1 Ethernet plus maybe single/multi-mode fibre plus more than likely only coax

yeah that sounds like dad alright

i'm guessing a lot of this is probably also due to a lot of people in the industry (especially the senior guys) having been there since before all that computer stuff was commonplace

Hunter2 Thompson
Feb 3, 2005

Ramrod XTreme
so you're saying Hackers is real?

Pile Of Garbage
May 28, 2007



Midjack posted:

nobody will give a gently caress until one of the ships is attacked and it can't be explained away as a mistake.

some of the culture of easy access comes from the maritime emergency managent tradition of ensuring that anyone on the ship can do anything in case everyone else is firefighting or otherwise unavailable, but that doesn't excuse everything you describe above.

that's not really true because not everyone is trained to do everything. sure maybe 10-20 employees of the vessel operator are trained in everything but i guarantee that the 250-500 other ppl on the vessel aren't trained or qualified to operate anything there.

Cocoa Crispies posted:

on a commercial vessel like that there's probably a tendency towards greater availability vs. more stringent auth*; if someone can't be trusted to not mess with something they shouldn't, they probably shouldn't be on board, while access controls can be seen as a dangerous hindrance in an emergency

the areas which i've accessed, on several vessels both in dock and off-shore, had critical areas demarcated with MARSEC signs as well as no unauthorised entry signs. these are never enforced and if you walk onto the bridge no one gives a gently caress. if you walk onto the bridge and then into the adjacent comms room where there's no CCTV there are still no fucks given.

idk this might just be one of those situations where i'm blowing a remote risk out of proportion but there's >200 pax on these vessels at a time so if things go to poo poo then :(

Pile Of Garbage fucked around with this message at 19:08 on Jun 17, 2017

Midjack
Dec 24, 2007



cheese-cube posted:

that's not really true because not everyone is trained to do everything. sure maybe 10-20 employees of the vessel operator are trained in everything but i guarantee that the 250-500 other ppl on the vessel aren't trained or qualified to operate anything there.

like i said, tradition

Pile Of Garbage
May 28, 2007



Midjack posted:

like i said, tradition

not sure what you mean. despite the massive op/infosec failings the vessel operators still enforce a tight hse standard. i dont see how tradition factors in. sure these vessels are old but their hse operating standards are very new.

Shifty Pony
Dec 28, 2004

Up ta somethin'


Notorious b.s.d. posted:

security costs money

how much money is the absence of security costing them?

more importantly security costs money up front.

before he quit the job a friend could tell the most absurd stores about drilling companies losing stupid amounts of money because they didn't want to spend a relative pittance to properly maintain their equipment, implement common sense interlocks, or even to bother training their employees beyond "the oil is under the surface". you would think that they would learn after the 20th time one of their rigs was down for a day due to the operator blowing the hydraulic system by engaging the pump with the engine on the wrong idle setting but nope!

Pile Of Garbage
May 28, 2007



hah yeah that poo poo still happens. a MODU i'm managing/monitoring hosed it's first two wells which i'm fairly sure was due to lovely practices (in fact they swapped out the OIM after the second failure lol)

Shifty Pony
Dec 28, 2004

Up ta somethin'


cheese-cube posted:

hah yeah that poo poo still happens. a MODU i'm managing/monitoring hosed it's first two wells which i'm fairly sure was due to lovely practices (in fact they swapped out the OIM after the second failure lol)

I think a lot of it is that due to the remoteness of the operations and urgency to get things going again there is basically no attempt to properly document why something went wrong. for the little documentation they do lying is very unlikely to be questioned, reduces the odds you get fired, and produces less paperwork so that's what they do.

Chris Knight
Jun 5, 2002

me @ ur posts


Fun Shoe
https://twitter.com/pinboard/status/876193906521554944


quote:


I need a bit of hands-on time with someone who knows how to troubleshoot WordPress installations.

I recently had to upgrade my WordPress installation due to an exploit that inserted a malicious URL in one of my widgets. Since then, my spam filter has not been operating correctly. I am not sure whether Akismet is working very slowly or not working at all, but the net result is that I am having to approve every post by hand.

There is a suspicious thing visible from my admin account. It looks as though Akismet is installed twice.

I suspect the fix for this is something simple, but I don’t know what it is. Can anybody help?

Lutha Mahtin
Oct 10, 2010

Your brokebrain sin is absolved...go and shitpost no more!

a couple weeks ago i got an email from level3. wait, it's from that level3? yep, because some guy is convinced that his ex girlfriend is a hacker who causes him computer problems, and he entered my email address in some level3 support form. the message he sent was copied in the email and i was quite disappointed because he didn't even sound like he was any kind of entertaining conspiracy theorist or anything like that, more that he was just a semi-literate dipshit who managed to find a web form on some level3 site :mad:

Adbot
ADBOT LOVES YOU

goddamnedtwisto
Dec 31, 2004

If you ask me about the mole people in the London Underground, I WILL be forced to kill you
Fun Shoe

Lutha Mahtin posted:

a couple weeks ago i got an email from level3. wait, it's from that level3? yep, because some guy is convinced that his ex girlfriend is a hacker who causes him computer problems, and he entered my email address in some level3 support form. the message he sent was copied in the email and i was quite disappointed because he didn't even sound like he was any kind of entertaining conspiracy theorist or anything like that, more that he was just a semi-literate dipshit who managed to find a web form on some level3 site :mad:

was his problem "i think my girlfriend is deleting all my emails because people keep telling me they've sent me something and i've never received it"?

  • Locked thread