Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
cage-free egghead
Mar 8, 2004

Martytoof posted:

How many times have you been to Applebee's anyway? Do you even need a menu at this point? :colbert:

I haven't been to in two years, but even then they had already had tablets with menus, games, etc on them for well over a few years now.

Edit: lovely restaurant page snipe

Adbot
ADBOT LOVES YOU

Bonzo
Mar 11, 2004

Just like Mama used to make it!

CommieGIR posted:

Wired with an article on how badly done their API security was:
https://www.wired.com/story/parler-hack-data-public-posts-images-video/

TL;DR: This isn't the first time a Conservative reactionary social network has gotten easily owned, they tend to be fly by night shops and develop with no eye on security whatsoever, in this case some very basic API best practices would've saved them the heartache.

quote:

...doesn't use any sort of "rate limiting" that would cut off anyone accessing too many posts too quickly.

This sounds like it was secure as an porn site in 1996. Jesus.

RFC2324
Jun 7, 2012

http 418

Bonzo posted:

This sounds like it was secure as an porn site in 1996. Jesus.

I remember being about to look at the URL of an image, and then wget it with a couple ?? in place of the numbers to get the whole series that was behind a paywall

CLAM DOWN
Feb 13, 2007




22 Eargesplitten posted:

Yeah, I was thinking a situation like a QR code menu posted on a window like some restaurants have their menus in the window, someone finds the site it goes to then slaps a new one up there that goes to a site that puts malware on the phone and then once it is done redirects to the proper site so nobody knows anything even happened.

There are cards/stickers on each table inside. It's not a window on the street. You're railing against an issue that has yet to exist, in the context of virtual menus at a restaurant.

DrDork
Dec 29, 2003
commanding officer of the Army of Dorkness

CLAM DOWN posted:

There are cards/stickers on each table inside. It's not a window on the street. You're railing against an issue that has yet to exist, in the context of virtual menus at a restaurant.

For now. I can absolutely see a not-to-distant future where shops do slap a QR code up the same way they used to do with printed menus for people walking by and trying to decide if they want to pop in or not.

I still don't think it's a major issue if you don't allow side-loading apps, especially since I'd imagine the majority of them would put the stickers under / behind the glass along with the printed menu, making it a bit more obvious if someone slapped a replacement over top--the effort:reward still sucks. Not quite as bad as actually dropping infected USB sticks in the parking lot and hoping, but you're not hitting the thousands a day you'd need to actually get real use out of it unless you were intentionally targeting a specific restaurant because it's frequented by high value targets. So I guess maybe I'd be more careful about the burger joint right next to a SCIF or something.

22 Eargesplitten
Oct 10, 2010



CLAM DOWN posted:

There are cards/stickers on each table inside. It's not a window on the street. You're railing against an issue that has yet to exist, in the context of virtual menus at a restaurant.

I'm not railing against anything, I'm asking if it's as bad of an idea as it seems because all I know about QR codes is you aren't supposed to scan random ones. Also I've literally never seen it so I don't know if anyone puts it on windows as well. I haven't been to a restaurant since August or so, and before that it was March.

22 Eargesplitten fucked around with this message at 01:37 on Jan 14, 2021

The Fool
Oct 16, 2003


The Fool posted:

It’s not any riskier than typing in a url, soooo

:shrug:

also

The restaurants in the downtown area here started putting QR code’s in their windows like a year ago or something

Lots of tourist foot traffic and the ones I’ve seen usually link to an online order form for pickup

DrDork
Dec 29, 2003
commanding officer of the Army of Dorkness
If you have side-loading turned on and you like mashing "Ok!" on any button that pops up, yeah, it's a Bad Idea to scan stuff that you don't implicitly trust.

Otherwise the effort put into making a functional hack that doesn't rely on side-loading is very disproportionate to your likely success and payoff. I mean maybe as an extension of an existing bad-app campaign (where the app already is in the Google/Apple app stores), but even then those campaigns are hoping to infect hundreds of thousands, not hundreds, and are usually run by groups outside the US. For them to hire someone to go to the effort of finding local shops, putting together custom redirectors to bounce you eventually to the correct page, and then actually going out and slapping them up just seems like a ton of extra expense and work for minimal payoff.

Could work as a targeted watering-hole style attack, though.

mllaneza
Apr 28, 2007

Veteran, Bermuda Triangle Expeditionary Force, 1993-1952




DrDork posted:

It certainly confirms something that most of us already assumed about Pharma Cos, at least.

Years ago, before the Sunshine Act, I dated the daughter of the Head of Medicine at a major California med school. he made more than the governor. She used to tell me stories about the annual big sales pitch in Carmel, CA. It's a snooty, upscale coastal town and the pharma sales reps basically took the place over for two weeks to schmooze doctors. She'd come back with thousands of dollars in new outfits and stories of fine dining in Michelin rated restaurants.

And that's why we have the Sunshine Acts, and we have severe restrictions on comping guests in the cafeteria, and doctors are lucky to get a handful of pens with drug names on them. We do still hire a lot of former cheerleaders as sales reps though; a fit, attractive woman with a bubbly personality can clean up in sales.

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

mllaneza posted:

Years ago, before the Sunshine Act, I dated the daughter of the Head of Medicine at a major California med school. he made more than the governor. She used to tell me stories about the annual big sales pitch in Carmel, CA. It's a snooty, upscale coastal town and the pharma sales reps basically took the place over for two weeks to schmooze doctors. She'd come back with thousands of dollars in new outfits and stories of fine dining in Michelin rated restaurants.

And that's why we have the Sunshine Acts, and we have severe restrictions on comping guests in the cafeteria, and doctors are lucky to get a handful of pens with drug names on them. We do still hire a lot of former cheerleaders as sales reps though; a fit, attractive woman with a bubbly personality can clean up in sales.

Yeah, pharma sales are a whole other ballgame. Med devices aren't much better as a whole at least for certain device types.

DrDork
Dec 29, 2003
commanding officer of the Army of Dorkness

mllaneza posted:

We do still hire a lot of former cheerleaders as sales reps though; a fit, attractive woman with a bubbly personality can clean up in sales.

Yup. Never underestimate the social engineering potential of a cute girl in a low-cut top.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

mllaneza posted:

Years ago, before the Sunshine Act, I dated the daughter of the Head of Medicine at a major California med school. he made more than the governor. She used to tell me stories about the annual big sales pitch in Carmel, CA. It's a snooty, upscale coastal town and the pharma sales reps basically took the place over for two weeks to schmooze doctors. She'd come back with thousands of dollars in new outfits and stories of fine dining in Michelin rated restaurants.

Carmel didn’t get its first Michelin star until 2019, I think! (I got email from the restaurant when they were selected.)

DrDork
Dec 29, 2003
commanding officer of the Army of Dorkness

Subjunctive posted:

Carmel didn’t get its first Michelin star until 2019, I think! (I got email from the restaurant when they were selected.)

Why would you expect sales reps to be honest about the quality of the restaurant they're taking to when you know they're not gonna be exactly truthful about most of the rest of their pitch, either?

Like half of Sales seems to be predicated on the (apparently well founded) assumption that you can tell people basically anything and they won't bother checking up on it, no matter how easily available the information may be to verify.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
Person gets arrested in Russia, takes a bit to get her phone back

The Russian's implanted a chip of some sort
https://twitter.com/_MG_/status/1349756902977097730?s=20

The chip appears to be an over the counter tracker bug:
https://www.alibaba.com/product-detail/PCB-Wifi-LBS-GSM-GPS-Tracker_62166465931.html?spm=a2700.details.maylikeexp.9.3bd72073s5qAQ2

BaseballPCHiker
Jan 16, 2006

I worked at a medical device manufacturer, and even after the Sunshine Act, our sales people were all sorts of shady. Salespeople were first hired on the basis of how good looking they were, male or female.

Somehow someway the company got away with doing "trainings" at fancy golf resorts. So long as the doctors attended what amounted to a 1hr sales pitch/demo they could play golf and eat free meals.

Harik
Sep 9, 2001

From the hard streets of Moscow
First dog to touch the stars


Plaster Town Cop
What's the term for SSO/IAM when used against outside vendors that you cannot make changes with and don't have SSO apis?

A number of employees have to deal with a garbage upstream portal that implements N-simultaneous users as company1 .. companyN accounts. Yes, it's explicitly simultaneous not per-seat, it's just done badly on their end.

My first thought was just push a PW manager database containing the logins they should have access to, but when you login to company3@portal it kicks whoever was already using that out instead of telling you to use a different account. So it'd need some sort of session logic, or at least fill in the accounts sequentially to minimize that.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
Parler's hosting requirements leaked and its.....something....

https://twitter.com/th3j35t3r/status/1350612426115452935?s=20

There's Top500 Supercomputers with less hardware than they are demanding.

Sickening
Jul 16, 2007

Black summer was the best summer.

CommieGIR posted:

Parler's hosting requirements leaked and its.....something....

https://twitter.com/th3j35t3r/status/1350612426115452935?s=20

There's Top500 Supercomputers with less hardware than they are demanding.

Considering how they were exploited I assume the code is so unoptimized that it rack up some major bills. This is what I would assume my devs would come up with if they didn't have any infrastructure people.

xtal
Jan 9, 2011

by Fluffdaddy
As Peter sunde said, embarrassing

CLAM DOWN
Feb 13, 2007




What the gently caress is their code lol

xtal
Jan 9, 2011

by Fluffdaddy

CLAM DOWN posted:

What the gently caress is their code lol

Probably Rails

Absurd Alhazred
Mar 27, 2010

by Athanatos

xtal posted:

Probably Rails

Rudy on Rails

Internet Explorer
Jun 1, 2005






:golfclap:

Butter Activities
May 4, 2018

22 Eargesplitten
Oct 10, 2010




Going to quote this one more time.

Looking at that, I'm guessing their devs think that Cloudfront is a euphemism for their old forum.

gallop w/a boner
Aug 16, 2002

Hell Gem
Can anyone help me put a risk into context, regarding Azure AD App Registrations. Specifically this: https://threatpost.com/mimecast-certificate-microsoft-supply-chain-attack/162965/

So my org uses Mimecast. We had an Azure App Registration setup that allows Mimecast to backup our O365 mailboxes. The App Registration config allows read rights to our Exchange Online tenant. In the authentication config we uploaded a certificate supplied by Mimecast. An attacker then stole this certificate from Mimecast.

Mimecast are not divulging at lot of information at this point. They have told customers to expect a more detailed update this week; so far we have just been told to delete and recreate the App Registration.

1) Am I correct in thinking that an attacker with the certificate could read our org's Exchange Online data and there would be no particular obstacles to this? Basically like in this code tutorial (https://www.c-sharpcorner.com/article/register-your-application-to-work-with-office-365-part-two/), just supply the tenant ID and the certificate and then access the relevant API?

2) Any idea how we would detect if this has already happened? Where is App Registration/Service Principal use logged? Can't figure this out from the documentation.

Bandire
Jul 12, 2002

a rabid potato

That's my (admittedly limited) understanding that the attacker could potentially access all your EXO data. For what it's worth, Mimecast told us Microsoft only detected suspicious traffic on five customer tenants, so unless they have contacted you already then your data may not have been accessed.

It still looks pretty bad though. We'll see when they release more details. We are a particularly noisy customer, so they proactively called us to disconnect when the breach was discovered.

titaniumone
Jun 10, 2001

CrowdStrike CTF starts tomorrow, if anyone likes that sort of thing

https://mobile.twitter.com/CrowdStrike/status/1348702484731211777

i am a moron
Nov 12, 2020

"I think if there’s one thing we can all agree on it’s that Penn State and Michigan both suck and are garbage and it’s hilarious Michigan fans are freaking out thinking this is their natty window when they can’t even beat a B12 team in the playoffs lmao"

gallop w/a boner posted:

Can anyone help me put a risk into context, regarding Azure AD App Registrations. Specifically this: https://threatpost.com/mimecast-certificate-microsoft-supply-chain-attack/162965/

So my org uses Mimecast. We had an Azure App Registration setup that allows Mimecast to backup our O365 mailboxes. The App Registration config allows read rights to our Exchange Online tenant. In the authentication config we uploaded a certificate supplied by Mimecast. An attacker then stole this certificate from Mimecast.

Mimecast are not divulging at lot of information at this point. They have told customers to expect a more detailed update this week; so far we have just been told to delete and recreate the App Registration.

1) Am I correct in thinking that an attacker with the certificate could read our org's Exchange Online data and there would be no particular obstacles to this? Basically like in this code tutorial (https://www.c-sharpcorner.com/article/register-your-application-to-work-with-office-365-part-two/), just supply the tenant ID and the certificate and then access the relevant API?

2) Any idea how we would detect if this has already happened? Where is App Registration/Service Principal use logged? Can't figure this out from the documentation.

1) if they have the secret (if one was generated) or you’re doing cert base auth there is no barrier unless you’re using conditional access.

2) Azure sign in logs. If those haven’t been sent to a log analytics workspace they’re more limited from a retention standpoint. edit: You can also go to the Enterprise App Registration and look specifically at when/where the API was used.

i am a moron fucked around with this message at 05:26 on Jan 18, 2021

Vegetable
Oct 22, 2010

Didn't see a more relevant thread for this, so apologies if it is off-topic.

Would like to share some pains I'm having with customer authentication at my company. We're a fintech app for mobile devices, serving consumers in a developing country. For the first factor they first tried passwords, and found that large segments of people were constantly forgetting their passwords and getting locked out. So they decided to make SMS TOTPs the first factor instead. (Each account is unique to a phone number, so there's no problem with coverage, at least.)

Unfortunately this opened the floodgates to phishing. The market we're in has low cybersecurity literacy so we're talking about very large numbers of people getting their accounts taken over every day. Just dangling the prospect of cash prizes and pretending to be a company employee were enough to complete the scam. Loud warnings in our SMS -- "DO NOT SHARE WITH ANYONE ELSE" -- did not help.

So we think 2FA would help. But it's been really hard to find something that is phishing-proof and customer-friendly. Authentication devices and authenticator apps would all be pretty tricky for a customer base with mixed digital literacy skills. Backup codes wouldn't really guard against phishing.

The big question is how to protect customers against themselves, and my research hasn't found something that really makes sense for our situation. Any advice would be helpful.

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


I've seen some finance websites use a series of personal questions as a second login step. Presumably those would be easier to remember than a password.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

Vegetable posted:

The market we're in has low cybersecurity literacy so we're talking about very large numbers of people getting their accounts taken over every day. Just dangling the prospect of cash prizes and pretending to be a company employee were enough to complete the scam. Loud warnings in our SMS -- "DO NOT SHARE WITH ANYONE ELSE" -- did not help.

So we think 2FA would help.

How, exactly, would 2fa help against these particular scams?

Raymond T. Racing
Jun 11, 2019

I’m not saying your company is potentially over their collective heads in this, but yikes.

The only truly unphishable 2FA method is U2F which has iffy mobile support to begin with (and that’s assuming smartphones). Everything else is phishable with varying amounts of effort.

Vegetable
Oct 22, 2010

Jabor posted:

How, exactly, would 2fa help against these particular scams?
I'm not an expert on this. But I have two thoughts.

One, an additional level of authentication -- whatever it may be -- could be enough friction to frustrate scammers or to raise alarm bells for the consumers, particularly if we can use that step to communicate additional warnings to the consumer. This is entirely unproven of course.

Two, the main problem of phishing is that the authentication token is transferable over distances. One possibility we considered was to require 2FA only for new-device logins. To authenticate them, you'd need to have a trusted device authenticate it via a proximity-based check (e.g., bluetooth handshake or NFC). This form of 2FA has a lot of problems -- a trusted device isn't always available, such as when you misplace it. But this form of MFA certainly makes it near-impossible for a gullible consumer to authenticate a scammer, who 100% of the time operates remotely.

Just some ideas that I've been floating. But I'm hoping there'll be more elegant solutions out there.

edit: Another option is, of course, biometric authentication based on fingerprints or face. It's phishing proof if designed correctly. But legally there are a lot of barriers to us doing this.

Vegetable fucked around with this message at 06:34 on Jan 18, 2021

Internet Explorer
Jun 1, 2005





Not being able to use passwords, an SMS MFA code, or app-based MFA is pretty rough. How about about sending a login link to their email that's a "click here" so they can't easily copy and paste it, then show them a bunch of pictures (blue dolphin, brown dog, etc.) and make them choose "their" picture. Maybe put a CAPTCHA before they can get an email link sent to them if you want to cut down on people getting spammed with links.

I assume you have no control over the devices they are connecting with and your stuff is web based, not app based?

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.
You could do something like magic links potentially. Which are slightly more secure that OTPs and a bit more difficult to phish.

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


CyberPingu posted:

You could do something like magic links potentially. Which are slightly more secure that OTPs and a bit more difficult to phish.

Magic links are good. You can even phrase it in the email as "visit this link to gain full access to your account" or something so people might realize what they're handing over.

beuges
Jul 4, 2005
fluffy bunny butterfly broomstick

Vegetable posted:

Didn't see a more relevant thread for this, so apologies if it is off-topic.

Would like to share some pains I'm having with customer authentication at my company. We're a fintech app for mobile devices, serving consumers in a developing country. For the first factor they first tried passwords, and found that large segments of people were constantly forgetting their passwords and getting locked out. So they decided to make SMS TOTPs the first factor instead. (Each account is unique to a phone number, so there's no problem with coverage, at least.)

Unfortunately this opened the floodgates to phishing. The market we're in has low cybersecurity literacy so we're talking about very large numbers of people getting their accounts taken over every day. Just dangling the prospect of cash prizes and pretending to be a company employee were enough to complete the scam. Loud warnings in our SMS -- "DO NOT SHARE WITH ANYONE ELSE" -- did not help.

So we think 2FA would help. But it's been really hard to find something that is phishing-proof and customer-friendly. Authentication devices and authenticator apps would all be pretty tricky for a customer base with mixed digital literacy skills. Backup codes wouldn't really guard against phishing.

The big question is how to protect customers against themselves, and my research hasn't found something that really makes sense for our situation. Any advice would be helpful.

I'm a developer, not a security expert, but my suggestion would be to use a password to register, and then once you've successfully logged in to the app, create an on-device 4-digit PIN to protect the account, or use biometrics on the device if available, and then store an authentication token in secure storage on the phone.
If you move to a new device or you entered your PIN incorrectly too many times, then you use the password to authenticate yourself and create a new PIN. And for the users who don't remember their password, you follow your existing password recovery process, except you should now have a much lower number of password recovery requests cos 4-digit PIN is easier to remember than password with unspecified complexity.

You said in your follow-up that biometrics are legally questionable, but I'd imagine that only becomes a concern if you're trying to validate the face or fingerprint against a stored master record on your backend, which would indeed be an issue. But if you're using the device's biometrics purely to verify that the person using the app is the person owning the phone and then using a pre-stored password or token, the biometric data doesn't leave the device so there's a lot less to worry about... in fact I'd be quite surprised if the fingerprint APIs even allow you to perform a raw scan to verify externally.

I have 4 separate online banking apps on my phone, and each allows me to login using face-ID without having to type in my password. That's probably the route you want to take.

Defenestrategy
Oct 24, 2010

Whats wrong with using hardware token auth? Not a lot of support for it?

Adbot
ADBOT LOVES YOU

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

Defenestrategy posted:

Whats wrong with using hardware token auth? Not a lot of support for it?

Yeah pretty much. Also technical education barriers and increased support tickets when people inevitably lose them.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply