Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Defenestrategy
Oct 24, 2010

denereal visease posted:

Thanks for posting this: I work in the wet infrastructure sector (water and wastewater specifically) and this is actual nightmare fuel. When I was in working as consultant for a medium/large regional firm that specialized in wet infrastructure, I asked my group manager a few times if we had any internal cybersec/infosec talent to offer our clients and the answer was "kinda" :smithicide: I'm on the public side of the equation now and our leadership is definitely worried about incidents like this.

I don't think that the wet infrastructure sector takes this stuff seriously enough: I read about this incident here before I heard about it any professional capacity, but AWWA did email me about an hour after you posted this. These guys got extremely loving lucky, it reads like someone just happened to be babysitting the right part of the system when it was hacked.

I will say that this might be the part where underfunded/smaller plants might be less vulnerable. I worked a few years doing construction oversite on a filter expansion for a water plant in bum gently caress Georgia, and the internal plant controls where air gapped from everything else.

Adbot
ADBOT LOVES YOU

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

denereal visease posted:

I don't think that the wet infrastructure sector takes this stuff seriously enough: I read about this incident here before I heard about it any professional capacity, but AWWA did email me about an hour after you posted this. These guys got extremely loving lucky, it reads like someone just happened to be babysitting the right part of the system when it was hacked.

Yeah, there's a lot to be said about the fact that whoever gained access to Teamviewer didn't really understand how to exploit it, this could have been MUCH MUCH worse had it been someone who knew what they had access to and started setting up persistence and moving laterally in the environment.

Guy Axlerod
Dec 29, 2008

stevewm posted:

We use both Mandrill and Mailchimp. Mailchimp uses their own mail-from, so SPF on your domain is not required, they do use DKIM though.

Mandrill also uses DKIM, but additionally can be set to use your own custom return path/mail-from, if you have this setup, then you do need to include Mailchimp/Mandrill in your SPF. (this is what we do)

Report from DMARCian on our domain:



We have a published DMARC of Reject.. DMARC passes if either SPF or DKIM passes, so this works fine.

Strangely.. occasionally a email will go out from Mandrill using their mail-from, and not our custom one. Like 1-3 in every few thousand. Hence the 99.9% SPF on that report.

Cool, thanks for sharing the report.

Sickening
Jul 16, 2007

Black summer was the best summer.

CommieGIR posted:

Yeah, there's a lot to be said about the fact that whoever gained access to Teamviewer didn't really understand how to exploit it, this could have been MUCH MUCH worse had it been someone who knew what they had access to and started setting up persistence and moving laterally in the environment.

That was my take too. If anyone but an armature had found the system people could have died.

I will also bet someone just ruined their life though if they are in the US.

Internet Explorer
Jun 1, 2005





Sickening posted:

That was my take too. If anyone but an armature had found the system people could have died.

I will also bet someone just ruined their life though if they are in the US.

There was a post on Ars that seemed to have a good amount of info on this, if anyone is interested. I thought it was informative.

https://arstechnica.com/information...1&post=39648168

denereal visease
Nov 27, 2002

"Research your own experience. Absorb what is useful, reject what is useless, add what is essentially your own."

Thanks for that link Internet Explorer!

Defenestrategy posted:

I will say that this might be the part where underfunded/smaller plants might be less vulnerable. I worked a few years doing construction oversite on a filter expansion for a water plant in bum gently caress Georgia, and the internal plant controls where air gapped from everything else.
My understanding is that pretty much every utility has their systems airgapped from their parent entity (ie, city network =/= treatment plant network). Obviously bad actors within the plant network could still present challenges.

CommieGIR posted:

Yeah, there's a lot to be said about the fact that whoever gained access to Teamviewer didn't really understand how to exploit it, this could have been MUCH MUCH worse had it been someone who knew what they had access to and started setting up persistence and moving laterally in the environment.
Yeah, going "I'll make this number bigger" suggests to a non-cybersec person like me that they did not know what they could have done. This could have been much much worse.

Again, these guys got super loving lucky.

smax
Nov 9, 2009

Internet Explorer posted:

There was a post on Ars that seemed to have a good amount of info on this, if anyone is interested. I thought it was informative.

https://arstechnica.com/information...1&post=39648168

Nerdy environmental engineer here, can confirm that this is a good post.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

Internet Explorer posted:

There was a post on Ars that seemed to have a good amount of info on this, if anyone is interested. I thought it was informative.

https://arstechnica.com/information...1&post=39648168

This is an excellent post, and reflects my limited experience with Industrial Control systems as an infosec guy.

BaseballPCHiker
Jan 16, 2006

EDITED.

BaseballPCHiker fucked around with this message at 21:20 on Feb 2, 2022

RFC2324
Jun 7, 2012

http 418

denereal visease posted:

My understanding is that pretty much every utility has their systems airgapped from their parent entity (ie, city network =/= treatment plant network). Obviously bad actors within the plant network could still present challenges.

Can't be airgapped from anything if you are exposed to the internet! :eng101:

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

RFC2324 posted:

Can't be airgapped from anything if you are exposed to the internet! :eng101:

Obviously its on Wifi, so it gaps over the air, ta-da!

evil_bunnY
Apr 2, 2003

lol

https://twitter.com/_mg_/status/1359582048260743169

Impotence
Nov 8, 2010
Lipstick Apathy
for a non-fte consulting rate that is beyond cheap as hell lmao

Internet Explorer
Jun 1, 2005





quote:

Breached water plant employees used the same TeamViewer password and no firewall
Shortcomings illustrate the lack of security rigor in critical infrastructure environments.

https://arstechnica.com/information-technology/2021/02/breached-water-plant-employees-used-the-same-teamviewer-password-and-no-firewall/

knox_harrington
Feb 18, 2011

Running no point.

Total amateur here. I'm working from home 100% and would be interested to know how my work computer is spying on me. It only needs a VPN if I'm accessing the corporate intranet, so presumably I can see where it's sending packets to across my home network?

I can see various anti IP loss software in task manager but presumably there is other hidden stuff. I live in a country where employee surveillance is somewhat prohibited but imagine my US employer doesn't care much about that.

Is there an easy resource you can point me to for monitoring this? The network uses Ubiquiti access points and then an ISP supplied fiber modem, that unfortunately I can't switch for anything better.

Sorry if this is the wrong thread!

BaseballPCHiker
Jan 16, 2006

knox_harrington posted:

Total amateur here. I'm working from home 100% and would be interested to know how my work computer is spying on me. It only needs a VPN if I'm accessing the corporate intranet, so presumably I can see where it's sending packets to across my home network?

I can see various anti IP loss software in task manager but presumably there is other hidden stuff. I live in a country where employee surveillance is somewhat prohibited but imagine my US employer doesn't care much about that.

Is there an easy resource you can point me to for monitoring this? The network uses Ubiquiti access points and then an ISP supplied fiber modem, that unfortunately I can't switch for anything better.

Sorry if this is the wrong thread!

I'm sure others will have better ideas but I would run Wireshark, take a good long packet capture, then see where your traffic is going. If you arent able to install Wireshark you could put in more effort by getting an old fashioned hub, and connecting your work computer to it, then another computer to the hub running Wireshark.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

knox_harrington posted:

Total amateur here. I'm working from home 100% and would be interested to know how my work computer is spying on me. It only needs a VPN if I'm accessing the corporate intranet, so presumably I can see where it's sending packets to across my home network?

I can see various anti IP loss software in task manager but presumably there is other hidden stuff. I live in a country where employee surveillance is somewhat prohibited but imagine my US employer doesn't care much about that.

Is there an easy resource you can point me to for monitoring this? The network uses Ubiquiti access points and then an ISP supplied fiber modem, that unfortunately I can't switch for anything better.

Sorry if this is the wrong thread!

First thing to check is your routing table to see if all traffic is getting bounced through the work VPN. Running a traceroute to google.com will tell you how its handling traffic not destined for work. Many VPN tunnels will force any DNS query to run through them so there may be logs of all the lookups your computer makes on their end when its active. You can use something like Process Explorer and Autoruns to see what is running on the systems and if all the processes to their software shut down when you aren't on the VPN you're probably fine. Beyond that, you're going to need to do some research on what software they are using to see what it is capable of. If its running a persistent service with system/root permissions all bets are off and it could be doing practically anything.

You are correct that a US company is able to operate in what would normally be violation of your privacy laws, these are called safe harbor provisions and again, what this means for you is going to depend on the country you are talking about and what you suspect they are doing

evil_bunnY
Apr 2, 2003

Like, what's the threat model (to you) here? Just use your own machine.

Defenestrategy
Oct 24, 2010

evil_bunnY posted:

Just use your own machine.

I mean if you're working from home literally just use your work laptop for work crap and keep pornhub on your own laptop? If it's annoying just buy a KVM switch to rotate between computers. also, if your laptop has a webcam/mic, remember to cover the camera and disable the mic.

Even the most nefarious corps aren't going to install malware on your home router to snoop on your private time....yet.

Space Gopher
Jul 31, 2006

BLITHERING IDIOT AND HARDCORE DURIAN APOLOGIST. LET ME TELL YOU WHY THIS SHIT DON'T STINK EVEN THOUGH WE ALL KNOW IT DOES BECAUSE I'M SUPER CULTURED.

BaseballPCHiker posted:

I'm sure others will have better ideas but I would run Wireshark, take a good long packet capture, then see where your traffic is going. If you arent able to install Wireshark you could put in more effort by getting an old fashioned hub, and connecting your work computer to it, then another computer to the hub running Wireshark.

The answer to this is going to be "to the corporate VPN," whether it's logging and transmitting every single click and keystroke, or just phoning home once a day to see what updates are whitelisted by their MDM setup. The entire point of the VPN is that the traffic is opaque to anybody using, say, Wireshark to sniff and analyze it.

You might be able to make some inferences based on traffic volume, but outside of that, it's not going to be very helpful without some way to MITM the VPN - which would be very noticeable to anybody looking for it.

Internet Explorer
Jun 1, 2005





I think it's fine to talk about "hey how could my work network be tracking me," god knows there's enough poo poo out there to monitor an employee's every move, but just a reminder that talking about how to get around your work's security is against SH/SC rules.

https://forums.somethingawful.com/showthread.php?threadid=3800661#post467110202

quote:

Employees: don't ask or discuss how to get around your work's network security.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
I know that the question has come up "Is it ethical to scan an employees home network if we discover that there is an infected device on the network when they are WFH?" and the general answer is "No, its outside of scope"

But people keep asking, and some Director or C level somewhere is going to mandate it be done....

bull3964
Nov 18, 2000

DO YOU HEAR THAT? THAT'S THE SOUND OF ME PATTING MYSELF ON THE BACK.


Then someone is going to get a nice payday when they discover that their place of work cataloged that they have an internet connected sex toy or disclosed that someone in their household has diabetes when they scanned their internet connected glucose meter.

If a company is that concerned about WFH wifi threats that they don't trust the protections on the device itself to do their job, they they need to start shipping out hotspots for employees to use when working from home.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

bull3964 posted:

Then someone is going to get a nice payday when they discover that their place of work cataloged that they have an internet connected sex toy or disclosed that someone in their household has diabetes when they scanned their internet connected glucose meter.

If a company is that concerned about WFH wifi threats that they don't trust the protections on the device itself to do their job, they they need to start shipping out hotspots for employees to use when working from home.

Pretty much.

knox_harrington
Feb 18, 2011

Running no point.

Sorry if I didn't phrase it well, the laptop doesn't require the VPN to be active all the time, just when I need to do intranet stuff like access the version controlled document repository. So the traffic is just going across my home network.

I only use the computer for work, and I'm not interested in defeating the corporate network security, but I think it's reasonable to be interested in what it's collecting about me, particularly if it's not in accordance with local law. I have plenty of other devices for watching smurf porn.

Sickening
Jul 16, 2007

Black summer was the best summer.

CommieGIR posted:

I know that the question has come up "Is it ethical to scan an employees home network if we discover that there is an infected device on the network when they are WFH?" and the general answer is "No, its outside of scope"

But people keep asking, and some Director or C level somewhere is going to mandate it be done....

So what is the end goal you want to achieve? What is the scan going to do for you? Confirm the infection? Isn't whatever you have detected the possible infection by the managed machine enough? I would assume folks want to minimize risk, but besides letting the employee know another machine on the network is possibly infected, how would that change your strategy?

If its a laptop that you, as a company, are going to allow to be on non-company networks (its a laptop after all) , isn't the computer being on networks with other possible infected machines the normal expectation?

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

Sickening posted:

So what is the end goal you want to achieve? What is the scan going to do for you? Confirm the infection? Isn't whatever you have detected the possible infection by the managed machine enough? I would assume folks want to minimize risk, but besides letting the employee know another machine on the network is possibly infected, how would that change your strategy?

If its a laptop that you, as a company, are going to allow to be on non-company networks (its a laptop after all) , isn't the computer being on networks with other possible infected machines the normal expectation?

I don't want to achieve this at all. You are misreading my post. The correct assumption is the one you already stated: That you just need to assume any company assets that are mobile are going to exist on networks with infections and malicious machines, and just build your security around that assumption.

CommieGIR fucked around with this message at 18:18 on Feb 11, 2021

Sickening
Jul 16, 2007

Black summer was the best summer.

knox_harrington posted:

Sorry if I didn't phrase it well, the laptop doesn't require the VPN to be active all the time, just when I need to do intranet stuff like access the version controlled document repository. So the traffic is just going across my home network.

I only use the computer for work, and I'm not interested in defeating the corporate network security, but I think it's reasonable to be interested in what it's collecting about me, particularly if it's not in accordance with local law. I have plenty of other devices for watching smurf porn.

Outside of what is already suggested, the chances of you figuring this out without breaking some security controls on your machine is pretty nill. Have you thought to reach out to your company to ask?

Sickening
Jul 16, 2007

Black summer was the best summer.

CommieGIR posted:

I don't want to achieve this at all. You are misreading my post. The correct assumption is the one you already stated: That you just need to assume any company assets that are mobile are going to exist on networks with infects and malicious machines, and just build your security around that assumption.

Yeah, I phrased that poorly as in not meaning "you" but more of the context of the person who would want to follow through with such an endeavor.

BaseballPCHiker
Jan 16, 2006

Space Gopher posted:

The answer to this is going to be "to the corporate VPN," whether it's logging and transmitting every single click and keystroke, or just phoning home once a day to see what updates are whitelisted by their MDM setup. The entire point of the VPN is that the traffic is opaque to anybody using, say, Wireshark to sniff and analyze it.

You might be able to make some inferences based on traffic volume, but outside of that, it's not going to be very helpful without some way to MITM the VPN - which would be very noticeable to anybody looking for it.

Not necessarily, lots of places are running split tunnel VPNs these days. Unless I am totally misreading the question. I thought this was something along the lines of "I have a work computer running the VPN but it only talks back to corporate for intranet traffic, not google" sort of thing. Maybe I'm assuming to much.

DrDork
Dec 29, 2003
commanding officer of the Army of Dorkness

BaseballPCHiker posted:

Not necessarily, lots of places are running split tunnel VPNs these days. Unless I am totally misreading the question. I thought this was something along the lines of "I have a work computer running the VPN but it only talks back to corporate for intranet traffic, not google" sort of thing. Maybe I'm assuming to much.

Sure, but if the interest is seeing what the company is collecting / sending back over the VPN, you're still not going to be able to sniff that via Wireshark on a hub or something. You could sniff some stuff that way when it's not connected via VPN, though (assuming you can't just install Wireshark directly on the laptop--since doing so would raise a bunch of red flags in a lot of companies).

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

Sickening posted:

Yeah, I phrased that poorly as in not meaning "you" but more of the context of the person who would want to follow through with such an endeavor.

Fair enough! Yeah, I've had to talk down a couple C levels from the brink about where their legal and ethical limits are, managed to convince all of them that its just far easier to assume a hostile environment than play offensive security.

Internet Explorer
Jun 1, 2005





*long sigh*

https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610

CLAM DOWN
Feb 13, 2007





I'm going to be employed forever.

Impotence
Nov 8, 2010
Lipstick Apathy
If you just are running openvpn that you have a config file for then it's probably fine and they just vacuum up network packets.

If you have any data loss prevention or managed endpoint security software/"antivirus", and the VPN verifies this (like anyconnect or globalprotect) then it's basically a complete keylogger that watches every single keystroke and your clipboard.

BaseballPCHiker posted:

Not necessarily, lots of places are running split tunnel VPNs these days. Unless I am totally misreading the question. I thought this was something along the lines of "I have a work computer running the VPN but it only talks back to corporate for intranet traffic, not google" sort of thing. Maybe I'm assuming to much.

If the split tunnel VPN is demanding you have endpoint security software, root CAs, or DLP, then it's probably taking everything and the kitchen sink, though.

Sickening
Jul 16, 2007

Black summer was the best summer.

CLAM DOWN posted:

I'm going to be employed forever.

Big same.

some kinda jackal
Feb 25, 2003

 
 

CLAM DOWN posted:

I'm going to be employed forever.

Yeah the real question is "is it worth it".

Sometimes I wish I had a less annoying job like garbageman or explosives disposal.

CLAM DOWN
Feb 13, 2007




Martytoof posted:

Yeah the real question is "is it worth it".

Sometimes I wish I had a less annoying job like garbageman or explosives disposal.

Some days I just loving hate computers and want to change jobs to run away into a forest or something. Park ranger. I dunno. Many years ago I worked on ships and I miss being at sea.

But other days I genuinely enjoy my job and can make a difference. I wish I didn't flip flop so regularly. I also make far more money doing security lol

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
I love what I do. I hate working with the people that employ me, because they don't listen.

Adbot
ADBOT LOVES YOU

Internet Explorer
Jun 1, 2005





I'm really struggling recently. Not exactly a new phenomena for me, but I guess like CLAM, I I fluctuate. I don't work strictly in infosec, but I have generally been the most infosec-minded person in my travels. I'm at the point where I don't know what I want to do next in my career, but I really wish I could just get away from anything even remotely user facing. Security seems like a logical next step, but I'm starting to realize that I think I've had ADHD my entire life and the idea of studying for a cert is just absolutely dreadful. The general depression that this world is bringing on isn't any help.

Maybe one day.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply