How did they do it? (Hacked)

Anything not relating to the X-Universe games (general tech talk, other games...) belongs here. Please read the rules before posting.

Moderator: Moderators for English X Forum

pjknibbs
Posts: 41359
Joined: Wed, 6. Nov 02, 20:31
x4

Re: How did they do it? (Hacked)

Post by pjknibbs » Wed, 29. Apr 20, 16:53

red assassin wrote:
Wed, 29. Apr 20, 16:22
Outlook.com accepts the same + syntax as GMail. Easy enough to test, anyway!
Odd, I just tested sending an e-mail to my work e-mail address (which is an Office 365 one) with that + thing on it, and it didn't work--got rejected due to the e-mail not existing. Guessing they only enable this feature for actual @outlook.com e-mail addresses.

Gavrushka
Posts: 8072
Joined: Fri, 26. Mar 04, 19:28
x4

Re: How did they do it? (Hacked)

Post by Gavrushka » Wed, 29. Apr 20, 16:55

red assassin wrote:
Wed, 29. Apr 20, 16:22
Vertigo 7 wrote:
Wed, 29. Apr 20, 16:08
That is quite brilliant. I hadn't considered that. I need to find out if that's offered with MS accounts.
Outlook.com accepts the same + syntax as GMail. Easy enough to test, anyway!
That's simply awesome. I need to send you many, many dollars. Thank you! :thumb_up:
“Man, my poor head is battered,” Ed said.

“That explains its unusual shape,” Styanar said, grinning openly now. “Although it does little to illuminate just why your jowls are so flaccid or why you have quite so many chins.”

“I…” Had she just called him fat? “I am just a different species, that’s all.”

“Well nature sure does have a sense of humour then,” Styanar said. “Shall we go inside? It’d not be a good idea for me to be spotted by others.”

Vertigo 7
Posts: 3461
Joined: Fri, 14. Jan 11, 17:30
x4

Re: How did they do it? (Hacked)

Post by Vertigo 7 » Wed, 29. Apr 20, 17:20

pjknibbs wrote:
Wed, 29. Apr 20, 16:53
red assassin wrote:
Wed, 29. Apr 20, 16:22
Outlook.com accepts the same + syntax as GMail. Easy enough to test, anyway!
Odd, I just tested sending an e-mail to my work e-mail address (which is an Office 365 one) with that + thing on it, and it didn't work--got rejected due to the e-mail not existing. Guessing they only enable this feature for actual @outlook.com e-mail addresses.
I would bet that the enterprise accounts don't have that enabled. I could see that as something the admins would not want enabled (if it's an option), especially if they have a spam/AV filter before the emails hit the mail server. But it def works for personal accounts.
The Future is Progressive!
rebellionpac.com
Fight white supremacy, fight corporate influence, fight for the rights of all peoples!

User avatar
Chips
Posts: 4879
Joined: Fri, 19. Mar 04, 19:46
x4

Re: How did they do it? (Hacked)

Post by Chips » Wed, 29. Apr 20, 17:34

RegisterMe wrote:
Wed, 29. Apr 20, 14:18
I talked her through it. She was adamant that she hadn't looked at the claimed porn sites. This was enough for me to say "there's a lot of bluff in this and that undermines the rest of the threat. Change all your passwords on everything and either ignore it or tell them where to get off, and report it to the police".

But if she'd been vulnerable in some way, and without access to somebody reasonably tech savvy, and had looked at whatever porn sites... it might have felt very threatening indeed.

It was, in effect, a reasonable sophisticated social engineering attempt.
I think it's more basic than you give them credit for :D 100k leaked email/passwords? Send out those emails with part password (rest starred out). Then take some guesses and leave the targets to self identify (common porn site, most laptops have webcams built in etc).

Now you just need a percentage to fall for it as they've kept it secret or think it's something to be humiliated over. Personally, I worked on the principle if you refuse to be embarrassed then hard to get blackmailed. No shame here :D

User avatar
red assassin
Posts: 4613
Joined: Sun, 15. Feb 04, 15:11
x3

Re: How did they do it? (Hacked)

Post by red assassin » Wed, 29. Apr 20, 18:04

Gavrushka wrote:
Wed, 29. Apr 20, 16:55
That's simply awesome. I need to send you many, many dollars. Thank you! :thumb_up:
Be aware that this is a fairly well-known trick and spammers may strip the +whatever off, replace it with something else, etc etc, so it's not reliable by any means, but it is often useful. (At least for telling you who to blame for losing your details!)
A still more glorious dawn awaits, not a sunrise, but a galaxy rise, a morning filled with 400 billion suns - the rising of the Milky Way

jlehtone
Posts: 21811
Joined: Sat, 23. Apr 05, 21:42
x4

Re: How did they do it? (Hacked)

Post by jlehtone » Wed, 29. Apr 20, 21:00

pjknibbs wrote:
Wed, 29. Apr 20, 16:53
Odd, I just tested sending an e-mail to my work e-mail address (which is an Office 365 one) with that + thing on it, and it didn't work--got rejected due to the e-mail not existing. Guessing they only enable this feature for actual @outlook.com e-mail addresses.
Same here. Exchange server at work. Bounces with:
Recipient address rejected: User unknown in local recipient table (in reply to RCPT TO command)
Alas, Exchange was taken into use last year. The previous server (not a MS product) was ok with the aliases. :cry:

Then again, it is the private addresses that we primarily want to track, isn't it?

A "group" in MS Yammer has address of form nameofgroup+domainname@yammer.com. No idea what protocol it uses to parse the address.
MS Teams addresses do not have '+'.

I presume that most mail servers are highly configurable and that lack of a feature is due to (conscious) omission or disablement.

User avatar
red assassin
Posts: 4613
Joined: Sun, 15. Feb 04, 15:11
x3

Re: How did they do it? (Hacked)

Post by red assassin » Thu, 30. Apr 20, 00:35

MS say + is coming to Office 365 with an ETA of later this year: https://office365.uservoice.com/forums/ ... -office-36
Couldn't find anything specific about local Exchange, though. Lots of 365 features don't make it through to the local versions, so I wouldn't hold out much hope.
A still more glorious dawn awaits, not a sunrise, but a galaxy rise, a morning filled with 400 billion suns - the rising of the Milky Way

Gavrushka
Posts: 8072
Joined: Fri, 26. Mar 04, 19:28
x4

Re: How did they do it? (Hacked)

Post by Gavrushka » Thu, 30. Apr 20, 19:43

Terre wrote:
Tue, 28. Apr 20, 19:33
I would still suggest a scan with Malwarebytes, just incase there is a miscreant onboard.
Loving Malwarebytes, and will buy the licence at the end of the trial. - Is it an addition to normal virus software, because it doesn't appear to have a 'full system scan' option? - I've Bitdefender running too and, although still active, it seems to take a back seat to Malwarebytes.
“Man, my poor head is battered,” Ed said.

“That explains its unusual shape,” Styanar said, grinning openly now. “Although it does little to illuminate just why your jowls are so flaccid or why you have quite so many chins.”

“I…” Had she just called him fat? “I am just a different species, that’s all.”

“Well nature sure does have a sense of humour then,” Styanar said. “Shall we go inside? It’d not be a good idea for me to be spotted by others.”

Vertigo 7
Posts: 3461
Joined: Fri, 14. Jan 11, 17:30
x4

Re: How did they do it? (Hacked)

Post by Vertigo 7 » Thu, 30. Apr 20, 20:31

If I would suggest, look into Cylance. They're a relatively new player in the AV field and making some huge inroads in enterprise security. Their consumer AV product is essentially the same as their enterprise one. What makes them stand out is they do not use signatures to detect malware. Rather it's AI based malicious code detection that can even prevent code executions that traditional AV products wont even have a signature for yet. Their annual price point is very reasonable too.
The Future is Progressive!
rebellionpac.com
Fight white supremacy, fight corporate influence, fight for the rights of all peoples!

User avatar
red assassin
Posts: 4613
Joined: Sun, 15. Feb 04, 15:11
x3

Re: How did they do it? (Hacked)

Post by red assassin » Fri, 1. May 20, 01:22

Don't pay for antivirus programs. The built-in Windows Defender is plenty good enough. Whatever the cause of your issue, it's almost certainly nothing to do with having malware on your device.
A still more glorious dawn awaits, not a sunrise, but a galaxy rise, a morning filled with 400 billion suns - the rising of the Milky Way

User avatar
felter
Posts: 6981
Joined: Sat, 9. Nov 02, 18:13
xr

Re: How did they do it? (Hacked)

Post by felter » Fri, 1. May 20, 02:57

red assassin wrote:
Fri, 1. May 20, 01:22
Don't pay for antivirus programs. The built-in Windows Defender is plenty good enough. Whatever the cause of your issue, it's almost certainly nothing to do with having malware on your device.
Are you sure about that, Windows Defender Sandbox Test vs Malware

Now compare that to lets say the free version of Kaspersky Security Cloud Review.

By the way, a detection rate as low 98% is counted as being pretty bad, a good AV product will be well into the 99+% rate, where it may have missed 1 or at worst two viruses, when he had to quit defender because it couldn't handle it any more, it was at a 92.56% detection rate.
Florida Man Makes Announcement.
We live in a crazy world where winter heating has become a luxury item.

Vertigo 7
Posts: 3461
Joined: Fri, 14. Jan 11, 17:30
x4

Re: How did they do it? (Hacked)

Post by Vertigo 7 » Fri, 1. May 20, 08:14

I'm telling ya, Cylance is worth the money. and it really isn't much. I'm paying around $50 USD /yr for 5 licenses.
The Future is Progressive!
rebellionpac.com
Fight white supremacy, fight corporate influence, fight for the rights of all peoples!

silenced
Posts: 4967
Joined: Tue, 20. Jun 06, 19:43
x4

Re: How did they do it? (Hacked)

Post by silenced » Fri, 1. May 20, 12:56

birdtable wrote:
Tue, 28. Apr 20, 20:37
even if it is a Russian damsel looking for rescue .. :)
But ... this is how I met my wife! =) Ok, she's Ukrainian, but hey ...
... what is a drop of rain, compared to the storm? ... what is a thought, compared to the mind? ... our unity is full of wonder which your tiny individualism cannot even conceive ... I've heard it all before ... you're saying nothing new ... I thought I saw a rainbow ... but I guess it wasn't true ... you cannot make me listen ... I cannot make you hear ... you find your way to heaven ... I'll meet you when you're there ...

User avatar
red assassin
Posts: 4613
Joined: Sun, 15. Feb 04, 15:11
x3

Re: How did they do it? (Hacked)

Post by red assassin » Fri, 1. May 20, 13:33

felter wrote:
Fri, 1. May 20, 02:57
red assassin wrote:
Fri, 1. May 20, 01:22
Don't pay for antivirus programs. The built-in Windows Defender is plenty good enough. Whatever the cause of your issue, it's almost certainly nothing to do with having malware on your device.
Are you sure about that, Windows Defender Sandbox Test vs Malware

Now compare that to lets say the free version of Kaspersky Security Cloud Review.

By the way, a detection rate as low 98% is counted as being pretty bad, a good AV product will be well into the 99+% rate, where it may have missed 1 or at worst two viruses, when he had to quit defender because it couldn't handle it any more, it was at a 92.56% detection rate.
Artificial detection rate tests have almost nothing to do with real world security and are extremely dependent on test methodology. (For example, here's the top result from Googling it which puts Defender on a 99.88% protection rate: https://www.av-comparatives.org/tests/m ... arch-2020/) Antivirus products in general and this sort of test in particular are a holdover from a bygone era of default-vulnerable Windows XP boxes. Any competent threat actor will test the new version of their malware against the full suite of antivirus products to ensure they don't flag before launching the campaign. There are also very few practical attack vectors left open for a criminal group attempting to get malware onto a home user's PC and pretty much all of them involve downloading something suspicious from a phishing email or webpage.

Furthermore, running an antivirus product poses significant risks, as you give them effectively unlimited access to your computer and the files on it. This is both an obvious privacy risk and a security risk: antivirus products have a long history of having their own critical exploitable security issues and breaking security in other applications via their hooking mechanisms. Plus of course you're paying money. And all for something that makes almost no difference to your actual security level. An antivirus is there as a backup in case all of the security mechanisms to stop stuff getting onto your computer in the first place fail and you're lucky enough to get hit late enough that AVs have had a chance to find and signature whatever it was.

Defender is fine, free, generally secure as AVs go, doesn't involve giving any more access to your computer than Microsoft already had, and takes advantage of Microsoft's general telemetry which gives them a good picture of what actual security threats are affecting their users.

Install updates for your OS and your software immediately. Keep backups. Don't download stuff you can't verify. Use Defender. And follow the password advice from my other post.

Vertigo 7 wrote:
Fri, 1. May 20, 08:14
I'm telling ya, Cylance is worth the money. and it really isn't much. I'm paying around $50 USD /yr for 5 licenses.
AI in security products is pointless marketing and has very little to do with their actual effectiveness as a product. All it means is that when it does or doesn't find something, you can't explain why.
A still more glorious dawn awaits, not a sunrise, but a galaxy rise, a morning filled with 400 billion suns - the rising of the Milky Way

Vertigo 7
Posts: 3461
Joined: Fri, 14. Jan 11, 17:30
x4

Re: How did they do it? (Hacked)

Post by Vertigo 7 » Fri, 1. May 20, 14:23

red assassin wrote:
Fri, 1. May 20, 13:33
Vertigo 7 wrote:
Fri, 1. May 20, 08:14
I'm telling ya, Cylance is worth the money. and it really isn't much. I'm paying around $50 USD /yr for 5 licenses.
AI in security products is pointless marketing and has very little to do with their actual effectiveness as a product. All it means is that when it does or doesn't find something, you can't explain why.
Really? So enterprises that are ditching multi million dollar contracts with Symantec/Broadcom and McAfee in favor of Cylance are just buying into marketing hype?

I can tell ya, as someone who does actually work in IT security for one of the largest healthcare providers in the US, and was directly involved in the efficacy of Cylance countering actual on going threats VS other products we were using at the time, Cylance hit all the marks and did so without consuming inordinate resources on both server and end user systems. We quickly switched products and have not regretted it once. It works, and it works damn well, and doesn't require constant updating of signatures to do it's job. We have had 0 malware or ransomware outbreaks since Cylance was deployed and field techs are no longer spending inordinate amounts of time cleaning or reimaging infected devices.

Their approach to using an AI engine to detect malware is definitely different from all the rest, but I can't argue with results. It's even detected PUPs on my machine that malware bytes and defender completely missed.
The Future is Progressive!
rebellionpac.com
Fight white supremacy, fight corporate influence, fight for the rights of all peoples!

User avatar
felter
Posts: 6981
Joined: Sat, 9. Nov 02, 18:13
xr

Re: How did they do it? (Hacked)

Post by felter » Fri, 1. May 20, 14:49

red assassin, did you even look at either the stuff I posted or even the link you posted that. The 99.88% protection rate you linked as being good is actually one of the worst out of all of the AV software they tested. Then you have to take into account the other two percentages used, the online and offline detection rates, which were 70.5% and 85.9% respectively which puts them down in the bottom 5 not the top 5 like you are trying to make out that they are. Windows defender is bad, it is not the worst and it is better than it used to be, but it is still one of the worst anti-virus products out there.
Florida Man Makes Announcement.
We live in a crazy world where winter heating has become a luxury item.

User avatar
red assassin
Posts: 4613
Joined: Sun, 15. Feb 04, 15:11
x3

Re: How did they do it? (Hacked)

Post by red assassin » Fri, 1. May 20, 15:28

Vertigo 7 wrote:
Fri, 1. May 20, 14:23
Really? So enterprises that are ditching multi million dollar contracts with Symantec/Broadcom and McAfee in favor of Cylance are just buying into marketing hype?

I can tell ya, as someone who does actually work in IT security for one of the largest healthcare providers in the US, and was directly involved in the efficacy of Cylance countering actual on going threats VS other products we were using at the time, Cylance hit all the marks and did so without consuming inordinate resources on both server and end user systems. We quickly switched products and have not regretted it once. It works, and it works damn well, and doesn't require constant updating of signatures to do it's job. We have had 0 malware or ransomware outbreaks since Cylance was deployed and field techs are no longer spending inordinate amounts of time cleaning or reimaging infected devices.

Their approach to using an AI engine to detect malware is definitely different from all the rest, but I can't argue with results. It's even detected PUPs on my machine that malware bytes and defender completely missed.
I am an infosec professional. Symantec and McAfee are pretty terrible, so I wouldn't exactly describe switching away from them as a bad move. Also, the situation for a corporate network is a bit different from home use under discussion here. Nonetheless, I stand by my statement: there are eleventy billion AI-powered network defence startups out there right now and how loudly they yell about AI in marketing has very little to do with how effective they are. A machine learning detection engine is vulnerable to just the same evasion processes any other detection engine is vulnerable to. As soon as Cylance gets popular enough for malware authors to start testing against it like they do more common AV engines, it'll start missing stuff in the critical early window and needing to push out engine updates just like other AVs.


felter wrote:
Fri, 1. May 20, 14:49
red assassin, did you even look at either the stuff I posted or even the link you posted that. The 99.88% protection rate you linked as being good is actually one of the worst out of all of the AV software they tested. Then you have to take into account the other two percentages used, the online and offline detection rates, which were 70.5% and 85.9% respectively which puts them down in the bottom 5 not the top 5 like you are trying to make out that they are. Windows defender is bad, it is not the worst and it is better than it used to be, but it is still one of the worst anti-virus products out there.
Did you read anything I wrote? Detection rates are not a useful measure of how an antivirus affects your security posture.
A still more glorious dawn awaits, not a sunrise, but a galaxy rise, a morning filled with 400 billion suns - the rising of the Milky Way

Vertigo 7
Posts: 3461
Joined: Fri, 14. Jan 11, 17:30
x4

Re: How did they do it? (Hacked)

Post by Vertigo 7 » Fri, 1. May 20, 15:56

red assassin wrote:
Fri, 1. May 20, 15:28
Vertigo 7 wrote:
Fri, 1. May 20, 14:23
Really? So enterprises that are ditching multi million dollar contracts with Symantec/Broadcom and McAfee in favor of Cylance are just buying into marketing hype?

I can tell ya, as someone who does actually work in IT security for one of the largest healthcare providers in the US, and was directly involved in the efficacy of Cylance countering actual on going threats VS other products we were using at the time, Cylance hit all the marks and did so without consuming inordinate resources on both server and end user systems. We quickly switched products and have not regretted it once. It works, and it works damn well, and doesn't require constant updating of signatures to do it's job. We have had 0 malware or ransomware outbreaks since Cylance was deployed and field techs are no longer spending inordinate amounts of time cleaning or reimaging infected devices.

Their approach to using an AI engine to detect malware is definitely different from all the rest, but I can't argue with results. It's even detected PUPs on my machine that malware bytes and defender completely missed.
I am an infosec professional. Symantec and McAfee are pretty terrible, so I wouldn't exactly describe switching away from them as a bad move. Also, the situation for a corporate network is a bit different from home use under discussion here. Nonetheless, I stand by my statement: there are eleventy billion AI-powered network defence startups out there right now and how loudly they yell about AI in marketing has very little to do with how effective they are. A machine learning detection engine is vulnerable to just the same evasion processes any other detection engine is vulnerable to. As soon as Cylance gets popular enough for malware authors to start testing against it like they do more common AV engines, it'll start missing stuff in the critical early window and needing to push out engine updates just like other AVs.
Cylance isn't a startup... Research, my friend. They've been around since 2012 and were bought by BlackBerry in 2018. They are constantly evaluating processes for malicious code. Sometimes, at least on the enterprise level, a bit too over zealously and flagging activity as suspicious that isn't, but not that often and nothing that has majorly impacted business.

Anyway, since I have actual real world experience with Cylance and have seen first hand it stopping zero-day threats long before any other AV product is able to, I'll stick with what I'm seeing first hand. As I said, it works. If something else comes along down the road that can do the job better, great. For now, I'm putting my trust in Cylance's ability to neutralize threats since it's accomplishing its task where others have failed.

We would not rely on Windows Defender in the corporate network, even with all of the strict controls and security appliances in place to prevent bad actors from gaining access. With far less controls on a home network, why should anyone rely on Windows Defender to keep their data safe? Cuz it's free? It's not nearly as effective as you claim it to be, again... PUPs were detected by Cylance on my machine that defender missed. Shit that GOG and Twitch threw out there. Hell, I wasn't even aware of it and I like to stay on top of what's going on with my machine. Not to mention, both Malware Bytes and Defender have been directly circumvented by certain malware and Cylance has built in process protections that prevent tampering.

Bottom line is, as I said, I can't argue with results. Show me something better, I'll take it into consideration. "marketing" is not a sufficient reason to dismiss an effective product.
The Future is Progressive!
rebellionpac.com
Fight white supremacy, fight corporate influence, fight for the rights of all peoples!

silenced
Posts: 4967
Joined: Tue, 20. Jun 06, 19:43
x4

Re: How did they do it? (Hacked)

Post by silenced » Fri, 1. May 20, 16:17

But on a side note: Wasn't Cyclance the one that could be circumvented by using "whitelisted" files that had been infected after being "whitelisted" and so the system totally failed?

I think it was them, and they said all of this was not true, but lots of patching and hotfixing was made a very short time after ... :gruebel: :gruebel:
... what is a drop of rain, compared to the storm? ... what is a thought, compared to the mind? ... our unity is full of wonder which your tiny individualism cannot even conceive ... I've heard it all before ... you're saying nothing new ... I thought I saw a rainbow ... but I guess it wasn't true ... you cannot make me listen ... I cannot make you hear ... you find your way to heaven ... I'll meet you when you're there ...

Vertigo 7
Posts: 3461
Joined: Fri, 14. Jan 11, 17:30
x4

Re: How did they do it? (Hacked)

Post by Vertigo 7 » Fri, 1. May 20, 16:24

I don't think so. Cylance evaluates processes in active memory, it doesn't care what the filename is.
The Future is Progressive!
rebellionpac.com
Fight white supremacy, fight corporate influence, fight for the rights of all peoples!

Post Reply

Return to “Off Topic English”