Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

INTERPOL's #BECareful Campaign

October 16, 2019 by Marc Handelman in International Policing, Information Security, Social Engineering, Email Fraud

Visit Interpol for additional and important information.

October 16, 2019 /Marc Handelman
International Policing, Information Security, Social Engineering, Email Fraud

Dallas County Iowa Courthouse

The Beans, Shall We Say, Have Been Spilt: State of Iowa Executes Partial Spillage

September 23, 2019 by Marc Handelman in Judicial Branch Security, Penetration Testing, Social Engineering

This suprisingly frank initial statement regarding the work Coalfire was contracted to perform and regarding the actions to be taken, thereto, follows after the next paragraph split.

Perhaps this entire scenario is indicative of governmental malfeascenace rather than profit-driven overreach by the corporate entity contracted to perform the labor and analysis... You be the judge...


September 18, 2019

State of Iowa State Court Administration Statement on the Coalfire Debacle:

Malicious cyber criminals use all techniques at their disposal—fair or foul—to access valuable data from private and public organizations. Global cybersecurity firms (such as Coalfire) involved in technical testing are professionally contracted to simulate real-world attacks using the same techniques any attacker may use to test the company’s defenses so that they can remedy their vulnerabilities before a real-world attack occurs.

Recently, two penetration testers employed by Coalfire were arrested in the Dallas County Courthouse during a security testing exercise to help the Iowa Judicial Branch ensure the court’s highly sensitive data was secured against attack. Coalfire was working to provide quality client service and a stronger security posture. Coalfire and State Court Administration believed they were in agreement regarding the physical security assessments for the locations included in the scope of work. Yet, recent events have shown that Coalfire and State Court Administration had different interpretations of the scope of the agreement. Together, Coalfire and State Court Administration continue to navigate through this process. To that end, the Iowa Judicial Branch and Coalfire will each be conducting independent reviews and releasing the contractual documents executed between both parties.

State Court Administration has worked with Coalfire in the past to conduct security testing of its data and welcomed the opportunity to work with them again. Both organizations value the importance of protecting the safety and security of employees as well as the integrity of data.

State Court Administration apologizes to the sheriffs and boards of supervisors of Dallas County and Polk County for the confusion and impact these incidents have caused.

Links below are to the contract documents with allowable redactions

Requirements and Assumptions Service Order—Redacted Rules of Engagement—Redacted Social Engineering Authorization—Redacted Master Agreement—Redacted

September 23, 2019 /Marc Handelman
Judicial Branch Security, Penetration Testing, Social Engineering

DerbyCon 2018, April Wright's 'Social Engineering At Work - How To Use Positive Influence To Gain Management Buy-In For Anything' →

December 07, 2018 by Marc Handelman in Irongeek, Information Security, Social Engineering

Videography Credit: Irongeek (Adrian Crenshaw).

December 07, 2018 /Marc Handelman
Irongeek, Information Security, Social Engineering

GrrCon Augusta 2018, Dragnet: Truman Kain's 'Your Social Engineering Sidekick' →

September 26, 2018 by Marc Handelman in Conferences, Education, GrrCon Augusta, Information Security, Dragnet, Social Engineering

Videography Credit: Irongeek (Adrian Crenshaw).

September 26, 2018 /Marc Handelman
Conferences, Education, GrrCon Augusta, Information Security, Dragnet, Social Engineering

Recon for Social Engineering, Par Excellence

July 14, 2018 by Marc Handelman in Information Security, Social Engineering, Reconnaissance

Lisa Forte, a Partner at UK based Red Goat Cyber Security, regales us with a tremendous blog post - detailing, if you will, the effort expended in executing reconnaissance operation targeting the focus of a social engineering mission. Quite likely the best prose you'll feast your eyes upon today, I'll wager.

July 14, 2018 /Marc Handelman
Information Security, Social Engineering, Reconnaissance

BSides Detroit 2018, Johnny Xmas' 'Yes, Your'e An Impostor - Now Get Back To Work' →

May 25, 2018 by Marc Handelman in BSides, Conferences, Education, Information Security, BSides Detroit, Social Engineering
May 25, 2018 /Marc Handelman
BSides, Conferences, Education, Information Security, BSides Detroit, Social Engineering

Mind The Shells, Windows PowerShell Credential Social Engineering Two-Step →

March 18, 2018 by Marc Handelman in Information Security, Social Engineering, Powershell

Apparently, a new Microsoft Corporation (Nasdaq: MSFT) Windows' Powershell soceng scam is making the rounds, according to Lawrence Abrams, concise writing at Bleeping Computer. Mind Your Shells!

March 18, 2018 /Marc Handelman
Information Security, Social Engineering, Powershell

XKCD, Impostor Syndrome →

February 13, 2018 by Marc Handelman in XKCD, Sarcasm, Satire, Social Engineering
February 13, 2018 /Marc Handelman
XKCD, Sarcasm, Satire, Social Engineering

DerbyCon 2017, Dave Mattingly's 'Improv Comedy as a Social Engineering Tool' →

December 10, 2017 by Marc Handelman in Conferences, DerbyCon, Social Engineering, Information Security
December 10, 2017 /Marc Handelman
Conferences, DerbyCon, Social Engineering, Information Security

DEF CON 24, Robert Anderson's 'US Interrogation Techniques and Social Interrogation'

August 19, 2017 by Marc Handelman in Information Security, Interrogation, All is Information, Conferences, Education, Veterans, US Army, US Armed Forces, Social Engineering
August 19, 2017 /Marc Handelman
Information Security, Interrogation, All is Information, Conferences, Education, Veterans, US Army, US Armed Forces, Social Engineering

Avoid the Stick →

September 21, 2016 by Marc Handelman in All is Information, Social Engineering, Information Security

via Motherboard contributor Joseph Cox, comes the strange case of the errant USB stick, down under. In this case, the USB stick, that may appear in any Australian postal mailbox. Hat Tip...

September 21, 2016 /Marc Handelman
All is Information, Social Engineering, Information Security

Social Engineering Attackers, Fake Profiles and You →

November 16, 2015 by Marc Handelman in Information Security, Social Engineering

Rick Robinson, reporting at Security Intelligence, briefly focuses on social engineering attacks and the so-called deployment of fake profiles... Also known as con-artistry, and in this case, of the pernicious kind...

November 16, 2015 /Marc Handelman
Information Security, Social Engineering

Infosecurity Europe 2015, Mitigating The Human Risk →

July 23, 2015 by Marc Handelman in All is Information, Education, Social Engineering, Human Engineering
July 23, 2015 /Marc Handelman
All is Information, Education, Social Engineering, Human Engineering

Irari Report, Treadstone 71's ISIS Recruiting Analysis →

July 01, 2015 by Marc Handelman in All is Information, Social Engineering, Terrorism
July 01, 2015 /Marc Handelman
All is Information, Social Engineering, Terrorism

Le Bots Émerger →

June 24, 2015 by Marc Handelman in All is Information, Automation, Common Sense, Communications, Social Engineering, Must Read

La Fin de Twitter est Proche, otherwise known as The End of Twitter, Inc. (NasdaqGS: TWTR) is Near... via The Harvard Business Review, and written by Alexandera Samuel, comes this tell-all on the rise of 'bots infecting Twitter, and not necessarily the 'bots you may think. Entitled "How Bots Took Over Twitter". Congratulations, you have discovered Today's Must Read.

June 24, 2015 /Marc Handelman
All is Information, Automation, Common Sense, Communications, Social Engineering, Must Read

Neil's Spiel →

May 29, 2015 by Marc Handelman in All is Information, Data Security, Infosec Policy, Information Security, Government, Social Engineering
May 29, 2015 /Marc Handelman
All is Information, Data Security, Infosec Policy, Information Security, Government, Social Engineering

GoDaddy's Big Social Engineering Adventure

March 23, 2015 by Marc Handelman in All is Information, Social Engineering, Information Security

Looks like GoDaddy has been hit again... Via CSOOnline's Steve Ragan, this time, smacked with the Social Engineering Paddle. When any registrar is attacked (successfully or otherwise) we all lose. The ramification to safe naming work - perhaps emanating from planted persistent threats post-attack - can permeate the infrastructure of the domain registration naming system.

March 23, 2015 /Marc Handelman
All is Information, Social Engineering, Information Security

Over One Billion Served →

February 17, 2015 by Marc Handelman in All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Security, Must Read, Network Security, Security Failure, Security Governance, Bank Security, Social Engineering, Behavioral Security, APT, Persistent Threats, Moles

Suprised by the largest heist in history? Concerned about Carbanak APT? Clearly, proof-positive that advanced persistent threats are deeply evil - and highly efficient when coupled with other complimentary and stealth-like methodologies (aka Hiding in Plain Sight). Read on...

February 17, 2015 /Marc Handelman
All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Security, Must Read, Network Security, Security Failure, Security Governance, Bank Security, Social Engineering, Behavioral Security, APT, Persistent Threats, Moles

Kimmel's Password

January 19, 2015 by Marc Handelman in Information Security, Social Engineering, Humor, Education
January 19, 2015 /Marc Handelman
Information Security, Social Engineering, Humor, Education
  • Newer
  • Older