|
| trhway wrote:
| One can wonder how much info for the hack was collected during
| the interviews. "Tell me about the security protection you
| architected for your validators".
| Apocryphon wrote:
| I've got to say, this is an incredibly cyberpunk article.
|
| > Ronin, the Ethereum-linked sidechain that underpins play-to-
| earn game Axie Infinity, lost $540 million in crypto to an
| exploit in March. While the US government later tied the incident
| to North Korean hacking group Lazarus, full details of how the
| exploit was carried out have not been disclosed.
|
| It's not in William Gibson's style, sounds more like Bruce
| Sterling's.
|
| > Axie Infinity was huge. At its peak, workers in Southeast Asia
| were even able to earn a living through the play-to-earn game. It
| boasted 2.7 million daily active users and $214 million in weekly
| trading volume for its in-game NFTs in November last year --
| although both numbers have since plummeted.
|
| > Earlier this year, staff at Axie Infinity developer Sky Mavis
| were approached by people purporting to represent the fake
| company and encouraged to apply for jobs, according to the people
| familiar with the matter. One source added that the approaches
| were made through the professional networking site LinkedIn.
|
| Also gives me Charles Stross vibes.
| pjbeam wrote:
| Cyberpunk is now, just sans the 80s fashion inspirations :)
| munificent wrote:
| _> sans the 80s fashion inspirations :)_
|
| You definitely haven't been paying attention to Gen-Z people
| then. The 80s are back.
| pjbeam wrote:
| That's a fair assessment of my attention
| hindsightbias wrote:
| The future is already here. It's just not evenly distributed
| yet" - maybe W. G.
| silentsea90 wrote:
| Who knows, hackers might be using their $ on fashion but alas
| the profession makes it hard to flaunt.
| outworlder wrote:
| Where are my mantis blades?
| jerf wrote:
| The people in this review seem to think they're alright,
| but they look very silly to me:
| https://www.youtube.com/watch?v=tB4DDM8VHVg YMMV. But hey,
| maybe you can ask them for their design.
| nkrisc wrote:
| > but they look very silly to me
|
| And pretty impractical as well. They look really poorly
| designed in terms of maximizing leverage. It also looks
| like they lose a lot of energy in the flexing of the
| entire mechanism and their arm, compared to a blade held
| directly in the hand.
| tadfisher wrote:
| More like Cryptonomicon without the Nazi gold backing.
| ineedasername wrote:
| How is Proof of Authority, mentioned in the article, any
| different than normal social trust and reputational risk
| associated with that? This seems like a cute way of wrapping up
| the status quo in crypto lingo.
| dboreham wrote:
| All it means is that the system organizers decided to make a
| certain set of keys able to vote on transaction validity.
| Similar for example to how browser vendors decide to make a
| certain set of keys valid for issuing certs.
| [deleted]
| cemregr wrote:
| Is it just me or is the (x) button on the banner ad on this site
| not work, and open the ad instead of dismissing it?
| esseti wrote:
| Did he get the job? because i guess he was fired from the
| previous one.
| zanethomas wrote:
| ThePowerOfFuet wrote:
| Quarrelsome wrote:
| kinda disgusting he got fired for this if that was the case.
| Its a very sophisticated attack and I think its conversion rate
| would be rather high.
| kube-system wrote:
| The article says they are no longer employed. It is possible
| that this exploit was only possible because of breaking other
| security policies.
|
| At least, I hope that any reasonable organization doesn't
| secure $600+ million dollars by relying on the endpoint
| security of a device used to access LinkedIn
| uhhyeahdude wrote:
| > reasonable organization
| tedunangst wrote:
| Opening a legit job offer PDF on your work computer could be
| considered a fireable offense. You should not be using
| company resources to find your next job.
| cbsks wrote:
| It's also possible that he quit instead. If I interviewed for a
| new job, accepted an offer, and then everything blew up in my
| face... I'd probably not want to stick around.
| rideontime wrote:
| Yeah, I wouldn't want to work for a company that designed a
| system that allowed this sort of thing to happen either.
| labrador wrote:
| Can someone explain to me how a pdf can execute code?
| WorldMaker wrote:
| PostScript the "graphics language" that PDF was built around is
| a Turing Complete language.
| marshray wrote:
| Yes, but PDF doesn't embed the PostScript language (which is
| basically Forth). Acrobat Reader's Turing completeness comes
| from weird machines.
|
| https://en.wikipedia.org/wiki/Weird_machine
| Hamuko wrote:
| https://opensource.adobe.com/dc-acrobat-sdk-docs/standards/p...
|
| Page 414 and forwards. And if you're generally interested in
| PDF feature bloat, go to page 511 to find out how to embed 3D
| art, including the manipulation of the virtual camera, in your
| PDF document.
| labrador wrote:
| > _12.6.3 An annotation, page object or... that can trigger
| the execution of an action_ Page 415
|
| What could go wrong?
| pjc50 wrote:
| Exploits in the PDF viewer.
|
| The Adobe tools in particular have been a bountiful source of
| exploits for decades, but it's a complicated spec and there are
| plenty of opportunities for bugs.
| labrador wrote:
| I see, much like Unicode exploits. I use Chrome to view PDFs
| which I assume to be safe.
| ylyn wrote:
| Chrome's PDF viewer seems to be implemented in native code.
| But it probably benefits from the sandboxing that Chrome
| does.
|
| I would say Firefox is the safest here, because its built-
| in PDF viewer is written in JS, although Firefox's
| sandboxing is not as strong as Chrome's.
| tialaramex wrote:
| Program and data aren't really different, philosophically.
| On some level this even applies to people. When someone
| teaches you French is that program or data? Is it just
| data? Why can you now understand French then? Or if it's
| program, how does that work, who taught the teacher how to
| program you?
|
| So, our best effort is to constrain what certain data can
| do when we process it, in the hope that this prevents
| surprising negative consequences like a PDF that steals
| privileged information and sends it elsewhere.
|
| Notice that, in some sense, a PDF which just contains a
| photograph of your wife tied to a chair and holding today's
| newspaper, plus human readable text like, "We have your
| wife Sarah and all three kids Beth, Jim and Amanda. We are
| watching. Do not try to call for help. Email the privileged
| information to crooks@example.com or we will kill your
| family" is also potentially effective at doing this, but we
| would not usually consider that an exploit in this context.
|
| One irritation in this space is that programmers love
| General Purpose Programming Languages. The idea of the
| general purpose language is that it can do anything. But
| the problem in this sort of situation is that we don't
| _want_ programs which can do anything, in fact doing
| anything is our worst case scenario. We actually want
| Special Purpose Programming Languages. We want to write our
| PDF data processing software in a language that _even if we
| were trying_ can 't do the things that should never happen
| as a result of processing a PDF.
|
| This is the purpose of languages like WUFFS:
| https://github.com/google/wuffs
|
| You can't write a WUFFS program to, for example, email
| anything to crooks@example.com even if you desperately
| needed to, which means you definitely won't _accidentally_
| write a program which can email the privileged information
| to the crooks when fed a PDF. Of course the PDF mentioned
| earlier with the kidnap note inside it could still work.
| And also of course making a PDF renderer out of WUFFS would
| be a really big ask. WUFFS-the-library today can render
| PNG, GIF, BMP but notably not yet JPEG. But it 's clearly
| _possible_ for something like PDF rendering to happen under
| these constraints. Nobody ordinarily _viewing_ a PDF wants
| it to do arbitrary stuff.
| labrador wrote:
| Good idea, but WUFFS is written in C
| tialaramex wrote:
| Well, WUFFS the library is C code, but that's because in
| practice the language implementation is a Go program
| which emits C rather than machine code. There's no reason
| you can't compile WUFFS the language into, say, Rust, or
| PowerPC assembler, or a long series of letters to
| Princess Celestia [the FiM++ programming language],
| except that nobody did all that hard work.
| labrador wrote:
| It's amazing what people come up with when they have time
| on their hands for leisure activities. That's why I look
| forward to robots doing all the work while human subsist
| on universal basic income.
|
| FiM++ - Esolang
|
| https://esolangs.org/wiki/FiM%2B%2B
| ourmandave wrote:
| _The rate of DeFi hacks has accelerated rapidly this year,
| topping $2 billion in total funds lost, according to The Block
| Research data._
|
| Seesh, you could finance a war with $2B.
| headsoup wrote:
| I'm still not entirely convinced this wasn't an inside job (or
| entirely made up) and they just put a nice pot of money away
| somewhere. Wouldn't be without precedent in the wonderful world
| of crypto...
| kube-system wrote:
| You don't just take some dude's word for it when dealing with a
| $600+ million dollar heist. There were multiple third party
| investigators involved in the aftermath.
| dboreham wrote:
| Perhaps they not taking his word, but waiting for him to move
| the funds?
| kube-system wrote:
| They already know where the money went:
|
| https://home.treasury.gov/policy-issues/financial-
| sanctions/...
|
| And it has already been moved:
|
| https://www.blockchain.com/eth/address/0x098B716B8Aaf215129
| 9...
| lern_too_spel wrote:
| From the group that brought you The Interview hack, here
| is an interview hack.
| jandrese wrote:
| This doesn't mean it wasn't an inside job. Dude could
| have a nice payday for "oops I got PDF hacked", plus
| giving away enough information about their internal
| organization to make the attack feasible.
| kube-system wrote:
| The organizations that were called in to investigate this
| are very well aware of the likelihood of insider-threat
| attacks. It is basically financial fraud 101. They
| haven't released any information beyond what was detailed
| here, but you can be certain that it was thoroughly
| covered.
| tehlike wrote:
| Given it's crypto, there might be game in a game. You
| never know.
| tartoran wrote:
| Or the dev could be simply setup to take the blame.
| Everything's possible. Or an ex employee could have
| surveyed the system and shared data with a larger group
| to perform the operation.
| Thorrez wrote:
| Google warned of North Korean hackers targeting security workers
| through LinkedIn in January 2021.
|
| https://blog.google/threat-analysis-group/new-campaign-targe...
| paulpauper wrote:
| I think the media and tech writes overestimate the efficacy of
| spear phishing attacks. There is tons of research involved in
| finding suitable targets and then planning out the attack, such
| as the exploit, fake websites, fake emails, and other
| ingredients.
| t_mann wrote:
| I think this is instead a good reminder that no matter how
| complicated / unlikely a specific attack vector seems, if the
| bounty is large enough you better assume that someone is going
| to do it.
| larsiusprime wrote:
| It helps when your boss is a state actor and your target
| chooses to put $625 million in assets behind what amounts to a
| single point of failure
| rchaud wrote:
| Surely the technology experts at A16z and Binance could have
| given them some basic cybersecurity tips before cutting a
| $300 million check?
| hn_throwaway_99 wrote:
| Huh? Don't understand your point. When the potential bounty is
| $540 million, seems like investment well spent.
|
| Just another reason crypto is a godsend for bad guys (obviously
| other financial crimes occur, e.g. with convincing folks to
| send fake wires) but there aren't many better ways to steal
| half a billion dollars I think. But, yeah yeah, "HN is so mean
| and hates crypto!!!"
| paulpauper wrote:
| This is a huge outlier though and it's not $500 million of
| cash but $500 million of crypto that must be
| processed/laundered slowly into usable cash, which may not
| even be doable. Given the recent crash it's probably more
| like a 100 hundred million now.
| jacquesm wrote:
| Meanwhile, my kids' school forces them to use windows, spreads
| around lots of information that should be on websites as pdfs and
| asks to install all kinds of software from dubious sources
| including stuff that can only properly be classified as a rootkit
| in disguise.
|
| People are conditioned to trust certain verticals, Google, Apple,
| Microsoft (which owns LinkedIn) and a bunch of others and will
| lower their guard. Which is why it works so well. In fact I've
| received email from some of those where I was pretty sure I was
| being spearphished but they turned out to be real (but not on
| LinkedIn, which I refuse to join).
| alexfromapex wrote:
| This is so interesting, I just reported someone doing this on
| LinkedIn to the IC3. They create fake companies and ask for
| details like your SSN to ostensibly run a background check on you
| but in actuality it's to steal your identity or use your info to
| gain access to restricted resources.
| dboreham wrote:
| In my mind there has to have been some insider involvement (at
| least) in this attack. There are too many things unknowable to
| outsiders that would need to be known.
| treme wrote:
| it's hilarious that KJU was probably among the biggest benefactor
| of crypto boom.
| jspdown wrote:
| They rely on 9 trusted validators, the hacker managed to get
| access to the private keys of 4 out of the 9 validators.
|
| What's the point of using a Blockchain if you end up centralizing
| validations like that?
| kwertyoowiyop wrote:
| Don't worry, they're going to have 100 trusted validators, thus
| solving the problem...FOREVER.
| ltbarcly3 wrote:
| The true answer is that it doesn't make sense but investors
| don't care because BLOCKCHAIN
| mikevin wrote:
| 'Proof of Authority' sounds an awful lot like the regular
| banking system.
| anyfactor wrote:
| TLDR
|
| Job offer PDF was downloaded to office computer. PDF had spyware
| that infiltrated the system.
| CarbonCycles wrote:
| LN has now become a dumping ground for spammers, scammers, and a
| social network site. It's lost its appeal, and I am getting more
| scammers all the time.
|
| I'm beginning to contemplate what value LN provides as LN has
| focused on more aggressive marketing tactics, and it's starting
| to feel like Instagram with the engagements metrics...
|
| Oh yea, I'm still perplexed on how anyone would ever go into an
| interview w/out doing any homework on the company...even the
| smallest of start-ups have a presence on the net. They better
| damn-well have a pitch deck for new capital and employees.
| Animats wrote:
| This reads like blameshifting. Axie Infinity is a Ponzi on the
| way down. They need someone to blame for their failure.
| schemescape wrote:
| They say that a worker downloading (and presumably viewing) a PDF
| (fake job offer) allowed spyware in. Which PDF viewer was
| exploited?
| alexk307 wrote:
| You can easily embed arbitrary javascript into any PDF, and you
| can obfuscate it pretty well enough to get past most endpoint
| security tools on the market.
| WorldMaker wrote:
| You don't even need JS in a PDF. PostScript remains a Turing
| Complete language on its own.
| Nextgrid wrote:
| That JS would be sandboxed similar to in browsers, so you'd
| still need an exploit to break out of that.
| kube-system wrote:
| Not too tough, if you're a state backed group. Just buy
| one.
|
| The going price for Adobe PDF RCE zero-days is $80,000
| Jwarder wrote:
| Is there a good no-nonsense way to clean PDFs of possible
| threats? Hunting around I see mentions of converting
| PDF->Postscript->PDF to remove junk, but I also see mentions
| that Postscript is its own security mess.
| jabroni_salad wrote:
| Your only option is to disable all of those fancy features.
| That config only lasts until someone needs to file a form
| with the government though.
| Nextgrid wrote:
| I'm not sure it was even an exploit. It could very well be an
| intentionally-malformed PDF that pretends it has to be opened
| in a special "viewer" software, maybe even Adobe- or DocuSign-
| branded.
| snickerbockers wrote:
| im guessing it was the ol' ".pdf.exe" trick.
| Hamuko wrote:
| This sounds way too sophisticated for them to risk it with a
| "Offer.pdf.exe". Especially if it was state-backed. If the
| victim notices it, and the bar isn't high, you'd basically
| spook him away and alert the entire company.
| j0hnyl wrote:
| You're downvoted, but I'm certain this is exactly what it is.
| hn_throwaway_99 wrote:
| That trick doesn't work anymore for any reasonably modern
| email client.
| snickerbockers wrote:
| That's when you remind him that your boss needs to get this
| role filled by the end of the week so if you don't get a
| response by tomorrow you'll have no choice but to offer the
| job to another candidate.
| bfgoodrich wrote:
| silverPoodle wrote:
| You can put it into a .zip archive or just send an email
| containing a link with a fake PDF
| samatman wrote:
| To quote Fight Club: a major one.
| t_mann wrote:
| This is an important social engineering attack vector that all
| companies should be aware of. These kind of targeted attacks
| (often spoofing valid contacts that employees would legitimately
| exchange documents with) were common since I can remember the
| space, but using job applications is particularly disingenuous
| because employees are naturally going to be a bit secretive about
| those.
| Ekaros wrote:
| And this is why you should separate work machines from private
| and anything else. Specially when working with something high
| value.
| petilon wrote:
| If you care about security, two things you don't want to install
| on your computer are Adobe Acrobat and Microsoft Office. These
| products were written the 1990s in C/C++ and are impossible to
| secure. Microsoft does not allow installing Office on Secure
| Admin Workstations (SAW) [1] for a reason!
|
| [1] https://www.microsoft.com/en-us/insidetrack/protecting-
| high-...
| wly_cdgr wrote:
| How do you go through a whole job interview process and not
| realize that the company you are applying to is fake and doesn't
| exist?!
|
| ...Oh wait, this is crypto
| vgel wrote:
| I applied (and got a job and worked at for a bit) a stealth-
| mode startup and it felt like a scam. No web presence, nobody
| had it listed as their job on LinkedIn, a couple vague
| references to funding rounds online that mentioned a different
| business model (turns out they had pivoted), etc. Remote
| applications are weird.
| a4isms wrote:
| How should we respond if we interview for a non-crypto job, and
| when we can't get any background on the company, they explain
| that they're in "stealth mode" to protect the advantage of
| surprise?
|
| From time to time there are real startups that decide to fly
| under the radar until they're ready to show the world what
| they've built. Of course, many such companies turn out to be
| massive duds... Like Cuil.
|
| https://en.wikipedia.org/wiki/Cuil
| 999900000999 wrote:
| Just interviewed with a crypto company, can confirm. Even
| "legitimate" companies with a web presence, customers, etc,
| come off as super sketchy.
|
| That said, for lower income people you'll be absolutely
| inundated with scams, a good friend of mine just hit me up cuz
| someone wanted to promise him for $100 or so a week, you'd
| somehow become a crypto millionaire. I actually think crypto in
| its entirety is a giant scam, there's just levels of
| sophistication to it.
|
| Not everyone's going to fall for give me $100 and I'll turn
| that into $10,000 , but a ton of people fell for buy a bunch of
| crypto coins and hold ,time the market and sell.
| jandrese wrote:
| What an incredible story. In fact it is so incredible that it
| smells a bit funny to me.
|
| Are we sure this heist wasn't an inside job? Axie was collapsing
| under its own weight and an employee decided to swipe all of the
| crypto after making up this crazy job offer PDF story to cover
| their tracks.
| password4321 wrote:
| I'm amazed I had to scroll down this far to find the obvious
| explanation: a rug pull with a press release so the perpetrator
| doesn't have to fake their own death.
|
| Edit: I thought the lack of details was fishy but the following
| would be tough to fake:
|
| _the FBI has attributed North Korea-based Lazarus Group,
| highly skilled hackers, to the Ronin Validator Security Breach.
| The US Government, specifically the Treasury Department, has
| sanctioned the address that received the stolen funds_
| xigency wrote:
| So they lost half a billion dollars because they forgot to set up
| Multi Factor Authentication?
| marshray wrote:
| MFA can't help you if your network admin is willing to open an
| untrusted file with an Adobe product.
| hn_throwaway_99 wrote:
| Two points to highlight from this article:
|
| 1. LinkedIn is an absolute godsend for bad guys, allowing easy
| targeting of everyone in the company with spear phishing emails
| and texts. I know many security professionals no longer use their
| real name, and don't list the real name of their company, because
| they know it's such a great hacking vector. Not sure what/whether
| LinkedIn can do anything about this.
|
| 2. I wish there were more information about what the
| vulnerability was in the PDF in the first place. I think a lot of
| people would be wary of downloading a PDF from a stranger, but
| not from someone who you had multiple interview rounds with and
| who offered you a job.
| jcrawfordor wrote:
| Most PDF "attacks" in the real world are very unsophisticated.
| One of the most common uses of PDFs in a phishing context is
| just as a way to deliver a link that would likely result in
| blocking by email security products (many don't inspect inside
| PDFs, and even for those that do the PDF format is complicated
| enough that it offers tremendous opportunities for
| obfuscation). I would wager money that the "PDF attack"
| involved here was as simple as a link to a malicious executable
| presented in a PDF to avoid detection by email filtering... in
| my time as a security analyst this was the #1 source of real
| compromise incidents, and anecdotally it seems to remain
| popular today based on the number of such PDFs I receive in my
| spam email.
|
| The PDF format presents many opportunities for other exploits,
| either obfuscating a payload or running code, but modern PDF
| viewers are locking these opportunities down to such a degree
| that they are not very reliable (most of all because it is
| difficult to know which PDF viewer your target will use, and
| many popular PDF viewers today like pdf.js are relatively
| feature-incomplete which is a significant security advantage in
| this case). It's possible that something more sophisticated was
| going on but I would be very surprised if it was anything more
| complex than using the PDF as an obfuscated transport for a
| binary packed in it and invoked by the user (e.g. by clicking a
| link in the PDF with a javascript target). Non-user-interaction
| PDF vulnerabilities exist but are increasingly hard to come by
| as there has been more than a decade of work on locking down
| PDF viewers and the situation has improved dramatically in that
| time.
|
| Contrary to what people sometimes expect, highly organized
| groups (such as APTs) tend to stick to very basic, simple
| methods as much as possible, since they are relatively
| reliable. The use of recent vulnerabilities in a specific PDF
| viewer, for example, is high risk due to the likelihood of
| failure and the opportunities for analysis it presents (you
| will have to do custom development rather than using off-the-
| shelf tooling). This is the kind of thing that organized groups
| try to avoid as much as possible, subject to an ROI analysis.
| Or in other words, if putting a link to an EXE in a PDF still
| works, why would you bother with anything else?
| noduerme wrote:
| If it's just a javascript link to download an EXE, doesn't
| the target of the hack still need to run the EXE? Or are you
| saying that a link in a PDF can install _and_ execute code on
| its own?
|
| Assuming it can't, then the engineer had to click to run some
| unknown EXE after downloading it... that should hardly be
| described as a "PDF attack".
| TechBro8615 wrote:
| There is a whole class of attacks related to "deep linking"
| and custom URL schemes that the operating system can pass
| to any application that registers itself to match it. At
| that point the sanitization is up to the application.
|
| I recently stumbled upon a nice write-up [0] that described
| this class of attack and surveyed which software was
| vulnerable to it. Many crypto clients were included.
|
| [0] https://positive.security/blog/url-open-rce
| joshstrange wrote:
| Personally I don't update my LinkedIn until I start looking for
| a new job. There is absolutely no need for anyone to know where
| I work (or at least for me to share that far and wide
| publically) and I'm not interested in cold emails/cold linkedin
| messages.
|
| My decision was cemented in 2020 when someone who didn't like a
| tweet of mine retweeted it to my old company's twitter account
| trying to get me fired/reprimanded (The tweet in question
| called out my local PD for a dubious tweet they made, the
| person who tried to get me in trouble lived in a different
| state 12+ hours away). Thankfully my current company wouldn't
| have cared but there is no need to give people ammo.
| V-2 wrote:
| Which is why I simply don't use my real name (well, not a
| full name) for my Twitter account. I have the right to keep
| my professional and private persona separate, and if someone
| really wanted to, they could find out where I work anyway.
| (I'm not tweeting anything extreme in my own view, but
| there's always someone who will regard it as such, and as you
| say, what's good about giving people such option to begin
| with).
| hn_throwaway_99 wrote:
| > Personally I don't update my LinkedIn until I start looking
| for a new job.
|
| Perhaps semi-off topic, but note there are companies that
| sell software (spyware?) to HR departments that specifically
| trolls LinkedIn looking for when employees update their
| LinkedIn profiles as a sign they're looking for a new job.
| This may or may not be a good thing depending on your
| position, perspective, or company, but just be aware it
| exists.
| heleninboodler wrote:
| Last time my RSU cliff came around, I logged into LinkedIn,
| updated my profile and accepted the backlog of connection
| requests (and read the flurry of "congratulations on your 4
| year anniversary" messages). I almost immediately got Slack
| messages saying "are you leaving?" But I _wanted_ them to
| notice; that was the point.
| joshstrange wrote:
| Yeah, though I'd get dinged by that either way since I
| normally update my bio to include recent projects/tech I've
| worked with. This way I can hide behind plausible
| deniability "Oh, I just got around to adding X company to
| my LinkedIn" if I need to, whereas updating an existing
| entry is harder to justify (without giving away you are
| looking). Though I also try not to work for companies that
| I would need to worry about that.
| mgkimsal wrote:
| > whereas updating an existing entry is harder to justify
| (without giving away you are looking)
|
| I don't think it is at all. Indeed, if you're updating it
| regularly (every 3-4 months, perhaps?) with new
| project/task stuff, it's simply keeping things fresh in
| your mind, vs having to try to trawl back 3 years to
| think about project FOO.
|
| If you _only_ update it once every 2 years, then people
| can draw more nefarious conclusions.
| outworlder wrote:
| You can't really reason with algorithms.
|
| You'll be placed in a list with a score next to your
| name.
|
| > Though I also try not to work for companies that I
| would need to worry about that.
|
| How do you figure out what kind of software your company
| uses internally?
| joshstrange wrote:
| > How do you figure out what kind of software your
| company uses internally?
|
| I work for smaller companies that are more concerned with
| building instead of turning their workforce into scores
| on a list.
| cmeacham98 wrote:
| I doubt they'd actually ask you about it (and thus give
| you a chance to "explain" yourself), HR would just note
| you down and you'd be more likely to be laid off, less
| likely to get promotions approved, etc.
| adaml_623 wrote:
| I know this is off topic but I'm always confused by the
| attitude you've mentioned where companies don't actively
| work to retain staff.
|
| I wonder if there are any courses for managers to train
| them to think logically about this and not switch into
| bad decisions based on emotion.
|
| Companies waste so much money on hiring and then deciding
| to react very slowly to changes in market conditions. If
| businesses treated their staff like they treat their
| clients...
| kortilla wrote:
| > less likely to get promotions approved
|
| This is not how companies work (at least the ones worth
| working for). Retention risk is a reflection on their
| current role, compensation, manager, etc.
|
| We have absolutely promoted high performing employees
| and/or given them raises even though we knew they were
| looking at other opportunities.
| cmeacham98 wrote:
| Companies worth working for aren't talking their
| employees in LinkedIn.
| joshstrange wrote:
| Fair, though if I'm looking I'm planning on being gone in
| 1-2 months max and I'm probably leaving in part due to
| lack of promotion.
| MisterBastahrd wrote:
| Meanwhile, my company actively gives us hints on how to
| spruce up our resumes with marketing bullshit that impresses
| nobody but middle managers who think that keyword searches
| with word soups like "Innovator. Thought-Haver. Bringer of
| Boys To the Yard." are their paths to big league success.
| BolexNOLA wrote:
| It's a shame too. In my experience LinkedIn has been great for
| job hunting, indeed et al. were worthless time sinks for me. I
| want to keep it just for the ability to job hunt and get
| _results_ but as you said...it's a risk too.
| V-2 wrote:
| That's the only thing it's good for, but that thing actually
| works. My last three job offers were from LinkedIn (I
| ultimately rejected one because my employer at the time gave
| me a counteroffer when I handed my notice, but I did accept
| the other two). The "content" on LI (feelhgood / motivational
| BS) is do ridiculous that I sort of contempt-read it
| ("hateread" would be to strong a word) for the heck of it,
| but I can't wrap my head around WHY people would participate
| in this nonsense for real.
| BolexNOLA wrote:
| Yeah I really don't see any appeal beyond jobs (my current
| job came from it). The content is just SEO/personal
| branding fodder.
| rurp wrote:
| When I first signed up for LI I honestly couldn't tell the
| difference between the actual feed and a what I imagined a
| parody site would look like. The posts that proclaim
| themselves to hold controversial ideas, followed by the
| most banal cliches possible, crack me up.
|
| Once in a while I check the feed for kicks and it's always
| 100% spam, cliches, humble brags, and not-so-humble brags.
| ineptech wrote:
| > I wish there were more information about what the
| vulnerability was in the PDF in the first place.
|
| Agreed, I thought that opening a read-only PDF was GRAS
| regardless of the application.
| WorldMaker wrote:
| PostScript is a Turing Complete language (always has been),
| and an over-simplified description of PDF is that it "just"
| wraps PostScript in a single Virtual Machine to target
| (versus PostScript has a lot of subtly different physical
| machines it was built for/targeted).
|
| That "PDF VM" has had many 0-day RCE bugs over the years.
| Thankfully though the VM is standardized with the format it
| does have multiple implementations still in different
| applications and many exploits are application-specific
| implementation bugs.
| LegitShady wrote:
| I see people posting things even on HN where its a link to a
| PDF and I don't click on them. I remember PDF being a leaky and
| buggy format whose interpreters were full of vulnerabilities. I
| don't click on PDFs.
| ChrisMarshallNY wrote:
| _> LinkedIn is an absolute godsend for bad guys_
|
| I am listed as the Principal on a couple of companies, and get
| _constant_ approaches that are obviously fake (like an
| attractive young "stewardess" from Dubai, who just happened to
| like my picture (which is actually my logo)).
|
| I've given up reporting them, as LI _always_ responds with
| "This is not in violation..."
| djbusby wrote:
| Isn't LI owned by MS?
| JohnJamesRambo wrote:
| Is there a "Best of" archive for HN comments?
| ChrisMarshallNY wrote:
| Yup. I'm gonna remove my cynical comment (although I still
| totally believe it). It's just not helpful. I think people
| can figure it out, for themselves.
|
| Also, people use LI as a way to aggregate information, then
| send emails that appear to be from LI, but are not. I got
| one of those, yesterday, and reported it to LI, saying
| "These guys obviously used your service to construct this
| honker."
|
| And LI's reply was ... envelope, please ... "Not our
| problem. Go away, kid. Yer bodderin' me." but stated a bit
| more politely.
|
| I deliberately stay fairly open. I mentioned that, some
| time ago. It comes with some problems, like a determined
| bad actor can build up a fairly good profile.
|
| But I have had _years_ of experience, rubbing elbows with
| professional con artists, so I am maybe a little tougher to
| fool than many (but some approaches have come close -these
| folks are good). I would never be so arrogant to say that I
| can 't be phished or whaled, but it's almost certainly not
| worth the effort.
| wombatpm wrote:
| I recently had some try the CEO/boss needs something
| right away for a customer ruse via text. I know LI was
| the source, because it referenced my previous job and LI
| still had the incorrect information. I played along that
| I was ready to purchase with my corporate card. Then
| after wasting more of their time, I sprung that they were
| fishing with old bait. Good times
| PebblesRox wrote:
| I'd love to hear more about your experience with con
| artists!
| ChrisMarshallNY wrote:
| It's not the type of story that I really share in the
| venue of press, radio and films, if you get my drift.
|
| I'm happy to chat -a bit- about it, directly. Many of the
| stories that I know, are not mine, to tell.
| cosmodisk wrote:
| Same here. I grew up knowing some very shady people. Some
| of the stuff could easily be turned into books or a
| script for a movie.
| _fat_santa wrote:
| I think one shouldn't discount the attack vector that is just
| working in the Crypto industry, especially when you're someone
| who works with startups rather than the big guys.
|
| In the "Web2 Sector", it would be very easy IMO to snuff out a
| fictitious company. I've gotten a handful of "offers" in the
| past and you can see straight through them, because the company
| doesn't exist in real life and you can't find any info on it,
| huge red flag.
|
| The problem with the "Web3 Sector" IMO is you have a bunch of
| upcomming players in the space that no one has heard of. Just
| like investors in Cryto, if you're a developer in the space, no
| doubt you are jockeying to join a project that might land you a
| 7-10 figure windfall at the end.
|
| So if an unheard of company approached me, I would tell them to
| kick rocks. If a similar company approached someone in the
| "Web3 Sector", they might take it thinking it's an emerging
| opportunity. I'm sure this still happens with Startups but my
| gut says it's really bad in the Web3 space.
| samstave wrote:
| Speaking of spear phishing:
|
| When I was at lockheed we had an incident whereby a bunch of
| folks had attended some defense conference, and after the fact
| received emails from folks they had 'met' at the conference,
| something along the lines of
|
| "Hey Bob, we met at the [defense] conference this last week and
| I wanted to be sure you had my contact info: malware-
| contact.vcf"
|
| or some other payload.
|
| This installed a very slow sprawling worm which would slowly
| trickle data out of lockheed to China.
|
| It was not discovered for quite a while due to how slowly it
| operated, but someone had complained about machine performance
| and IT looked at the machine and discovered the worm... after
| removing it - this somehow sent a signal to China that they had
| been found and all the worms started to firehose as much as
| they could until egress was closed. At the time, all of
| Lockheeds 150,000 employees had just three egress points to the
| internet. They had to shut them all down to kill that worm.
| secondcoming wrote:
| Also, don't use a company device for personal business.
|
| If you use your own device then do company work in a VM.
| jessaustin wrote:
| Opening the pdf wasn't "company work", so maybe everything
| should be done in a VM? (Not the _same_ VM!)
| secondcoming wrote:
| He opened it on a company device I assume
| jessaustin wrote:
| That's possible, and addressed by your first sentence
| above. You wrote the second sentence to address a
| different possibility. In that case, a process with
| access to the whole device could read e.g. auth tokens
| contained in a VM.
| jedberg wrote:
| I'm not sure this is Linkedin's problem to solve. They are just
| a directory.
|
| I suppose they could add a phishing warning for messages sent
| on LinkedIn, but really it's an education problem, teaching
| people to identify what phishing emails look like and how to
| avoid them. This is a problem I've been working on since at
| least 2003, when we realized that the best way to prevent eBay
| account takeovers was teaching people what phishing is. We also
| identified that education is the hardest solution to achieve.
|
| It's ironic that the security professionals are the ones hiding
| their identity, given that they are the best prepared to
| identify and avoid phishing emails.
| hungryforcodes wrote:
| You're right -- apparently it's a PDF problem, and I'm still
| looking for an explanation of how a simple PDF could be worth
| half a billion dollars.
| burrows wrote:
| > I'm not sure this is Linkedin's problem to solve. They are
| just a directory.
|
| If the issue reduces user metrics, then they will want to fix
| it. Ultimate responsibility seems irrelevant.
|
| > It's ironic that the security professionals are the ones
| hiding their identity, given that they are the best prepared
| to identify and avoid phishing emails.
|
| I might have demolitions training, but I'd still rather walk
| around the minefield.
| aaronharnly wrote:
| On (1), I have seen employees get spear-phishing texts (Welcome
| X! This is the CEO of Y. I need you to do a small favor...)
| within hours of updating their LinkedIn. I assume there are
| robots crawling it constantly looking for fresh candidates for
| account takeovers or other scams.
| alexfromapex wrote:
| I think one other thing that bears mentioning is that
| LinkedIn's reporting doesn't easily let you explain how someone
| is performing a scam. If you're diligent you can find the link
| somewhere where you can actually explain it but when you just
| "report" someone or a job the response from LinkedIn is usually
| "We didn't find anything indicating this is a scam" or similar.
| walrus01 wrote:
| > I know many security professionals no longer use their real
| name, and don't list the real name of their company, because
| they know it's such a great hacking vector. Not sure
| what/whether LinkedIn can do anything about this.
|
| on the other hand I bet you could collect some interesting
| things by creating a few fake people as linkedin honeypots at
| FAANGs, and I would be very surprised in their infosec/netsec
| teams aren't already doing this.
|
| or getting real people who opt-in to have their linkedin
| profile receive incoming scams, virus, trojans, phish links and
| pipeline them into the infosec/netsec team.
| bl_valance wrote:
| Isn't the issue here that they used their work laptop or were
| on their work's internal network(VPN?) to "apply" for this job?
|
| This is something I see/hear so often, people using work
| equipment/network to conduct their personal stuff. This, IMO,
| should not be allowed at all.
| Dig1t wrote:
| I deactivated my LI after my last job search, it hasn't
| affected my life at all since then. I don't know why you need
| one at all most of the time. Even without one, I think it would
| be perfectly easy to get interviews at companies, most
| interviews I've done in the past have been the ones I got by
| just going to the company's website and applying directly
| anyway.
| caseysoftware wrote:
| Some in the security community demonstrated this with Robin
| Sage, circa 2009: https://en.wikipedia.org/wiki/Robin_Sage
|
| It introduces the idea of "transitive trust" where person A
| might not know person B but if the two have a bunch of contacts
| in common, the odds of A trusting B goes up. When there's a
| profile with tens or hundreds of shared connections, it looks
| real by all accounts.
|
| I wrote about this is an intel gathering/attack vector way back
| in the day but it's 100x better now because connecting is
| second nature and people trust more now:
| https://caseysoftware.com/blog/open-source-intelligence-link...
| elif wrote:
| I'm so confused by #2 as well.
|
| If pdf is compromised, is it fixed? This seems like the kind of
| vulnerability that would ruin pdf's reputation permanently. It
| was the safe alternative to sending someone a .doc particularly
| because of it's limited functionality.
| kornhole wrote:
| I only use titles such as 'Employee' 'Worker' 'Carbon Based
| Life Form'.. on Linkedin. It also significantly reduces the
| amount of spam and cold calls.
| rmbyrro wrote:
| The main problem was using a machine that had access to half a
| billion dollars to also browse the web and do stuff like
| applying for jobs.
|
| If you're gonna have access to such amount of money, it's worth
| buying a dedicated machine and using it very, very cautiously.
| PragmaticPulp wrote:
| > The main problem was using a machine that had access to
| half a billion dollars
|
| Going up a level, the main problem was that the company had a
| system where a _single person_ could irreversibly transfer
| half a billion dollars away from the company.
| handoflixue wrote:
| The article actually covers that it required 5 out of 9
| people to sign off. They got 4 via PDF attacks and 1 via
| legacy access that was never properly terminated.
| 8note wrote:
| I think it's worth noting that the people did not sign
| off, only the keys did.
|
| The system does not require people to sign off, but for
| the keys to sign off.
|
| I don't think it's worth calling this a hack, the keys
| are what owned the moneies, and it's the keys that
| decided what to do with it. People have access to keys,
| they don't own them
| tylersmith wrote:
| The compromised employee had access to that 5th factor it
| was just not as direct as as him having a 5th private
| key.
| mousetree wrote:
| My understanding of the article was that only 1 person
| was compromised and that the exploit installed on their
| computer was then used to access the validator nodes
| themselves. FWIW, I have no idea what a validator node is
| but I'm assuming that by compromising one employee's
| workstation they somehow got access to multiple other
| machines (which if true is itself a bit of a f* up).
| logifail wrote:
| > I'm assuming that by compromising one employee's
| workstation they somehow got access to multiple other
| machines (which if true is itself a bit of a f* up)
|
| Q: If you assume the bad guys have already compromised
| your workstation, how sure are you that they won't be
| able to compromise other machines you connect to?
| charcircuit wrote:
| You can't which is why one person shouldn't have access
| to more than one.
| [deleted]
| fsckboy wrote:
| because the workstation was compromised by opening a
| corrupted pdf, but that vector wouldn't compromise the
| other machines unless users on them could be induced to
| open the same pdf.
|
| not to say it can't be done, but it was unexplained
| sangnoir wrote:
| It doesn't have to be the same pdf, it could have been an
| attachments from compromised machine via email/slack.
| "Hey, can you help me figure this unusual log/transaction
| summary". How many wouldn't open such an attachment from
| a "colleague"?
| abxytg wrote:
| Yep. Bad opsec at the org level. Either the eng was doing
| work stuff on a personal laptop or personal stuff on a work
| laptop. This is easily preventable and should be table stakes
| when handling money, phi, etc
| spaceman_2020 wrote:
| When I first got into crypto, a few things were pretty much
| drilled into my head:
|
| - Not your keys, not your coins; always self-custody
|
| - Never use the same machine for trading and for work/surfing
| the web
|
| - Store only funds you want to regularly trade with on a hot
| wallet. Everything else on a cold wallet.
| empraptor wrote:
| and this is part of why i think cryptocurrencies should
| have died before large number of people wasted their money
| on it. for the average user without the
| time/knowledge/patience to handle cryptos "properly", the
| choice is between losing money while handling this shit
| yourself or losing money while trusting someone else to do
| it right.
| spaceman_2020 wrote:
| Its an entirely free market. Just because one person
| doesn't understand the tech and loses his money doesn't
| mean that everyone else shouldn't be allowed to use it
| either.
|
| Even if you don't buy into the crypto vision (I don't), a
| digital-only currency that isn't tied to any nation-state
| does deserve to exist.
| Retric wrote:
| It's fine for a few people to play with such a system.
| The issue if it's absolutely clear crypto is incapable of
| widespread adoption or just about anything else people
| hype it up as, then it shouldn't be hyped as if that
| stuff is a possibility.
|
| I could never tell how much was incompetence vs fraud,
| but either way without the hype vastly fewer suckers
| would be holding the bag right now. The crypto ecosystem
| has been just been terrible for just about everyone and
| things are far from over.
| spaceman_2020 wrote:
| The people holding the bag right now mostly got in
| because of the allure of quick profits. And if they
| didn't sell even after making incredible (paper) returns,
| they have their own greed to blame.
|
| Bitcoin was $6,000 in March 2020. It hit $63,000 in April
| 2021. And if you didn't sell that top, it hit $67,000
| again in November 2021.
|
| Even now, it has dropped less than Netflix, a supposed
| bluechip.
|
| I don't know what's the scam in this - you had plenty of
| entry opportunities and plenty of exit opportunities. The
| underlying system itself still works exactly as
| described.
| 8note wrote:
| I'd put an addendum to the first one
|
| You can't own keys, so you can't own coins. You instead
| have access to coins when you have access to keys.
| abirch wrote:
| I still can't believe that they opened the PDF on the
| _company_ computer. I always use my home computer and the
| poor hacker would get bored of seeing all of my Raspberry Pi
| projects that I haven 't done.
| cfn wrote:
| I suppose that sending it during business hours and, who
| knows, maybe the final offer would be in the PDF and the
| poor guy couldn't wait to open it. The rest is history.
| kuboble wrote:
| It might be hard to believe that the particular person in a
| particular company did that, but given a lot of attempts,
| dedication and lucky / unlucky circumstances eventually
| somewhere someone will trust a malicious person and will
| get socially engineered into opening a pdf on a working
| computer.
| godot wrote:
| Also wonder if the PDF exploit works for only
| local/native PDF readers (e.g. Adobe Readers) or also
| web-based. If someone occasionally checks their personal
| email from a work laptop, chances are they'd only use the
| Gmail preview to open the PDF. It seems like most
| engineers wouldn't get all the way to downloading a job
| offer PDF to their work laptop and opening it up there.
| turtlebits wrote:
| If you're looking for work, you have to interview during
| the day, which you're probably in office (things are very
| different now). I know I'm guilty of having my personal
| emailed signed into my work computer (albeit with a
| separate browser). I've also done virtual interviews in the
| office meeting/phone room.
| bornfreddy wrote:
| You've done interviews in the office of your (then)
| current employer??? Gutsy. I wouldn't dream of using
| employer's equipment, time or space while negotiating for
| a new employment.
| CrispinS wrote:
| I can't believe a software developer is using an operating
| system/pdf viewer that isn't patched for security
| vulnerabilities as major as an RCE.
|
| Unless this was a zero day, but I would have assumed the
| article would mention that fact ..
| da39a3ee wrote:
| Huh? I've used my company laptops for my personal life for
| the last 15 years. Why would I want to carry two laptops
| everywhere? I travel. I barely remember what a personal
| laptop is.
| RajT88 wrote:
| I travel with a HP Spectre x360 for personal stuff. It is
| barely a weight or bulk addition compared to my work
| machine.
|
| When I was on the road all the time I also had separate
| phones to ensure I never got stuck with a dead phone.
| logifail wrote:
| > I've used my company laptops for my personal life for
| the last 15 years.
|
| Counterpoint: I've been completely and utterly allergic
| to opening anything personal from any company system for
| longer than that.
| jazzyjackson wrote:
| lol
|
| do you at least dual boot?
|
| have a separate user account?
|
| I guess its fine as long as your computer doesn't have
| the credentials to the company slush fund.
|
| Friend of mine I traveled with carried 3 macbooks with
| her: school issued, work issued, and personal. They had
| different software licenses tied to the machine,
| whadyagonnado?
| acheron wrote:
| I hope this is satire.
| kornhole wrote:
| I think you are joking to bait us. At least use a VM
| running a VPN within it. It won't protect you from screen
| captures or keyloggers your employer put on your machine,
| but it will segregate files and network activity.
| koofdoof wrote:
| How usable is LinkedIn with a pseudonym? Is that a security
| industry only practice or could a regular dev get away with
| that too? I've always been shy about having a profile with my
| actual name but id consider one with a thin veil of anonymity.
| 8organicbits wrote:
| Same, although my perception is that LinkedIn has moved past
| its peak usefulness, and it would be better to spend time on
| other platforms than creating a LI account. All I hear about
| LinkedIn these days is spam.
| bckr wrote:
| which other platform?
| 8organicbits wrote:
| There's a lot of platforms that do sort of related
| things, so it's a hard thing to answer. For "finding a
| job" I've been looking at HN, remoteok, and a bunch of
| others. For professional networking I use various tools
| run by former coworkers (mostly Slack and Google Groups).
| For "blogs" I use HN and Reddit. etc. I don't think
| LinkedIn does any of those better (my perception, I'm not
| a current user).
|
| Personally, I'm probably not interested in a LI clone for
| many of the reasons I stopped using LI. I deleted my LI
| account maybe 8 years ago, after getting too much spam
| (and I think some security issue?)
| mistrial9 wrote:
| LinkedIn sceptic here -- I would assume that in 2022, the
| closer you are to real, legal Microsoft-ecosystem roles,
| the more useful it is.. meanwhile, the independent people
| in tech get splashed with mud. No comment in this
| discussion has indicated to me that LinkedIn is not useful
| for certain swathes of established professions, even now.
| chatmasta wrote:
| As an engineer I never found LinkedIn useful. But during
| college I made sure to connect with everybody, even if I
| barely knew them. The only jobs I've had I got through other
| means, in some cases even "connections," in the traditional
| sense of the word, which incidentally exist on the LinkedIn
| graph, but that's just a mirror of real life and it's not
| like the coordination occurs over LinkedIn messages anyway.
|
| As a startup founder, it's effective in some contexts, like
| as a contact point or promotional tool. We never felt the
| need to use it for recruiting. At least in the software
| industry, GitHub is a much more effective marketplace of
| talent. But LinkedIn can have some benefits for a startup
| outside of recruiting. Posting content about your product is
| a good way to stay in front of investors you've connected
| with who doomscroll their LinkedIn feed like a dev does HN.
| :) (it's also something I need to automate because I block
| LinkedIn on /etc/hosts for productivity purposes..)
|
| I'm not sure I've ever _sourced_ an opportunity from
| LinkedIn. I also never accept connections without at least
| one prior interaction. For me it's a tool for following up
| and keeping in touch, not introductions. It might also be
| useful in some rare sales contexts, for some specific
| archetype of audience especially susceptible to the
| psychological tactics commonly deployed to the LinkedIn
| newsfeed. Developers are definitely not that audience (well,
| not on LinkedIn at least...)
| charlie0 wrote:
| I really wish I could just dump LI and delete my account;
| it's just spam and another service for those who love to self
| promote themselves. I won't do it because I'm not sure how it
| will impact by ability to get a job.
|
| How many of you have gotten jobs with no LI account? YEO?
| CodesInChaos wrote:
| Did this use a code-execution vulnerability in the PDF reader? or
| did they just trick the user into opening an executable?
| nemothekid wrote:
| I'm assuming it was an exploit in Adobe reader. The target
| cloud have even been persuaded to install Adobe reader to
| "e-sign" the document. PDFs don't have the best track record
| when it comes to security
| silentsea90 wrote:
| Why do pdfs even allow executing code outside of the pdf env
| ie why isn't there a sandbox/apis that allow very limited
| operation?
| nemothekid wrote:
| >Why do pdfs even allow executing code outside of the pdf
| env
|
| Some PM in 2006 thought it would be a good idea if PDFs
| were turing complete. I'm sure the word sandbox wasn't even
| thought about. 10 years later PDF (and more notably, Flash)
| became huge attack vectors.
|
| I think a far more interesting hack is when NSO used a PDF
| to embed a virtual machine inside an iPhone to develop a
| zero click exploit over iMessage:
|
| https://hothardware.com/news/zero-click-malware-pwns-
| iphone-...
| darepublic wrote:
| During beginning of pandemic I got a job via a fully remote
| process. I felt it was sketchy in some respects and I began to
| increasingly fearful that it was some kind of phishing scheme.
| Luckily turned out to be legit. Job applications are such an open
| door for this kind of thing. They collect so much info from
| candidates, easily enough to commit identity theft. Also god
| forbid the company or recruiters get hacked and the data leaks
| anyway
| londons_explore wrote:
| Chrome/Edge PDF viewers are pretty secure. You can reasonably
| safely open anything in them.
|
| Desktop PDF viewers like acrobat are gaping security holes...
| Don't use them!
| ahmadmijot wrote:
| Does Adobe Acrobat really that bad? We use Acrobat Pro because
| it easy to modify pdf file with it. Other software can't do
| that much. Is there other pdf 'editor' that you can recommend?
| londons_explore wrote:
| Acrobat in a virtual machine that you don't connect to the
| network?
|
| Most malware these days can't function without internet
| connectivity. The exploits typically connect to a server to
| get the rest of their code because they don't want any pesky
| researchers getting their hands on stuff.
| TedDoesntTalk wrote:
| I use PDF Expert on MacOS for its editing and markup abilities;
| built-in browser viewers aren't good for that. What should I
| do?
| CamelRocketFish wrote:
| Don't work for a crypto company.
| iamwil wrote:
| In this case, there's no need to make it on a blockchain if a
| company controls the majority of validators.
| UberFly wrote:
| I read the first paragraph, the overlay banner popped up and
| blocked everything. I don't care what the article says after
| that.
| elif wrote:
| Is this the moment we need for LaTeX to become standard? pdf is
| clearly to blame here imo. This guy isn't the only one to trust
| it.
|
| It seems like the entire legal profession, for instance, should
| be crippled by this vulnerability disclosure, if true.
| shp0ngle wrote:
| hahaha
| Barrera wrote:
| > Validators fulfill various functions in blockchains, including
| the creation of transaction blocks and the updating of data
| oracles. Ronin uses a so-called "proof of authority" system for
| signing transactions, concentrating power in the hands of nine
| trusted actors.
|
| This paragraph perfectly encapsulates everything wrong with the
| way promoters sell Ethereum. Smart contracts can do little of
| interest beyond straight monetary transactions without
| information about the outside world. That information comes from
| "oracles", or what the article calls "validators".
|
| The security guarantees of this system are far, far weaker than
| the Ethereum consensus protocol, as the article demonstrates. And
| yet, the system is hyped to the n-th degree by sheisters who
| ignore this basic fact with ludicrous claims about security and
| stability.
|
| Zooming out, basically Ethereum is hyped as a platform for "smart
| contracts." But the minute a smart contract does anything beyond
| basic money transfers, it needs an oracle. And with the oracle
| comes radically reduced security.
|
| Eventually, this will be obvious. For now, shenanigans like this
| will continue.
| whatisweb3 wrote:
| Oracles that connect to off-chain data are usually understood
| as points of centralization, I don't think Ethereum or it's
| developers are selling otherwise.
|
| Most Ethereum developers are advising against relying on
| bridges across security zones that would be upheld by multisigs
| and oracles, they are vulnerable to attacks. A better model
| than a bridge to sidechain would be a rollup - posting proofs
| on chain without giving the sequencer the ability to steal or
| control user funds.
| [deleted]
| jedberg wrote:
| For those that don't want to read the whole thing, (supposedly)
| the attackers reached out on linkedin to a bunch of employees
| asking them to apply to a fake company. One of them did it, went
| through a bunch of fake interviews, and then got a fake offer, in
| the form of a PDF.
|
| They opened the PDF and that installed a keylogger on their
| system (it doesn't explain how).
|
| The attackers then used that engineer's credentials to take over
| 4 of the 9 validators on the blockchain which they then used for
| their heist.
| leoqa wrote:
| It's honestly impressive. I work in security in fintech and it
| can be frustrating to have our work deprioritized against
| product features. These examples help underscore why having
| robust security controls is existential.
| CobrastanJorji wrote:
| I'm trying to imagine a setup at any company whose primary
| business is controlling extremely valuable digital assets
| having a security setup that could be entirely undone with
| keyloggers, and it's difficult. No necessary VPNs, keys on
| devices, or other non-password authentication? One engineer's
| password should not be the keys to the kingdom.
|
| Sounds like a bad RPG plot. "Because of its danger, we broke
| the Obsidian Key into 9 pieces and divided them across the
| realm, each protected by a powerful, mystic dungeon. Also, Dave
| can access them any time he says the secret word."
| SV_BubbleTime wrote:
| Agreed. The article doesn't mention keylogger at all. I was
| definitely picturing a remote control exploit.
| jedberg wrote:
| They must have updated it. When I read it it specifically
| said keylogger.
| phphphphp wrote:
| I'm of the view that the completely illogical nature of their
| entire business and the absence of any meaningful security
| are deeply interwoven.
|
| Rather than think of their primary business as securing
| digital assets, think of their primary business as convincing
| people that a perpetual money machine in the shape of a video
| game is possible. The valuable digital assets are just a
| narrative tool -- and so it follows that they wouldn't have
| the expertise in securing digital assets.
|
| Nobody capable of building a secure system for digital assets
| would waste their time working for a company like Axie, after
| all, the entire premise of their business is flawed so people
| with the critical thinking skills necessary to build a secure
| system would apply that critical thinking to the viability of
| the company -- and, of course, conclude it's destined for
| failure and not hitch their wagon to it.
| tornato7 wrote:
| Axie Infinity exploded in popularity overnight. They likely
| built their infrastructure when they were securing $1M in
| digital assets and then suddenly found themselves
| controlling half a billion before they could upgrade their
| security.
|
| That doesn't excuse their poor security practices. They
| shouldn't have built their asset custody system in-house if
| they didn't have the expertise. They could have used
| Fireblocks or a Gnosis Safe Multisig with hardware wallets
| and they would be safe.
| dataangel wrote:
| I understand your argument but this kind of reasoning
| consistently fails to be predictive. If things worked as
| you describe, there would be way more consensus amongst
| skilled engineers on political topics. In practice people
| are very skilled at selectively turning off their brain,
| especially when they stand to benefit.
|
| "It's difficult to get a man to understand something when
| his salary depends on not understanding it." -Upton
| Sinclair
| phphphphp wrote:
| I completely agree in principle but the nuance here is
| that I'm leaning on the belief that people joining Axie
| do not "...stand to benefit..." because the long term
| prospects of Axie Infinity are not good (and have never
| been good) and so anybody analysing the benefit of
| joining them -- who has a broad range of opportunities
| available to them -- would immediately see how little
| they stand to benefit from getting involved with Axie
| Infinity.
|
| I'm under no illusions about the intelligence of software
| engineers (of any specialism) -- we are all idiots at
| least some of the time -- but I struggle to believe that
| a competent engineer with lots of opportunities would
| somehow believe that Axie Infinity is the best
| opportunity available to them, hence, their system is
| built by people who don't have other opportunities and
| have produced an insecure house of cards (more insecure
| than the average system anyway -- all systems are
| insecure in some capacity).
| eigenvalue wrote:
| Seems like there would be market demand for a super locked down
| PDF viewer that basically ignores all the silly
| extensions/additions that Adobe has added to the format over the
| decades. The vast majority of documents don't need Turing
| complete code capabilities or embedded videos or interactive 3D
| models. Something that safely (using sandboxing and other
| methods) turns the document into totally static pixel data that
| still feels nice to read would mitigate this extremely common
| attack vector.
| tornato7 wrote:
| This pretty much already exists, it's called Cloudflare Browser
| Isolation. They basically render your browser on a remote
| server and pipe you the visual data.
| SV_BubbleTime wrote:
| FoxIt has out of the box GPO controls that are quite easy to
| use. It's probably got a lot of tweaking to really lock it
| down, but I think you could get pretty far before having to
| stop for lunch.
| stefan_ wrote:
| I realized some time ago, not wanting to install drivers, that
| a lot of office printers now have some janky webinterface that
| also allows uploading PDFs to submit as print jobs. This will
| turn a malicious PDF into perfectly safe paper!
|
| Now whatever cursed embedded software on the printer reads the
| PDF is probably a lot easier to exploit than an updated PDF
| viewer, but that's not what these people are going for.
| schemescape wrote:
| What's the best practice, security-wise, for viewing PDFs?
| AustinDev wrote:
| I have a script that watches my download folder and runs them
| through ghost script which is designed to reduce the file size
| of PDFs but it also strips out any linked media or embedded
| code from my testing. It does a bunch of other stuff too but
| the pdf auto-converter was pretty simple.
| pcthrowaway wrote:
| Curious if anyone has been able to find technical details of how
| this attack works/worked. I'm under the impression most PDF
| viewers would prevent this sort of attack (e.g. opening a PDF in
| your browser should sandbox it to the browsing context), but
| really keen to know what PDF viewer / OS was used by the dev.
| layer8 wrote:
| On Windows, Acrobat Reader has Protected Mode (sandbox) and
| Protected View (most features disabled) features [0], but
| people tend to disable it, in particular the Protected View, or
| don't enable it for all locations. Or maybe the vulnerability
| wasn't on Windows, or was in something like font rendering, or
| they used a different reader without sandboxing.
|
| [0] https://helpx.adobe.com/reader/using/protected-mode-
| windows....
| butterNaN wrote:
| Why is Protected mode not the default?
| wespiser_2018 wrote:
| Here's a demonstration of some example attacks using pdf:
| executing arbitrary js, and connecting to a samba server:
| https://www.sentinelone.com/blog/malicious-pdfs-revealing-te...
|
| I'm not sure about this attack specifically, though, and in
| Ronin's post mortem they aren't really talking about that:
| https://roninblockchain.substack.com/p/back-to-building-
| roni....
|
| To some extent, the PDF viewer/OS doesn't matter. A dedicated
| and well resourced attacker like the Lazarus Group will find
| holes in all of them. The "right" move here would have been for
| the employee not to download the compromised pdf, and short of
| that, for the IT Security team at Ronin to quickly detect the
| weird traffic that resulted and isolate the validators to
| prevent a compromise of their critical assets.
| Volundr wrote:
| The right move here would have been to have separate
| work/personal computers so that this PDF never landed on a
| system with access to the Ronin network.
|
| I know I'm pushing a boulder uphill with that one but it
| really is the way to go, better for both the individual and
| the company.
| gowld wrote:
| llaolleh wrote:
| I'm in this camp. All employees should be sent a laptop, or
| work with a remote environment that is isolated from your
| personal computer.
| rchaud wrote:
| what would stop a developer from checking personal email on
| a work machine?
| Volundr wrote:
| Themselves. I'm saying developers (and employees in
| general) should not do any personal stuff on work
| machines or any work stuff on personal machines.
|
| This has benefits for the employee, not just the company,
| in that it keeps the employees personal data out of the
| hands of the IT department.
| pcthrowaway wrote:
| It makes it a bit harder to travel with two laptops,
| which is one of the nice advantages of working from
| home.. but I'm otherwise in support of this.
|
| This might just result in employees finding ways to
| remote access their work computer from their personal
| computer from wherever they are, but at least that's an
| additional wall for would-be attackers to hurdle.
| macintux wrote:
| Exactly. I was on a meeting a couple of years ago and the
| co-worker who was presenting his desktop received a
| personal iMessage that flashed for everyone to see.
| ptudan wrote:
| yeah but that's solved by disabling notifications before
| presenting.
| ptudan wrote:
| Nahhhhh, I gotta browse the internet to be effective.
| That requires me logging into random sites with personal
| logins.
|
| I don't install anything personal on my work computer,
| but I wouldn't hesitate to open an email or pdf from a
| seemingly trusted source. I don't really blame the dev
| here.
|
| What you propose is a reasonable solution, but I feel
| like it slams in the face of actual human behavior. Most
| people act the way I describe, even most tech
| professionals.
| pcthrowaway wrote:
| Or more to the point, what would stop someone from
| sending malicious documents to the employees' work
| emails?
|
| Figure out a company uses register a phishing
| domain (e.g. gith.ub) send them an email with important
| info about their account, and a PDF attachment with more
| details.
|
| If it's that easy to compromise a system all you have to
| do is get a few employees to open the PDF right?
| Volundr wrote:
| And this is exactly why your IT department sends out
| those simulated phishing emails everyone likes to
| complain about.
| elif wrote:
| So then the attackers can only get my bank password?
|
| I think the clear move here should be to avoid pdf, just
| like the move is to avoid doc
| the_gipsy wrote:
| I know that document-rendering is much more complex than what
| it appears on the surface, but surely in this day and age
| there should be document viewers that don't run scripts and
| are exploit free.
| gowld wrote:
| cmeacham98 wrote:
| > To some extent, the PDF viewer/OS doesn't matter. A
| dedicated and well resourced attacker like the Lazarus Group
| will find holes in all of them.
|
| I dispute this: the web browser is one of the most defended
| pieces of software of all time, especially relative to its
| complexity. I would find it much safer to open a potentially
| malicious PDF in my browser's JS-based reader than using a
| desktop reader.
|
| > The "right" move here would have been for the employee not
| to download the compromised pdf, and short of that, for the
| IT Security team at Ronin to quickly detect the weird traffic
| that resulted and isolate the validators to prevent a
| compromise of their critical assets.
|
| It also probably would have been helpful if one employee
| didn't have access to almost half of the validators,
| especially on a system they're accessing email with.
| lordnacho wrote:
| Does it even need to be terribly complicated? Congrats on your
| new job, here's a script for you to generate a new ssh key with
| us, just copy/paste it in your terminal and that will sort it
| out.
| pcthrowaway wrote:
| Yet according to the article, the malware was introduced by
| the "candidate" opening a PDF; I'd expect most senior
| developers to know better than to run a random script from a
| company they don't have an ongoing relationship with without
| looking at the source first, especially if they have
| sensitive credentials on the computer they're using.
|
| But you never know.
| jaywalk wrote:
| Probably Acrobat.
| kyle-rb wrote:
| Likely this was a standalone PDF reader hack (rather than a
| browser), since those can have many more features and a much
| larger attack surface.
|
| It says it was an offer letter, so my guess is that opening it
| in the browser came up with an error like "to be able to
| digitally sign this offer letter, please open it in a desktop
| PDF reader with full scripting support enabled :)"
| pcthrowaway wrote:
| I guess we all need to be opening anything remotely phishy in
| VMs to avoid similar issues
| londons_explore wrote:
| The other major cause of the failure was that one dev had access
| to 5 signing keys. That shouldn't have happened, because than
| that one dev could have run off with $540 Million...
|
| And remember, it wasn't just that one dev - it was everything
| running on his computer - think of the probably tens of thousands
| of developers who wrote the code that runs as root on his PC,
| much of it unreviewed.
| hourago wrote:
| > In a post-mortem blog post on the hack, published April 27,
| Sky Mavis said: "Employees are under constant advanced spear-
| phishing attacks on various social channels and one employee
| was compromised. This employee no longer works at Sky Mavis.
| The attacker managed to leverage that access to penetrate Sky
| Mavis IT infrastructure and gain access to the validator
| nodes."
|
| The company fully blames the employee. I wish software
| companies had the same level of professionalism than airlines.
| "It's the pilot's fault" does not help to improve security.
| Nothing is learned.
| giaour wrote:
| My takeaway was that Sky Mavis's ops culture is a dumpster
| fire, something that might be generalizable to a good chunk
| of the Web3 sector. The tech companies where I have worked (a
| couple BigTech cos, some smaller orgs, and civil service)
| have all taken the blameless postmortem approach very
| seriously.
| Sebguer wrote:
| Airlines would behave the same way if there wasn't an
| aggressive government regulatory body forcing them to learn
| from failures.
| WorldMaker wrote:
| Government regulatory body _and_ a pilot 's union.
| ChadNauseam wrote:
| Do countries without a pilot's union have more unsafe air
| travel?
| xmprt wrote:
| I don't think you can generalize Web3 companies to all
| software companies. Web3 companies have shown time and time
| again that they don't care much about security or good
| software development practices. I'm not sure if it's because
| the industry is so nascent or because the people joining are
| simply incompetent or because they don't care (or a
| combination of all three) but it's clear that Web3 companies
| have major incidents at higher rates than most other software
| companies.
| ChadNauseam wrote:
| > clear that Web3 companies have major incidents at higher
| rates than most other software companies
|
| I won't argue this, but I think that it depends on where
| you look. Cryptography audit services are books out for
| months or years because of the demand from cryptocurrency
| projects. There's never been a vulnerability in the Bitcoin
| or Ethereum networks that allowed an attacker to steal
| funds or execute a double-spend. And cryptocurrency
| projects have pioneered whole fields of cryptography like
| zksnarks for security purposes.
|
| Cryptocurrency projects often have a fundamentally very
| difficult problem to solve, and attackers are also very
| sophisticated. There are currently very few people with the
| expertise needed to implement a complex cryptocurrency
| project securely.
|
| Disclaimer: I'm a protocol developer for a cryptocurrency
| project (not one of the ones mentioned here)
| system2 wrote:
| It is called dodging.
| nipponese wrote:
| No one is going to pick up the low hanging fruit and criticize
| _nine nodes_ as not being decentralized?
| marshray wrote:
| "multiple rounds of fake job interviews" ... "The con culminated
| in one senior engineer clicking a PDF supposedly containing the
| official offer"
|
| Wow! These folks were _really_ on the ball if it took that much
| social engineering just to get an employee to open a PDF.
___________________________________________________________________
(page generated 2022-07-06 23:00 UTC) |