[HN Gopher] A fake job offer took down Axie Infinity
___________________________________________________________________
 
A fake job offer took down Axie Infinity
 
Author : danso
Score  : 355 points
Date   : 2022-07-06 14:43 UTC (8 hours ago)
 
web link (www.theblock.co)
w3m dump (www.theblock.co)
 
| trhway wrote:
| One can wonder how much info for the hack was collected during
| the interviews. "Tell me about the security protection you
| architected for your validators".
 
| Apocryphon wrote:
| I've got to say, this is an incredibly cyberpunk article.
| 
| > Ronin, the Ethereum-linked sidechain that underpins play-to-
| earn game Axie Infinity, lost $540 million in crypto to an
| exploit in March. While the US government later tied the incident
| to North Korean hacking group Lazarus, full details of how the
| exploit was carried out have not been disclosed.
| 
| It's not in William Gibson's style, sounds more like Bruce
| Sterling's.
| 
| > Axie Infinity was huge. At its peak, workers in Southeast Asia
| were even able to earn a living through the play-to-earn game. It
| boasted 2.7 million daily active users and $214 million in weekly
| trading volume for its in-game NFTs in November last year --
| although both numbers have since plummeted.
| 
| > Earlier this year, staff at Axie Infinity developer Sky Mavis
| were approached by people purporting to represent the fake
| company and encouraged to apply for jobs, according to the people
| familiar with the matter. One source added that the approaches
| were made through the professional networking site LinkedIn.
| 
| Also gives me Charles Stross vibes.
 
  | pjbeam wrote:
  | Cyberpunk is now, just sans the 80s fashion inspirations :)
 
    | munificent wrote:
    | _> sans the 80s fashion inspirations :)_
    | 
    | You definitely haven't been paying attention to Gen-Z people
    | then. The 80s are back.
 
      | pjbeam wrote:
      | That's a fair assessment of my attention
 
    | hindsightbias wrote:
    | The future is already here. It's just not evenly distributed
    | yet" - maybe W. G.
 
    | silentsea90 wrote:
    | Who knows, hackers might be using their $ on fashion but alas
    | the profession makes it hard to flaunt.
 
    | outworlder wrote:
    | Where are my mantis blades?
 
      | jerf wrote:
      | The people in this review seem to think they're alright,
      | but they look very silly to me:
      | https://www.youtube.com/watch?v=tB4DDM8VHVg YMMV. But hey,
      | maybe you can ask them for their design.
 
        | nkrisc wrote:
        | > but they look very silly to me
        | 
        | And pretty impractical as well. They look really poorly
        | designed in terms of maximizing leverage. It also looks
        | like they lose a lot of energy in the flexing of the
        | entire mechanism and their arm, compared to a blade held
        | directly in the hand.
 
  | tadfisher wrote:
  | More like Cryptonomicon without the Nazi gold backing.
 
| ineedasername wrote:
| How is Proof of Authority, mentioned in the article, any
| different than normal social trust and reputational risk
| associated with that? This seems like a cute way of wrapping up
| the status quo in crypto lingo.
 
  | dboreham wrote:
  | All it means is that the system organizers decided to make a
  | certain set of keys able to vote on transaction validity.
  | Similar for example to how browser vendors decide to make a
  | certain set of keys valid for issuing certs.
 
| [deleted]
 
| cemregr wrote:
| Is it just me or is the (x) button on the banner ad on this site
| not work, and open the ad instead of dismissing it?
 
| esseti wrote:
| Did he get the job? because i guess he was fired from the
| previous one.
 
  | zanethomas wrote:
 
    | ThePowerOfFuet wrote:
 
  | Quarrelsome wrote:
  | kinda disgusting he got fired for this if that was the case.
  | Its a very sophisticated attack and I think its conversion rate
  | would be rather high.
 
    | kube-system wrote:
    | The article says they are no longer employed. It is possible
    | that this exploit was only possible because of breaking other
    | security policies.
    | 
    | At least, I hope that any reasonable organization doesn't
    | secure $600+ million dollars by relying on the endpoint
    | security of a device used to access LinkedIn
 
      | uhhyeahdude wrote:
      | > reasonable organization
 
    | tedunangst wrote:
    | Opening a legit job offer PDF on your work computer could be
    | considered a fireable offense. You should not be using
    | company resources to find your next job.
 
  | cbsks wrote:
  | It's also possible that he quit instead. If I interviewed for a
  | new job, accepted an offer, and then everything blew up in my
  | face... I'd probably not want to stick around.
 
    | rideontime wrote:
    | Yeah, I wouldn't want to work for a company that designed a
    | system that allowed this sort of thing to happen either.
 
| labrador wrote:
| Can someone explain to me how a pdf can execute code?
 
  | WorldMaker wrote:
  | PostScript the "graphics language" that PDF was built around is
  | a Turing Complete language.
 
    | marshray wrote:
    | Yes, but PDF doesn't embed the PostScript language (which is
    | basically Forth). Acrobat Reader's Turing completeness comes
    | from weird machines.
    | 
    | https://en.wikipedia.org/wiki/Weird_machine
 
  | Hamuko wrote:
  | https://opensource.adobe.com/dc-acrobat-sdk-docs/standards/p...
  | 
  | Page 414 and forwards. And if you're generally interested in
  | PDF feature bloat, go to page 511 to find out how to embed 3D
  | art, including the manipulation of the virtual camera, in your
  | PDF document.
 
    | labrador wrote:
    | > _12.6.3 An annotation, page object or... that can trigger
    | the execution of an action_ Page 415
    | 
    | What could go wrong?
 
  | pjc50 wrote:
  | Exploits in the PDF viewer.
  | 
  | The Adobe tools in particular have been a bountiful source of
  | exploits for decades, but it's a complicated spec and there are
  | plenty of opportunities for bugs.
 
    | labrador wrote:
    | I see, much like Unicode exploits. I use Chrome to view PDFs
    | which I assume to be safe.
 
      | ylyn wrote:
      | Chrome's PDF viewer seems to be implemented in native code.
      | But it probably benefits from the sandboxing that Chrome
      | does.
      | 
      | I would say Firefox is the safest here, because its built-
      | in PDF viewer is written in JS, although Firefox's
      | sandboxing is not as strong as Chrome's.
 
      | tialaramex wrote:
      | Program and data aren't really different, philosophically.
      | On some level this even applies to people. When someone
      | teaches you French is that program or data? Is it just
      | data? Why can you now understand French then? Or if it's
      | program, how does that work, who taught the teacher how to
      | program you?
      | 
      | So, our best effort is to constrain what certain data can
      | do when we process it, in the hope that this prevents
      | surprising negative consequences like a PDF that steals
      | privileged information and sends it elsewhere.
      | 
      | Notice that, in some sense, a PDF which just contains a
      | photograph of your wife tied to a chair and holding today's
      | newspaper, plus human readable text like, "We have your
      | wife Sarah and all three kids Beth, Jim and Amanda. We are
      | watching. Do not try to call for help. Email the privileged
      | information to crooks@example.com or we will kill your
      | family" is also potentially effective at doing this, but we
      | would not usually consider that an exploit in this context.
      | 
      | One irritation in this space is that programmers love
      | General Purpose Programming Languages. The idea of the
      | general purpose language is that it can do anything. But
      | the problem in this sort of situation is that we don't
      | _want_ programs which can do anything, in fact doing
      | anything is our worst case scenario. We actually want
      | Special Purpose Programming Languages. We want to write our
      | PDF data processing software in a language that _even if we
      | were trying_ can 't do the things that should never happen
      | as a result of processing a PDF.
      | 
      | This is the purpose of languages like WUFFS:
      | https://github.com/google/wuffs
      | 
      | You can't write a WUFFS program to, for example, email
      | anything to crooks@example.com even if you desperately
      | needed to, which means you definitely won't _accidentally_
      | write a program which can email the privileged information
      | to the crooks when fed a PDF. Of course the PDF mentioned
      | earlier with the kidnap note inside it could still work.
      | And also of course making a PDF renderer out of WUFFS would
      | be a really big ask. WUFFS-the-library today can render
      | PNG, GIF, BMP but notably not yet JPEG. But it 's clearly
      | _possible_ for something like PDF rendering to happen under
      | these constraints. Nobody ordinarily _viewing_ a PDF wants
      | it to do arbitrary stuff.
 
        | labrador wrote:
        | Good idea, but WUFFS is written in C
 
        | tialaramex wrote:
        | Well, WUFFS the library is C code, but that's because in
        | practice the language implementation is a Go program
        | which emits C rather than machine code. There's no reason
        | you can't compile WUFFS the language into, say, Rust, or
        | PowerPC assembler, or a long series of letters to
        | Princess Celestia [the FiM++ programming language],
        | except that nobody did all that hard work.
 
        | labrador wrote:
        | It's amazing what people come up with when they have time
        | on their hands for leisure activities. That's why I look
        | forward to robots doing all the work while human subsist
        | on universal basic income.
        | 
        | FiM++ - Esolang
        | 
        | https://esolangs.org/wiki/FiM%2B%2B
 
| ourmandave wrote:
| _The rate of DeFi hacks has accelerated rapidly this year,
| topping $2 billion in total funds lost, according to The Block
| Research data._
| 
| Seesh, you could finance a war with $2B.
 
| headsoup wrote:
| I'm still not entirely convinced this wasn't an inside job (or
| entirely made up) and they just put a nice pot of money away
| somewhere. Wouldn't be without precedent in the wonderful world
| of crypto...
 
  | kube-system wrote:
  | You don't just take some dude's word for it when dealing with a
  | $600+ million dollar heist. There were multiple third party
  | investigators involved in the aftermath.
 
    | dboreham wrote:
    | Perhaps they not taking his word, but waiting for him to move
    | the funds?
 
      | kube-system wrote:
      | They already know where the money went:
      | 
      | https://home.treasury.gov/policy-issues/financial-
      | sanctions/...
      | 
      | And it has already been moved:
      | 
      | https://www.blockchain.com/eth/address/0x098B716B8Aaf215129
      | 9...
 
        | lern_too_spel wrote:
        | From the group that brought you The Interview hack, here
        | is an interview hack.
 
        | jandrese wrote:
        | This doesn't mean it wasn't an inside job. Dude could
        | have a nice payday for "oops I got PDF hacked", plus
        | giving away enough information about their internal
        | organization to make the attack feasible.
 
        | kube-system wrote:
        | The organizations that were called in to investigate this
        | are very well aware of the likelihood of insider-threat
        | attacks. It is basically financial fraud 101. They
        | haven't released any information beyond what was detailed
        | here, but you can be certain that it was thoroughly
        | covered.
 
        | tehlike wrote:
        | Given it's crypto, there might be game in a game. You
        | never know.
 
        | tartoran wrote:
        | Or the dev could be simply setup to take the blame.
        | Everything's possible. Or an ex employee could have
        | surveyed the system and shared data with a larger group
        | to perform the operation.
 
| Thorrez wrote:
| Google warned of North Korean hackers targeting security workers
| through LinkedIn in January 2021.
| 
| https://blog.google/threat-analysis-group/new-campaign-targe...
 
| paulpauper wrote:
| I think the media and tech writes overestimate the efficacy of
| spear phishing attacks. There is tons of research involved in
| finding suitable targets and then planning out the attack, such
| as the exploit, fake websites, fake emails, and other
| ingredients.
 
  | t_mann wrote:
  | I think this is instead a good reminder that no matter how
  | complicated / unlikely a specific attack vector seems, if the
  | bounty is large enough you better assume that someone is going
  | to do it.
 
  | larsiusprime wrote:
  | It helps when your boss is a state actor and your target
  | chooses to put $625 million in assets behind what amounts to a
  | single point of failure
 
    | rchaud wrote:
    | Surely the technology experts at A16z and Binance could have
    | given them some basic cybersecurity tips before cutting a
    | $300 million check?
 
  | hn_throwaway_99 wrote:
  | Huh? Don't understand your point. When the potential bounty is
  | $540 million, seems like investment well spent.
  | 
  | Just another reason crypto is a godsend for bad guys (obviously
  | other financial crimes occur, e.g. with convincing folks to
  | send fake wires) but there aren't many better ways to steal
  | half a billion dollars I think. But, yeah yeah, "HN is so mean
  | and hates crypto!!!"
 
    | paulpauper wrote:
    | This is a huge outlier though and it's not $500 million of
    | cash but $500 million of crypto that must be
    | processed/laundered slowly into usable cash, which may not
    | even be doable. Given the recent crash it's probably more
    | like a 100 hundred million now.
 
| jacquesm wrote:
| Meanwhile, my kids' school forces them to use windows, spreads
| around lots of information that should be on websites as pdfs and
| asks to install all kinds of software from dubious sources
| including stuff that can only properly be classified as a rootkit
| in disguise.
| 
| People are conditioned to trust certain verticals, Google, Apple,
| Microsoft (which owns LinkedIn) and a bunch of others and will
| lower their guard. Which is why it works so well. In fact I've
| received email from some of those where I was pretty sure I was
| being spearphished but they turned out to be real (but not on
| LinkedIn, which I refuse to join).
 
| alexfromapex wrote:
| This is so interesting, I just reported someone doing this on
| LinkedIn to the IC3. They create fake companies and ask for
| details like your SSN to ostensibly run a background check on you
| but in actuality it's to steal your identity or use your info to
| gain access to restricted resources.
 
| dboreham wrote:
| In my mind there has to have been some insider involvement (at
| least) in this attack. There are too many things unknowable to
| outsiders that would need to be known.
 
| treme wrote:
| it's hilarious that KJU was probably among the biggest benefactor
| of crypto boom.
 
| jspdown wrote:
| They rely on 9 trusted validators, the hacker managed to get
| access to the private keys of 4 out of the 9 validators.
| 
| What's the point of using a Blockchain if you end up centralizing
| validations like that?
 
  | kwertyoowiyop wrote:
  | Don't worry, they're going to have 100 trusted validators, thus
  | solving the problem...FOREVER.
 
  | ltbarcly3 wrote:
  | The true answer is that it doesn't make sense but investors
  | don't care because BLOCKCHAIN
 
  | mikevin wrote:
  | 'Proof of Authority' sounds an awful lot like the regular
  | banking system.
 
| anyfactor wrote:
| TLDR
| 
| Job offer PDF was downloaded to office computer. PDF had spyware
| that infiltrated the system.
 
| CarbonCycles wrote:
| LN has now become a dumping ground for spammers, scammers, and a
| social network site. It's lost its appeal, and I am getting more
| scammers all the time.
| 
| I'm beginning to contemplate what value LN provides as LN has
| focused on more aggressive marketing tactics, and it's starting
| to feel like Instagram with the engagements metrics...
| 
| Oh yea, I'm still perplexed on how anyone would ever go into an
| interview w/out doing any homework on the company...even the
| smallest of start-ups have a presence on the net. They better
| damn-well have a pitch deck for new capital and employees.
 
| Animats wrote:
| This reads like blameshifting. Axie Infinity is a Ponzi on the
| way down. They need someone to blame for their failure.
 
| schemescape wrote:
| They say that a worker downloading (and presumably viewing) a PDF
| (fake job offer) allowed spyware in. Which PDF viewer was
| exploited?
 
  | alexk307 wrote:
  | You can easily embed arbitrary javascript into any PDF, and you
  | can obfuscate it pretty well enough to get past most endpoint
  | security tools on the market.
 
    | WorldMaker wrote:
    | You don't even need JS in a PDF. PostScript remains a Turing
    | Complete language on its own.
 
    | Nextgrid wrote:
    | That JS would be sandboxed similar to in browsers, so you'd
    | still need an exploit to break out of that.
 
      | kube-system wrote:
      | Not too tough, if you're a state backed group. Just buy
      | one.
      | 
      | The going price for Adobe PDF RCE zero-days is $80,000
 
    | Jwarder wrote:
    | Is there a good no-nonsense way to clean PDFs of possible
    | threats? Hunting around I see mentions of converting
    | PDF->Postscript->PDF to remove junk, but I also see mentions
    | that Postscript is its own security mess.
 
      | jabroni_salad wrote:
      | Your only option is to disable all of those fancy features.
      | That config only lasts until someone needs to file a form
      | with the government though.
 
  | Nextgrid wrote:
  | I'm not sure it was even an exploit. It could very well be an
  | intentionally-malformed PDF that pretends it has to be opened
  | in a special "viewer" software, maybe even Adobe- or DocuSign-
  | branded.
 
  | snickerbockers wrote:
  | im guessing it was the ol' ".pdf.exe" trick.
 
    | Hamuko wrote:
    | This sounds way too sophisticated for them to risk it with a
    | "Offer.pdf.exe". Especially if it was state-backed. If the
    | victim notices it, and the bar isn't high, you'd basically
    | spook him away and alert the entire company.
 
    | j0hnyl wrote:
    | You're downvoted, but I'm certain this is exactly what it is.
 
    | hn_throwaway_99 wrote:
    | That trick doesn't work anymore for any reasonably modern
    | email client.
 
      | snickerbockers wrote:
      | That's when you remind him that your boss needs to get this
      | role filled by the end of the week so if you don't get a
      | response by tomorrow you'll have no choice but to offer the
      | job to another candidate.
 
      | bfgoodrich wrote:
 
      | silverPoodle wrote:
      | You can put it into a .zip archive or just send an email
      | containing a link with a fake PDF
 
  | samatman wrote:
  | To quote Fight Club: a major one.
 
| t_mann wrote:
| This is an important social engineering attack vector that all
| companies should be aware of. These kind of targeted attacks
| (often spoofing valid contacts that employees would legitimately
| exchange documents with) were common since I can remember the
| space, but using job applications is particularly disingenuous
| because employees are naturally going to be a bit secretive about
| those.
 
| Ekaros wrote:
| And this is why you should separate work machines from private
| and anything else. Specially when working with something high
| value.
 
| petilon wrote:
| If you care about security, two things you don't want to install
| on your computer are Adobe Acrobat and Microsoft Office. These
| products were written the 1990s in C/C++ and are impossible to
| secure. Microsoft does not allow installing Office on Secure
| Admin Workstations (SAW) [1] for a reason!
| 
| [1] https://www.microsoft.com/en-us/insidetrack/protecting-
| high-...
 
| wly_cdgr wrote:
| How do you go through a whole job interview process and not
| realize that the company you are applying to is fake and doesn't
| exist?!
| 
| ...Oh wait, this is crypto
 
  | vgel wrote:
  | I applied (and got a job and worked at for a bit) a stealth-
  | mode startup and it felt like a scam. No web presence, nobody
  | had it listed as their job on LinkedIn, a couple vague
  | references to funding rounds online that mentioned a different
  | business model (turns out they had pivoted), etc. Remote
  | applications are weird.
 
  | a4isms wrote:
  | How should we respond if we interview for a non-crypto job, and
  | when we can't get any background on the company, they explain
  | that they're in "stealth mode" to protect the advantage of
  | surprise?
  | 
  | From time to time there are real startups that decide to fly
  | under the radar until they're ready to show the world what
  | they've built. Of course, many such companies turn out to be
  | massive duds... Like Cuil.
  | 
  | https://en.wikipedia.org/wiki/Cuil
 
  | 999900000999 wrote:
  | Just interviewed with a crypto company, can confirm. Even
  | "legitimate" companies with a web presence, customers, etc,
  | come off as super sketchy.
  | 
  | That said, for lower income people you'll be absolutely
  | inundated with scams, a good friend of mine just hit me up cuz
  | someone wanted to promise him for $100 or so a week, you'd
  | somehow become a crypto millionaire. I actually think crypto in
  | its entirety is a giant scam, there's just levels of
  | sophistication to it.
  | 
  | Not everyone's going to fall for give me $100 and I'll turn
  | that into $10,000 , but a ton of people fell for buy a bunch of
  | crypto coins and hold ,time the market and sell.
 
| jandrese wrote:
| What an incredible story. In fact it is so incredible that it
| smells a bit funny to me.
| 
| Are we sure this heist wasn't an inside job? Axie was collapsing
| under its own weight and an employee decided to swipe all of the
| crypto after making up this crazy job offer PDF story to cover
| their tracks.
 
  | password4321 wrote:
  | I'm amazed I had to scroll down this far to find the obvious
  | explanation: a rug pull with a press release so the perpetrator
  | doesn't have to fake their own death.
  | 
  | Edit: I thought the lack of details was fishy but the following
  | would be tough to fake:
  | 
  |  _the FBI has attributed North Korea-based Lazarus Group,
  | highly skilled hackers, to the Ronin Validator Security Breach.
  | The US Government, specifically the Treasury Department, has
  | sanctioned the address that received the stolen funds_
 
| xigency wrote:
| So they lost half a billion dollars because they forgot to set up
| Multi Factor Authentication?
 
  | marshray wrote:
  | MFA can't help you if your network admin is willing to open an
  | untrusted file with an Adobe product.
 
| hn_throwaway_99 wrote:
| Two points to highlight from this article:
| 
| 1. LinkedIn is an absolute godsend for bad guys, allowing easy
| targeting of everyone in the company with spear phishing emails
| and texts. I know many security professionals no longer use their
| real name, and don't list the real name of their company, because
| they know it's such a great hacking vector. Not sure what/whether
| LinkedIn can do anything about this.
| 
| 2. I wish there were more information about what the
| vulnerability was in the PDF in the first place. I think a lot of
| people would be wary of downloading a PDF from a stranger, but
| not from someone who you had multiple interview rounds with and
| who offered you a job.
 
  | jcrawfordor wrote:
  | Most PDF "attacks" in the real world are very unsophisticated.
  | One of the most common uses of PDFs in a phishing context is
  | just as a way to deliver a link that would likely result in
  | blocking by email security products (many don't inspect inside
  | PDFs, and even for those that do the PDF format is complicated
  | enough that it offers tremendous opportunities for
  | obfuscation). I would wager money that the "PDF attack"
  | involved here was as simple as a link to a malicious executable
  | presented in a PDF to avoid detection by email filtering... in
  | my time as a security analyst this was the #1 source of real
  | compromise incidents, and anecdotally it seems to remain
  | popular today based on the number of such PDFs I receive in my
  | spam email.
  | 
  | The PDF format presents many opportunities for other exploits,
  | either obfuscating a payload or running code, but modern PDF
  | viewers are locking these opportunities down to such a degree
  | that they are not very reliable (most of all because it is
  | difficult to know which PDF viewer your target will use, and
  | many popular PDF viewers today like pdf.js are relatively
  | feature-incomplete which is a significant security advantage in
  | this case). It's possible that something more sophisticated was
  | going on but I would be very surprised if it was anything more
  | complex than using the PDF as an obfuscated transport for a
  | binary packed in it and invoked by the user (e.g. by clicking a
  | link in the PDF with a javascript target). Non-user-interaction
  | PDF vulnerabilities exist but are increasingly hard to come by
  | as there has been more than a decade of work on locking down
  | PDF viewers and the situation has improved dramatically in that
  | time.
  | 
  | Contrary to what people sometimes expect, highly organized
  | groups (such as APTs) tend to stick to very basic, simple
  | methods as much as possible, since they are relatively
  | reliable. The use of recent vulnerabilities in a specific PDF
  | viewer, for example, is high risk due to the likelihood of
  | failure and the opportunities for analysis it presents (you
  | will have to do custom development rather than using off-the-
  | shelf tooling). This is the kind of thing that organized groups
  | try to avoid as much as possible, subject to an ROI analysis.
  | Or in other words, if putting a link to an EXE in a PDF still
  | works, why would you bother with anything else?
 
    | noduerme wrote:
    | If it's just a javascript link to download an EXE, doesn't
    | the target of the hack still need to run the EXE? Or are you
    | saying that a link in a PDF can install _and_ execute code on
    | its own?
    | 
    | Assuming it can't, then the engineer had to click to run some
    | unknown EXE after downloading it... that should hardly be
    | described as a "PDF attack".
 
      | TechBro8615 wrote:
      | There is a whole class of attacks related to "deep linking"
      | and custom URL schemes that the operating system can pass
      | to any application that registers itself to match it. At
      | that point the sanitization is up to the application.
      | 
      | I recently stumbled upon a nice write-up [0] that described
      | this class of attack and surveyed which software was
      | vulnerable to it. Many crypto clients were included.
      | 
      | [0] https://positive.security/blog/url-open-rce
 
  | joshstrange wrote:
  | Personally I don't update my LinkedIn until I start looking for
  | a new job. There is absolutely no need for anyone to know where
  | I work (or at least for me to share that far and wide
  | publically) and I'm not interested in cold emails/cold linkedin
  | messages.
  | 
  | My decision was cemented in 2020 when someone who didn't like a
  | tweet of mine retweeted it to my old company's twitter account
  | trying to get me fired/reprimanded (The tweet in question
  | called out my local PD for a dubious tweet they made, the
  | person who tried to get me in trouble lived in a different
  | state 12+ hours away). Thankfully my current company wouldn't
  | have cared but there is no need to give people ammo.
 
    | V-2 wrote:
    | Which is why I simply don't use my real name (well, not a
    | full name) for my Twitter account. I have the right to keep
    | my professional and private persona separate, and if someone
    | really wanted to, they could find out where I work anyway.
    | (I'm not tweeting anything extreme in my own view, but
    | there's always someone who will regard it as such, and as you
    | say, what's good about giving people such option to begin
    | with).
 
    | hn_throwaway_99 wrote:
    | > Personally I don't update my LinkedIn until I start looking
    | for a new job.
    | 
    | Perhaps semi-off topic, but note there are companies that
    | sell software (spyware?) to HR departments that specifically
    | trolls LinkedIn looking for when employees update their
    | LinkedIn profiles as a sign they're looking for a new job.
    | This may or may not be a good thing depending on your
    | position, perspective, or company, but just be aware it
    | exists.
 
      | heleninboodler wrote:
      | Last time my RSU cliff came around, I logged into LinkedIn,
      | updated my profile and accepted the backlog of connection
      | requests (and read the flurry of "congratulations on your 4
      | year anniversary" messages). I almost immediately got Slack
      | messages saying "are you leaving?" But I _wanted_ them to
      | notice; that was the point.
 
      | joshstrange wrote:
      | Yeah, though I'd get dinged by that either way since I
      | normally update my bio to include recent projects/tech I've
      | worked with. This way I can hide behind plausible
      | deniability "Oh, I just got around to adding X company to
      | my LinkedIn" if I need to, whereas updating an existing
      | entry is harder to justify (without giving away you are
      | looking). Though I also try not to work for companies that
      | I would need to worry about that.
 
        | mgkimsal wrote:
        | > whereas updating an existing entry is harder to justify
        | (without giving away you are looking)
        | 
        | I don't think it is at all. Indeed, if you're updating it
        | regularly (every 3-4 months, perhaps?) with new
        | project/task stuff, it's simply keeping things fresh in
        | your mind, vs having to try to trawl back 3 years to
        | think about project FOO.
        | 
        | If you _only_ update it once every 2 years, then people
        | can draw more nefarious conclusions.
 
        | outworlder wrote:
        | You can't really reason with algorithms.
        | 
        | You'll be placed in a list with a score next to your
        | name.
        | 
        | > Though I also try not to work for companies that I
        | would need to worry about that.
        | 
        | How do you figure out what kind of software your company
        | uses internally?
 
        | joshstrange wrote:
        | > How do you figure out what kind of software your
        | company uses internally?
        | 
        | I work for smaller companies that are more concerned with
        | building instead of turning their workforce into scores
        | on a list.
 
        | cmeacham98 wrote:
        | I doubt they'd actually ask you about it (and thus give
        | you a chance to "explain" yourself), HR would just note
        | you down and you'd be more likely to be laid off, less
        | likely to get promotions approved, etc.
 
        | adaml_623 wrote:
        | I know this is off topic but I'm always confused by the
        | attitude you've mentioned where companies don't actively
        | work to retain staff.
        | 
        | I wonder if there are any courses for managers to train
        | them to think logically about this and not switch into
        | bad decisions based on emotion.
        | 
        | Companies waste so much money on hiring and then deciding
        | to react very slowly to changes in market conditions. If
        | businesses treated their staff like they treat their
        | clients...
 
        | kortilla wrote:
        | > less likely to get promotions approved
        | 
        | This is not how companies work (at least the ones worth
        | working for). Retention risk is a reflection on their
        | current role, compensation, manager, etc.
        | 
        | We have absolutely promoted high performing employees
        | and/or given them raises even though we knew they were
        | looking at other opportunities.
 
        | cmeacham98 wrote:
        | Companies worth working for aren't talking their
        | employees in LinkedIn.
 
        | joshstrange wrote:
        | Fair, though if I'm looking I'm planning on being gone in
        | 1-2 months max and I'm probably leaving in part due to
        | lack of promotion.
 
    | MisterBastahrd wrote:
    | Meanwhile, my company actively gives us hints on how to
    | spruce up our resumes with marketing bullshit that impresses
    | nobody but middle managers who think that keyword searches
    | with word soups like "Innovator. Thought-Haver. Bringer of
    | Boys To the Yard." are their paths to big league success.
 
  | BolexNOLA wrote:
  | It's a shame too. In my experience LinkedIn has been great for
  | job hunting, indeed et al. were worthless time sinks for me. I
  | want to keep it just for the ability to job hunt and get
  | _results_ but as you said...it's a risk too.
 
    | V-2 wrote:
    | That's the only thing it's good for, but that thing actually
    | works. My last three job offers were from LinkedIn (I
    | ultimately rejected one because my employer at the time gave
    | me a counteroffer when I handed my notice, but I did accept
    | the other two). The "content" on LI (feelhgood / motivational
    | BS) is do ridiculous that I sort of contempt-read it
    | ("hateread" would be to strong a word) for the heck of it,
    | but I can't wrap my head around WHY people would participate
    | in this nonsense for real.
 
      | BolexNOLA wrote:
      | Yeah I really don't see any appeal beyond jobs (my current
      | job came from it). The content is just SEO/personal
      | branding fodder.
 
      | rurp wrote:
      | When I first signed up for LI I honestly couldn't tell the
      | difference between the actual feed and a what I imagined a
      | parody site would look like. The posts that proclaim
      | themselves to hold controversial ideas, followed by the
      | most banal cliches possible, crack me up.
      | 
      | Once in a while I check the feed for kicks and it's always
      | 100% spam, cliches, humble brags, and not-so-humble brags.
 
  | ineptech wrote:
  | > I wish there were more information about what the
  | vulnerability was in the PDF in the first place.
  | 
  | Agreed, I thought that opening a read-only PDF was GRAS
  | regardless of the application.
 
    | WorldMaker wrote:
    | PostScript is a Turing Complete language (always has been),
    | and an over-simplified description of PDF is that it "just"
    | wraps PostScript in a single Virtual Machine to target
    | (versus PostScript has a lot of subtly different physical
    | machines it was built for/targeted).
    | 
    | That "PDF VM" has had many 0-day RCE bugs over the years.
    | Thankfully though the VM is standardized with the format it
    | does have multiple implementations still in different
    | applications and many exploits are application-specific
    | implementation bugs.
 
  | LegitShady wrote:
  | I see people posting things even on HN where its a link to a
  | PDF and I don't click on them. I remember PDF being a leaky and
  | buggy format whose interpreters were full of vulnerabilities. I
  | don't click on PDFs.
 
  | ChrisMarshallNY wrote:
  | _> LinkedIn is an absolute godsend for bad guys_
  | 
  | I am listed as the Principal on a couple of companies, and get
  | _constant_ approaches that are obviously fake (like an
  | attractive young  "stewardess" from Dubai, who just happened to
  | like my picture (which is actually my logo)).
  | 
  | I've given up reporting them, as LI _always_ responds with
  | "This is not in violation..."
 
    | djbusby wrote:
    | Isn't LI owned by MS?
 
      | JohnJamesRambo wrote:
      | Is there a "Best of" archive for HN comments?
 
      | ChrisMarshallNY wrote:
      | Yup. I'm gonna remove my cynical comment (although I still
      | totally believe it). It's just not helpful. I think people
      | can figure it out, for themselves.
      | 
      | Also, people use LI as a way to aggregate information, then
      | send emails that appear to be from LI, but are not. I got
      | one of those, yesterday, and reported it to LI, saying
      | "These guys obviously used your service to construct this
      | honker."
      | 
      | And LI's reply was ... envelope, please ... "Not our
      | problem. Go away, kid. Yer bodderin' me." but stated a bit
      | more politely.
      | 
      | I deliberately stay fairly open. I mentioned that, some
      | time ago. It comes with some problems, like a determined
      | bad actor can build up a fairly good profile.
      | 
      | But I have had _years_ of experience, rubbing elbows with
      | professional con artists, so I am maybe a little tougher to
      | fool than many (but some approaches have come close -these
      | folks are good). I would never be so arrogant to say that I
      | can 't be phished or whaled, but it's almost certainly not
      | worth the effort.
 
        | wombatpm wrote:
        | I recently had some try the CEO/boss needs something
        | right away for a customer ruse via text. I know LI was
        | the source, because it referenced my previous job and LI
        | still had the incorrect information. I played along that
        | I was ready to purchase with my corporate card. Then
        | after wasting more of their time, I sprung that they were
        | fishing with old bait. Good times
 
        | PebblesRox wrote:
        | I'd love to hear more about your experience with con
        | artists!
 
        | ChrisMarshallNY wrote:
        | It's not the type of story that I really share in the
        | venue of press, radio and films, if you get my drift.
        | 
        | I'm happy to chat -a bit- about it, directly. Many of the
        | stories that I know, are not mine, to tell.
 
        | cosmodisk wrote:
        | Same here. I grew up knowing some very shady people. Some
        | of the stuff could easily be turned into books or a
        | script for a movie.
 
  | _fat_santa wrote:
  | I think one shouldn't discount the attack vector that is just
  | working in the Crypto industry, especially when you're someone
  | who works with startups rather than the big guys.
  | 
  | In the "Web2 Sector", it would be very easy IMO to snuff out a
  | fictitious company. I've gotten a handful of "offers" in the
  | past and you can see straight through them, because the company
  | doesn't exist in real life and you can't find any info on it,
  | huge red flag.
  | 
  | The problem with the "Web3 Sector" IMO is you have a bunch of
  | upcomming players in the space that no one has heard of. Just
  | like investors in Cryto, if you're a developer in the space, no
  | doubt you are jockeying to join a project that might land you a
  | 7-10 figure windfall at the end.
  | 
  | So if an unheard of company approached me, I would tell them to
  | kick rocks. If a similar company approached someone in the
  | "Web3 Sector", they might take it thinking it's an emerging
  | opportunity. I'm sure this still happens with Startups but my
  | gut says it's really bad in the Web3 space.
 
  | samstave wrote:
  | Speaking of spear phishing:
  | 
  | When I was at lockheed we had an incident whereby a bunch of
  | folks had attended some defense conference, and after the fact
  | received emails from folks they had 'met' at the conference,
  | something along the lines of
  | 
  | "Hey Bob, we met at the [defense] conference this last week and
  | I wanted to be sure you had my contact info: malware-
  | contact.vcf"
  | 
  | or some other payload.
  | 
  | This installed a very slow sprawling worm which would slowly
  | trickle data out of lockheed to China.
  | 
  | It was not discovered for quite a while due to how slowly it
  | operated, but someone had complained about machine performance
  | and IT looked at the machine and discovered the worm... after
  | removing it - this somehow sent a signal to China that they had
  | been found and all the worms started to firehose as much as
  | they could until egress was closed. At the time, all of
  | Lockheeds 150,000 employees had just three egress points to the
  | internet. They had to shut them all down to kill that worm.
 
  | secondcoming wrote:
  | Also, don't use a company device for personal business.
  | 
  | If you use your own device then do company work in a VM.
 
    | jessaustin wrote:
    | Opening the pdf wasn't "company work", so maybe everything
    | should be done in a VM? (Not the _same_ VM!)
 
      | secondcoming wrote:
      | He opened it on a company device I assume
 
        | jessaustin wrote:
        | That's possible, and addressed by your first sentence
        | above. You wrote the second sentence to address a
        | different possibility. In that case, a process with
        | access to the whole device could read e.g. auth tokens
        | contained in a VM.
 
  | jedberg wrote:
  | I'm not sure this is Linkedin's problem to solve. They are just
  | a directory.
  | 
  | I suppose they could add a phishing warning for messages sent
  | on LinkedIn, but really it's an education problem, teaching
  | people to identify what phishing emails look like and how to
  | avoid them. This is a problem I've been working on since at
  | least 2003, when we realized that the best way to prevent eBay
  | account takeovers was teaching people what phishing is. We also
  | identified that education is the hardest solution to achieve.
  | 
  | It's ironic that the security professionals are the ones hiding
  | their identity, given that they are the best prepared to
  | identify and avoid phishing emails.
 
    | hungryforcodes wrote:
    | You're right -- apparently it's a PDF problem, and I'm still
    | looking for an explanation of how a simple PDF could be worth
    | half a billion dollars.
 
    | burrows wrote:
    | > I'm not sure this is Linkedin's problem to solve. They are
    | just a directory.
    | 
    | If the issue reduces user metrics, then they will want to fix
    | it. Ultimate responsibility seems irrelevant.
    | 
    | > It's ironic that the security professionals are the ones
    | hiding their identity, given that they are the best prepared
    | to identify and avoid phishing emails.
    | 
    | I might have demolitions training, but I'd still rather walk
    | around the minefield.
 
  | aaronharnly wrote:
  | On (1), I have seen employees get spear-phishing texts (Welcome
  | X! This is the CEO of Y. I need you to do a small favor...)
  | within hours of updating their LinkedIn. I assume there are
  | robots crawling it constantly looking for fresh candidates for
  | account takeovers or other scams.
 
  | alexfromapex wrote:
  | I think one other thing that bears mentioning is that
  | LinkedIn's reporting doesn't easily let you explain how someone
  | is performing a scam. If you're diligent you can find the link
  | somewhere where you can actually explain it but when you just
  | "report" someone or a job the response from LinkedIn is usually
  | "We didn't find anything indicating this is a scam" or similar.
 
  | walrus01 wrote:
  | > I know many security professionals no longer use their real
  | name, and don't list the real name of their company, because
  | they know it's such a great hacking vector. Not sure
  | what/whether LinkedIn can do anything about this.
  | 
  | on the other hand I bet you could collect some interesting
  | things by creating a few fake people as linkedin honeypots at
  | FAANGs, and I would be very surprised in their infosec/netsec
  | teams aren't already doing this.
  | 
  | or getting real people who opt-in to have their linkedin
  | profile receive incoming scams, virus, trojans, phish links and
  | pipeline them into the infosec/netsec team.
 
  | bl_valance wrote:
  | Isn't the issue here that they used their work laptop or were
  | on their work's internal network(VPN?) to "apply" for this job?
  | 
  | This is something I see/hear so often, people using work
  | equipment/network to conduct their personal stuff. This, IMO,
  | should not be allowed at all.
 
  | Dig1t wrote:
  | I deactivated my LI after my last job search, it hasn't
  | affected my life at all since then. I don't know why you need
  | one at all most of the time. Even without one, I think it would
  | be perfectly easy to get interviews at companies, most
  | interviews I've done in the past have been the ones I got by
  | just going to the company's website and applying directly
  | anyway.
 
  | caseysoftware wrote:
  | Some in the security community demonstrated this with Robin
  | Sage, circa 2009: https://en.wikipedia.org/wiki/Robin_Sage
  | 
  | It introduces the idea of "transitive trust" where person A
  | might not know person B but if the two have a bunch of contacts
  | in common, the odds of A trusting B goes up. When there's a
  | profile with tens or hundreds of shared connections, it looks
  | real by all accounts.
  | 
  | I wrote about this is an intel gathering/attack vector way back
  | in the day but it's 100x better now because connecting is
  | second nature and people trust more now:
  | https://caseysoftware.com/blog/open-source-intelligence-link...
 
  | elif wrote:
  | I'm so confused by #2 as well.
  | 
  | If pdf is compromised, is it fixed? This seems like the kind of
  | vulnerability that would ruin pdf's reputation permanently. It
  | was the safe alternative to sending someone a .doc particularly
  | because of it's limited functionality.
 
  | kornhole wrote:
  | I only use titles such as 'Employee' 'Worker' 'Carbon Based
  | Life Form'.. on Linkedin. It also significantly reduces the
  | amount of spam and cold calls.
 
  | rmbyrro wrote:
  | The main problem was using a machine that had access to half a
  | billion dollars to also browse the web and do stuff like
  | applying for jobs.
  | 
  | If you're gonna have access to such amount of money, it's worth
  | buying a dedicated machine and using it very, very cautiously.
 
    | PragmaticPulp wrote:
    | > The main problem was using a machine that had access to
    | half a billion dollars
    | 
    | Going up a level, the main problem was that the company had a
    | system where a _single person_ could irreversibly transfer
    | half a billion dollars away from the company.
 
      | handoflixue wrote:
      | The article actually covers that it required 5 out of 9
      | people to sign off. They got 4 via PDF attacks and 1 via
      | legacy access that was never properly terminated.
 
        | 8note wrote:
        | I think it's worth noting that the people did not sign
        | off, only the keys did.
        | 
        | The system does not require people to sign off, but for
        | the keys to sign off.
        | 
        | I don't think it's worth calling this a hack, the keys
        | are what owned the moneies, and it's the keys that
        | decided what to do with it. People have access to keys,
        | they don't own them
 
        | tylersmith wrote:
        | The compromised employee had access to that 5th factor it
        | was just not as direct as as him having a 5th private
        | key.
 
        | mousetree wrote:
        | My understanding of the article was that only 1 person
        | was compromised and that the exploit installed on their
        | computer was then used to access the validator nodes
        | themselves. FWIW, I have no idea what a validator node is
        | but I'm assuming that by compromising one employee's
        | workstation they somehow got access to multiple other
        | machines (which if true is itself a bit of a f* up).
 
        | logifail wrote:
        | > I'm assuming that by compromising one employee's
        | workstation they somehow got access to multiple other
        | machines (which if true is itself a bit of a f* up)
        | 
        | Q: If you assume the bad guys have already compromised
        | your workstation, how sure are you that they won't be
        | able to compromise other machines you connect to?
 
        | charcircuit wrote:
        | You can't which is why one person shouldn't have access
        | to more than one.
 
        | [deleted]
 
        | fsckboy wrote:
        | because the workstation was compromised by opening a
        | corrupted pdf, but that vector wouldn't compromise the
        | other machines unless users on them could be induced to
        | open the same pdf.
        | 
        | not to say it can't be done, but it was unexplained
 
        | sangnoir wrote:
        | It doesn't have to be the same pdf, it could have been an
        | attachments from compromised machine via email/slack.
        | "Hey, can you help me figure this unusual log/transaction
        | summary". How many wouldn't open such an attachment from
        | a "colleague"?
 
    | abxytg wrote:
    | Yep. Bad opsec at the org level. Either the eng was doing
    | work stuff on a personal laptop or personal stuff on a work
    | laptop. This is easily preventable and should be table stakes
    | when handling money, phi, etc
 
    | spaceman_2020 wrote:
    | When I first got into crypto, a few things were pretty much
    | drilled into my head:
    | 
    | - Not your keys, not your coins; always self-custody
    | 
    | - Never use the same machine for trading and for work/surfing
    | the web
    | 
    | - Store only funds you want to regularly trade with on a hot
    | wallet. Everything else on a cold wallet.
 
      | empraptor wrote:
      | and this is part of why i think cryptocurrencies should
      | have died before large number of people wasted their money
      | on it. for the average user without the
      | time/knowledge/patience to handle cryptos "properly", the
      | choice is between losing money while handling this shit
      | yourself or losing money while trusting someone else to do
      | it right.
 
        | spaceman_2020 wrote:
        | Its an entirely free market. Just because one person
        | doesn't understand the tech and loses his money doesn't
        | mean that everyone else shouldn't be allowed to use it
        | either.
        | 
        | Even if you don't buy into the crypto vision (I don't), a
        | digital-only currency that isn't tied to any nation-state
        | does deserve to exist.
 
        | Retric wrote:
        | It's fine for a few people to play with such a system.
        | The issue if it's absolutely clear crypto is incapable of
        | widespread adoption or just about anything else people
        | hype it up as, then it shouldn't be hyped as if that
        | stuff is a possibility.
        | 
        | I could never tell how much was incompetence vs fraud,
        | but either way without the hype vastly fewer suckers
        | would be holding the bag right now. The crypto ecosystem
        | has been just been terrible for just about everyone and
        | things are far from over.
 
        | spaceman_2020 wrote:
        | The people holding the bag right now mostly got in
        | because of the allure of quick profits. And if they
        | didn't sell even after making incredible (paper) returns,
        | they have their own greed to blame.
        | 
        | Bitcoin was $6,000 in March 2020. It hit $63,000 in April
        | 2021. And if you didn't sell that top, it hit $67,000
        | again in November 2021.
        | 
        | Even now, it has dropped less than Netflix, a supposed
        | bluechip.
        | 
        | I don't know what's the scam in this - you had plenty of
        | entry opportunities and plenty of exit opportunities. The
        | underlying system itself still works exactly as
        | described.
 
      | 8note wrote:
      | I'd put an addendum to the first one
      | 
      | You can't own keys, so you can't own coins. You instead
      | have access to coins when you have access to keys.
 
    | abirch wrote:
    | I still can't believe that they opened the PDF on the
    | _company_ computer. I always use my home computer and the
    | poor hacker would get bored of seeing all of my Raspberry Pi
    | projects that I haven 't done.
 
      | cfn wrote:
      | I suppose that sending it during business hours and, who
      | knows, maybe the final offer would be in the PDF and the
      | poor guy couldn't wait to open it. The rest is history.
 
      | kuboble wrote:
      | It might be hard to believe that the particular person in a
      | particular company did that, but given a lot of attempts,
      | dedication and lucky / unlucky circumstances eventually
      | somewhere someone will trust a malicious person and will
      | get socially engineered into opening a pdf on a working
      | computer.
 
        | godot wrote:
        | Also wonder if the PDF exploit works for only
        | local/native PDF readers (e.g. Adobe Readers) or also
        | web-based. If someone occasionally checks their personal
        | email from a work laptop, chances are they'd only use the
        | Gmail preview to open the PDF. It seems like most
        | engineers wouldn't get all the way to downloading a job
        | offer PDF to their work laptop and opening it up there.
 
      | turtlebits wrote:
      | If you're looking for work, you have to interview during
      | the day, which you're probably in office (things are very
      | different now). I know I'm guilty of having my personal
      | emailed signed into my work computer (albeit with a
      | separate browser). I've also done virtual interviews in the
      | office meeting/phone room.
 
        | bornfreddy wrote:
        | You've done interviews in the office of your (then)
        | current employer??? Gutsy. I wouldn't dream of using
        | employer's equipment, time or space while negotiating for
        | a new employment.
 
      | CrispinS wrote:
      | I can't believe a software developer is using an operating
      | system/pdf viewer that isn't patched for security
      | vulnerabilities as major as an RCE.
      | 
      | Unless this was a zero day, but I would have assumed the
      | article would mention that fact ..
 
      | da39a3ee wrote:
      | Huh? I've used my company laptops for my personal life for
      | the last 15 years. Why would I want to carry two laptops
      | everywhere? I travel. I barely remember what a personal
      | laptop is.
 
        | RajT88 wrote:
        | I travel with a HP Spectre x360 for personal stuff. It is
        | barely a weight or bulk addition compared to my work
        | machine.
        | 
        | When I was on the road all the time I also had separate
        | phones to ensure I never got stuck with a dead phone.
 
        | logifail wrote:
        | > I've used my company laptops for my personal life for
        | the last 15 years.
        | 
        | Counterpoint: I've been completely and utterly allergic
        | to opening anything personal from any company system for
        | longer than that.
 
        | jazzyjackson wrote:
        | lol
        | 
        | do you at least dual boot?
        | 
        | have a separate user account?
        | 
        | I guess its fine as long as your computer doesn't have
        | the credentials to the company slush fund.
        | 
        | Friend of mine I traveled with carried 3 macbooks with
        | her: school issued, work issued, and personal. They had
        | different software licenses tied to the machine,
        | whadyagonnado?
 
        | acheron wrote:
        | I hope this is satire.
 
        | kornhole wrote:
        | I think you are joking to bait us. At least use a VM
        | running a VPN within it. It won't protect you from screen
        | captures or keyloggers your employer put on your machine,
        | but it will segregate files and network activity.
 
  | koofdoof wrote:
  | How usable is LinkedIn with a pseudonym? Is that a security
  | industry only practice or could a regular dev get away with
  | that too? I've always been shy about having a profile with my
  | actual name but id consider one with a thin veil of anonymity.
 
    | 8organicbits wrote:
    | Same, although my perception is that LinkedIn has moved past
    | its peak usefulness, and it would be better to spend time on
    | other platforms than creating a LI account. All I hear about
    | LinkedIn these days is spam.
 
      | bckr wrote:
      | which other platform?
 
        | 8organicbits wrote:
        | There's a lot of platforms that do sort of related
        | things, so it's a hard thing to answer. For "finding a
        | job" I've been looking at HN, remoteok, and a bunch of
        | others. For professional networking I use various tools
        | run by former coworkers (mostly Slack and Google Groups).
        | For "blogs" I use HN and Reddit. etc. I don't think
        | LinkedIn does any of those better (my perception, I'm not
        | a current user).
        | 
        | Personally, I'm probably not interested in a LI clone for
        | many of the reasons I stopped using LI. I deleted my LI
        | account maybe 8 years ago, after getting too much spam
        | (and I think some security issue?)
 
      | mistrial9 wrote:
      | LinkedIn sceptic here -- I would assume that in 2022, the
      | closer you are to real, legal Microsoft-ecosystem roles,
      | the more useful it is.. meanwhile, the independent people
      | in tech get splashed with mud. No comment in this
      | discussion has indicated to me that LinkedIn is not useful
      | for certain swathes of established professions, even now.
 
    | chatmasta wrote:
    | As an engineer I never found LinkedIn useful. But during
    | college I made sure to connect with everybody, even if I
    | barely knew them. The only jobs I've had I got through other
    | means, in some cases even "connections," in the traditional
    | sense of the word, which incidentally exist on the LinkedIn
    | graph, but that's just a mirror of real life and it's not
    | like the coordination occurs over LinkedIn messages anyway.
    | 
    | As a startup founder, it's effective in some contexts, like
    | as a contact point or promotional tool. We never felt the
    | need to use it for recruiting. At least in the software
    | industry, GitHub is a much more effective marketplace of
    | talent. But LinkedIn can have some benefits for a startup
    | outside of recruiting. Posting content about your product is
    | a good way to stay in front of investors you've connected
    | with who doomscroll their LinkedIn feed like a dev does HN.
    | :) (it's also something I need to automate because I block
    | LinkedIn on /etc/hosts for productivity purposes..)
    | 
    | I'm not sure I've ever _sourced_ an opportunity from
    | LinkedIn. I also never accept connections without at least
    | one prior interaction. For me it's a tool for following up
    | and keeping in touch, not introductions. It might also be
    | useful in some rare sales contexts, for some specific
    | archetype of audience especially susceptible to the
    | psychological tactics commonly deployed to the LinkedIn
    | newsfeed. Developers are definitely not that audience (well,
    | not on LinkedIn at least...)
 
    | charlie0 wrote:
    | I really wish I could just dump LI and delete my account;
    | it's just spam and another service for those who love to self
    | promote themselves. I won't do it because I'm not sure how it
    | will impact by ability to get a job.
    | 
    | How many of you have gotten jobs with no LI account? YEO?
 
| CodesInChaos wrote:
| Did this use a code-execution vulnerability in the PDF reader? or
| did they just trick the user into opening an executable?
 
  | nemothekid wrote:
  | I'm assuming it was an exploit in Adobe reader. The target
  | cloud have even been persuaded to install Adobe reader to
  | "e-sign" the document. PDFs don't have the best track record
  | when it comes to security
 
    | silentsea90 wrote:
    | Why do pdfs even allow executing code outside of the pdf env
    | ie why isn't there a sandbox/apis that allow very limited
    | operation?
 
      | nemothekid wrote:
      | >Why do pdfs even allow executing code outside of the pdf
      | env
      | 
      | Some PM in 2006 thought it would be a good idea if PDFs
      | were turing complete. I'm sure the word sandbox wasn't even
      | thought about. 10 years later PDF (and more notably, Flash)
      | became huge attack vectors.
      | 
      | I think a far more interesting hack is when NSO used a PDF
      | to embed a virtual machine inside an iPhone to develop a
      | zero click exploit over iMessage:
      | 
      | https://hothardware.com/news/zero-click-malware-pwns-
      | iphone-...
 
| darepublic wrote:
| During beginning of pandemic I got a job via a fully remote
| process. I felt it was sketchy in some respects and I began to
| increasingly fearful that it was some kind of phishing scheme.
| Luckily turned out to be legit. Job applications are such an open
| door for this kind of thing. They collect so much info from
| candidates, easily enough to commit identity theft. Also god
| forbid the company or recruiters get hacked and the data leaks
| anyway
 
| londons_explore wrote:
| Chrome/Edge PDF viewers are pretty secure. You can reasonably
| safely open anything in them.
| 
| Desktop PDF viewers like acrobat are gaping security holes...
| Don't use them!
 
  | ahmadmijot wrote:
  | Does Adobe Acrobat really that bad? We use Acrobat Pro because
  | it easy to modify pdf file with it. Other software can't do
  | that much. Is there other pdf 'editor' that you can recommend?
 
    | londons_explore wrote:
    | Acrobat in a virtual machine that you don't connect to the
    | network?
    | 
    | Most malware these days can't function without internet
    | connectivity. The exploits typically connect to a server to
    | get the rest of their code because they don't want any pesky
    | researchers getting their hands on stuff.
 
  | TedDoesntTalk wrote:
  | I use PDF Expert on MacOS for its editing and markup abilities;
  | built-in browser viewers aren't good for that. What should I
  | do?
 
    | CamelRocketFish wrote:
    | Don't work for a crypto company.
 
| iamwil wrote:
| In this case, there's no need to make it on a blockchain if a
| company controls the majority of validators.
 
| UberFly wrote:
| I read the first paragraph, the overlay banner popped up and
| blocked everything. I don't care what the article says after
| that.
 
| elif wrote:
| Is this the moment we need for LaTeX to become standard? pdf is
| clearly to blame here imo. This guy isn't the only one to trust
| it.
| 
| It seems like the entire legal profession, for instance, should
| be crippled by this vulnerability disclosure, if true.
 
  | shp0ngle wrote:
  | hahaha
 
| Barrera wrote:
| > Validators fulfill various functions in blockchains, including
| the creation of transaction blocks and the updating of data
| oracles. Ronin uses a so-called "proof of authority" system for
| signing transactions, concentrating power in the hands of nine
| trusted actors.
| 
| This paragraph perfectly encapsulates everything wrong with the
| way promoters sell Ethereum. Smart contracts can do little of
| interest beyond straight monetary transactions without
| information about the outside world. That information comes from
| "oracles", or what the article calls "validators".
| 
| The security guarantees of this system are far, far weaker than
| the Ethereum consensus protocol, as the article demonstrates. And
| yet, the system is hyped to the n-th degree by sheisters who
| ignore this basic fact with ludicrous claims about security and
| stability.
| 
| Zooming out, basically Ethereum is hyped as a platform for "smart
| contracts." But the minute a smart contract does anything beyond
| basic money transfers, it needs an oracle. And with the oracle
| comes radically reduced security.
| 
| Eventually, this will be obvious. For now, shenanigans like this
| will continue.
 
  | whatisweb3 wrote:
  | Oracles that connect to off-chain data are usually understood
  | as points of centralization, I don't think Ethereum or it's
  | developers are selling otherwise.
  | 
  | Most Ethereum developers are advising against relying on
  | bridges across security zones that would be upheld by multisigs
  | and oracles, they are vulnerable to attacks. A better model
  | than a bridge to sidechain would be a rollup - posting proofs
  | on chain without giving the sequencer the ability to steal or
  | control user funds.
 
| [deleted]
 
| jedberg wrote:
| For those that don't want to read the whole thing, (supposedly)
| the attackers reached out on linkedin to a bunch of employees
| asking them to apply to a fake company. One of them did it, went
| through a bunch of fake interviews, and then got a fake offer, in
| the form of a PDF.
| 
| They opened the PDF and that installed a keylogger on their
| system (it doesn't explain how).
| 
| The attackers then used that engineer's credentials to take over
| 4 of the 9 validators on the blockchain which they then used for
| their heist.
 
  | leoqa wrote:
  | It's honestly impressive. I work in security in fintech and it
  | can be frustrating to have our work deprioritized against
  | product features. These examples help underscore why having
  | robust security controls is existential.
 
  | CobrastanJorji wrote:
  | I'm trying to imagine a setup at any company whose primary
  | business is controlling extremely valuable digital assets
  | having a security setup that could be entirely undone with
  | keyloggers, and it's difficult. No necessary VPNs, keys on
  | devices, or other non-password authentication? One engineer's
  | password should not be the keys to the kingdom.
  | 
  | Sounds like a bad RPG plot. "Because of its danger, we broke
  | the Obsidian Key into 9 pieces and divided them across the
  | realm, each protected by a powerful, mystic dungeon. Also, Dave
  | can access them any time he says the secret word."
 
    | SV_BubbleTime wrote:
    | Agreed. The article doesn't mention keylogger at all. I was
    | definitely picturing a remote control exploit.
 
      | jedberg wrote:
      | They must have updated it. When I read it it specifically
      | said keylogger.
 
    | phphphphp wrote:
    | I'm of the view that the completely illogical nature of their
    | entire business and the absence of any meaningful security
    | are deeply interwoven.
    | 
    | Rather than think of their primary business as securing
    | digital assets, think of their primary business as convincing
    | people that a perpetual money machine in the shape of a video
    | game is possible. The valuable digital assets are just a
    | narrative tool -- and so it follows that they wouldn't have
    | the expertise in securing digital assets.
    | 
    | Nobody capable of building a secure system for digital assets
    | would waste their time working for a company like Axie, after
    | all, the entire premise of their business is flawed so people
    | with the critical thinking skills necessary to build a secure
    | system would apply that critical thinking to the viability of
    | the company -- and, of course, conclude it's destined for
    | failure and not hitch their wagon to it.
 
      | tornato7 wrote:
      | Axie Infinity exploded in popularity overnight. They likely
      | built their infrastructure when they were securing $1M in
      | digital assets and then suddenly found themselves
      | controlling half a billion before they could upgrade their
      | security.
      | 
      | That doesn't excuse their poor security practices. They
      | shouldn't have built their asset custody system in-house if
      | they didn't have the expertise. They could have used
      | Fireblocks or a Gnosis Safe Multisig with hardware wallets
      | and they would be safe.
 
      | dataangel wrote:
      | I understand your argument but this kind of reasoning
      | consistently fails to be predictive. If things worked as
      | you describe, there would be way more consensus amongst
      | skilled engineers on political topics. In practice people
      | are very skilled at selectively turning off their brain,
      | especially when they stand to benefit.
      | 
      | "It's difficult to get a man to understand something when
      | his salary depends on not understanding it." -Upton
      | Sinclair
 
        | phphphphp wrote:
        | I completely agree in principle but the nuance here is
        | that I'm leaning on the belief that people joining Axie
        | do not "...stand to benefit..." because the long term
        | prospects of Axie Infinity are not good (and have never
        | been good) and so anybody analysing the benefit of
        | joining them -- who has a broad range of opportunities
        | available to them -- would immediately see how little
        | they stand to benefit from getting involved with Axie
        | Infinity.
        | 
        | I'm under no illusions about the intelligence of software
        | engineers (of any specialism) -- we are all idiots at
        | least some of the time -- but I struggle to believe that
        | a competent engineer with lots of opportunities would
        | somehow believe that Axie Infinity is the best
        | opportunity available to them, hence, their system is
        | built by people who don't have other opportunities and
        | have produced an insecure house of cards (more insecure
        | than the average system anyway -- all systems are
        | insecure in some capacity).
 
| eigenvalue wrote:
| Seems like there would be market demand for a super locked down
| PDF viewer that basically ignores all the silly
| extensions/additions that Adobe has added to the format over the
| decades. The vast majority of documents don't need Turing
| complete code capabilities or embedded videos or interactive 3D
| models. Something that safely (using sandboxing and other
| methods) turns the document into totally static pixel data that
| still feels nice to read would mitigate this extremely common
| attack vector.
 
  | tornato7 wrote:
  | This pretty much already exists, it's called Cloudflare Browser
  | Isolation. They basically render your browser on a remote
  | server and pipe you the visual data.
 
  | SV_BubbleTime wrote:
  | FoxIt has out of the box GPO controls that are quite easy to
  | use. It's probably got a lot of tweaking to really lock it
  | down, but I think you could get pretty far before having to
  | stop for lunch.
 
  | stefan_ wrote:
  | I realized some time ago, not wanting to install drivers, that
  | a lot of office printers now have some janky webinterface that
  | also allows uploading PDFs to submit as print jobs. This will
  | turn a malicious PDF into perfectly safe paper!
  | 
  | Now whatever cursed embedded software on the printer reads the
  | PDF is probably a lot easier to exploit than an updated PDF
  | viewer, but that's not what these people are going for.
 
| schemescape wrote:
| What's the best practice, security-wise, for viewing PDFs?
 
  | AustinDev wrote:
  | I have a script that watches my download folder and runs them
  | through ghost script which is designed to reduce the file size
  | of PDFs but it also strips out any linked media or embedded
  | code from my testing. It does a bunch of other stuff too but
  | the pdf auto-converter was pretty simple.
 
| pcthrowaway wrote:
| Curious if anyone has been able to find technical details of how
| this attack works/worked. I'm under the impression most PDF
| viewers would prevent this sort of attack (e.g. opening a PDF in
| your browser should sandbox it to the browsing context), but
| really keen to know what PDF viewer / OS was used by the dev.
 
  | layer8 wrote:
  | On Windows, Acrobat Reader has Protected Mode (sandbox) and
  | Protected View (most features disabled) features [0], but
  | people tend to disable it, in particular the Protected View, or
  | don't enable it for all locations. Or maybe the vulnerability
  | wasn't on Windows, or was in something like font rendering, or
  | they used a different reader without sandboxing.
  | 
  | [0] https://helpx.adobe.com/reader/using/protected-mode-
  | windows....
 
    | butterNaN wrote:
    | Why is Protected mode not the default?
 
  | wespiser_2018 wrote:
  | Here's a demonstration of some example attacks using pdf:
  | executing arbitrary js, and connecting to a samba server:
  | https://www.sentinelone.com/blog/malicious-pdfs-revealing-te...
  | 
  | I'm not sure about this attack specifically, though, and in
  | Ronin's post mortem they aren't really talking about that:
  | https://roninblockchain.substack.com/p/back-to-building-
  | roni....
  | 
  | To some extent, the PDF viewer/OS doesn't matter. A dedicated
  | and well resourced attacker like the Lazarus Group will find
  | holes in all of them. The "right" move here would have been for
  | the employee not to download the compromised pdf, and short of
  | that, for the IT Security team at Ronin to quickly detect the
  | weird traffic that resulted and isolate the validators to
  | prevent a compromise of their critical assets.
 
    | Volundr wrote:
    | The right move here would have been to have separate
    | work/personal computers so that this PDF never landed on a
    | system with access to the Ronin network.
    | 
    | I know I'm pushing a boulder uphill with that one but it
    | really is the way to go, better for both the individual and
    | the company.
 
      | gowld wrote:
 
      | llaolleh wrote:
      | I'm in this camp. All employees should be sent a laptop, or
      | work with a remote environment that is isolated from your
      | personal computer.
 
      | rchaud wrote:
      | what would stop a developer from checking personal email on
      | a work machine?
 
        | Volundr wrote:
        | Themselves. I'm saying developers (and employees in
        | general) should not do any personal stuff on work
        | machines or any work stuff on personal machines.
        | 
        | This has benefits for the employee, not just the company,
        | in that it keeps the employees personal data out of the
        | hands of the IT department.
 
        | pcthrowaway wrote:
        | It makes it a bit harder to travel with two laptops,
        | which is one of the nice advantages of working from
        | home.. but I'm otherwise in support of this.
        | 
        | This might just result in employees finding ways to
        | remote access their work computer from their personal
        | computer from wherever they are, but at least that's an
        | additional wall for would-be attackers to hurdle.
 
        | macintux wrote:
        | Exactly. I was on a meeting a couple of years ago and the
        | co-worker who was presenting his desktop received a
        | personal iMessage that flashed for everyone to see.
 
        | ptudan wrote:
        | yeah but that's solved by disabling notifications before
        | presenting.
 
        | ptudan wrote:
        | Nahhhhh, I gotta browse the internet to be effective.
        | That requires me logging into random sites with personal
        | logins.
        | 
        | I don't install anything personal on my work computer,
        | but I wouldn't hesitate to open an email or pdf from a
        | seemingly trusted source. I don't really blame the dev
        | here.
        | 
        | What you propose is a reasonable solution, but I feel
        | like it slams in the face of actual human behavior. Most
        | people act the way I describe, even most tech
        | professionals.
 
        | pcthrowaway wrote:
        | Or more to the point, what would stop someone from
        | sending malicious documents to the employees' work
        | emails?
        | 
        | Figure out a company uses  register a phishing
        | domain (e.g. gith.ub) send them an email with important
        | info about their account, and a PDF attachment with more
        | details.
        | 
        | If it's that easy to compromise a system all you have to
        | do is get a few employees to open the PDF right?
 
        | Volundr wrote:
        | And this is exactly why your IT department sends out
        | those simulated phishing emails everyone likes to
        | complain about.
 
      | elif wrote:
      | So then the attackers can only get my bank password?
      | 
      | I think the clear move here should be to avoid pdf, just
      | like the move is to avoid doc
 
    | the_gipsy wrote:
    | I know that document-rendering is much more complex than what
    | it appears on the surface, but surely in this day and age
    | there should be document viewers that don't run scripts and
    | are exploit free.
 
      | gowld wrote:
 
    | cmeacham98 wrote:
    | > To some extent, the PDF viewer/OS doesn't matter. A
    | dedicated and well resourced attacker like the Lazarus Group
    | will find holes in all of them.
    | 
    | I dispute this: the web browser is one of the most defended
    | pieces of software of all time, especially relative to its
    | complexity. I would find it much safer to open a potentially
    | malicious PDF in my browser's JS-based reader than using a
    | desktop reader.
    | 
    | > The "right" move here would have been for the employee not
    | to download the compromised pdf, and short of that, for the
    | IT Security team at Ronin to quickly detect the weird traffic
    | that resulted and isolate the validators to prevent a
    | compromise of their critical assets.
    | 
    | It also probably would have been helpful if one employee
    | didn't have access to almost half of the validators,
    | especially on a system they're accessing email with.
 
  | lordnacho wrote:
  | Does it even need to be terribly complicated? Congrats on your
  | new job, here's a script for you to generate a new ssh key with
  | us, just copy/paste it in your terminal and that will sort it
  | out.
 
    | pcthrowaway wrote:
    | Yet according to the article, the malware was introduced by
    | the "candidate" opening a PDF; I'd expect most senior
    | developers to know better than to run a random script from a
    | company they don't have an ongoing relationship with without
    | looking at the source first, especially if they have
    | sensitive credentials on the computer they're using.
    | 
    | But you never know.
 
  | jaywalk wrote:
  | Probably Acrobat.
 
  | kyle-rb wrote:
  | Likely this was a standalone PDF reader hack (rather than a
  | browser), since those can have many more features and a much
  | larger attack surface.
  | 
  | It says it was an offer letter, so my guess is that opening it
  | in the browser came up with an error like "to be able to
  | digitally sign this offer letter, please open it in a desktop
  | PDF reader with full scripting support enabled :)"
 
    | pcthrowaway wrote:
    | I guess we all need to be opening anything remotely phishy in
    | VMs to avoid similar issues
 
| londons_explore wrote:
| The other major cause of the failure was that one dev had access
| to 5 signing keys. That shouldn't have happened, because than
| that one dev could have run off with $540 Million...
| 
| And remember, it wasn't just that one dev - it was everything
| running on his computer - think of the probably tens of thousands
| of developers who wrote the code that runs as root on his PC,
| much of it unreviewed.
 
  | hourago wrote:
  | > In a post-mortem blog post on the hack, published April 27,
  | Sky Mavis said: "Employees are under constant advanced spear-
  | phishing attacks on various social channels and one employee
  | was compromised. This employee no longer works at Sky Mavis.
  | The attacker managed to leverage that access to penetrate Sky
  | Mavis IT infrastructure and gain access to the validator
  | nodes."
  | 
  | The company fully blames the employee. I wish software
  | companies had the same level of professionalism than airlines.
  | "It's the pilot's fault" does not help to improve security.
  | Nothing is learned.
 
    | giaour wrote:
    | My takeaway was that Sky Mavis's ops culture is a dumpster
    | fire, something that might be generalizable to a good chunk
    | of the Web3 sector. The tech companies where I have worked (a
    | couple BigTech cos, some smaller orgs, and civil service)
    | have all taken the blameless postmortem approach very
    | seriously.
 
    | Sebguer wrote:
    | Airlines would behave the same way if there wasn't an
    | aggressive government regulatory body forcing them to learn
    | from failures.
 
      | WorldMaker wrote:
      | Government regulatory body _and_ a pilot 's union.
 
        | ChadNauseam wrote:
        | Do countries without a pilot's union have more unsafe air
        | travel?
 
    | xmprt wrote:
    | I don't think you can generalize Web3 companies to all
    | software companies. Web3 companies have shown time and time
    | again that they don't care much about security or good
    | software development practices. I'm not sure if it's because
    | the industry is so nascent or because the people joining are
    | simply incompetent or because they don't care (or a
    | combination of all three) but it's clear that Web3 companies
    | have major incidents at higher rates than most other software
    | companies.
 
      | ChadNauseam wrote:
      | > clear that Web3 companies have major incidents at higher
      | rates than most other software companies
      | 
      | I won't argue this, but I think that it depends on where
      | you look. Cryptography audit services are books out for
      | months or years because of the demand from cryptocurrency
      | projects. There's never been a vulnerability in the Bitcoin
      | or Ethereum networks that allowed an attacker to steal
      | funds or execute a double-spend. And cryptocurrency
      | projects have pioneered whole fields of cryptography like
      | zksnarks for security purposes.
      | 
      | Cryptocurrency projects often have a fundamentally very
      | difficult problem to solve, and attackers are also very
      | sophisticated. There are currently very few people with the
      | expertise needed to implement a complex cryptocurrency
      | project securely.
      | 
      | Disclaimer: I'm a protocol developer for a cryptocurrency
      | project (not one of the ones mentioned here)
 
    | system2 wrote:
    | It is called dodging.
 
| nipponese wrote:
| No one is going to pick up the low hanging fruit and criticize
| _nine nodes_ as not being decentralized?
 
| marshray wrote:
| "multiple rounds of fake job interviews" ... "The con culminated
| in one senior engineer clicking a PDF supposedly containing the
| official offer"
| 
| Wow! These folks were _really_ on the ball if it took that much
| social engineering just to get an employee to open a PDF.
 
___________________________________________________________________
(page generated 2022-07-06 23:00 UTC)