zlacker

[return to "Checkout.com hacked, refuses ransom payment, donates to security labs"]
â—§
1. joshmn+6t[view] [source] 2025-11-13 13:11:12
>>Strang+(OP)
It’s notable that there were ShinyHunters members arrested by the FBI a few years ago. I was in prison with Sebastian Raoult, one of them. We talked quite a bit.

The level of persistence these guys went through to phish at scale is astounding—which is how they gained most of their access. They’d otherwise look up API endpoints on GitHub and see if there were any leaked keys (he wasn’t fond of GitHub's automated scanner).

https://www.justice.gov/usao-wdwa/pr/member-notorious-intern...

â—§â—©
2. rkozik+GI[view] [source] 2025-11-13 14:44:56
>>joshmn+6t
Generally speaking, humans are more often than not the weakest link the chain when it comes to cyber security, so the fact that most of their access comes from social engineering isn't the least bit surprising.

They themselves are likely to some extent the victims of social engineering as well. After all who benefits from creating exploits for online games and getting children to become script kiddies? Its easier (and probably safer) to make money off of cyber crime if your role isn't committing the crimes yourself. It isn't illegal to create premium software that could in theory be use for crime if you don't market it that way.

â—§â—©â—ª
3. aetern+Ip1[view] [source] 2025-11-13 17:57:08
>>rkozik+GI
I'm not sure this is very fair because humans are often not given the right tools to make a good decision. For example:

To gift to a 529 regardless of the financial institution, you go to some random ugift529.com site and put in a code plus all your financial info. This is considered the gold standard.

To get a payout from a class-action lawsuit that leaked your data, you must go to some other random site (usually some random domain name loosely related to the settlement recently registered by kroll) and enter basically more PII than was leaked in the first place.

To pay your fed taxes with a credit card, you must verify your identity with some 3rd party site, then go to yet another 3rd party site to enter your CC info.

This is insane and forces/trains people to perform actions that in many other scenarios lead to a phishing attack.

◧◩◪◨
4. theweb+BJ1[view] [source] 2025-11-13 19:26:04
>>aetern+Ip1
Don't forget magic links in email for auth and password resets training people that it's OK to click links in emails.

Yes, we've (the software industry) been training people to practice poor OpSec for a very long time, so it's not surprising at all that corporate cybersecurity training is largely ineffective. We violate our own rules all the time

◧◩◪◨⬒
5. Razeng+kV1[view] [source] 2025-11-13 20:29:57
>>theweb+BJ1
There should be a way to tell you who I am without telling you who I am.

Phone/laptop based biometrics?

◧◩◪◨⬒⬓
6. disill+Cs2[view] [source] 2025-11-13 23:39:25
>>Razeng+kV1
Isn't that what a passkey is intended to be?

If I want to use a passkey on my phone, I have to bio authenticate into it. Similarly, with Windows Hello as a passkey provider, via my camera scanner. It works well and is pretty seamless, all things considered. I prefer it to the email/code/magic link method.

[go to top]