Netsec – Telegram
Netsec
7.4K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
RDP Brute force attacks using real name?
Hello,I'm not entirely sure this subreddit is the right one, but if you can suggest another one that's more appropriate, let me know.Here goes...sorry for the book.As some quick background, I'm in IT, web development background, infrastructure experience over the past 15 years, fairly experienced with AD security policies, basic intrusion detection (via Splunk), and I have a fairly basic home network. Anyway, I'm sure this is a bad practice, but I've had port forwarding setup for several years now so that I can RDP to my PC and my wife's. We use non-default RDP ports (I know that's not security, and I really do it so that we can have the same external IP with diff ports go to diff internal IPs on 3389). I keep strong passwords on my admin accounts, and change them pretty infrequently.In our PCs, I do have failure auditing enabled, and I occasionally review security event logs. I've seen the brute force attempts to login, and usually ignore it because it was always using default users names (Administrator, Backup, Copier, Warehouse, User1)...stuff like that.Anyway, I recently rebuilt my PC and had forgotten to enable failure auditing for a few weeks. When I did, I took a look at the event logs and was shocked when I saw my family members' real names being used to try and login. I see these attempts using all of my family members real names, from multiple foreign IP addresses. Interestingly, in one case, they even misspelled my daughter's name (instead of Jane Smith, for example, it was Jane Smlth). These real names are in no way actual accounts on my PC. Amazingly, they have all of our real names -- I'm probably the outlier in our family and I rarely if ever go on social media -- so I've no idea how they did this.So, now my question...has anyone seen anything like this before? I'm really surprised that someone would be able to track down our real names and correlate them with our public IP address from our cable internet provider (which changes infrequently admittedly, but has changed). Any ideas or have you seen this as well?In the meantime, I did setup a scheduled task that blackholes failed login attempts from the same IP, so there's that...Thanks in advance...

Submitted May 26, 2018 at 05:15AM by kevlav84
via reddit https://ift.tt/2KTnItC
mquery: Blazingly fast Yara queries for malware analysts
https://ift.tt/2ILJGSD

Submitted May 26, 2018 at 12:08PM by digicat
via reddit https://ift.tt/2s72KRe
Apple ID is being used to sign in to a new device in China. I live in Hawaii. I have 2-Factor Identification on all accounts and devices. Should I be concerned/change anything?
https://ift.tt/2KWu63q

Submitted May 26, 2018 at 03:11PM by jakes_tornado
via reddit https://ift.tt/2Lw4rzB
FBI to America: Reboot Your Routers, Right Now
https://ift.tt/2IP0F2o

Submitted May 26, 2018 at 01:48PM by absolufreak
via reddit https://ift.tt/2ksAx33
Jamming Anybody's Wifi by DDOS Attacj
https://ift.tt/2sf15YS

Submitted May 26, 2018 at 12:41PM by vortex1000
via reddit https://ift.tt/2KVzzaN
Security concern about email services and providers
Is there any free email service that does not delete user account, ever?I'm certain that one of the highest security risk of email accounts is the removing of account after an inactivity period, because of the other services registered with that email address. Usually you won't be able to change anything on you other services, because you can not confirm changes by email ever again. And you can not recover those other accounts (in case of lost password, etc.). And on top of that if someone registers your old address, then he can get your password or reset your password to those services.I know, there are several services with 180 days inactivity periods (gmail perhaps 18 months), and paid services/accounts never will be cancelled, but what if the account owner gets a stroke and hospitalized for a long time (can not pay or login)?

Submitted May 26, 2018 at 07:43PM by Erdoe
via reddit https://ift.tt/2LyRNQq
Hey everyone,
I've removed posts from /r/security as it wasn't sharing useful information and /r/netsec covers pretty much everything.
Intel Engine Firmware Analysis Tool (Sources + Discussion)
https://ift.tt/2bHr9nD

Submitted May 27, 2018 at 03:40PM by Scene_News
via reddit https://ift.tt/2INahil
SEVered: Subverting AMD’s Virtual Machine Encryption
https://ift.tt/2sb4EQG

Submitted May 27, 2018 at 10:34PM by majorllama
via reddit https://ift.tt/2xi9aSo
NetBSD network stack audit results
https://ift.tt/2GYa0TM

Submitted May 28, 2018 at 03:30PM by apancetta
via reddit https://ift.tt/2sevw2k
New VPNFilter malware targets at least 500K networking devices worldwide
https://ift.tt/2scqK4H

Submitted May 28, 2018 at 02:07PM by nachoparker
via reddit https://ift.tt/2IORVxf
IBM QRadar unauthenticated remote code execution (writeup + exploit)
https://ift.tt/2seGW5g

Submitted May 28, 2018 at 06:53PM by jose_boneh
via reddit https://ift.tt/2ITC3pc
Open Source Vulnerability Assessment and Management Tool for Developers and Pentesters [Updated 28 May] (See Comment)
https://ift.tt/2ukKY03

Submitted May 28, 2018 at 10:25PM by TechLord2
via reddit https://ift.tt/2kuvGy4
Archery - Open Source Vulnerability Assessment and Management Tool for Developers and Pentesters [Updated 28 May]
https://ift.tt/2ukKY03

Submitted May 28, 2018 at 11:07PM by PeterG45
via reddit https://ift.tt/2L3J1Zo