bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

254
active users

#simswap

0 posts0 participants0 posts today
BiyteLüm<p>SIM swap attacks are one of the easiest ways hackers steal your accounts—all they need is your number.</p><p>✅ How to protect yourself:<br>✔ Port your number to a VoIP provider (MySudo, JMP.chat)<br>✔ Use app-based 2FA (NO SMS 2FA!)<br>✔ Ask your carrier for a port-out PIN</p><p>📌 Keep your number private. Keep your accounts safe.</p><p><a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://mastodon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a></p>
BiyteLüm<p>📵 Your phone number is your weakest link.</p><p>Hackers use SIM swap attacks to steal your number, reset your accounts, and bypass 2FA. It happens more than you think.</p><p>💡 Protect yourself:<br>✔ Remove your number from important accounts (email, banking)<br>✔ Use app-based 2FA (Aegis, YubiKey, OTP)—NEVER SMS<br>✔ Ask your carrier for a port-out PIN</p><p>📌 Your phone number shouldn’t be your identity.</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> the sheer fact that <a href="https://infosec.space/tags/MSPs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSPs</span></a> &amp; <a href="https://infosec.space/tags/CSPs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSPs</span></a> can access clients' setups without proper <a href="https://infosec.space/tags/authorization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authorization</span></a> [including <a href="https://infosec.space/tags/KYC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KYC</span></a> / <a href="https://infosec.space/tags/KYB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KYB</span></a>, <a href="https://infosec.space/tags/AuthCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AuthCode</span></a>|s and proper authorization via contract] is already sickening.</p><ul><li><a href="https://cyberplace.social/@GossiTheDog/114104955818018205" rel="nofollow noopener noreferrer" target="_blank">This</a> literally <em>begs to be abused</em> via <a href="https://infosec.space/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialEngineering</span></a> / <a href="https://infosec.space/tags/SocialHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialHacking</span></a> of <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> personnel or just blatant <em>"<a href="https://infosec.space/tags/PrivilegueEscalation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivilegueEscalation</span></a>"</em> through falsefully claiming to be a <a href="https://infosec.space/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> / <a href="https://infosec.space/tags/CSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSP</span></a> contracted by the targeted company.</li></ul><p>Such fundamental <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a> fuckups are reasons alone not to use <a href="https://infosec.space/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> or any <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> products &amp; services <em>at all</em>...</p><ul><li>I mean, it doesn't require <a href="https://infosec.space/tags/Mitnick" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mitnick</span></a>-level skills to pull this off, since it doesn't necessitate <a href="https://infosec.space/tags/Lapsus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lapsus</span></a>-Style <a href="https://infosec.space/tags/SIMswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswap</span></a> or other means to gain access...</li></ul>
Ducky Fella<p><a href="https://cupoftea.social/tags/PSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PSA</span></a> for everyone who owns a mobile phone:</p><p>Please please please enable <a href="https://cupoftea.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> on your mobile provider’s account. Please also set up a SIM PIN code if you’re still using a physical <a href="https://cupoftea.social/tags/SIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIM</span></a> card. </p><p>Why? Banks and other financial institutions that you use on a daily basis are still relying on (insecure!) telephone infrastructure to authenticate you. All it takes is for someone to trick your provider into issuing a new SIM to a different address and your savings could be gone! Fraudsters are relying on you not having these basic <a href="https://cupoftea.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> features switched on. Don’t make their job easy!</p><p><a href="https://cupoftea.social/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://cupoftea.social/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedKingdom</span></a> <a href="https://cupoftea.social/tags/SimSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SimSwap</span></a></p>
ITSEC News<p>Smashing Security podcast #404: Podcast not found - The story of how hackers managed to compromise the US Government's official SEC Twitter a... <a href="https://grahamcluley.com/smashing-security-podcast-404/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grahamcluley.com/smashing-secu</span><span class="invisible">rity-podcast-404/</span></a> <a href="https://schleuss.online/tags/artificialintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>artificialintelligence</span></a> <a href="https://schleuss.online/tags/smashingsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smashingsecurity</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://schleuss.online/tags/law%E2%84%B4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lawℴ</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcast</span></a> <a href="https://schleuss.online/tags/twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>twitter</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://schleuss.online/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a> <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>
The New Oil<p>Hacker pleads guilty to <a href="https://mastodon.thenewoil.org/tags/SIMswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswap</span></a> attack on <a href="https://mastodon.thenewoil.org/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> <a href="https://mastodon.thenewoil.org/tags/SEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SEC</span></a> <a href="https://mastodon.thenewoil.org/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> account</p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-pleads-guilty-to-sim-swap-attack-on-us-sec-x-account/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hacker-pleads-guilty-to-sim-swap-attack-on-us-sec-x-account/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a></p>
BrianKrebs<p>Feds Charge Five Men in 'Scattered Spider' Roundup</p><p>Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. technology companies between 2021 and 2023, including LastPass, MailChimp, Okta, T-Mobile and Twilio.</p><p>Two of the accused I've written about extensively already. Today's story looks at how several of these guys were caught. For example:</p><p>"The phishing kits used for these campaigns featured a hidden Telegram instant message bot that forwarded any submitted credentials in real-time. </p><p>In August 2022, multiple security firms gained access to the server that was receiving data from that Telegram bot, which on several occasions leaked the Telegram ID and handle of its developer, who used the nickname "Joeleoli."</p><p><a href="https://krebsonsecurity.com/2024/11/feds-charge-five-men-in-scattered-spider-roundup/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2024/11/fe</span><span class="invisible">ds-charge-five-men-in-scattered-spider-roundup/</span></a></p><p><a href="https://infosec.exchange/tags/scatteredspider" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scatteredspider</span></a> <a href="https://infosec.exchange/tags/fbi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fbi</span></a> <a href="https://infosec.exchange/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p>