Birdwants

joined 5 days ago
[–] Birdwants@lemmus.org 4 points 1 day ago

hahahahah gems

[–] Birdwants@lemmus.org 17 points 2 days ago (2 children)

Next level : if you want it to fill your tank fast & ad free, you have to subscribe to a monthly card-club with Facial-Recognition, otherwise it keeps showing you ads & it fills your gas tank reeeeeally sloooOOOOoowly to make sure you watch at least 5 ads ^^

[–] Birdwants@lemmus.org 2 points 2 days ago (1 children)

Technically speaking, what kind of logs does burning a CD actually leave on a hardened Win/Linux workstation compared to a USB mount? If the DLP is only looking for 'Mass Storage Devices', does the burning process even trigger a file-copy event in the logs?

[–] Birdwants@lemmus.org 1 points 2 days ago

def a rookie move! ^^ thx for the reply, appreciate it! yeah this case raises so many questions & i'm just guessing here. clearly a ton of security issues.

"Why was it a trainee... notifying security?" totally agree. besides the CDs, my main trigger was the trainee reporting it directly to security, skipping any manager or coworker. why? and why did no one else notice anything? makes me wonder if it’s really a single-man job... accomplices in the team maybe?

"Are there protocols in place...?" i d assume protocols exist but were bypassed. plugging in an external burner would def raise eyebrows or trigger dlp/edr. so i bet the workstations had built-in drives. in my dpo class, everyone just laughed bc it’s "old tech" nobody uses anymore... maybe the cybersec team thought the same? blocked usbs & set protocols for ports but underestimated optical? i have gen z students in my opsec classes who don't even know what a tower's cd-player is if i show them a photo. or they know it’s a player but don't realize it's a burner too.

what's ur take?

[–] Birdwants@lemmus.org 1 points 2 days ago (1 children)

why cd's? less digital footprint? burnin a disc feels more 'mechanical' — maybe it leaves nothing on the host side compared to mounting a usb mass storage? is it off the grid coz its physical legacy tech and modern dlp/edr just ignore it? anyone ever seen optical media used as a stealth exfiltration vector like this?

[–] Birdwants@lemmus.org 2 points 2 days ago* (last edited 2 days ago)

hey! thx for the reply. your points hit exactly on what i've been obsessed with lol.

"Why is the IT guy trusted...?" & "Why does he have access...?" totally agree, huge mistakes. but what if they actually didn't trust him? maybe they cut his privs to the bare minimum but since he knows the system, he found a loophole to bypass the DLP. in my class, everyone laughed bc CD-ROMs are "obsolete tech"... so did the sec team underestimate this attack surface? maybe they blocked USB ports & set alarms for external drives but forgot the optical burner? or maybe it was just easier to bypass optical media rules without triggering anything.

"Is access to the database monitored?" maybe he knew the exact threshold before a system alarm goes off? that would explain why he only picked "top" clients instead of the whole DB. plus, fitting a full banking DB on a few CDs is technicaly impossible anyway, so he had to cherry-pick.

my intuition is also on the trainee reporting it. why him/her? that's a break in the incident reporting process. where were the managers? the fact that it's neither a colleague nor a manager makes me wonder if it was a single-man job. any accomplices? i've seen enough teams to know that when ppl feel frustrated or abused, they tend to turn others against the board. keeping someone on notice after firing them is a massive danger for this exact reason.

what do u think?

--

 

quick case study for the cybersec folks here. got this real story in my dpo class & wanted ur thoughts.

IT guy at a bank, last day of his notice period. a trainee saw him puttin some CD-ROMs in his bag & told security. they checked him at the exit and found a full export of the bank's top clients on the discs. guy got fired for gross misconduct & a police complaint was filed.

any red flags or stuff that stands out to u technicaly or otherwise ?

thx 🫥

 

quick case study for the cybersec folks here. got this real story in my dpo class & wanted ur thoughts.

IT guy at a bank, last day of his notice period. a trainee saw him puttin some CD-ROMs in his bag & told security. they checked him at the exit and found a full export of the bank's top clients on the discs. guy got fired for gross misconduct & a police complaint was filed.

any red flags or stuff that stands out to u technicaly or otherwise ? i have my own ideas on this cas but curious what u guys think first?

thx 😎