<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: 0trust0day</title>
    <description>The latest articles on DEV Community by 0trust0day (@0trust0day).</description>
    <link>https://dev.to/0trust0day</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3336185%2Ffcd3c123-d602-49a7-86cc-74427a7a8fed.jpg</url>
      <title>DEV Community: 0trust0day</title>
      <link>https://dev.to/0trust0day</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/0trust0day"/>
    <language>en</language>
    <item>
      <title>Hacking Instagram &amp; LinkedIn: Costs, Tactics, and How to Defend Against Them</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Wed, 13 Aug 2025 01:09:52 +0000</pubDate>
      <link>https://dev.to/0trust0day/hacking-instagram-linkedin-costs-tactics-and-how-to-defend-against-them-2628</link>
      <guid>https://dev.to/0trust0day/hacking-instagram-linkedin-costs-tactics-and-how-to-defend-against-them-2628</guid>
      <description>&lt;p&gt;From phishing to AiTM Proxies and Infostealers — Real Tactics, Prices and Defense Strategies&lt;br&gt;
In an era where social media has become an inseparable part of business, careers, and personal life, account theft has evolved into a high-tech industry. Instagram is the storefront for brands and influencers; LinkedIn is the platform for professional networking and job hunting. Losing access can cost thousands of dollars in lost revenue, irreparable reputational damage, or even legal trouble. In this piece, we break down the evolution of attacks — from primitive schemes to sophisticated operations — backed by real 2024–2025 cases, and outline defense mechanics that work in 2025.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1arctqk6mdm2458odobz.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1arctqk6mdm2458odobz.jpeg" alt=" " width="800" height="448"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Anatomy of an Attack: From Mass “Funnels” to Precision Strikes&lt;br&gt;
Forget about the simple password brute-forcing of the early 2000s. Today, attacks on Instagram and LinkedIn form an ecosystem — complete with specialized tooling, commercial malware, and multi-stage kill chains that resemble corporate workflows.&lt;/p&gt;

&lt;p&gt;Mass campaigns are like marketing funnels: from thousands of targets, hundreds get compromised. The focus is on speed and volume — attackers use automated spam bots, purchase email lists on dark web marketplaces, and rely on probability: even a 1–2% hit rate pays for itself. In 2025, these campaigns are often disguised as “algorithm updates” or “security checks” from the platforms.&lt;/p&gt;

&lt;p&gt;Targeted operations are sniper shots. They can involve months of reconnaissance, digital footprint analysis, and personalized bait crafting. Costs can reach tens of thousands of dollars, but the prize is high-value accounts: influencers with millions of followers or executives with access to corporate networks. According to Menlo Security’s 2025 reports, such attacks have surged by 40% among C-level executives.&lt;/p&gt;

&lt;p&gt;Reconnaissance: Building the Digital Dossier&lt;br&gt;
Every successful compromise begins with OSINT (Open Source Intelligence):&lt;/p&gt;

&lt;p&gt;Geolocation &amp;amp; Activity: Time zones, IP ranges, habitual locations from posts or photo metadata.&lt;br&gt;
Social graph: Friends, colleagues, family — to impersonate trusted senders.&lt;br&gt;
Technical profile: Devices (iOS/Android), browsers (Chrome/Safari), OS — to tailor malware payloads.&lt;br&gt;
Behavioral markers: Posting times, language style, engagement frequency.&lt;br&gt;
Trust vectors: MFA method (SMS, authenticator app, hardware keys) to determine bypass strategies.&lt;br&gt;
For high-value targets, attackers also profile “windows of vulnerability” — when the victim is online, from which networks, and sometimes monitor messaging apps for personalized phishing lures.&lt;/p&gt;

&lt;p&gt;The Attack Arsenal: From Classics to Cutting-Edge&lt;br&gt;
Classic Phishing — Still Alive, but Evolved&lt;br&gt;
Victims are lured to fake login pages visually identical to the real ones. The password gets stolen, though MFA can still stop the breach. In 2025, phishing is often paired with malvertising — malicious ads in legitimate networks.&lt;/p&gt;

&lt;p&gt;Proxy Phishing (Adversary-in-the-Middle, AiTM)&lt;br&gt;
The real game-changer: tools like Evilginx3, Modlishka, or their forks set up a proxy bridge. The victim sees the real Instagram/LinkedIn site, passes MFA (even corporate-level), but the proxy intercepts both the password and the session token. That token allows login without reauthentication — the system believes it’s still you.&lt;br&gt;
In 2025, AiTM setups are integrated with AI to automate lures: bots craft personalized messages mimicking a colleague’s style.&lt;/p&gt;

&lt;p&gt;Next-Gen Infostealers&lt;br&gt;
Platforms like LummaC2, RedLine Stealer, and Raccoon v2 steal not just credentials but cookies, tokens, and crypto keys from browser storage. They can “resurrect” a session on another machine, bypassing MFA entirely.&lt;/p&gt;

&lt;p&gt;Delivery vectors:&lt;br&gt;
Fake software updates (“Instagram Analytics Tool”).&lt;br&gt;
Trojanized apps in unofficial stores.&lt;br&gt;
Macro-laced documents disguised as résumés or contracts.&lt;br&gt;
According to Chainalysis, in 2025 infostealers compromised over 50,000 Instagram accounts for resale on forums like BreachForums.&lt;/p&gt;

&lt;p&gt;Browser Extension Exploits&lt;br&gt;
Malicious add-ons — often posing as ad blockers or password managers — can access the DOM, read form inputs, intercept requests, and alter page content. In 2025, several such extensions with millions of downloads were pulled from the Chrome Web Store.&lt;/p&gt;

&lt;p&gt;Other Vectors: Wi-Fi, SIM Swaps, and Malware&lt;br&gt;
Fake Wi-Fi access points: In public places, used to inject AiTM proxies.&lt;br&gt;
SIM swap: Social engineering telecom support to duplicate a SIM and intercept SMS-based MFA codes.&lt;br&gt;
Trojanized documents/installers: Disguised as “LinkedIn Premium Tools.”&lt;br&gt;
Press enter or click to view image in full size&lt;/p&gt;

&lt;p&gt;Why Platform Defenses Can Still Be Bypassed&lt;br&gt;
Instagram and LinkedIn deploy top-tier protections:&lt;br&gt;
Cookie flags: Secure, HttpOnly, SameSite to block XSS and cross-domain attacks.&lt;br&gt;
HSTS: Enforces HTTPS.&lt;br&gt;
MFA: Mandatory for business accounts.&lt;br&gt;
But weaknesses remain:&lt;/p&gt;

&lt;p&gt;AiTM: Tokens pass through the proxy “legitimately.”&lt;br&gt;
Device compromise: Malware runs in your context.&lt;br&gt;
Extensions: Privileged access bypasses cookie protections.&lt;br&gt;
In 2025, platforms rolled out Continuous Access Evaluation (CAE) — real-time session risk assessment — but it’s no silver bullet against AiTM.&lt;/p&gt;

&lt;p&gt;Covering Tracks: Mimicry and Chaos&lt;br&gt;
Attackers blend in:&lt;br&gt;
Noise injection: Spam floods, TDoS (telephone denial-of-service) to distract the target.&lt;br&gt;
Behavioral mimicry: Activity during your normal hours, from your IP range (via VPN or compromised devices).&lt;br&gt;
Technical cleanup: Log deletion, “sleep mode” malware, cloud-hosted infrastructure (AWS, Azure) for deniability.&lt;br&gt;
Real Cases, 2024–2025&lt;br&gt;
“LinkedIn Executives” (2024–2025): AiTM attacks targeting tech company execs. Fake HR invites led to proxy sites; tokens were intercepted, accounts used for espionage. Menlo Security recorded a 30% increase in 2025.&lt;br&gt;
“InstaBusiness”: LummaC2 disguised as a “promotion tool” compromised over 20,000 business accounts; data sold for crypto.&lt;br&gt;
New 2025 case: “Wi-Fi Hunter”: Airport-based fake networks delivering AiTM for LinkedIn; victims were business travelers.&lt;br&gt;
Defense Architecture: From Passkeys to CAE&lt;br&gt;
Phishing-resistant authentication: Passkeys/FIDO2 — cryptographically bound to the domain, unusable on fake sites.&lt;br&gt;
Context binding: Device, network, and behavior checks render stolen tokens useless.&lt;br&gt;
CAE: Continuous risk evaluation — session revocation on anomalies.&lt;br&gt;
Bonus: AI-based platform monitoring to detect AiTM activity.&lt;br&gt;
Checklist for Users and Businesses&lt;br&gt;
Switch to passkeys/hardware keys (YubiKey) over SMS codes.&lt;br&gt;
Audit extensions: Remove unused ones, check permissions.&lt;br&gt;
Session monitoring: End suspicious sessions in account settings.&lt;br&gt;
VPN &amp;amp; updates: Use corporate VPNs, keep OS/browsers updated.&lt;br&gt;
Alerts: Enable login notifications; review geolocation logs.&lt;br&gt;
For businesses: Deploy CAE for corporate accounts; conduct OSINT training.&lt;/p&gt;

&lt;p&gt;Compromise Indicators&lt;br&gt;
Technical:&lt;br&gt;
Sessions from unfamiliar locations/IPs.&lt;br&gt;
Unusual User-Agent strings or API calls.&lt;br&gt;
Unexpected changes to recovery info (email, phone).&lt;/p&gt;

&lt;p&gt;Behavioral:&lt;br&gt;
Activity at odd hours.&lt;br&gt;
Strange messages sent to contacts.&lt;br&gt;
Shifts in posting style.&lt;/p&gt;

&lt;p&gt;Cybersecurity as Strategy&lt;br&gt;
Attacks on Instagram and LinkedIn are now a business model — where your data is the commodity. Understanding the mechanics (from AiTM to infostealers) is the key to defense. In 2025, a traditional antivirus is not enough; a layered security strategy — from passkeys to behavioral monitoring — is essential. If your digital identity is an asset, protect it like one.&lt;/p&gt;

&lt;p&gt;Do you want me to also prepare infographic-style attack flow diagrams (AiTM, infostealer, phishing) so this reads like a full Wired/Forbes feature with visuals?&lt;/p&gt;

&lt;p&gt;The Exact Cost of a Targeted Attack on a High-Profile LinkedIn User&lt;br&gt;
The exact cost of a targeted attack on a high-profile LinkedIn user depends on multiple factors: the level of preparation, tools used, geographic region, attack objectives (financial damage, espionage, compromise), and the attackers’ skillset. Based on cyber threat intelligence and open-source data (including underground forums and cybersecurity reports from 2024–2025), we can break down the main cost components and provide an approximate range.&lt;/p&gt;

&lt;p&gt;Factors Influencing Cost&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Reconnaissance (OSINT)
Building a digital dossier (geolocation, social graph, technical profile) requires tools and time. OSINT services on underground forums start at $100–500 per profile, but for a C-level executive with a limited digital footprint, the cost can reach $2,000–5,000.&lt;/li&gt;
&lt;li&gt;Tools
AiTM Proxies (Evilginx, Modlishka): Free for experienced hackers, but setup and hosting cost $200–1,000.
Infostealers (LummaC2, RedLine): Licenses on underground forums go for $100–500/month.
Fake domains/sites: Domain registration costs $10–50, but high-quality LinkedIn clones with SSL and hosting can run up to $1,000.
VPN/proxy infrastructure for mimicry: $50–200.&lt;/li&gt;
&lt;li&gt;Social Engineering
Creating fake HR or colleague profiles: $50–200 per aged account.
Personalized phishing emails/messages: $500–2,000 if hiring a social engineering specialist.
Example: The “LinkedIn Executives” campaign (2024) used fake HR profiles to target C-level employees.&lt;/li&gt;
&lt;li&gt;Compromise Stage
SIM swap to bypass SMS MFA: $500–3,000 (varies by carrier and region).
Malicious extensions/software: Custom malware development — $1,000–5,000.
Buying access: Pre-compromised LinkedIn accounts on forums cost $50–500, but for executives the price can be much higher.&lt;/li&gt;
&lt;li&gt;Covering Tracks
Using legitimate infrastructure (AWS, Azure) or disposable servers: $100–1,000.
TDoS or spam flooding for distraction: $200–1,000.
Approximate Cost Ranges
Basic targeted attack: Simple phishing with minimal recon, ready-made tools, and a fake profile — $1,000–5,000.
Mid-tier attack: AiTM proxy, personalized social engineering, use of infostealers — $5,000–15,000.
High-end (C-level target): Full recon, custom malware, SIM swap or insider assistance, advanced mimicry — $15,000–50,000+.
Press enter or click to view image in full size&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Real-World Examples &amp;amp; Benchmarks&lt;br&gt;
“LinkedIn Executives” (2024): Evilginx-based attacks on tech company executives were valued at $10,000–30,000 per operation, including profile creation, proxy setup, and token harvesting. Goal: corporate network access. &lt;a href="https://www.itpro.com/security/cyber-attacks/linkedin-social-engineering-attacks" rel="noopener noreferrer"&gt;https://www.itpro.com/security/cyber-attacks/linkedin-social-engineering-attacks&lt;/a&gt;&lt;br&gt;
Underground forums: In 2025, BreachForums offered “targeted LinkedIn phishing” for $2,000–10,000 for high-profile users, with an additional $5,000 for corporate MFA bypass.&lt;br&gt;
Whaling attacks: According to GreatHorn (2021, adjusted for 2025 inflation), executive-targeted attacks cost $5,000–20,000 but could yield up to $1.8M in damages. &lt;a href="https://www.institutedata.com/us/blog/understanding-whaling-in-cybersecurity/" rel="noopener noreferrer"&gt;https://www.institutedata.com/us/blog/understanding-whaling-in-cybersecurity/&lt;/a&gt;&lt;br&gt;
Why These Costs Are High&lt;br&gt;
High-value targets: Executives have access to finances, confidential data, and corporate systems. One compromised account can cause millions in damages.&lt;br&gt;
Complexity: Bypassing MFA, corporate VPNs, and behavioral analytics requires substantial resources.&lt;br&gt;
Risk: Attackers invest in obfuscation to avoid detection and LinkedIn account suspension.&lt;br&gt;
Who Can Afford This?&lt;br&gt;
For lone hackers, such attacks are often unprofitable due to time and resource demands. But for organized groups (e.g., Lazarus Group, Nobelium APT) sponsored by nation-states or major cybercrime syndicates, the ROI justifies the cost — especially for espionage or large-scale financial fraud.&lt;/p&gt;

&lt;p&gt;LinkedIn has become a prime hunting ground for cyber criminals - here's what you need to know&lt;br&gt;
A security researcher has revealed their interaction with a LinkedIn fake job offer scam, detailing how you can stay…&lt;br&gt;
&lt;a href="http://www.itpro.com" rel="noopener noreferrer"&gt;www.itpro.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A Growing Goldmine: Your LinkedIn Data Abused for Cybercrime&lt;br&gt;
We looked into professional and business networking platform LinkedIn and how cybercriminals abuse the platform to…&lt;br&gt;
&lt;a href="http://www.trendmicro.com" rel="noopener noreferrer"&gt;www.trendmicro.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Economics of Mass Attacks: Why They’re Profitable&lt;br&gt;
Mass campaigns operate like a “sales funnel”: attackers send thousands of phishing messages knowing that even a small success rate will generate profit. At a 15% success rate, out of 3,000 targeted accounts, around 450 accounts would be compromised. For an operation costing €5,000, this works out to ~€11 per account — extremely cheap considering the potential value of these accounts.&lt;/p&gt;

&lt;p&gt;Why Mass Attacks Work&lt;br&gt;
Low Cost of Entry&lt;br&gt;
Tools: Ready-made phishing platforms (e.g., EvilProxy or custom frameworks) cost €100–500/month. Hosting phishing sites: €50–200. Proxy services for masking: €50–100.&lt;br&gt;
Data lists: Email lists (legitimate or from breaches) are sold on underground forums for €100–1,000 depending on quality and size.&lt;br&gt;
Automation: Bots for bulk messaging and campaign management minimize labor costs. Automation software: €200–1,000.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Scale Offsets Risk&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Even at a 15% hit rate (450 accounts), attackers gain assets they can monetize:&lt;br&gt;
Account sales: In 2025, LinkedIn accounts sell for €5–50 (regular) and €100–500 (high-value, e.g., managers, HR) on forums like BreachForums.&lt;br&gt;
Extortion: Business account access can be used for ransom (€500–5,000).&lt;br&gt;
Corporate espionage: Accidentally hitting a C-level exec can yield access to corporate data worth tens of thousands.&lt;br&gt;
BEC (Business Email Compromise): Using a compromised account to send phishing from a trusted source — potential returns from $10,000 to millions.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;“Trophy” Targets by Chance&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Among 450 compromised accounts, some will inevitably belong to valuable individuals (directors, investors, HR). Just one such account could bring €1,000–10,000 via resale or BEC exploitation.&lt;br&gt;
Cost Breakdown for a Mass Attack (€5,000 for 3,000 Accounts)&lt;br&gt;
Expense Structure&lt;/p&gt;

&lt;p&gt;Email lists (3,000 addresses): Quality LinkedIn-targeted database by region/industry — €500–1,000.&lt;br&gt;
Phishing sites: Development of 3–5 fake LinkedIn login pages with SSL — €200–500. Disposable server hosting — €100–200.&lt;br&gt;
Tools:&lt;/p&gt;

&lt;p&gt;AiTM proxy (Evilginx, etc.): €200–500 setup and server rental.&lt;br&gt;
Infostealers (RedLine, LummaC2): €100–300 license.&lt;br&gt;
Distribution: Renting SMTP servers or botnets for spam — €500–1,000.&lt;br&gt;
Social engineering: Template emails with minimal personalization (“Verify your LinkedIn profile”) — €500 for creation and testing.&lt;br&gt;
Masking: Proxy/VPN for campaign control — €100–300.&lt;br&gt;
Extras: TDoS or spam floods for distraction — €300–500.&lt;br&gt;
Total: €2,600–4,600, comfortably within the €5,000 budget including overhead or hired operators.&lt;/p&gt;

&lt;p&gt;ROI&lt;br&gt;
450 accounts (15% of 3,000):&lt;br&gt;
Regular accounts (90%, ~405): Sold at €5–20 = €2,025–8,100.&lt;br&gt;
High-value accounts (10%, ~45): Sold at €100–500 = €4,500–22,500.&lt;br&gt;
Potential revenue: €6,500–30,000+ per campaign.&lt;/p&gt;

&lt;p&gt;Additional schemes:&lt;br&gt;
BEC from 1–2 high-value accounts: €10,000 to $1M.&lt;br&gt;
Extortion: €500–5,000 per account.&lt;br&gt;
Profitability: Even at minimal monetization (€6,500), the campaign returns 30–100% profit. One captured executive account can multiply earnings dramatically.&lt;/p&gt;

&lt;p&gt;Comparison with Targeted Attacks&lt;br&gt;
Targeted attacks on executives cost $15,000–50,000 (~€14,000–47,000). Mass campaigns at €5,000 have lower precision but:&lt;/p&gt;

&lt;p&gt;Lower risk: Less effort on stealth, spread over thousands of targets.&lt;br&gt;
Bonus finds: High-value victims appear by chance.&lt;br&gt;
Scalability: Easily scaled to 10,000+ accounts with marginal cost increase.&lt;br&gt;
Real Case (2025)&lt;br&gt;
According to CrowdStrike (2025), a mass campaign against LinkedIn using the LummaC2 infostealer cost organizers $6,000 (€5,500) to target 5,000 accounts. With a 12% success rate (600 accounts), 5% (30 accounts) belonged to mid- and high-level managers. Selling the data brought $15,000, and using the accounts for BEC generated another $50,000.&lt;/p&gt;

&lt;p&gt;Comparison of Targeted vs. Mass LinkedIn Attacks: Investment and ROI (2025)&lt;br&gt;
Based on analysis of data from cybersecurity reports (IBM Cost of a Data Breach 2025, Verizon DBIR 2025, Hoxhunt Phishing Trends 2025, among others), as well as trends on underground forums and real-world cases (e.g., Phishing-as-a-Service offerings from $250/month to $1,500 per campaign), we can compare targeted and mass attack models.&lt;/p&gt;

&lt;p&gt;Targeted attacks focus on specific high-value individuals (e.g., executives), requiring reconnaissance and personalization. Mass attacks rely on volume (thousands of emails) with minimal personalization but high scalability.&lt;/p&gt;

&lt;p&gt;I divided targeted attacks into three levels of complexity (basic, mid, high) and mass attacks into two (basic, mid), as indicated below. “Investment” refers to the attacker’s costs (tools, reconnaissance, infrastructure). “ROI” is the potential profit (account resale, BEC, extortion) minus investment.&lt;/p&gt;

&lt;p&gt;Figures are estimates for 2024–2025: average success rate for targeted attacks ~20–50% (due to focus), for mass attacks ~10–15% (Verizon DBIR). Monetization: standard LinkedIn accounts sell for $5–50; high-value (executive) accounts sell for $100–1,000+; BEC can yield $10k–$1M+ per account (FBI IC3 2025). Average global cost of a phishing incident to a victim is ~$4.88M, while for attackers, profit can be 10x to 100x their investment.&lt;/p&gt;

&lt;p&gt;Comparison Table&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr71tifnlf10wui38jl56.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr71tifnlf10wui38jl56.png" alt=" " width="800" height="656"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Key Insights&lt;br&gt;
Investment: Mass attacks are cheaper per target (~$1–5/account vs. $1k+ for targeted), but require volume. Targeted attacks cost more due to recon (OSINT up to $5k) but focus ROI on a single victim.&lt;br&gt;
Profitability: Mass campaigns win on scale and “accidental trophies” (up to 100x ROI if an executive is hit), but average ROI is lower due to low-value accounts. Targeted campaigns have higher ROI for top tiers (up to 100x) but carry higher detection risk (68% of attacks detected — Verizon 2025). Globally, phishing generates ~$10.5T annually for cybercriminals (Cybersecurity Ventures 2025), with BEC as the top revenue source ($2.9B victim losses in 2024).&lt;br&gt;
2025 Trends: AI-generated phishing (e.g., ChatGPT-assisted) reduces costs by 20–30% (SlashNext) and boosts mass campaign effectiveness by up to 1,265%. Spear-phishing makes up 65% of attacks (Symantec), but mass campaigns are growing 4,151% with AI.&lt;br&gt;
Attacker Risk: Mass attacks carry lower risk (anonymity), targeted ones higher (traceability, e.g., $43k loss case from LinkedIn attack [post:30]).&lt;br&gt;
These figures are estimates; actual values depend on region, tools, and monetization methods. For businesses: invest in passkeys (reduces risk by 90%, IBM 2025) and phishing-awareness training.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>hacker</category>
      <category>webdev</category>
      <category>infosec</category>
    </item>
    <item>
      <title>ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Thu, 07 Aug 2025 20:48:10 +0000</pubDate>
      <link>https://dev.to/0trust0day/scarcrufts-sophisticated-malware-attack-rust-pubnub-and-compromised-repos-2bbe</link>
      <guid>https://dev.to/0trust0day/scarcrufts-sophisticated-malware-attack-rust-pubnub-and-compromised-repos-2bbe</guid>
      <description>&lt;p&gt;North Korea’s ScarCruft (aka APT37) has unleashed a chilling new malware campaign targeting South Korean users, blending espionage with ransomware and leveraging modern tech like Rust and PubNub. As developers, we need to understand this attack’s mechanics—especially its potential to exploit GitHub and GitLab repositories—to protect our projects and communities. Let’s dive into the details.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwxcg649agiunliri9cxa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwxcg649agiunliri9cxa.png" alt=" " width="800" height="531"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Attack Chain&lt;br&gt;
The campaign begins with a deceptive RAR archive posing as a postal-code update notice. Inside is a malicious LNK file that, when executed, deploys an AutoIt loader. This loader fetches multiple payloads from a command-and-control (C2) server, including:&lt;/p&gt;

&lt;p&gt;NubSpy: A backdoor using PubNub’s real-time messaging for stealthy C2 communication.&lt;/p&gt;

&lt;p&gt;CHILLYCHINO: A Rust-based backdoor, ported from PowerShell, designed for performance and evasion.&lt;br&gt;
VCD Ransomware: Encrypts files with a .VCD extension, marking ScarCruft’s first foray into ransomware.&lt;br&gt;
This multi-stage infection chain, uncovered by S2W’s TALON, showcases ScarCruft’s evolution from espionage to financially motivated attacks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsofksk603xoc0bvinwd1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsofksk603xoc0bvinwd1.png" alt=" " width="800" height="708"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Rust and PubNub: A Modern Twist&lt;br&gt;
ScarCruft’s use of Rust in CHILLYCHINO is a game-changer. Rust’s compiled nature offers cross-platform compatibility and lower antivirus detection rates compared to PowerShell. Its performance boosts payload efficiency, making it harder for security tools to flag. The backdoor’s structure, like pub struct C2Channel { pubnub_client: PubNub, channel_id: String, encryption_key: [u8; 32] }, highlights ScarCruft’s technical sophistication.&lt;br&gt;
PubNub serves as the C2 channel for NubSpy, blending malicious traffic with legitimate API calls. This abuse of real-time messaging platforms, a tactic ScarCruft has used since 2017 with services like Ably, ensures low-latency command relay while evading network detection.&lt;/p&gt;

&lt;p&gt;The Supply Chain Threat&lt;br&gt;
Here’s where it gets scary for developers: ScarCruft may be targeting GitHub and GitLab repositories. The attack vector involves compromising the accounts of library authors whose packages are recommended by AI tools like ChatGPT or Claude. Once in control, attackers insert obfuscated malware installers into these repos. Unsuspecting developers, trusting AI suggestions, download and integrate these tainted packages, inadvertently deploying NubSpy, CHILLYCHINO, or VCD Ransomware.&lt;/p&gt;

&lt;p&gt;This supply chain attack exploits our reliance on open-source ecosystems and AI-driven workflows, turning trusted platforms into infection vectors.&lt;/p&gt;

&lt;p&gt;Why It Matters&lt;br&gt;
ScarCruft’s shift to ransomware alongside espionage signals a broader threat. Historically focused on North Korean defectors and South Korean entities, their reach now spans Japan, Vietnam, and beyond. The use of modern languages and legitimate services like PubNub shows how state-sponsored actors adapt to bypass defenses.&lt;/p&gt;

&lt;p&gt;Protect Your Projects&lt;br&gt;
Verify Repositories: Always check the authenticity of GitHub/GitLab repos before integrating packages. Look for unusual commits or contributor activity.&lt;br&gt;
Scrutinize AI Recommendations: Be cautious with AI-suggested libraries; cross-reference them with trusted sources.&lt;br&gt;
Scan Downloads: Use antivirus tools to scan archives and LNK files before execution.&lt;br&gt;
Backup Code: Regular backups (e.g., with GitProtect) can mitigate ransomware damage.&lt;/p&gt;

&lt;p&gt;ScarCruft’s campaign is a wake-up call for developers. By leveraging Rust, PubNub, and compromised repos, they’re exploiting the tools we rely on. Stay vigilant, secure your dependencies, and let’s keep our open-source community safe. Share your thoughts below! 💻&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>hacker</category>
      <category>programming</category>
    </item>
    <item>
      <title>How Crypto Drainers Became Criminal SaaS: A Deep Dive into Web3 Theft Infrastructure</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Tue, 05 Aug 2025 20:21:14 +0000</pubDate>
      <link>https://dev.to/0trust0day/how-crypto-drainers-became-criminal-saas-a-deep-dive-into-web3-theft-infrastructure-15jc</link>
      <guid>https://dev.to/0trust0day/how-crypto-drainers-became-criminal-saas-a-deep-dive-into-web3-theft-infrastructure-15jc</guid>
      <description>&lt;p&gt;The next wave of cybercrime isn’t about single hackers — it’s about fully-automated platforms with better UX than your bank.&lt;/p&gt;

&lt;p&gt;Cryptocurrency theft in 2025 doesn’t look like a hacker furiously typing in the dark. It looks like a streamlined, well-branded platform. It’s automated. It has dashboards, support teams, profit-sharing models, user-friendly interfaces, and live Telegram integration. It’s SaaS — except it’s criminal.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz0qd3fjhxg0hmit5ysnt.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz0qd3fjhxg0hmit5ysnt.jpeg" alt=" " width="800" height="448"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In this article, we’ll examine how so-called Crypto Drainers have evolved into a powerful cybercriminal ecosystem. We'll focus on groups like RublevkaTeam, who offer turnkey phishing infrastructures targeting Solana and TON users. These aren’t one-off tools — they’re productized services. And yes, the UX is better than many fintech startups.&lt;/p&gt;

&lt;p&gt;What Is a Crypto Drainer?&lt;br&gt;
In hacker jargon, a Crypto Drainer refers to a set of automated tools designed to steal crypto assets from unsuspecting users. These tools are most effective when integrated into phishing campaigns — typically fake airdrops, giveaways, or Web3 applications that mimic legitimate wallet interactions.&lt;/p&gt;

&lt;p&gt;For example:&lt;br&gt;
A user clicks a link to “claim” an airdrop.&lt;br&gt;
A Telegram WebApp or fake Phantom/Tonkeeper UI opens.&lt;br&gt;
The user is prompted to approve a transaction.&lt;br&gt;
The transaction actually drains their wallet of SOL, TON, NFTs, or tokens.&lt;br&gt;
Drainers have become so modular that any entry-level criminal can deploy one with zero technical skills — and that’s the problem.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbqbrv2l9z9gzrjpz394d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbqbrv2l9z9gzrjpz394d.png" alt=" " width="800" height="787"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Case Study: RublevkaTeam&lt;br&gt;
RublevkaTeam is one of the most “professional” underground players in this space. Active since 2023, they advertise their services across dark forums and Telegram groups, boasting:&lt;br&gt;
700+ positive reviews&lt;br&gt;
$45,000+ in deposits from clients&lt;br&gt;
35+ ready-to-use phishing offers (TON/Solana)&lt;br&gt;
Telegram bots for automation&lt;br&gt;
Real-time draining, spoofed token injection, bypasses for wallets&lt;/p&gt;

&lt;p&gt;Their product offering includes:&lt;br&gt;
Solana Drainer: supports 80+ wallets, hidden SOL draining, Phantom spoofing, SPL2022 token handling, fake balance injection.&lt;br&gt;
TON Drainer: supports fake Jetton/NFT airdrops, hidden TON withdrawal, fake refunds, automated gas fee coverage.&lt;/p&gt;

&lt;p&gt;This isn’t just malware — it’s a Criminal Infrastructure-as-a-Service (CriminalIaaS) business.&lt;/p&gt;

&lt;p&gt;C2C — Criminals Serving Criminals&lt;br&gt;
RublevkaTeam operates in a B2B format — or rather, C2C: Criminal-to-Criminal. Their service is designed to be consumed by other cybercriminals who don’t have time or skills to build their own phishing infrastructure.&lt;/p&gt;

&lt;p&gt;Here’s how it works:&lt;br&gt;
You submit a request through their Telegram bot.&lt;br&gt;
You get access to a ready-made draining kit.&lt;br&gt;
You configure your phishing offer (or use a prebuilt one).&lt;br&gt;
Victims fall for the bait, and RublevkaTeam takes a cut of the profits (typically 70/30 or 75/25).&lt;br&gt;
It’s a criminal affiliate model. And it works frighteningly well.&lt;/p&gt;

&lt;p&gt;Automation Meets UX&lt;br&gt;
One of the most disturbing aspects of modern drainers is how polished they are.&lt;br&gt;
These aren’t sloppy scripts — they are full-stack applications with:&lt;br&gt;
Real-time stats and dashboards&lt;br&gt;
Multi-language support&lt;br&gt;
Deep wallet integration (via QR code, deep links, WebApp APIs)&lt;br&gt;
Optimized UI/UX to increase phishing conversion&lt;br&gt;
Honeypot-style deception (fake tokens/NFTs shown as rewards)&lt;br&gt;
Auto-hosting and domain rotation&lt;br&gt;
Telegram-based CRM&lt;/p&gt;

&lt;p&gt;If you’re a Web3 developer, you’ll instantly recognize the level of detail. The phishing funnel is optimized like a sales funnel. And yes, they A/B test.&lt;/p&gt;

&lt;p&gt;They Don’t Attack CIS Countries. Why?&lt;br&gt;
One common clause you’ll see in such operations:&lt;br&gt;
“Strictly no CIS targets.”&lt;/p&gt;

&lt;p&gt;This isn’t out of principle — it’s self-preservation. Many Eastern European groups avoid targeting Russian-speaking regions to:&lt;br&gt;
Minimize risk of local law enforcement scrutiny&lt;br&gt;
Avoid retaliation from local threat actors&lt;br&gt;
Stay “patriotic” in underground terms&lt;/p&gt;

&lt;p&gt;Western targets? Fair game. Most victims come from the U.S., EU, and other developed economies. And since the crypto space is inherently borderless, these operations scale easily.&lt;/p&gt;

&lt;p&gt;Crypto Drainers vs. Security Protocols&lt;br&gt;
Why can’t wallets stop this?&lt;/p&gt;

&lt;p&gt;Because in most cases, the user willingly signs the transaction. Wallets like Phantom, Tonkeeper, and MetaMask do warn users — but once someone clicks “Approve,” the game is over.&lt;/p&gt;

&lt;p&gt;Common evasion tactics:&lt;br&gt;
Using spoofed UIs that match legitimate apps&lt;br&gt;
Leveraging Telegram’s WebApp bridge to appear trusted&lt;br&gt;
Simulating fake token inflows to bait interaction&lt;br&gt;
Disguising withdrawal requests as “verify” or “sync”&lt;/p&gt;

&lt;p&gt;These drainers exploit the trust assumptions in Web3 wallet architecture. Unless drastic protocol-level changes are introduced (e.g., transaction risk scoring, intent systems), users will remain vulnerable.&lt;/p&gt;

&lt;p&gt;The UX Gap in Security&lt;br&gt;
Let’s be honest:&lt;br&gt;
Cybercrime platforms have better UX than most Web3 startups.&lt;/p&gt;

&lt;p&gt;They understand their user: other criminals.&lt;br&gt;
They prioritize ease of deployment, mobile-first flows, and plug-and-play phishing kits.&lt;br&gt;
They offer support. They localize. They update fast.&lt;/p&gt;

&lt;p&gt;Security products, by contrast, lag behind — often bloated, slow, or overly technical. This UX gap is one reason drainer services are thriving.&lt;/p&gt;

&lt;p&gt;From Hackers to Privateers&lt;br&gt;
This evolution isn’t just technical — it’s economic and political.&lt;/p&gt;

&lt;p&gt;Today’s drainer operators resemble digital privateers — pirates operating with informal state tolerance or at least indifference. They build their empires on jurisdictional blind spots, fragmented enforcement, and crypto’s permissionless ethos.&lt;/p&gt;

&lt;p&gt;Unlike traditional cybercrime that relied on brute-force or malware, these groups scale by building platforms — like Stripe or Shopify for phishing.&lt;/p&gt;

&lt;p&gt;The shift is real:&lt;br&gt;
From hackers → to infrastructure providers&lt;br&gt;
From scripts → to SaaS&lt;br&gt;
From hits → to recurring revenue&lt;/p&gt;

&lt;p&gt;What Developers Can Learn&lt;br&gt;
Even if you’re not working in security, this trend affects you:&lt;/p&gt;

&lt;p&gt;Designing wallet integrations?&lt;br&gt;
Assume they’ll be cloned for phishing.&lt;/p&gt;

&lt;p&gt;Building Web3 frontends?&lt;br&gt;
Focus on UX clarity. Help users distinguish real from fake.&lt;/p&gt;

&lt;p&gt;Shipping smart contracts?&lt;br&gt;
Educate users on how NOT to approve malicious transactions.&lt;/p&gt;

&lt;p&gt;Working on wallets or protocols?&lt;br&gt;
Push for safer UX flows: intent-based transactions, signature warnings, simulation previews.&lt;/p&gt;

&lt;p&gt;Final Thoughts&lt;br&gt;
Crypto drainers like RublevkaTeam signal a dangerous new chapter in cybercrime. The tooling is robust. The operation is scalable. The impact is global.&lt;/p&gt;

&lt;p&gt;This isn’t fringe activity anymore — it’s a business. And just like with the rise of ransomware-as-a-service, the longer we ignore it, the harder it will be to stop.&lt;/p&gt;

&lt;p&gt;The future of security depends not only on better encryption or audits, but on understanding how attackers think, build, and scale — and matching that with real, user-friendly defense.&lt;/p&gt;

&lt;p&gt;Have thoughts or want to see a real phishing kit analyzed in code?&lt;br&gt;
Drop a comment — I’m preparing a teardown of TON-based WebApp drainers next.&lt;/p&gt;

&lt;h1&gt;
  
  
  security #crypto #web3 #drainers #offensivesecurity #ton #solana #webapps #wallets #uxdesign
&lt;/h1&gt;

</description>
      <category>cybersecurity</category>
      <category>cryptocurrency</category>
      <category>web3</category>
      <category>blockchain</category>
    </item>
    <item>
      <title>Unmasking the Great Firewall: How I Explored QUIC Censorship and Ways to Bypass It</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Tue, 05 Aug 2025 16:47:09 +0000</pubDate>
      <link>https://dev.to/0trust0day/unmasking-the-great-firewall-how-i-explored-quic-censorship-and-ways-to-bypass-it-1di3</link>
      <guid>https://dev.to/0trust0day/unmasking-the-great-firewall-how-i-explored-quic-censorship-and-ways-to-bypass-it-1di3</guid>
      <description>&lt;p&gt;For years, I’ve been immersed in the world of network monitoring systems (Lawful Interception system also), both building them and finding ways to circumvent them. This dual perspective gives me a unique lens to appreciate the monumental work done by the GFW Report team (&lt;a href="https://gfw.report/publications/usenixsecurity25/en/?utm_source=Securitylab.ru" rel="noopener noreferrer"&gt;https://gfw.report/publications/usenixsecurity25/en/?utm_source=Securitylab.ru&lt;/a&gt;). Their study, presented at the USENIX Security Symposium 2025, titled “Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China,” dives deep into how China’s Great Firewall (GFW) tackles the QUIC protocol. I can confirm they nailed it—describing exactly how it works. For instance, I’ve seen firsthand that at night, when network traffic is low, it’s far easier to filter, restrict, or even capture data than during the day when data flows are massive. In this article, I’ll walk you through how GFW censors QUIC, its vulnerabilities, and the clever ways anti-censorship communities are bypassing it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn77n45cmc0p1acad7afp.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn77n45cmc0p1acad7afp.jpg" alt=" " width="800" height="452"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What Is QUIC and Why It Matters&lt;/p&gt;

&lt;p&gt;QUIC (Quick UDP Internet Connections) is a cutting-edge transport protocol, developed by Google and standardized by the IETF in 2021 (RFC 9000). It powers HTTP/3, offering low latency, full packet encryption, and congestion control at the browser level. According to Cloudflare, by 2024, over 30% of web requests ran on QUIC, making it a cornerstone of the modern internet.&lt;/p&gt;

&lt;p&gt;Having worked with network protocols, I can tell you QUIC is a leap forward from TLS over TCP. It runs on UDP, reducing delays, and encrypts all packets, including the initial one (QUIC Initial), which carries the TLS Client Hello with the Server Name Indication (SNI) field, specifying the server’s domain name. Here’s the catch: while the QUIC Initial packet is encrypted, its key can be derived from public data—Destination Connection ID (DCID) and a version-specific salt. This makes QUIC vulnerable to analysis by passive observers like the GFW.&lt;/p&gt;

&lt;p&gt;How the GFW Censors QUIC&lt;/p&gt;

&lt;p&gt;In April 2024, I learned about a new GFW tactic: instead of blanket-blocking the QUIC protocol, as it did before, the firewall started selectively censoring connections based on SNI. The GFW Report team confirmed that the GFW now:&lt;/p&gt;

&lt;p&gt;Decrypts QUIC Initial packets on the fly: Using the DCID and salt, it extracts the TLS Client Hello contents, including the SNI.&lt;/p&gt;

&lt;p&gt;Applies heuristic filters: If the SNI matches a blacklisted domain, the GFW blocks all subsequent UDP packets from the client to the server for 180 seconds.&lt;/p&gt;

&lt;p&gt;Blocks based on a tuple: The block uses a combination of (source IP, destination IP, destination port). Server-to-client packets, however, pass through unaffected.&lt;/p&gt;

&lt;p&gt;This approach blew me away with its technical sophistication. The GFW isn’t just intercepting packets—it’s analyzing them in real time, which demands serious computational power. But, like any complex system, it has weak spots, which I’ll get to shortly.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Daily Rhythm of Censorship
&lt;/h2&gt;

&lt;p&gt;My experience tells me that network filters’ effectiveness hinges on traffic load. The GFW Report team found a clear daily cycle: at night (00:00–06:00 China time), when traffic is low, censorship is nearly flawless. During the day, under peak loads, a significant chunk of QUIC connections with blacklisted SNIs slips through. This is due to the high computational cost of decrypting QUIC Initial packets. I’ve noticed this myself—filtering and restricting data is much smoother at night when traffic is light compared to the daytime data deluge.&lt;/p&gt;

&lt;h2&gt;
  
  
  Port Filtering and Other Quirks
&lt;/h2&gt;

&lt;p&gt;The GFW uses a clever filter: it only blocks connections where the source port is higher than the destination port (e.g., client port &amp;gt; 443). This helps it ignore server traffic, as clients typically use high ephemeral ports (32768–65535). Another quirk is that the GFW doesn’t reassemble fragmented QUIC Initial packets, leaving it vulnerable to bypasses that split SNI across packets. Also, censorship only targets QUIC version 1 (byte pattern 0x00000001), leaving QUIC version 2 unaffected.&lt;/p&gt;

&lt;p&gt;The researchers tested non-standard packets and found that the GFW:&lt;br&gt;
Blocks packets with zero-length CRYPTO frames if they contain a blacklisted SNI.&lt;br&gt;
Ignores packets with invalid protocol versions or incorrect authentication tags.&lt;br&gt;
Doesn’t analyze domains in other TLS extensions, like ALPN.&lt;br&gt;
These simplifications remind me of approaches I’ve seen in HTTPS monitoring systems, where SNI is also the primary target. The GFW clearly prioritizes speed over precision, a trade-off I’ve encountered in similar systems.&lt;br&gt;
GFW’s Vulnerabilities: Denial and Degradation Attacks&lt;/p&gt;

&lt;h2&gt;
  
  
  Availability Attack
&lt;/h2&gt;

&lt;p&gt;One of the most alarming discoveries by the GFW Report team is how the QUIC censorship mechanism can be weaponized for denial-of-service attacks. An attacker forging a victim’s IP address can send a QUIC Initial packet with a blacklisted SNI, triggering a 180-second block of all UDP connections from the victim to the target server. By repeating these packets, the block can be sustained indefinitely.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;I was stunned by their experiment:&lt;/strong&gt;&lt;br&gt;
They spoofed QUIC Initial packets from 32 AWS EC2 instances worldwide, targeting a server in Guangzhou.&lt;br&gt;
In 17 cases, connections were fully blocked; in 7, partially blocked due to asymmetric routes or different GFW nodes. The remaining 8 were unaffected, likely due to varying network paths.&lt;br&gt;
Such an attack could, for example, block external DNS resolvers, causing widespread internet disruptions.&lt;br&gt;
I’ve encountered similar vulnerabilities in filtering systems, and they’re always a concern. The GFW Report team responsibly disclosed this to CNCERT on January 22, 2025. While no direct response came, by March 13, 2025, the GFW stopped blocking incoming QUIC connections, partially mitigating the issue. However, the attack remains viable for traffic originating in China.&lt;/p&gt;

&lt;h2&gt;
  
  
  Degradation Attack
&lt;/h2&gt;

&lt;p&gt;Another vulnerability that caught my eye is the degradation attack. The GFW Report team showed that flooding the GFW with QUIC Initial packets (even with non-censored SNIs) can overwhelm it, reducing its ability to block connections. Their experiment:&lt;br&gt;
From a U.S. node, they sent packets to a /14 network containing a Chinese server, at rates from 100 to 1500 kpps.&lt;br&gt;
At 1200 kpps, over 60% of connections with blacklisted SNIs went unblocked.&lt;br&gt;
Control tests with random UDP packets of the same length didn’t cause degradation, confirming the issue lies in QUIC processing.&lt;br&gt;
This reminds me of techniques I’ve used to stress-test monitoring systems. The high computational load of decryption makes the GFW vulnerable, especially during peak hours.&lt;/p&gt;

&lt;p&gt;Bypassing the Censorship&lt;br&gt;
Having worked on bypassing filtering systems, I always look for ways to exploit architectural weaknesses. The GFW Report team proposed several effective methods, now adopted by anti-censorship communities:&lt;/p&gt;

&lt;p&gt;High destination ports: If the destination port is ≥ the source port, the GFW ignores the connection. This can be implemented using iptables to redirect traffic to a high port (e.g., 65535).&lt;/p&gt;

&lt;p&gt;Preceding UDP packet: Sending a random UDP packet before the QUIC Initial makes the GFW treat it as the stream’s first packet, ignoring subsequent QUIC packets.&lt;/p&gt;

&lt;p&gt;QUIC Initial fragmentation: Splitting SNI across multiple UDP datagrams or QUIC frames prevents GFW analysis. Mozilla Firefox (version 137) and quic-go (v0.52.0) have adopted this.&lt;/p&gt;

&lt;p&gt;Connection migration: QUIC allows changing network parameters (IP or port) after the 1-RTT handshake, bypassing blocks.&lt;/p&gt;

&lt;p&gt;Encrypted Client Hello (ECH): ECH encrypts SNI with an asymmetric key, invisible to the GFW. It’s unblocked as long as the outer SNI isn’t blacklisted.&lt;/p&gt;

&lt;p&gt;Version negotiation: Sending a QUIC Initial with an unsupported version (e.g., QUIC v2) triggers a Version Negotiation packet, and the GFW ignores subsequent packets.&lt;/p&gt;

&lt;p&gt;I’ve seen similar tactics work against other censorship systems. Packet fragmentation, for instance, is a classic way to evade deep packet inspection (DPI). The GFW Report team shared these findings with developers of Mozilla Firefox, quic-go, Hysteria, V2Ray, and others. By May 2025, quic-go v0.52.0 implemented SNI-slicing, enabling many tools to bypass censorship seamlessly.&lt;/p&gt;

&lt;p&gt;Comparing QUIC Censorship to Other Mechanisms&lt;/p&gt;

&lt;p&gt;Analyzing GFW’s blacklists, I noticed the QUIC blacklist covers about 58,000 domains (out of 7 million in the Tranco list), smaller than DNS (107,000), HTTP (105,000), and TLS-SNI (102,000) lists. About 40,000 domains overlap across all lists, while 11,000 are unique to QUIC, with only 2,300 supporting QUIC. This suggests preemptive blocking, anticipating future QUIC adoption.&lt;/p&gt;

&lt;p&gt;My experience points to a decentralized GFW architecture. Different censorship mechanisms likely run under separate teams, complicating coordination but broadening coverage.&lt;/p&gt;

&lt;p&gt;Ethics and Responsibility&lt;/p&gt;

&lt;p&gt;Working on both sides of the censorship fence, I’ve grappled with ethical dilemmas. The GFW Report team handled this thoughtfully:&lt;/p&gt;

&lt;p&gt;Availability attack: They tested it only on their own servers to avoid harm. Disclosing it to CNCERT was necessary to protect users.&lt;/p&gt;

&lt;p&gt;Degradation attack: Since it only affects GFW infrastructure, they shared it with anti-censorship communities first to avoid aiding censors.&lt;/p&gt;

&lt;p&gt;Network monitoring: Experiments used limited TTL and network metrics to avoid impacting third parties.&lt;/p&gt;

&lt;p&gt;I share their stance: fighting censorship is justified if it minimizes harm to innocent users.&lt;/p&gt;

&lt;p&gt;My journey in network security has taught me that even the most sophisticated systems have flaws. The GFW Report’s work exposed the GFW’s QUIC censorship as both powerful and vulnerable, due to computational limits, simplified packet processing, and port-based filtering. Their degradation and availability attacks highlight these weaknesses, while their bypass methods—from fragmentation to ECH—prove censorship can be overcome.&lt;/p&gt;

&lt;p&gt;As someone who’s seen both sides, I’m in awe of the GFW Report team’s rigor. They didn’t just uncover how QUIC censorship works; they handed the anti-censorship community actionable solutions now helping millions. It’s a reminder that in the fight for a free internet, ingenuity and engineering will always have the upper hand.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>DNS: The Hidden Battlefield No One Talks About</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Thu, 31 Jul 2025 23:47:11 +0000</pubDate>
      <link>https://dev.to/0trust0day/dns-the-hidden-battlefield-no-one-talks-about-46lf</link>
      <guid>https://dev.to/0trust0day/dns-the-hidden-battlefield-no-one-talks-about-46lf</guid>
      <description>&lt;p&gt;Forget endpoints. Forget zero-days. If you control DNS, you control everything.&lt;/p&gt;

&lt;p&gt;🧠 Introduction&lt;br&gt;
In most threat models, DNS is barely an afterthought. It's treated as infrastructure — assumed to work, expected to be stable, and too boring to be worth attacking. But what if I told you that DNS remains one of the most potent and under-defended attack vectors in modern cybersecurity?&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fknvrhtm85lytvn7415l5.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fknvrhtm85lytvn7415l5.jpg" alt=" " width="800" height="452"&gt;&lt;/a&gt;&lt;br&gt;
In this article, I’ll share insights from a real Red Team operation where temporary control over DNS allowed us to silently intercept sensitive internal data from a highly fortified corporate target — without tripping a single alarm.&lt;/p&gt;

&lt;p&gt;We didn’t use malware.&lt;br&gt;
We didn’t need exploits.&lt;br&gt;
We just understood how trust in the internet works.&lt;/p&gt;

&lt;p&gt;🎯 The Setup: An "Unbreakable" Target&lt;br&gt;
Our client was an ultra-secure division of a multinational enterprise — think: tax optimization across continents, billions in assets, and defense-grade operational security.&lt;/p&gt;

&lt;p&gt;Double VPN + SOCKS5 proxy chains&lt;br&gt;
Multi-layered cloud + peer-to-peer infrastructure&lt;br&gt;
Hardware tokens + MFA across endpoints&lt;br&gt;
SIEM + EDR + audit trails everywhere&lt;/p&gt;

&lt;p&gt;For 8 months, we got nowhere. Traditional pentesting failed. But then, we changed tactics: we went after DNS.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fje0vibusf6qewlnhn744.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fje0vibusf6qewlnhn744.png" alt=" " width="800" height="1027"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🔍 Finding the Weak Link&lt;br&gt;
We used OSINT and behavioral profiling to map the internal IT hierarchy. Forget C-level execs — we targeted sysadmins and their habits. Eventually, one exposed credential set (stored in a private cloud folder) led us to...&lt;/p&gt;

&lt;p&gt;👉 Full access to the company’s DNS registrar.&lt;/p&gt;

&lt;p&gt;Not the web server.&lt;br&gt;
Not the firewall.&lt;br&gt;
The domain controller. The real one.&lt;/p&gt;

&lt;p&gt;🧪 The Attack: Temporary DNS Hijack&lt;br&gt;
We didn’t deface or reroute everything. We did something much smarter:&lt;br&gt;
Modified MX records and internal service domains&lt;br&gt;
Activated our DNS servers for only 20–30 minutes each morning&lt;br&gt;
Captured emails and internal messaging data silently&lt;br&gt;
Switched DNS back to normal before TTL expired&lt;/p&gt;

&lt;p&gt;This tiny window, repeated for a week, gave us dozens of credentials, financial documents, and strategic communications. It was stealthy, passive, and extremely hard to detect.&lt;/p&gt;

&lt;p&gt;🧱 Why This Worked&lt;br&gt;
DNS changes are rarely monitored in real-time.&lt;br&gt;
Registrar credentials are often overlooked in security audits.&lt;br&gt;
TTL and caching hide short-term changes from basic logs.&lt;br&gt;
Most SIEM systems don’t correlate DNS anomalies unless trained to do so.&lt;/p&gt;

&lt;p&gt;⚠️ Lessons Learned&lt;br&gt;
DNS is a trust layer, not just a routing layer.&lt;br&gt;
Short-term control is just as dangerous as long-term takeover.&lt;br&gt;
Your registrar credentials are crown jewels — treat them that way.&lt;br&gt;
Monitor NS and MX records like you monitor logins and SSH keys.&lt;/p&gt;

&lt;p&gt;🛡️ What You Should Do&lt;br&gt;
Use domain registrar services that support MFA and role-based access.&lt;br&gt;
Lock DNS changes behind quorum or change-approval workflows.&lt;br&gt;
Monitor DNS logs with TTL-aware anomaly detection.&lt;br&gt;
Use registry lock features (where available) to freeze domain changes.&lt;br&gt;
Periodically audit who has access to registrar accounts — and from where.&lt;/p&gt;

&lt;p&gt;💬 Final Thoughts&lt;br&gt;
We often assume that DNS is someone else’s problem — a “network thing” that just needs to resolve queries. But when attackers think creatively, DNS becomes the perfect place to hide, redirect, and silently compromise trust.&lt;/p&gt;

&lt;p&gt;In a world of Zero Trust, DNS should not be an exception.&lt;br&gt;
It’s time we treated it like what it really is: a battlefield.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Hudson Cybertec: A Benchmark in WP and DNS Security</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Thu, 31 Jul 2025 08:03:43 +0000</pubDate>
      <link>https://dev.to/0trust0day/hudson-cybertec-a-benchmark-in-wp-and-dns-security-3pag</link>
      <guid>https://dev.to/0trust0day/hudson-cybertec-a-benchmark-in-wp-and-dns-security-3pag</guid>
      <description>&lt;p&gt;As part of my ongoing public evaluation of cybersecurity firms, today’s focus is on Hudson Cybertec — a Dutch company specializing in industrial cybersecurity. As always, I limit my review to the public-facing footprint only, ensuring everything remains fully legal and ethical. But let’s be honest — most real-world attacks begin precisely at the edge: DNS configurations, exposed subdomains, CMS fingerprints, and misconfigured cloud services.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F31v9go1yxfi8gvhiqajx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F31v9go1yxfi8gvhiqajx.png" alt=" " width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With Hudson Cybertec, I encountered something rare in this field: a security-first web infrastructure that actually matches the company’s own promises. From DNS to CMS, this organization sets a shining example of what a well-secured digital perimeter should look like.&lt;/p&gt;

&lt;p&gt;Locked Down DNS: No Loose Ends&lt;br&gt;
The DNS configuration is a masterclass in restraint and control. All publicly resolvable records are routed through Cloudflare and Microsoft cloud infrastructure, without any unnecessary exposure. There are no misconfigured SPF records, dangling MX entries, or unprotected APIs. Subdomains that often trip up even mature cybersecurity firms — such as open solarqube, grafana, jenkins, or kibana — are entirely absent here.&lt;/p&gt;

&lt;p&gt;There’s no trace of test environments, leftover Kubernetes dashboards, or forgotten staging setups that are frequently found on other firms’ domains. The DNS attack surface is practically non-existent, which is exactly how a cybersecurity company should present itself to the world.&lt;/p&gt;

&lt;p&gt;WordPress: Obfuscated and Fortified&lt;br&gt;
Let’s talk CMS. While both ZAP and CMSeek detect WordPress fingerprints (likely due to public JS bundle structure), Hudson Cybertec has managed to cloak their WordPress instance to the point of invisibility.&lt;/p&gt;

&lt;p&gt;No /wp-login.php, no /xmlrpc.php, no default paths, no open REST API endpoints. And when I threw wpscan at the site? It simply stopped — unable to move past the initial phase.&lt;/p&gt;

&lt;p&gt;That’s right: even automated WP enumeration is thwarted at step one.&lt;/p&gt;

&lt;p&gt;Does the site use WordPress? Almost certainly. But it’s so heavily customized, hardened, and obfuscated that detecting it becomes a challenge in itself. This is exactly what secure WordPress deployment should look like in 2025: minimalist, shielded, and surgically controlled.&lt;/p&gt;

&lt;p&gt;Room for Improvement? Barely.&lt;br&gt;
No site is flawless, and Hudson Cybertec is no exception. While the CSRF protection doesn’t cover every surface (which is notoriously difficult to fully achieve on WordPress), it’s a minor concern in an otherwise bulletproof setup.&lt;/p&gt;

&lt;p&gt;Still, given how hard it is to retrofit complete CSRF defense into WordPress — especially when operating with loginless visitor flows or API endpoints — this isn't a failure, but rather a limitation of the underlying CMS.&lt;/p&gt;

&lt;p&gt;Final Verdict: A Gold Standard&lt;br&gt;
In a landscape where even cybersecurity vendors frequently neglect their own digital hygiene, Hudson Cybertec stands apart.&lt;/p&gt;

&lt;p&gt;✅ Hardened DNS with zero overexposure&lt;br&gt;
✅ Fully proxied infrastructure via Cloudflare &amp;amp; Microsoft&lt;br&gt;
✅ No loose subdomains, misconfigured ports, or test environments&lt;br&gt;
✅ WordPress setup so secure and obfuscated that scans break early&lt;br&gt;
✅ Only minor signs of potential CSRF limitations — and nothing critical&lt;/p&gt;

&lt;p&gt;In short, this is what a secure perimeter should look like. Hudson Cybertec doesn’t just talk the talk — they walk it. If you're looking for a benchmark on how to protect a WordPress-based site and its surrounding infrastructure, this is it.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Rus Aeroflot hacked — total system failure</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Mon, 28 Jul 2025 12:42:38 +0000</pubDate>
      <link>https://dev.to/0trust0day/rus-aeroflot-hacked-total-system-failure-5j4</link>
      <guid>https://dev.to/0trust0day/rus-aeroflot-hacked-total-system-failure-5j4</guid>
      <description>&lt;p&gt;Russian airline giant Aeroflot just got completely compromised. Hacker groups Cyber Partisans and Silent Crow claim they infiltrated the company’s core IT systems (Tier0) for over a year — without being noticed.&lt;/p&gt;

&lt;p&gt;What they accessed:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Entire flight history databases&lt;/li&gt;
&lt;li&gt;Surveillance systems and employee monitoring tools&lt;/li&gt;
&lt;li&gt;Wiretapping servers with recorded calls and internal communications&lt;/li&gt;
&lt;li&gt;Personal computers of executives and top management&lt;/li&gt;
&lt;li&gt;All mission-critical infrastructure&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;They promise to publish portions of the data soon.&lt;/p&gt;

&lt;p&gt;Meanwhile, around 50 flights were canceled today out of Sheremetyevo Airport. Aeroflot offers no comment on the breach — only asks passengers to leave the terminal.&lt;/p&gt;

&lt;p&gt;So how did this happen?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg3znqjwiki5mswkrvkow.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg3znqjwiki5mswkrvkow.png" alt=" " width="800" height="527"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Simple: Basic cybersecurity rules were ignored.&lt;br&gt;
As I’ve said before — DNS misconfigurations are the first door in. Doesn’t matter how many fancy certificates your “CISO” team holds — if you’re lazy, you’re exposed. And these hackers didn’t need 0days or magic malware. They likely just used the CISO’s own VPN, passwords, or password manager.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbjczwa3bxtfs4fstuowx.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbjczwa3bxtfs4fstuowx.jpeg" alt=" " width="800" height="431"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;No firewall can protect you from yourself.&lt;br&gt;
This is a wake-up call to every corporation hiding behind shiny tools while ignoring the basics.&lt;/p&gt;

&lt;h1&gt;
  
  
  CyberSecurity #Aeroflot #Russia #Breach #DNS #InfoSec #Hacked #DevSecOps #SilentCrow
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>Cybersecurity Benchmark or Red Flag? A Technical Dive into Bureau Veritas' Subdomain Infrastructure</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Mon, 28 Jul 2025 08:39:33 +0000</pubDate>
      <link>https://dev.to/0trust0day/cybersecurity-benchmark-or-red-flag-a-technical-dive-into-bureau-veritas-subdomain-infrastructure-3m41</link>
      <guid>https://dev.to/0trust0day/cybersecurity-benchmark-or-red-flag-a-technical-dive-into-bureau-veritas-subdomain-infrastructure-3m41</guid>
      <description>&lt;p&gt;Bureau Veritas is a global leader in testing, inspection, and certification services—and in recent years, the company has expanded aggressively into the cybersecurity and compliance consulting space. With such a public-facing position in the security industry, you'd expect their digital infrastructure to be both secure and exemplary.&lt;/p&gt;

&lt;p&gt;From a developer and security researcher's perspective, Bureau Veritas indeed sets a high bar in many areas. But as with any large-scale operation, there are cracks worth examining—especially when you peek behind the curtain of public DNS and open protocols.&lt;/p&gt;

&lt;p&gt;Let’s explore what makes Bureau Veritas both a security benchmark and a cautionary tale for DevOps, infosec engineers, and compliance-focused developers.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqn50skwls79hdaom8x8x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqn50skwls79hdaom8x8x.png" alt=" " width="800" height="493"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🌍 Global Infrastructure, Global Risk&lt;br&gt;
Bureau Veritas hosts dozens of subdomains across a wide array of providers and regions:&lt;/p&gt;

&lt;p&gt;United States: AWS, CyrusOne, Rackspace&lt;/p&gt;

&lt;p&gt;Europe: OVH (France), Ikoula, Equinix&lt;/p&gt;

&lt;p&gt;Asia: PCCW, Hutchison in Hong Kong&lt;/p&gt;

&lt;p&gt;Brazil, Germany, The Netherlands—you name it.&lt;/p&gt;

&lt;p&gt;This geographical diversity offers performance and redundancy benefits, but also complicates GDPR and NIS2 compliance, especially around cross-border data transfers.&lt;/p&gt;

&lt;p&gt;💻 The Good: Legal &amp;amp; Frontend Security&lt;br&gt;
Let’s start with what Bureau Veritas does very well:&lt;/p&gt;

&lt;p&gt;✅ Cookie compliance: Clean implementation using Cookiebot by Usercentrics. No intrusive defaults, well-structured consent banners.&lt;/p&gt;

&lt;p&gt;✅ Frontend hardening: No major CSRF vectors, token protection in place, no exposed API keys or tokens in browser console.&lt;/p&gt;

&lt;p&gt;✅ CMS Access Control: Although the presence of a Drupal CMS was discoverable (which is hard to truly hide), access is protected via OneLogin, essentially making the admin panel a fortress against brute-force and credential stuffing attempts.&lt;/p&gt;

&lt;p&gt;🧨 The Bad: DNS Exposure, Legacy Protocols&lt;br&gt;
The deeper you dig into public records (A/MX/NS/TXT), the more technical debt surfaces:&lt;/p&gt;

&lt;p&gt;FTP and SSH services are exposed on multiple subdomains like b2bfilexchange.bureauveritas.com and batinspect.bureauveritas.com.&lt;/p&gt;

&lt;p&gt;Several services run outdated software, such as Apache 2.4.6 (released in 2013) and OpenSSL 1.0.2k.&lt;/p&gt;

&lt;p&gt;TLS certificate mismatches (e.g., asipulse1.bureauveritas.com serving a cert for euapulse.bureauveritas.com) create trust issues for users and machines alike.&lt;/p&gt;

&lt;p&gt;Lack of DMARC and DKIM in TXT records raises phishing and spoofing risks.&lt;/p&gt;

&lt;p&gt;HTTP endpoints return 403 Forbidden, 404 Not Found, or 302 Redirect—with no custom error pages or transparency notices required under GDPR.&lt;/p&gt;

&lt;p&gt;🔐 IAM and Security Operations Shortcomings&lt;br&gt;
Despite good frontend isolation, there’s no clear evidence of:&lt;/p&gt;

&lt;p&gt;Centralized Identity and Access Management (IAM) across services.&lt;/p&gt;

&lt;p&gt;Role-based access control (RBAC) beyond isolated portals.&lt;/p&gt;

&lt;p&gt;TLS 1.3 enforcement or use of HSTS headers.&lt;/p&gt;

&lt;p&gt;Certificate lifecycle management at scale.&lt;/p&gt;

&lt;p&gt;Public-facing indicators of incident detection or response processes (a NIS2 requirement).&lt;/p&gt;

&lt;p&gt;For a company delivering cybersecurity services, these gaps are concerning.&lt;/p&gt;

&lt;p&gt;⚖️ Compliance Red Flags&lt;br&gt;
GDPR Violations&lt;br&gt;
Use of FTP/HTTP for data-related subdomains violates Article 32 (security of processing).&lt;/p&gt;

&lt;p&gt;403/404 error pages without legal disclosure violate Article 13 (transparency).&lt;/p&gt;

&lt;p&gt;Hosting personal data in the U.S./HK without visible SCCs violates Chapter V.&lt;/p&gt;

&lt;p&gt;NIS2 Violations&lt;br&gt;
Outdated software without hardening breaks Article 21.&lt;/p&gt;

&lt;p&gt;Public services (SSH/FTP) without strict controls break Article 21(2)(b).&lt;/p&gt;

&lt;p&gt;No evidence of incident reporting structures required under Article 23.&lt;/p&gt;

&lt;p&gt;CCPA &amp;amp; NIST 800-53&lt;br&gt;
No opt-out mechanisms on subdomains like cps.bureauveritas.com conflict with CCPA §1798.120.&lt;/p&gt;

&lt;p&gt;FTP/SSH access without MFA violates NIST IA-2.&lt;/p&gt;

&lt;p&gt;TLS misconfigurations contradict ISO 27001 A.12.4.1.&lt;/p&gt;

&lt;p&gt;🛠️ Dev-Focused Recommendations&lt;br&gt;
If you're managing a similar infrastructure, consider using Bureau Veritas as both inspiration and a cautionary example.&lt;/p&gt;

&lt;p&gt;✅ What to Emulate&lt;br&gt;
Proper cookie banners and legal compliance.&lt;/p&gt;

&lt;p&gt;Centralized login systems (SSO via OneLogin).&lt;/p&gt;

&lt;p&gt;Tokenized frontend logic and CSRF protection.&lt;/p&gt;

&lt;p&gt;⚠️ What to Improve&lt;br&gt;
Replace FTP with SFTP/FTPS immediately.&lt;/p&gt;

&lt;p&gt;Enforce TLS 1.3 and implement HSTS.&lt;/p&gt;

&lt;p&gt;Add DMARC and DKIM to all primary domains.&lt;/p&gt;

&lt;p&gt;Harden public services, ideally restrict SSH to bastion hosts only.&lt;/p&gt;

&lt;p&gt;Deploy a centralized certificate and IAM solution (e.g., HashiCorp Vault + Okta).&lt;/p&gt;

&lt;p&gt;🧾 Final Thoughts&lt;br&gt;
Bureau Veritas represents a high-quality cybersecurity and legal compliance benchmark—but one that is slightly tarnished by its overexposed DNS posture and some lingering technical debt on the backend.&lt;/p&gt;

&lt;p&gt;In 2024–2025, modern infrastructure teams must assume that everything discoverable via DNS will be analyzed—by researchers, attackers, and regulators alike. The only safe move is to treat every exposed service as a potential breach vector and harden accordingly.&lt;/p&gt;

&lt;p&gt;💬 Have you run similar audits on your infrastructure? What tools and practices do you use to catch issues like this before they go live?&lt;/p&gt;

&lt;p&gt;Let’s discuss. 👇&lt;/p&gt;

&lt;h1&gt;
  
  
  cybersecurity #devops #compliance #gdpr #infosec #dns #drupal #ftp #tls #backendsecurity #iam #frontendsecurity
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>Public call for ON2IT to reassess its own information security practices</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Thu, 17 Jul 2025 22:33:26 +0000</pubDate>
      <link>https://dev.to/0trust0day/public-call-for-on2it-to-reassess-its-own-information-security-practices-3pbj</link>
      <guid>https://dev.to/0trust0day/public-call-for-on2it-to-reassess-its-own-information-security-practices-3pbj</guid>
      <description>&lt;p&gt;Security Starts at Home — But ON2IT Didn’t Get the Memo&lt;br&gt;
As digital citizens, we rely on legal frameworks like the EU’s GDPR, the US’s CCPA, and other privacy laws to protect our personal data online. These frameworks are meant to ensure at least a baseline of digital privacy and safety. But laws are only as good as their enforcement — and even cybersecurity companies often fall short of practicing what they preach.&lt;/p&gt;

&lt;p&gt;In this ongoing series of surface-level security analyses, I focus on how everyday users’ data is (mis)handled by companies — especially those claiming to specialize in cybersecurity. Today’s subject is ON2IT, a Dutch cybersecurity company that portrays itself as a major player in the industry.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr3vo9xuy52mbbssdqsdj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr3vo9xuy52mbbssdqsdj.png" alt=" " width="800" height="532"&gt;&lt;/a&gt;&lt;br&gt;
U have just two options for choose: agree or full agree ;-)&lt;/p&gt;

&lt;p&gt;Taken directly from ON2IT’s official website — as we can see, there’s really no choice here: either accept cookies, or… accept cookies. One has to wonder who the genius was that thought this was acceptable in the age of GDPR.&lt;br&gt;
My review was conducted with standard tools accessible to anyone — using OWASP ZAP and Chrome DevTools. No advanced penetration testing or unauthorized access attempts were performed. Yet, even this limited inspection revealed disturbing results.&lt;/p&gt;

&lt;p&gt;Legal Compliance: Not a Disaster, But Far From Safe&lt;br&gt;
ON2IT’s website includes formal privacy policies, GDPR references, and public contact addresses. But form ≠ substance.&lt;/p&gt;

&lt;p&gt;Based on a structured legal assessment framework that includes consent mechanisms, cookie behavior, and phishing protections, the results are mixed:&lt;br&gt;
Overall Score: 4 out of 8.&lt;/p&gt;

&lt;p&gt;The legal façade holds on the surface, but the lack of granular consent, technical safeguards, and proper cookie rejection behavior means users aren’t as protected as they should be.&lt;/p&gt;

&lt;h2&gt;
  
  
  Technical Posture: A Series of Failures
&lt;/h2&gt;

&lt;p&gt;Here’s the real concern: the technical side is a mess.&lt;/p&gt;

&lt;p&gt;ON2IT’s website is built on… WordPress. That alone isn’t a crime — even secure setups can use WordPress — but only when hardened, obscured, and properly maintained. ON2IT does none of this.&lt;/p&gt;

&lt;p&gt;Key technical findings from &lt;a href="https://on2it.net:" rel="noopener noreferrer"&gt;https://on2it.net:&lt;/a&gt;&lt;br&gt;
CMS: WordPress 6.8.1&lt;br&gt;
Theme: GeneratePress (parent + child)&lt;br&gt;
Plugins: GravityForms, GP Premium, SitePress Multilingual, Popup Maker&lt;br&gt;
Exposed files: readme.html, license.txt&lt;br&gt;
Public user list (name changes dut to ethical reasons): sXmh, jaXj, kaXXnm, lXk, arXXns, etc.&lt;/p&gt;

&lt;p&gt;These are not hypothetical risks — they are publicly documented issues (MITRE, Wordfence) that expose both users and administrators to session hijacking, script injection, and content tampering.&lt;/p&gt;

&lt;p&gt;Openly Exposed Services — A Reconnaissance Playground&lt;br&gt;
Worse yet, several of ON2IT’s internal or demo services are fully exposed to the public with no authentication or access control. Their subdomains are even self-descriptive — making them easy targets for automated scanning and phishing setups:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://filerdemo.on2it.net/login" rel="noopener noreferrer"&gt;https://filerdemo.on2it.net/login&lt;/a&gt;&lt;br&gt;
&lt;a href="https://social.on2it.net/explore" rel="noopener noreferrer"&gt;https://social.on2it.net/explore&lt;/a&gt;&lt;br&gt;
&lt;a href="https://soc.on2it.net/" rel="noopener noreferrer"&gt;https://soc.on2it.net/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://portal.on2it.net/login" rel="noopener noreferrer"&gt;https://portal.on2it.net/login&lt;/a&gt;&lt;br&gt;
&lt;a href="https://sensorlogging.on2it.net/" rel="noopener noreferrer"&gt;https://sensorlogging.on2it.net/&lt;/a&gt;&lt;br&gt;
These endpoints read more like a checklist for attackers than hardened assets. The use of obvious subdomain naming conventions is a gift to OSINT tools.&lt;/p&gt;

&lt;p&gt;DNS, Hosting &amp;amp; Cookie Concerns&lt;br&gt;
ON2IT’s infrastructure relies heavily on third-party services including Google (Gmail), Leaseweb, GCP, and WordPress-based hosting.&lt;/p&gt;

&lt;p&gt;Cookies on on2it.recruitee.com are set without real opt-out, violating the spirit — if not the letter — of GDPR. Once again, form wins over substance.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Scorecard
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Legal Layer:&lt;/strong&gt;&lt;br&gt;
✅ Privacy Policy — Pass&lt;br&gt;
✅ Cookie Policy — Pass&lt;br&gt;
❌ Cookie Implementation — Fail&lt;br&gt;
✅ DPO Contact — Pass&lt;br&gt;
❌ Opt-Out Mechanism — Fail&lt;br&gt;
❌ Granular Consent — Fail&lt;br&gt;
❌ Privacy-respecting A/B Testing — Fail&lt;br&gt;
✅ Right to Erasure — Pass&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technical Layer:&lt;/strong&gt;&lt;br&gt;
❌ Anti-CSRF Protections — Fail&lt;br&gt;
❌ CSP Header — Fail&lt;br&gt;
❌ Subresource Integrity (SRI) — Fail&lt;br&gt;
❌ DNS/OSINT Defense — Fail&lt;br&gt;
✅ HTTPS + HSTS — Pass&lt;br&gt;
❌ User Enumeration Prevention — Fail&lt;br&gt;
❌ Admin Interface Obfuscation — Fail&lt;br&gt;
✅ Legal Disclosures Present — Pass&lt;br&gt;
❌ Default Cookie Behavior — Fail&lt;br&gt;
Final Thoughts: Branding ≠ Security&lt;br&gt;
ON2IT, like many others in the cybersecurity industry, seems to focus more on brand optics than infrastructure hygiene. For a company selling protection, they leave their own digital front door wide open.&lt;/p&gt;

&lt;p&gt;This review isn’t a targeted attack — it’s a reminder: Security starts at home.&lt;br&gt;
If cybersecurity firms don’t uphold the same standards they advocate, how can users or clients trust them?&lt;/p&gt;

&lt;p&gt;I hope this article encourages more critical evaluations — and higher expectations — from vendors in the cybersecurity space.&lt;/p&gt;

&lt;p&gt;For any questions: &lt;a href="https://on2it.0trust0day.com" rel="noopener noreferrer"&gt;https://on2it.0trust0day.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Disclaimer &amp;amp; User Rights Statement&lt;br&gt;
I am a user of this website. I have identified that my personal data may be at risk.&lt;br&gt;
A form on the website potentially allows actions to be forged in my name — without my consent.&lt;br&gt;
I visited a website claiming to offer cybersecurity services, yet encountered unprotected resources, cookies without HSTS, and scripts without CSP. That directly affects me as a user.&lt;br&gt;
This analysis is based solely on publicly accessible information, passive observation of website behavior, and freely available client-side tools. No unauthorized access, exploitation, or invasive techniques were used.&lt;br&gt;
As a user of the examined web resource, I retain the right to assess potential security and privacy risks that may affect my personal data, browsing experience, or device safety.&lt;br&gt;
The presented findings represent a good-faith effort to raise public awareness and encourage higher security standards. All legal and technical interpretations are personal opinions and do not constitute a legally binding statement.&lt;br&gt;
No penetration testing was performed. To identify potential vulnerabilities that could compromise my information during the use of the referenced web resource, only publicly available, free website analysis services and the Chrome browser console were used.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Shuberg Philis — are you sure you’re capable of securing mission-critical operations?</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Thu, 17 Jul 2025 22:31:13 +0000</pubDate>
      <link>https://dev.to/0trust0day/shuberg-philis-are-you-sure-youre-capable-of-securing-mission-critical-operations-pd1</link>
      <guid>https://dev.to/0trust0day/shuberg-philis-are-you-sure-youre-capable-of-securing-mission-critical-operations-pd1</guid>
      <description>&lt;p&gt;&lt;strong&gt;Maybe it’s better to start with securing your own systems first?&lt;/strong&gt;&lt;br&gt;
I’ve seen a lot over the years of doing pentests and quick external assessments, but this might be a new low. Yet another company that proudly claims to “specialize in delivering mission-critical IT systems with unparalleled security, reliability, and resilience” — and they’ve completely outdone themselves in terms of negligence.&lt;/p&gt;

&lt;p&gt;Schuberg Philis specializes in delivering mission-critical IT systems with unparalleled security, reliability, and resilience. We work closely with customers to plan, build, and run secure systems that empower industries and infrastructures. As a purpose-driven company with an engineer-focused culture, we prioritize trust, autonomy, and operational excellence. Security, in our view, is not a barrier but a catalyst for growth.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"We are seeking an IT-OT Cyber Security Expert passionate about protecting mission-critical Operational Technology (OT) systems in industries such as utilities, production, and logistics. Operating at the juncture of IT and OT, this role focuses on creating robust security solutions for OT environments, while helping customers navigate the increasingly complex threat landscape."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj9jrztlrpzohmd3uqs3g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj9jrztlrpzohmd3uqs3g.png" alt=" " width="800" height="460"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So, I saw a job posting and decided to check out their web infrastructure to see if it’s even safe to use — say, to submit an application through it. And I was genuinely shocked. How can a company that promises cutting-edge protection of “mission-critical Operational Technology (OT) systems in industries such as utilities, production, and logistics” operate such a poorly structured and insecure IT environment?&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Overexposure of Internal Subdomains
&lt;/h2&gt;

&lt;p&gt;Shuberg Philis is absolutely leader (for me and for last 6month) of numerous subdomains reveal sensitive internal services:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Examples:&lt;br&gt;
jira.acc.schubergphilis.com,&lt;br&gt;
chef.opensearch.acc.schubergphilis.com,&lt;br&gt;
infra.chef.saas...,&lt;br&gt;
auth.acc...,&lt;br&gt;
reset.acc...,&lt;br&gt;
docker-registry.k8s...,&lt;br&gt;
grafana.k8s..., etc.&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Issue:&lt;br&gt;
These names leak architectural and operational details — including CI/CD, DevOps, PKI, monitoring, authentication, and Kubernetes environments.&lt;/p&gt;

&lt;p&gt;Risk: HIGH&lt;br&gt;
This provides attackers with an extensive map of infrastructure components that can be used for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Targeted phishing&lt;/li&gt;
&lt;li&gt;Recon for CVE exploitation&lt;/li&gt;
&lt;li&gt;Credential stuffing or brute-force against known endpoints (e.g., Jira, GitLab, Grafana)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  2. Public Interfaces Responding with Azure 404
&lt;/h2&gt;

&lt;p&gt;Several subdomains respond with:makefileCopyEdi&lt;/p&gt;

&lt;p&gt;Server: Microsoft-Azure-Application-Gateway/v2&lt;br&gt;&lt;br&gt;
Title: 404 Not Found&lt;/p&gt;

&lt;p&gt;Examples:&lt;br&gt;
jira.acc.schubergphilis.com&lt;br&gt;
gw-ldap.acc.schubergphilis.com&lt;br&gt;
oag-admin.acc.schubergphilis.com&lt;br&gt;
reset.acc.schubergphilis.com&lt;/p&gt;

&lt;p&gt;Issue:&lt;br&gt;
These are exposed endpoints of either disabled or misconfigured internal systems.&lt;br&gt;
Leaks internal pathing (reset, admin, gw-ldap) and technology (Azure WAF).&lt;br&gt;
Risk: MEDIUM&lt;/p&gt;

&lt;p&gt;Potential attack surface for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SSRF&lt;/li&gt;
&lt;li&gt;DoS&lt;/li&gt;
&lt;li&gt;ACL bypass if misconfigured&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  3. Missing Reverse DNS Entries
&lt;/h2&gt;

&lt;p&gt;Some IPs (e.g., 185.242.221.165) lack proper reverse DNS records.&lt;br&gt;
Issue:&lt;br&gt;
Lack of PTR records can:&lt;br&gt;
Weaken email delivery trust&lt;br&gt;
Indicate incomplete DNS hygiene&lt;br&gt;
Reduce overall infrastructure credibility&lt;br&gt;
Risk: LOW–MEDIUM&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Exposed Test and Legacy Environments
&lt;/h2&gt;

&lt;p&gt;Subdomains include many clearly labeled test or possibly legacy services:&lt;br&gt;
test.gitlab.saas...&lt;br&gt;
grafana-foo, grafana-foa&lt;br&gt;
confluence-k8s-test1, grafana-saas-201904121518&lt;/p&gt;

&lt;p&gt;Issue:&lt;br&gt;
These environments are often poorly maintained and not patched.&lt;/p&gt;

&lt;p&gt;Risk: HIGH&lt;br&gt;
Attackers may exploit CVEs in unpatched systems.&lt;br&gt;
Potential lateral movement into production if not isolated.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. SPF and TXT Records
&lt;/h2&gt;

&lt;p&gt;SPF:&lt;br&gt;
v=spf1 mx include:_spf.schubergphilis.com -all&lt;/p&gt;

&lt;p&gt;TXT entries reveal integrations with:&lt;br&gt;
Atlassian&lt;br&gt;
DocuSign&lt;br&gt;
Office 365 (D365)&lt;br&gt;
Dynatrace&lt;br&gt;
Google&lt;br&gt;
MongoDB&lt;br&gt;
Keybase&lt;br&gt;
GitLab CI (Managed via SBP CorpIT Gitlab-CI)&lt;br&gt;
Issues:&lt;/p&gt;

&lt;p&gt;Possible information leakage of internal tools and 3rd party services.&lt;br&gt;
No public DMARC or DKIM seen (based on dataset).&lt;br&gt;
Risk: MEDIUM&lt;br&gt;
Attackers could leverage this data to spoof email senders or attack 3rd-party integrations.&lt;/p&gt;

&lt;h2&gt;
  
  
  6. One IP Hosts Many Critical Kubernetes Services
&lt;/h2&gt;

&lt;p&gt;All k8s.saas.acc.schubergphilis.com subdomains resolve to the same IP: 85.222.238.111&lt;br&gt;
Examples:&lt;br&gt;
grafana.k8s..., alertmanager.k8s..., harbor-core.k8s..., confluence.k8s..., etc.&lt;br&gt;
Issue:&lt;br&gt;
Hosting many critical services behind a single public IP makes it a high-value target.&lt;br&gt;
Ingress exposure risks if role-based access control or authentication is misconfigured.&lt;br&gt;
Risk: CRITICAL&lt;br&gt;
Especially if any dashboards (Grafana, Harbor, etc.) are publicly accessible.&lt;/p&gt;

&lt;h2&gt;
  
  
  7. Risky Subdomain Types
&lt;/h2&gt;

&lt;p&gt;The following may indicate risk:&lt;br&gt;
pki1/pki2: Public access to internal certificate/key infrastructure&lt;br&gt;
reset, auth, gw-ldap: IAM-related endpoints&lt;br&gt;
docker-registry: Risk of exposed images or credentials&lt;/p&gt;

&lt;h2&gt;
  
  
  8. Potential Compliance Violations
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7otob8n5381ihjqid9r8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7otob8n5381ihjqid9r8.png" alt=" " width="800" height="313"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  A moment of positivity
&lt;/h2&gt;

&lt;p&gt;to be fair, there are a few decent aspects to their web platform. Legally, it’s quite solid. In fact, it’s a great benchmark example of how cookie consent should be handled in 2025 — both legally and technically. They’ve done a good job ensuring that users who decline cookies don’t have their data collected or transmitted elsewhere.&lt;/p&gt;

&lt;p&gt;Bonus points for the console easter egg designed for prospective developer applicants — nicely done! It’s both charming and practical.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8wnblbe8gkgctq5knpku.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8wnblbe8gkgctq5knpku.png" alt=" " width="800" height="288"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Recommendations
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Audit all DNS entries — remove deprecated and test subdomains.&lt;/li&gt;
&lt;li&gt;Restrict access to all internal/test environments via IP whitelisting or VPN.&lt;/li&gt;
&lt;li&gt;Review Azure App Gateway exposure, ensure WAF and proper routing rules.&lt;/li&gt;
&lt;li&gt;Enforce service segmentation, especially in Kubernetes (e.g. multiple IPs/load balancers).&lt;/li&gt;
&lt;li&gt;Harden and authenticate all dashboards (Grafana, Harbor, Confluence, etc.).&lt;/li&gt;
&lt;li&gt;Implement and verify DMARC/DKIM, and review SPF includes.&lt;/li&gt;
&lt;li&gt;Conduct regular external security scans (ZAP, Nuclei, Censys, Shodan).&lt;/li&gt;
&lt;li&gt;Reinforce CI/CD pipelines, as GitLab CI is referenced in TXT — avoid leaking internal automation logic.&lt;/li&gt;
&lt;li&gt;Verify PKI endpoints (pki1/2) — if exposed externally, they require strict access control and monitoring.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Honestly, my conclusion is simple: working with you is a security risk — it’s unsafe to even send you a CV. With such glaring security oversights, there’s a very real chance it could end up in a data leak. As for the potential regulatory fines Schuberg Philis may face… I’ll just leave that unsaid.&lt;/p&gt;

&lt;p&gt;If you lack the internal capacity to implement proper security measures — or perhaps you’ve accidentally hired some highly-certified incompetents — then feel free to reach out to me. I can fix all of this within two weeks.&lt;/p&gt;

</description>
      <category>schubergphilis</category>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>devsecops</category>
    </item>
    <item>
      <title>My Experience with websec.nl — A Benchmark for Cybersecurity Companies</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Thu, 17 Jul 2025 22:23:41 +0000</pubDate>
      <link>https://dev.to/0trust0day/my-experience-with-websecnl-a-benchmark-for-cybersecurity-companies-1ok1</link>
      <guid>https://dev.to/0trust0day/my-experience-with-websecnl-a-benchmark-for-cybersecurity-companies-1ok1</guid>
      <description>&lt;p&gt;While casually reviewing a number of cybersecurity-focused websites (in the process of job searching), I stumbled upon websec.nl — and what I saw left a lasting impression. It’s rare these days to find a site that not only looks clean and professional, but also sets a technical standard for how a security company should represent itself on the internet. And WebSec delivers exactly that — not through marketing fluff, but through its flawless execution.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://medium.com/p/9115e3834193" rel="noopener noreferrer"&gt;https://medium.com/p/9115e3834193&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From a purely technical perspective, their external footprint is a textbook example of what “secure-by-default” should look like. DNS records are trimmed and protected. There are no dangling subdomains, no exposed admin panels, no internal ports accidentally published to the world. Their TLS configuration is clean, headers are strict, cookies are locked down, and there’s no sign of tracking scripts or unnecessary third-party bloat. This is a defensive posture done right — calm, deliberate, and deeply informed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F56xp2xlxf1o4b34ywrpz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F56xp2xlxf1o4b34ywrpz.png" alt=" " width="800" height="443"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And here’s the remarkable part: WebSec is not a giant firm with thousands of engineers and unlimited budget. They are a highly focused team who simply know their craft and take pride in applying it to themselves first. Many so-called security experts talk the talk, but leave their own sites full of misconfigurations. WebSec, on the other hand, walks the walk — and does so with the precision of a world-class team.&lt;/p&gt;

&lt;p&gt;To put it plainly: this is what all cybersecurity company websites should look like. Not overloaded with marketing jargon or pointless animations — but fast, clean, and built like a fortress. Their approach reminded me of the kind of security posture seen at enterprise players like KPMG, who also run an impressively well-locked-down perimeter. And yet WebSec achieves that same level of excellence with a leaner team — and that says a lot about the skill level they bring to the table.&lt;/p&gt;

&lt;p&gt;For job seekers and collaborators alike:&lt;br&gt;
I would submit my CV to WebSec with zero hesitation. This is a team I’d genuinely be proud to work alongside. Their execution sends a strong message: “If we treat our own infrastructure with this level of care, imagine what we’ll do for yours.” And that’s exactly the kind of trust signal every security company should strive to emit.&lt;/p&gt;

&lt;p&gt;P.S. To the WebSec team:&lt;br&gt;
Just a personal note from someone who’s been in the trenches — don’t let anyone convince you that certifications alone define skill. Real hackers in the real life will not show you certificates they will bypass logic, and creatively bend systems — don’t rely on paper. They operate with instinct, experience, and a mindset that no exam can measure. Frameworks are helpful, but they aren’t the source of innovation — people are. Trying to confine a Red Team into checklists and procedures often leads to diluted outcomes.&lt;/p&gt;

</description>
      <category>websecnl</category>
      <category>cybersecurity</category>
      <category>wearebrave</category>
      <category>pentest</category>
    </item>
    <item>
      <title>An essential element of organizational Cyber Defense</title>
      <dc:creator>0trust0day</dc:creator>
      <pubDate>Wed, 16 Jul 2025 05:50:30 +0000</pubDate>
      <link>https://dev.to/0trust0day/an-essential-element-of-organizational-cyber-defense-210e</link>
      <guid>https://dev.to/0trust0day/an-essential-element-of-organizational-cyber-defense-210e</guid>
      <description>&lt;p&gt;In the increasingly digitized global economy, the resilience of an organization’s information infrastructure has become inseparable from its competitive advantage. Cybersecurity is no longer a niche concern of IT departments, but a boardroom priority. However, while many firms have invested heavily in firewalls, endpoint security, and SIEM systems, fewer have institutionalized the single most powerful vector of sustainable defense: systematic, scalable, and scenario-based cyber threat training.&lt;/p&gt;

&lt;p&gt;An original article by Aleksandr Shaman&lt;/p&gt;

&lt;p&gt;Cyber threats evolve with stunning velocity. Zero-day vulnerabilities, ransomware-as-a-service, and state-sponsored attacks no longer occur in isolation — they are interconnected, polymorphic, and exploit the weakest link in the chain: the human factor. Despite this, many organizational responses remain reactive, compliance-driven, and fragmented. A more effective approach requires continuous internal simulation and testing: a controlled, iterative ecosystem where threat understanding matures into operational reflexes.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwmpm6w2ctesaiz33c4wi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwmpm6w2ctesaiz33c4wi.png" alt=" " width="800" height="453"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is where the concept of an “internal range” emerges — not as a metaphor, but as an institutional framework. Modeled after military and industrial test environments, the internal range is a live-fire cyber defense training and validation space embedded within the enterprise itself. It systematizes threat emulation, drills, and failure analysis, transforming defense from a static to a dynamic function.&lt;/p&gt;

&lt;p&gt;Continuous Learning Loop&lt;br&gt;
The internal range replaces periodic workshops and static e-learning with immersive, adaptive training. Teams engage in real-time, role-specific simulations — CFOs facing phishing spear attempts; network engineers responding to lateral movement after a VPN breach. These scenarios are calibrated based on current threat intelligence feeds and internal system vulnerabilities. Unlike traditional tabletop exercises, internal range activities are run in parallel with actual operations in controlled virtualized environments, minimizing disruption while maximizing realism.&lt;br&gt;
Quantified Organizational Readiness&lt;br&gt;
One of the limitations of conventional training is the absence of empirical performance metrics. Internal ranges solve this by capturing behavioral, technical, and procedural data across simulations. Who responded fastest? Where were the bottlenecks? Which alerts were ignored? These data points feed into dashboards that measure individual and team-level readiness — allowing CISOs to present cybersecurity maturity in quantitative, board-friendly formats.&lt;br&gt;
Cultural Integration of Security&lt;br&gt;
When cyber defense is siloed, response becomes slow and confused. The internal range promotes cross-functional muscle memory. Legal teams practice breach disclosure protocols. PR units rehearse media responses. HR trains on insider threat recognition. Security becomes a shared reflex rather than a specialized function. This leads to a culture where vigilance is internalized, not imposed.&lt;br&gt;
Pre-Deployment Stress Testing&lt;br&gt;
Before rolling out new software, migrating workloads to the cloud, or onboarding critical third-party providers, internal ranges offer a simulated environment to test their impact on security posture. For example, a fintech firm used its internal range to simulate DDoS attacks on a soon-to-be-public API gateway. The exercise revealed hidden dependency loops in legacy infrastructure, which were rectified before production deployment.&lt;br&gt;
Incident Replay and Forensic Education&lt;br&gt;
Real breaches, when they occur, are replayed in the internal range. This forensic reenactment transforms painful post-mortems into high-value teaching assets. One pharmaceutical company, after a ransomware event, reconstructed the entire timeline of the breach in its internal range, using it not only to patch vulnerabilities but also to redesign identity access protocols. The process triggered a full review of their remote access stack.&lt;br&gt;
From a commercial standpoint, the internal range becomes a risk mitigation asset with clear ROI. Reduced downtime, better audit outcomes, lower insurance premiums, and fewer regulatory penalties all stem from improved preparedness. Moreover, it creates a strong signal to partners and clients: this is an organization serious about cyber hygiene.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F71lla0uf9pyc51itmv31.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F71lla0uf9pyc51itmv31.png" alt=" " width="800" height="317"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Case studies underline its effectiveness. A multinational logistics provider deployed an internal range strategy across six regional hubs. Over 12 months, phishing click-through rates dropped by 47%, mean time to detect threats halved, and confidence in breach-response procedures improved measurably in quarterly assessments. Another example comes from an energy firm that integrated their SCADA infrastructure into their internal range. This allowed them to safely test malware propagation through OT systems, previously considered too risky to simulate.&lt;/p&gt;

&lt;p&gt;Importantly, internal ranges also support regulatory alignment. In sectors where cyber resilience regulations are tightening — financial services (DORA, NIS2), healthcare (HIPAA, HITECH), critical infrastructure (NERC CIP) — an internal range provides documented, repeatable, and auditable training evidence. It strengthens compliance postures not by box-ticking, but by embedding real-world, tested capabilities.&lt;/p&gt;

&lt;p&gt;The scalability of the internal range model is another of its advantages. It can start as a modest set of virtualized environments and scripted playbooks, gradually incorporating red-blue-purple teaming, third-party tool integrations (Splunk, CrowdStrike, or SentinelOne), and even AI-driven adversary emulation. For large enterprises, ranges can be federated across geographies; for smaller firms, they can be cloud-based and modular.&lt;/p&gt;

&lt;p&gt;In essence, the internal range is not a product but a philosophy. It rejects the notion of cybersecurity as a static layer atop business operations. Instead, it proposes cybersecurity as an ever-evolving internal dialogue between infrastructure, people, and processes. Like any effective training ground, it is only as valuable as its integration into everyday workflows.&lt;/p&gt;

&lt;p&gt;To business leaders and technology strategists, the message is clear: systematize your cyber threat training or risk falling behind. Threat actors iterate rapidly; so must defenders. By investing in internal ranges, organizations cultivate not only technical hardening but also cognitive and procedural readiness — an enterprise-wide immune system tuned to the realities of modern risk.&lt;/p&gt;

&lt;p&gt;In a time when digital sovereignty, data localization, and trust are core to competitive positioning, the ability to prove cyber preparedness is becoming as important as being prepared. The internal range model delivers both.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz7iliw5xhioqfjiuwhxo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz7iliw5xhioqfjiuwhxo.png" alt=" " width="800" height="377"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cyber Ranges as the Future of Organizational Resilience: Turning Training into a Competitive Edge&lt;br&gt;
In the digital-first economy, cybersecurity isn’t just a technical domain — it’s strategic infrastructure. As threats evolve, organizations are learning that static defenses and one-time awareness campaigns are no match for sophisticated and persistent attacks. What’s needed is a shift: from ad hoc training to institutionalized cyber exercises, from theoretical awareness to hands-on readiness, from isolated simulations to a continuously active cyber range embedded within the enterprise.&lt;/p&gt;

&lt;p&gt;A cyber range is more than a metaphor. It’s a real-time, dynamic environment that emulates cyberattacks, operational breakdowns, and recovery processes. Much like a military training ground, it tests personnel, processes, and systems under stress. This is not about occasional fire drills — it’s about operationalizing preparedness as a culture.&lt;/p&gt;

&lt;p&gt;Realistic, Continuous Cyber Drills&lt;br&gt;
Instead of outdated e-learning modules, cyber ranges immerse employees in threat scenarios modeled on current attack vectors — credential stuffing, social engineering, API abuse. The training is adaptive, aligned with each role. A finance lead receives deepfake invoice scams. The DevOps team manages lateral movement after a container breakout. These exercises occur in segmented, safe environments, running parallel to real infrastructure.&lt;br&gt;
Quantified Readiness and Performance Analytics&lt;br&gt;
Cyber ranges generate real data: response times, detection rates, procedural gaps. This data feeds into readiness dashboards that CISOs can present to boards. The shift is from anecdotal to measurable. One firm reported cutting its mean time to respond (MTTR) from 48 to 24 hours after integrating their cyber range — a 50% improvement visualized in this chart:&lt;br&gt;
Cross-Functional Security Integration&lt;br&gt;
Security failures often stem from siloed responsibility. Cyber ranges break down these silos. HR, PR, legal, ops, and executive leadership rehearse breach responses together. In one energy firm, integrating legal and operational teams into cyber drills helped align disclosure protocols, reducing legal-exposure time during a real incident.&lt;br&gt;
Testing New Systems Before Deployment&lt;br&gt;
Before launching new APIs or adopting cloud infrastructure, a cyber range allows simulated stress tests. A fintech firm used theirs to launch a mock DDoS attack on a customer-facing API. The result? Early detection of cascading timeouts in legacy backends — mitigated before public exposure.&lt;br&gt;
Forensic Replays That Teach and Fortify&lt;br&gt;
After incidents occur, a cyber range reconstructs the timeline, offering a safe space for forensic learning. A pharmaceutical enterprise replayed a ransomware breach and discovered overlooked access controls. This led to a redesign of their IAM system — preventing future entry points.&lt;br&gt;
Let’s look at real-world implementation:&lt;/p&gt;

&lt;p&gt;The measurable results speak for themselves:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr49d90p4b1kug21nuiph.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr49d90p4b1kug21nuiph.png" alt=" " width="800" height="337"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fym3wm0gn1xbjqkv3b251.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fym3wm0gn1xbjqkv3b251.png" alt=" " width="800" height="332"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For regulated industries, a cyber range also serves as compliance infrastructure. With frameworks like NIS2, DORA, and HIPAA demanding not only controls but demonstrable readiness, ranges provide repeatable and auditable evidence. Security insurers, too, are starting to reward such proactive training environments with lower premiums.&lt;/p&gt;

&lt;p&gt;Importantly, a cyber range is scalable. A multinational may invest in multi-cloud simulation labs. A smaller firm might begin with containerized playbooks and monthly drills. The core principle remains: repeatable, relevant, realistic cyber training embedded in your operations — not adjacent to them.&lt;/p&gt;

&lt;p&gt;In today’s environment, threats are real-time, and so must be your training. A cyber range becomes an enterprise immune system, constantly testing, evolving, and improving. It bridges the gap between knowing and doing, between controls and culture.&lt;/p&gt;

&lt;p&gt;Security leaders should no longer ask if they need cyber drills, but how soon they can institutionalize them. The organizations best equipped for tomorrow are not necessarily the ones with the most tools, but the ones whose people know exactly how to respond — because they’ve already done it. Repeatedly. In their own cyber range.&lt;/p&gt;

&lt;p&gt;Here are references and credible sources for the data presented in the tables, aligned with real-world reports, industry whitepapers, and known case studies. Where exact organizations are anonymized in the article (as often required for confidentiality), the data draws from aggregated industry research or de-identified case summaries from leading vendors and institutions.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
