this post was submitted on 21 Dec 2023
78 points (96.4% liked)

Technology

59381 readers
2702 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 6 comments
sorted by: hot top controversial new old
[โ€“] [email protected] 44 points 11 months ago (1 children)

Short version:

  • Malware got onto Windows PC.
  • From the compromised machine, spying on credentials is trivial.

That's it. All the analysis about how they inject some code into some browser and communicate with their server is a smoke screen.

Our most favourite OS is blatantly insecure.

[โ€“] [email protected] 4 points 11 months ago (1 children)

Mac browser too apparently.

It's really hard to defend against the human angle. I've seen senior management wire $1mil+ to a scammer by emailing the wire info, including PIN. ๐Ÿคฆโ€โ™‚๏ธ

[โ€“] [email protected] 2 points 11 months ago

Yes, this is human failure and it's also human to fail.

Principally, this can work on any OS with gullible users. I blame Microsoft-Entreprise-IT partly because it's an easy target and partly because dumb users are their fault due the multiple layers of obfuscation built into the products/setups.

If you have a Google password and an Apple password, they are clearly both vulnerable to phishing attacks. But you would never use any of those with Amazon because clearly you learned the use unique passwords. Also, how often do Google or Apple ask for your password? Maybe, once when you setup a device, are once per day (if you have your sessions expire). Reasonable. Not the most secure setup, we can do better than passwords, but most people somehow manage.

Now enter corporate IT. Here we have "password sync" (shudder). Here we have Azure AD / Entra ID / M365, which are okay products, deployed in companies that never wanted anything in the cloud. Now you get emails from "Word" asking for your most important password. Depending on the configuration, you may be constantly nagged by 2FA requests.

Also, no one explains anything the the users, including the CEO. The "new" Windows and office just appeared. People startet entering passwords in places that never needed a password before.

This makes phishing effective.

[โ€“] [email protected] 8 points 11 months ago (1 children)
[โ€“] [email protected] 2 points 11 months ago

^ yep.

Absolute fucktons of.

[โ€“] [email protected] 5 points 11 months ago

This is the best summary I could come up with:


Judging by the evidence to hand, it appears the Windows malware DanaBot, or something related or connected to it, infects victims' PCs โ€“ typically from spam emails and other means โ€“ and then waits for the user to visit their bank website.

The script is fairly smart: it communicates with a remote command-and-control (C2) server, and removes itself from the DOM tree โ€“ deletes itself from the login page, basically โ€“ once it's done its thing, which makes it tricky to detect and analyze.

These include injecting a prompt for the user's phone number or two-factor authentication token, which the miscreants can use with the intercepted username and password to access the victim's bank account and steal their cash.

"This sophisticated threat showcases advanced capabilities, particularly in executing man-in-the-browser attacks with its dynamic communication, web injection methods and the ability to adapt based on server instructions and current page state," Langus warned.

PS: AT&T Alien Labs this week drilled into information-stealing malware dubbed JaskaGO, which is written in Go and said to pose "a severe threat to both Windows and macOS operating systems."

The code uses multiple techniques to persist on an infected computer, and can siphon data including login credentials stored by browsers and attack cryptocurrency wallets.


The original article contains 619 words, the summary contains 208 words. Saved 66%. I'm a bot and I'm open source!