Brian in Pittsburgh Profile picture
Former attorney, current IT & infosec consultant in the 'Burgh. Happy to talk about password spraying one minute and constitutional law the next. Son of #wvu.
Aug 7 16 tweets 3 min read
Okay, after finally reading/puzzling through CrowdStrike's Root Cause Analysis (the way the 20 vs 21 inputs thing actually worked is confusing as hell) I can empathize a bit more with CS's people. And I finally think I can explain what happened here in layman's terms:
🧵 Basically, CrowdStrike wanted to have the ability to frequently push out new detections to spot malware very frequently and very fast.

The way this worked is that something called a Template Instance would essentially contain matching rules for spotting activity of concern.
Aug 3 8 tweets 2 min read
So, it's easy to agree with the guy here, as far as what he says goes: big tech & security firms all represent, explicitly and/or implicitly, that their products are suitable for critical infrastructure uses. They should test them appropriately.

But...
cnbc.com/2024/07/31/del… But, not to put too fine a point on it, the CEO of Delta should really know that big tech & sec firms have not infrequently been proven to be full of 💩 in terms of what they represent about their products, how they are built, and what they are suitable for.
Jun 3 8 tweets 3 min read
Ugh.

From 2020-2023, UnitedHealthcare Group's then-CISO "orchestrated a complete reinvention of the cybersecurity program." Facilitating "rapid business expansion through frequent acquisitions, averaging approximately two companies each month."
😬😬 cybersecuritysummit.com/speaker/cardwe… After Caldwell left in 2023, her replacement was Tammi Morton. Who apparently(?) didn't last long.
securitymagazine.com/articles/99776…
May 2 20 tweets 3 min read
This is the type of announcement from Microsoft that may seem quite puzzling to some:

1. You can (finally!!) use phones + the MS Authenticator app to login with phishing-resistant authentication to AAD/EID.

2. MS says most customers shouldn't want to.

techcommunity.microsoft.com/t5/microsoft-e… But why not?
After all, if you're an organization that is aware of the increasing threat posed by MFA-aware phishing attacks you're probably quite interested in moving to phishing-resistant auth.

And device-bound passkeys are pretty good in terms of phishing-resistance.
Apr 20 4 tweets 1 min read
If you're worried about 0day exploitation of VPNs:
1. Use IPsec VPNs where possible.
2. use separate identity authorities at network and app layers
3. Make sure that at least app-level traffic (RDP, SSH, https) to admin boxes & Tier 0 is using cert pinning or other server auth 4. Actually take advantage of the ability to turn your double layer perimeter setup into a nightmare for any state actor unwise to exploit their way into it by baselining both typical network traffic patterns to and from the VPN and host telemetry from it.
Apr 19 24 tweets 5 min read
So with all the negative talk about Microsoft security recently it occurred to me it's interesting to remember that MS also achieved one of the most consequential security successes of the last decade. A success that no one--including MS--ever talks about.

Hardening Office. By Office, I mean of course the Office apps. Principally the Windows desktop apps, and especially the core three: Word, Excel, and PowerPoint.
Three of the most important pieces of software on the planet.

And also, until recently, among the most widely abused for initial entry.
Apr 15 24 tweets 4 min read
It's honestly pretty funny to me how criticizing Microsoft has gone from almost verboten to The Hot New Thing among prominent infosec folks and journalists.
So let's talk about what is--and isn't--really wrong with Microsoft.
🧵 First of all, let's call out the elephant in the room:

From the standpoint of an MS shareholder who only looks at short-term returns there's nothing wrong with Microsoft's approach to security.

Indeed, things have never been better.
Mar 26 22 tweets 4 min read
So...
I'm starting to think the most practical software liability regime might use a tiered system of liability standards + safe harbors that--with some limits--would allow software makers themselves to select warranty/attestation levels for their own products.
Let me explain: The idea behind this regime would be that software makers could largely--but not entirely (see following tweets)--select the degree of security quality they would warrant to customers their products would meet in a way both comprehensible to customers and binding on the makers.
Mar 3 10 tweets 2 min read
The specific, urgent problem where gov agency cyber policy & messaging could probably achieve important gains relatively quickly:
Drastically reducing the number of easy-to-exploit, pre-authentication vulnerabilities in Net-facing software in use by critical infrastructure orgs. (By "relatively quickly" I mean a few years vs decades.)

What if in addition to medium and long-term efforts and things that required extensive discussion, careful consideration, and/or Congressional approval CISA or somebody applied focused, aggressive attention toward that?
Jul 14, 2023 7 tweets 2 min read
Microsoft has released a fascinating, actually pretty transparent post on the recent cloud breach.
Notable:
1. MS unsure how (inactive) consumer/MSA key obtained.
2. A validation flaw allowed that to be used vs Exchange Online.
3. An important API flaw made the situation worse. The most surprising news concerns point #3. There was a flaw in the GetAccessTokenForResource API that allowed the attacker here to renew access tokens by just providing the previous one, instead of requiring a new token signed by a proper AAD or MSA key. Image
May 26, 2023 4 tweets 2 min read
Lol. This says a lot more about the foolishness of many Washington policymakers when it comes to tech than it does about the substantive merits of his/Microsoft's arguments.

At least the Post pointed out the actual self-interest factor at play here.
washingtonpost.com/technology/202… Image Smith had to have been absolutely laughing his ass off when he read this quote from a Congressman: Image
May 26, 2023 12 tweets 2 min read
From one standpoint, arguably the central problem with adversary simulation/emulation red teaming in infosec today is that so often there's a mismatch between the types of threat actors organizations most need to better prepare for and the types that red teamers usually pose as. Simply put the number of organizations who need to be focused intently and presently on being able to defeat intrusions conducted by skilled operators using stealthy techniques appears to be much lower than the number who are undergoing red teaming using that threat profile.
May 24, 2023 9 tweets 2 min read
It's important to really understand the implications of the fact that threat actors of many types are now regularly using legitimate remote access capabilities--both those built-in to OSes and from third party apps--to maintain persistent remote access into targets. Often, attackers will create these persistence footholds in addition to ones involving the malware they use, for the purpose of trying to establish multiple redundant access channels.
But sometimes there will be no malware C2 footholds at all.
May 24, 2023 5 tweets 1 min read
I would very seriously argue that the single biggest factor holding back advances in both the practical art of conducting organizational cybersecurity well and in cybersecurity policymaking is that the details of how breaches of note occurred are almost always kept under wraps. There is immense, underappreciated value in being able to point to specific instances of events and say "The approach you're talking about is the same one that [organizations X, Y, and Z] took. It didn't work. And it would be dangerous here for similar reasons."
May 23, 2023 4 tweets 1 min read
A cheap, pre-hardened remote access box (for use as a Privileged Access Workstation & connecting to high-security environments) from MS and based on the Xbox platform is one of the best, enduring, and entirely doable dreams of Windows security people.
One can always dream. Give me a standards-based, interoperable VPN client, SSH client + terminal, and RDP that can connect to Azure Virtual Desktop or on-prem.

On Xbox hardware for like $400-$500. With optional subscription to enable fancy enterprise remote management of the box.

Yup.
May 23, 2023 8 tweets 2 min read
Okay, so a non-IT/sec interlude for a moment:

As someone who both handled some child custody cases where couples got married young and takes pragmatic views on many things, you might expect me to agree with "Don't get married or have kids in your 20s."

You would be wrong. I remember a talk with a woman I was representing in a child custody case. At some point, she made a self-critical comment: "I can't believe I made the mistake of marrying him."

My reply:
"You were really in love. And you two wanted to be married. What else could you have done?"
May 21, 2023 7 tweets 2 min read
The approach of trying to secure corporate IT infrastructure well by applying bare minimum maintenance & hardening efforts to it and then slathering it in security products & services and dedicated security personnel does not reliably work.

And it will never reliably work. To know and control what equipment, software, and people are allowed in your networks and to access non-public resources, and with what privileges; to understand how things are patched and/or configured, and how they *should* be; and etc: That is the vital foundation of security.
Dec 31, 2022 6 tweets 2 min read
To explain what is going on here for my tech/sec readership, in the American legal system there is a difference between whether a federal Constitutional right exists and whether a cause of action that can allow you to sue officials for money damages for violation of it exists. In 1871, Congress passed the Ku Klux Klan Act, one provision of which--later famously codified in Title 42, Section 1983 of the United States Code--allows suits against state officials for money damages* for violating federal Constitutional rights.
*Subject to qualified immunity.
Dec 30, 2022 5 tweets 1 min read
This reminds me, if you have Netflix and haven't seen Challenger: The Final Flight I recommend it.
Challenger is the story of how NASA officials faced a choice between admitting the Space Shuttle couldn't meet the launch pace promised and plowing forward hoping for the best. The people who directly made the decision to launch on that cold Florida morning knew there was probably some greater risk going forward with the rocket booster O-rings at that temperature. But the schedule pressure alongside overconfidence led them to underappreciate that risk.
Dec 6, 2022 4 tweets 1 min read
There's something I wish people understood about cybersecurity policy reform (well many things, but here one in particular):
On most issues where more gov intervention is necessary the best answer is not (IMO, anyway) actually specific proscriptive regulation. *But* that... ...outcome actually becomes more & more likely over time on various issues as interests try--and temporarily succeed--in thwarting more flexible, less intrusive measures being put in place.
Why?
Because that opposition means problems won't get addressed until awful things happen.
Dec 5, 2022 8 tweets 2 min read
I mentioned earlier that it's good that the CSRB will be investigating the $Lapsus intrusions. One particular reason for that (among others) is that, frankly, this will provide a good test case to see whether or not the current board membership is... well, a sham. Here are the key & obvious lessons to learn from the $Lapsus intrusions: (At least based on what is publicly known about them. Which is a lot.)

1. Remote access for ALL privileged accounts--inc. support-- must use cryptographic authentication at important and high-profile orgs.