Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. @jpm @decryption @Viss yeah, this thing is probably some variant of clickfix.

@jpm @decryption @Viss yeah, this thing is probably some variant of clickfix.

Scheduled Pinned Locked Moved Uncategorized
16 Posts 6 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • viss@mastodon.socialV viss@mastodon.social

    @da_667 @jpm @decryption oh man, this is interesting. i literally used almost exactly this technique on a gig i did last year for a company who wanted a phishing test.

    da_667 is probably right on the money. i dont personally track the threat actors myself, but i pay keen attention to their techniques. the screenshots he posted scream infostealer to me. it just nabs shit from your system, zips it up, and ships it to the attacker

    viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.social
    wrote last edited by
    #6

    @da_667 @jpm @decryption it is plausible that the single pixel gif is a flavor of what the blackhole exploit kit used to do - push victims through a bunch of browser fingerprinting to assert that the victim was indeed vulnerable, and if they were, then go deliver the payload, and if they werent, they just got redirected to google and they were left just curious wtf happened.

    viss@mastodon.socialV 1 Reply Last reply
    0
    • viss@mastodon.socialV viss@mastodon.social

      @da_667 @jpm @decryption it is plausible that the single pixel gif is a flavor of what the blackhole exploit kit used to do - push victims through a bunch of browser fingerprinting to assert that the victim was indeed vulnerable, and if they were, then go deliver the payload, and if they werent, they just got redirected to google and they were left just curious wtf happened.

      viss@mastodon.socialV This user is from outside of this forum
      viss@mastodon.socialV This user is from outside of this forum
      viss@mastodon.social
      wrote last edited by
      #7

      @da_667 @jpm @decryption but the infostealer stuff is getting big because defenses are getting fucking hard to bypass. like the gig i was on was a 2 week engagement, and i spent the entire fucking time, save 2 days, trying to get around apples codesigning requirements, googles spam filters, and various endpoint protection issues. i eventually bailed on trying to use any kinda sliver/msf/etc payload and just went with 'stupid bash'.

      but it worked, like a champ.
      shit sailed right through

      viss@mastodon.socialV 1 Reply Last reply
      0
      • viss@mastodon.socialV viss@mastodon.social

        @da_667 @jpm @decryption but the infostealer stuff is getting big because defenses are getting fucking hard to bypass. like the gig i was on was a 2 week engagement, and i spent the entire fucking time, save 2 days, trying to get around apples codesigning requirements, googles spam filters, and various endpoint protection issues. i eventually bailed on trying to use any kinda sliver/msf/etc payload and just went with 'stupid bash'.

        but it worked, like a champ.
        shit sailed right through

        viss@mastodon.socialV This user is from outside of this forum
        viss@mastodon.socialV This user is from outside of this forum
        viss@mastodon.social
        wrote last edited by
        #8

        @da_667 @jpm @decryption but in general, any website asking you to copypaste shit into the terminal is 100% shady.

        and that includes every real website asking you to "curl pipe to bash". like rvm, homebrew, openclaw, and every other 'devops flavored' installer that asks you to "just trust us bro"

        all that shit is a gigantic pietri dish for malware

        sassdawe@infosec.exchangeS 1 Reply Last reply
        0
        • viss@mastodon.socialV viss@mastodon.social

          @da_667 @jpm @decryption but in general, any website asking you to copypaste shit into the terminal is 100% shady.

          and that includes every real website asking you to "curl pipe to bash". like rvm, homebrew, openclaw, and every other 'devops flavored' installer that asks you to "just trust us bro"

          all that shit is a gigantic pietri dish for malware

          sassdawe@infosec.exchangeS This user is from outside of this forum
          sassdawe@infosec.exchangeS This user is from outside of this forum
          sassdawe@infosec.exchange
          wrote last edited by
          #9

          @Viss @da_667 @jpm @decryption

          I guess the bootstrap scripts published on the GitHub readme.md files are the same, right?

          I tend to trust those which come from people I have met in person before, but I guess I should reconsider this probably 🤔

          viss@mastodon.socialV 1 Reply Last reply
          0
          • sassdawe@infosec.exchangeS sassdawe@infosec.exchange

            @Viss @da_667 @jpm @decryption

            I guess the bootstrap scripts published on the GitHub readme.md files are the same, right?

            I tend to trust those which come from people I have met in person before, but I guess I should reconsider this probably 🤔

            viss@mastodon.socialV This user is from outside of this forum
            viss@mastodon.socialV This user is from outside of this forum
            viss@mastodon.social
            wrote last edited by
            #10

            @sassdawe @da_667 @jpm @decryption I guess it would be an easy thing to say "here is the script, you should review it before you run it", which would encourage folks to take the time to understand what the fuck they were about to do, but it just doesnt seem to happen

            people are way too complacent about just running some shit from the internet - and its so bad and also common now that you can just give people the script unobfuscated and they wont even bother to read it before running it

            viss@mastodon.socialV 1 Reply Last reply
            0
            • viss@mastodon.socialV viss@mastodon.social

              @sassdawe @da_667 @jpm @decryption I guess it would be an easy thing to say "here is the script, you should review it before you run it", which would encourage folks to take the time to understand what the fuck they were about to do, but it just doesnt seem to happen

              people are way too complacent about just running some shit from the internet - and its so bad and also common now that you can just give people the script unobfuscated and they wont even bother to read it before running it

              viss@mastodon.socialV This user is from outside of this forum
              viss@mastodon.socialV This user is from outside of this forum
              viss@mastodon.social
              wrote last edited by
              #11

              @sassdawe @da_667 @jpm @decryption and the whole concept of vibecoding is gonna make that so much worse.

              like, imagine a malicious browser plugin that takes any code you copy from chatgpt, alters it slightly in the clipboard, and so when you paste it, you have auto-backdoored code.

              nobodys gonna look.
              cuz they're in the middle of a "workflow" that is copypasting 5 pages of code from a browser tab into a terminal that they can plainly see, and they arent even reviewing THAT before running it

              buherator@infosec.placeB 1 Reply Last reply
              0
              • viss@mastodon.socialV viss@mastodon.social

                @sassdawe @da_667 @jpm @decryption and the whole concept of vibecoding is gonna make that so much worse.

                like, imagine a malicious browser plugin that takes any code you copy from chatgpt, alters it slightly in the clipboard, and so when you paste it, you have auto-backdoored code.

                nobodys gonna look.
                cuz they're in the middle of a "workflow" that is copypasting 5 pages of code from a browser tab into a terminal that they can plainly see, and they arent even reviewing THAT before running it

                buherator@infosec.placeB This user is from outside of this forum
                buherator@infosec.placeB This user is from outside of this forum
                buherator@infosec.place
                wrote last edited by
                #12
                @Viss As I see with the rise of smart phones companies successfully convinced users that files and directories are low level magic they are not supposed to know or care about. From this point doing stuff with files in a file manager is sorcery indistinguishable from copying 5 pages of sorcery into the sorcery manager. Confirmation windows never stopped any attacks because users click Yes faster than the blink of an eye.

                In essence users are expected to make critical decisions about a system that is hidden from them in every other aspect of working with computers.

                @sassdawe @da_667 @jpm @decryption
                schrotthaufen@mastodon.socialS krypt3ia@infosec.exchangeK 2 Replies Last reply
                0
                • buherator@infosec.placeB buherator@infosec.place
                  @Viss As I see with the rise of smart phones companies successfully convinced users that files and directories are low level magic they are not supposed to know or care about. From this point doing stuff with files in a file manager is sorcery indistinguishable from copying 5 pages of sorcery into the sorcery manager. Confirmation windows never stopped any attacks because users click Yes faster than the blink of an eye.

                  In essence users are expected to make critical decisions about a system that is hidden from them in every other aspect of working with computers.

                  @sassdawe @da_667 @jpm @decryption
                  schrotthaufen@mastodon.socialS This user is from outside of this forum
                  schrotthaufen@mastodon.socialS This user is from outside of this forum
                  schrotthaufen@mastodon.social
                  wrote last edited by
                  #13

                  @buherator @decryption @jpm @da_667 @sassdawe @Viss Confirmation dialogues need a 10s timer before they let you click on the non-abort option smdh

                  1 Reply Last reply
                  1
                  0
                  • buherator@infosec.placeB buherator@infosec.place
                    @Viss As I see with the rise of smart phones companies successfully convinced users that files and directories are low level magic they are not supposed to know or care about. From this point doing stuff with files in a file manager is sorcery indistinguishable from copying 5 pages of sorcery into the sorcery manager. Confirmation windows never stopped any attacks because users click Yes faster than the blink of an eye.

                    In essence users are expected to make critical decisions about a system that is hidden from them in every other aspect of working with computers.

                    @sassdawe @da_667 @jpm @decryption
                    krypt3ia@infosec.exchangeK This user is from outside of this forum
                    krypt3ia@infosec.exchangeK This user is from outside of this forum
                    krypt3ia@infosec.exchange
                    wrote last edited by
                    #14

                    @buherator @decryption @jpm @da_667 @sassdawe @Viss Deep magic

                    viss@mastodon.socialV 1 Reply Last reply
                    0
                    • krypt3ia@infosec.exchangeK krypt3ia@infosec.exchange

                      @buherator @decryption @jpm @da_667 @sassdawe @Viss Deep magic

                      viss@mastodon.socialV This user is from outside of this forum
                      viss@mastodon.socialV This user is from outside of this forum
                      viss@mastodon.social
                      wrote last edited by
                      #15

                      @krypt3ia @buherator @decryption @jpm @da_667 @sassdawe fucking "ls -lasth" is now black magic?

                      smh

                      buherator@infosec.placeB 1 Reply Last reply
                      0
                      • viss@mastodon.socialV viss@mastodon.social

                        @krypt3ia @buherator @decryption @jpm @da_667 @sassdawe fucking "ls -lasth" is now black magic?

                        smh

                        buherator@infosec.placeB This user is from outside of this forum
                        buherator@infosec.placeB This user is from outside of this forum
                        buherator@infosec.place
                        wrote last edited by
                        #16
                        @Viss

                        I may be wrong but assuming users don't know what files are helped me resolve a number of family techsupport situations.

                        @krypt3ia @decryption @jpm @da_667 @sassdawe
                        1 Reply Last reply
                        1
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups