Opens profile photo
Follow
Matt Johansen
@mattjay
Helping Secure the Internet | Long Island elder emo surviving in ATX | Expect: infosec current events, DFIR, appsec & cloudsec - and me!
Join 2k+ subscribers:mattjay.com/newsletterJoined June 2008

Matt Johansen’s posts

🚨 Woah. An intentional backdoor discovered in encrypted radio comms used globally for over 25 years. Buckle up!
226
14.6K
🚨 A new vulnerability found in Telegram that can grant access to your camera and microphone. Found by an engineer at Google, reported to Telegram and they haven't addressed it. So now we get a detailed public disclosure! How this works and what it means for your privacy 👇
85
2,884
Internet Explorer being developed by a bunch of strung out people going through divorces makes the most sense of anything I’ve heard recently.
18
2,251
🚨 Woah. Crazy new research paper I just read. Remotely and inaudibly issue commands to Alexa, Siri, Google Assistant, etc. "allows attackers to deliver security-relevant commands via an audio signal between 16 and 22 kHz (often outside the range of human adult hearing)" 🔊
Image
47
2,398
Woah. Unicode 'n' characters in a domain name as a super dangerous spoofed cryptocurrency exchange. Even has an SSL cert.
Image
81
1,781
Replying to
The encryption algorithms used in TETRA were kept secret until a group of Dutch researchers got their hands on them and found severe flaws, including a deliberate backdoor. This backdoor could allow someone to snoop on communications and potentially send harmful commands.
7
1,467
Replying to
The technology in question is a European radio standard called TETRA (Terrestrial Trunked Radio). It's used in radios made by Motorola, Damm, Hytera, and others and is embedded in critical infrastructure like pipelines, railways, and the electric grid.
Image
6
1,379
Replying to
These vulnerabilities are not just theoretical. TETRA radios are used in 2+ dozen critical infrastructure systems in the US. - Electric Utilities - A State border control agency - An oil refinery - Chemical plants - A major mass transit system on the East Coast.
Image
8
1,150
Replying to
The researchers plan to present their findings at the BlackHat They plan to release a detailed technical analysis and the secret TETRA encryption algorithms that have been unavailable to the public until now.
Image
3
1,133
Replying to
TETRA is also used in specialized systems sold exclusively to police forces, prison personnel, military, intelligence agencies, and emergency services. This includes the C2000 system used by Dutch police, fire, ambulance, and the Ministry of Defense. 🚓🚑
Image
8
1,103
Replying to
The researchers also found a second vulnerability that could let someone decrypt encrypted voice and data communications and send fraudulent messages. This could be used to spread misinformation or redirect personnel and forces during critical times. 📡
1
1,076
Replying to
The researchers discovered these vulnerabilities in 2021 but agreed not to disclose them publicly until radio manufacturers could create patches and mitigations. BUT Not all of these issues can be fixed with a patch. It's not clear which manufacturers have prepared them.
3
994
Are you actually relaxing? Or are you just shutting down and disassociating because you’re stuck from all the stress you’re dealing with? I know my answer!
27
872
Hey friends - I won't be drinking in Vegas this year. I'd appreciate support in this matter and not trying to force me to because I'd still like to hang out with you and I won't if that nonsense goes on. Generally good advice to not do that since you don't know someone's reasons
43
791
If you're an experienced security pro in Vegas this week I've got 2 challenges for you. 1. Watch one talk you know NOTHING about. Like barely understand the title. 2. Find at least one student or much younger pro and buy them a meal/coffee/drink and let them ask you questions.
29
788
The rookie years breaking into infosec are rough. I felt like an idiot most of the time. Didn't understand the acronym soup. I couldn't even figure out what to ask half the time. I was so lost. Here are 13 infosec career hacks I wish I had known when I was getting started:
19
887
I remember sitting in the crowd in Miami when Barnaby Jack used a Pringles can antenna to scan the audience for insulin pumps. He found one, and informed the gentleman who stood up he could make his pump dispense all of its insulin right now from the stage.
Image
17
816
Replying to
The first vulnerability the researchers found was the backdoor in TEA1. All four TETRA encryption algorithms use 80-bit keys, but TEA1 has a feature that reduces its key to just 32 bits. The researchers were able to crack it in less than a minute using a standard laptop
5
807
Here is an interesting bit about the stolen MSA signing key from the China/Microsoft Incident this week: MS doesn't know how the hackers stole it.
15
751
Replying to
TETRA was developed in the ’90s by the European Telecommunications Standards Institute (ETSI) The standard includes four encryption algorithms—TEA1, TEA2, TEA3, and TEA4
4
696
🚨 Over 250,000 Fortinet firewalls publicly accessible on the Internet. They just dropped a patch for a major Remote Code Execution vulnerability. ...and then announced the vuln may have been used in attacks already. Lets dive in 👇
Image
13
686
Replying to
The second major vulnerability isn’t in one of the secret algorithms... it affects all of them. The issue lies in the standard itself and how TETRA handles time syncing and keystream generation. This could allow an attacker to intercept and decrypt communication.
1
649
🔥 Thousands of container images on Docker Hub are leaking confidential secrets! We've seen this a lot on GitHub repos, but it seems there is another growing way to accidentally publish private keys... Your container images. Let's look at what's going on:
13
627
Replying to
As for fixes... ETSI fixed the keystream/timestamp issue in a revised TETRA standard published last October, and they created three additional algorithms for vendors to use, including one that replaces TEA1 However, the problem with TEA1 cannot be fixed with an update
1
547
OH: "Whats MFA?" "Multi factor auth" "oh, I'm used to 2fa. is 2fa like bi and mfa like pan?" "yes. mfa is the pansexual authentication
8
471
Tabletop scenario: your infosec team has pooled for the billion dollar lotto jackpot and won. They all quit tomorrow. What do you do?
92
408
I'm missing a department presentation called "What is Burnout" because I've been pulled into some urgent meetings. Alanis Morissette take note.
11
380
Wow! Interesting data. When launched security alerts they were tracking 500k known vulnerabilies. Shorty after alerting repo owners, 450k of them were fixed.
Quote
Our Data Team looked at how many vulnerabilities you've responded to (and how quickly you resolved them) since security alerts were introduced last year. Hint: You've responded to a lot of vulnerabilities 👏 blog.github.com/2018-03-21-sec
8
380
Grateful to work for a company that gives new Dads paternity leave to spend time figuring it all out during the first year. Seems my little girl is grateful too.
Image
19
364
Looking for a Security Data Engineer @ Reddit - can be remote. Build logging and SIEM/SOAR pipelines and workflows. Cool threat detection automation slice and dice stuff. Cloud heavy. DM me for link to apply. RT pls!
18
385
My buddy texted me saying he gave 90 day notice but got walked out the door. The straw that broke his back? He called out sick on Monday because his daughter was exposed to Covid with symptoms. His boss said “no” - ok I quit then. The great resignation and power shift is real.
15
360
Hear me out. What if we didn’t have a system reliant on someone elderly surviving cancer and working till the last possible day in order for democracy to not die a fiery death?
12
344
Security people mocking a company for not patching a known vulnerability, claiming how easy it was, have obviously never worked blue team.
25
327
Most important news I've discovered in months. LAX has dedicated pups for you to pet during your layover. 2 super sweet pits made my day.
Image
6
290
Tabletop exercise of the day: You lead a small security team for a tech startup No Active Directory or mail servers, but a fleet of macbooks and SaaS apps You hear mumblings of some weird Slack DMs & later a teammate texts you saying they have a ransomware message. What next?
87
328
Badass security job alert: I'm looking for a Sr. Security Engineer - Would be working on our detections, threat hunting, automation, siem/soar, etc. Reports to head of the SOC Small team, lots of room to grow and make it your own. Going to be picky on this one. Key role. pls RT
18
309
I stopped drinking right before blackhat and it was rough. Today is 9 months sober. Fitting that it’s an anniversary during RSA.
Image
33
273
Replying to
Even macOS Root users can't access the microphone or screen recording unless the app has direct user consent or manually granted permissions. But this newly discovered weakness in Telegram's macOS application can sidestep that security measure.
8
277
Barista asked me what “k8s” was on my RUN K8S shirt. Instinctively said “Kubernetes” and realized how unhelpful that was. What would you have said?
116
273
If you read the Dragos breach disclosure and didn't immediately ping your IT team to ask them how they're verifying new hires are who they say they are... ...what are you waiting for?
8
267
You only have 18 summers with your kid at home. A friend told me that over coffee in SF a few weeks ago and I can't get it out of my head. Don't wait to take that trip, see that show, buy that tent...
15
252
Replying to
The weakness was discovered in February, and despite attempts to alert Telegram's security team, the issue remains unresolved. The vulnerability was publicly disclosed today after the grace period with VINCE expired.
3
244
Tabletop Thursday: You wake up to find out your main domain wasn't on auto-renew, and someone snagged it. It's tied to your primary email, aka all password reset power. The person who snagged it isn't responding to comms to repurchase it. What do you do?
55
231
🚨 Woah. Crazy spyware analysis just dropped. Triangulation iOS spyware that targeted Kaspersky employees. Upon analysis, this implant might work on macOS as well. Lets dive in! 👇
2
220
Just because you don’t workout today doesn’t make you a piece of shit. You’re a piece of shit for so many other reasons.
14
194
Tabletop scenario time: Your IT staff is doing new hire onboarding Monday morning and they think 1 of the 6 new hires might be an impersonator. They claim to not have got the laptop in the mail but are trying to do orientation and need Slack and Email. What do you do?
51
210
Replying to
The weakness involves macOS's Transparency, Consent, and Control (TCC) mechanism. This mechanism manages access to "privacy-protected" areas in macOS, which Telegram's vulnerability can exploit.
1
205
🎲 Tabletop scenario time! You're the CISO of a major corporation. Suddenly, you discover stalkerware on an executive's endpoint. But wait, there's more! The stalkerware's c2 itself is breached, and the collected data leaks to the dark web. What do you do?
52
196
It turns out not enough houses burned down for FEMA to declare it a disaster and give me any money. My house didn’t burn down any less just because another neighborhood nearby still stands. Strange rules.
19
179
Replying to
iOS requires an app to be signed with Hardened Runtime entitlement to be uploaded to the App Store macOS doesn't have this requirement This loophole can potentially leave macOS apps more vulnerable.
4
182
Whelp. Whole house has Covid. Positive test back. I’m completely fine and asymptotic. The rest are mild colds. Hunkering down.
56
165
Replying to
What makes an application like Telegram susceptible to this? It comes down to Entitlements and Hardened Runtime. Entitlements are permissions given to a binary to obtain certain privileges like accessing the microphone. Hardened Runtime prevents certain types of exploits.
2
179
wow! thats new. all signs point to a scam but it was by a legit employee committing fraud for quota incentives.
Quote
Woah, first time getting scammed from a real @Att employee directly. I only caught this because I got suspicious and started digging Here's what happened...
4
179