lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAAHcKrqAB56RikRKK1rr892nUU_bP8Zn=JjBSLmG_pA8E48-gA@mail.gmail.com>
Date: Thu, 10 Apr 2014 11:35:05 +0100
From: Jeff Sergeant <jeffuk@...il.com>
To: alfiej@...tmail.fm
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] When two-factor authentication is not enough

The fact they've clearly mapped out Gandi's processes to find the weak link
(The apparent opt-out to the email change request, real or not) and add
noise to exploit it makes it clear that someone put a lot of work into
this.  Pretty much a textbook example of the 'APT' we're always warned
about.

Good save!




On Thu, Apr 10, 2014 at 9:01 AM, Alfie John <alfiej@...tmail.fm> wrote:

> The story of a failed attempt to steal FastMail's domains:
>
>
> http://blog.fastmail.fm/2014/04/10/when-two-factor-authentication-is-not-enough/
>
> tl;dr: Pay attention next time you get a flood of emails. The flood
> could part of a larger plot to distract you from something you should be
> paying attention to. In other words, learn to spot misdirection:
>
>   https://www.youtube.com/watch?v=GZGY0wPAnus
>
> Alfie
>
> --
>   Alfie John
>   alfiej@...tmail.fm
>
> _______________________________________________
> Sent through the Full Disclosure mailing list
> http://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ