There are some neat TTPs that I don’t use frequently, and if the time arises, I need to dig up details again. So, I figured to write some of them down, starting with SSH Agent Hijacking.
What is SSH Agent Hijacking? Short story, if you have keys added to an SSH Agent an adversary with root permissions can use them. If you forward the SSH Agent to another host, an adversary with root permission on that other host can exploit and leverage your keys as well.
The key behavior that we are highlighting this week for Cybersecurity Awareness Month is using strong passwords and a password manager. In today’s blog we interviewed NIST’s Connie LaSalle, a senior technology policy advisor, and she offers four specific ways to mitigate your cybersecurity risks online while discussing the importance of adopting strong passwords. Take a look at her responses to our questions below… This week’s Cybersecurity Awareness Month theme is using strong passwords and a password manager. How does your work/specialty area at NIST tie into this behavior? As a senior
Anne W takes stock of where we are following the changes to Cyber Essentials in early 2022, discussing some of the feedback received and clarifying some common misconceptions.
Summary
Several reputable news outlets have reported on Killnet activities against multiple airports and government agencies across the U.S. and globally presently and over the past several months. The current efforts of Killnet appear to be mainly US airports as identified by a list within a twitter post linked below.
Threat Type
DDoS Campaign
Overview
***UPDATE #1, OCTOBER 10, 2022***
A new post from Bleeping Computer lists the following airports suffering from potential DDoS attacks:
Atlanta (ATL)
Los An
Join Akamai and the Internet Architecture Board to make #shift happen. Let's work together to make life better for billions of people, billions of times a day. #GreenWithAkamai