Wow. If SANS can’t keep their systems secure, what hope do the rest of us have? Looks like somebody sent a malicious Office 365 add-in to a SANS emplo
[See the full post at: SANS Institute security breach]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
SANS Institute security breach
Home » Forums » Newsletter and Homepage topics » SANS Institute security breach
- This topic has 7 replies, 6 voices, and was last updated 4 years, 10 months ago.
Tags: SANS Institute breach
AuthorTopicViewing 3 reply threadsAuthorReplies-
anonymous
Guest -
Nibbled To Death By Ducks
AskWoody PlusAugust 11, 2020 at 7:05 pm #2288037Wow. If SANS can’t keep their systems secure, what hope do the rest of us have?
Truly, it lends another meaning to the maxim, “Quis custodiet ipsos custodes?” (Who will guard the guardians?)
I think I just heard another pillar of civilization hit the ground…
What a way to start the week…
- Security issues and CVE’s galore
- Our state just reported Covid under counts due to a “system glitch”
- The State Public Health Officer just resigned
- In our county, all servers dealing with Social Services seem to be down.
Helmets and armor on, all, it’s gonna be a bumpy week.
Win7 Pro SP1 64-bit, Dell Latitude E6330 ("The Tank"), Intel CORE i5 "Ivy Bridge", 12GB RAM, Group "0Patch", Multiple Air-Gapped backup drives in different locations. Linux Mint Newbie
--
"The more kinks you put in the plumbing, the easier it is to stop up the pipes." -Scotty-
This reply was modified 4 years, 10 months ago by
Nibbled To Death By Ducks. Reason: Clarity
-
Paul T
AskWoody MVPAugust 12, 2020 at 3:32 am #2288090We had a discussion about this recently.
https://www.askwoody.com/forums/topic/forwarding-exchange-emails-to-a-private-email-account/cheers, Paul
-
dmt_3904
AskWoody LoungerAugust 12, 2020 at 7:56 am #2288127If SANS can’t keep their systems secure, what hope do the rest of us have?
I am thinking just this thought! It’s so scary. I consider myself better than average when it comes to security and I think I am very careful. But I make mistakes, of course, and big ones! It is hard to remain constantly, consistently vigilant!! E.g. I might, could fall for something like this, as described in bleeping computer, where it appears that MS is asking for permission, see graphic below this sentence in the article: SANS has not provided much information about this add-on, but it likely an Office 365 Oauth app used to gain persistence to the email account.
sometimes I am quick to click, without thinking. How are we to best protect ourselves? Just don’t click, ever? Never ever click a link in an email? Guard against malicious websites. Run antivirus. What else can we/should we be doing? I run windows defender & Malwarebytes premium on Windows. I only go to known websites. I try to do all web browsing on iOS and I check links on virus total before clicking. But, really how can we protect ourselves? What other advice do you all have?
-
Nibbled To Death By Ducks
Guest -
Ascaris
AskWoody MVPAugust 12, 2020 at 6:01 pm #2288239sometimes I am quick to click, without thinking. How are we to best protect ourselves? Just don’t click, ever?
It can be hard, but you have to try to not click without thinking. If you see a permission dialog or warning message, stop to think what it is that is asking for permission, what it is asking for permission to do, and if that is reasonable given what you are doing. I haven’t seen this particular thing, as I’ve never used Office 365, but I have seen web pages that claim to have a “great” Firefox addon, and they exhorted me to accept the installation when the permission dialog came up.
I hadn’t asked to download an addon, and the site had not redirected me to the Mozilla addon site to serve up the addon, so there’s no way I would find that reasonable. If in doubt, don’t allow it.
The sample authorization dialog on Bleeping Computer would trigger the same kind of questions. Did I initiate some kind of action that would trigger this? Who is the party listed, and why do they want access to my files? If you have not initiated some kind of connection to your Office account, meaning that a dialog like this was expected, decline it. It’s similar to receiving a file from an unknown source… if you receive an authentication dialog from an unknown source, treat it the same way. If you were not expecting it, don’t accept it.
I don’t know what others use for email, but I use Thunderbird, and when I mouse over a link in an email, I can see in the status bar where the link is actually pointing. It’s a trick of scammers and other miscreants to put a link whose text is something like http://www.google.com, but the link itself actually points to something like 85.fdfrgr.net, or something equally not google.com-ish. I always look at a link’s target before clicking.
Unfortunately, not even seeing a recognized sender in the From: field means that everything contained in the email is safe, even if the person listed is trusted. I’ve received emails from previously trusted individuals that seemed suspicious… links to sites I had never heard of just suddenly arriving, without any context, or file attachments in the same way. The last one I received was an office document with a macro in it, which immediately made me highly suspicious. I don’t have Office, but I suspected strongly that the person whose computer sent that attachment does, and that they had themselves run the Office macro and become infected. It must have read the person’s address book and sent more copies of itself to everyone in there.
I sent them an email advising them that they were likely infected with an Office macro malware, and that they should take action accordingly to remove it and prevent it from trying to spread itself further. I never got a reply, but I also did not get any more malware from them.
Just think of NO as your default answer for anything asking for permission to do anything on your PC. If it has to ask, it should be either something you were expecting to ask for permission, or else the answer is NO. It can be easy to develop a habit of saying YES, and I fell victim to that once myself, despite my efforts to maintain the right mindset. I had a host intrusion prevention system (HIPS) installed as part of my firewall and antimalware suite, and I had it set to alert on every little thing that could be malware. Anything that was normal given what I was doing could be remembered in that context so that it would not ask next time, but each program had its own permissions, so that a slight change would result in the same alerts as last time. I made an effort to diligently read each alert and think about it rather than just accepting without thinking, and for years the only alerts were normal things.
One day, though, I went to what should have been an innocuous web site, but it had some strange cryptic text about drug use, and immediately my HIPS alerted. The force of habit engaged, and I automatically hit “accept,” even though part of my mind was yelling, “Stop! Stop!”
As soon as I accepted it, I knew I’d messed up. I’d actually known before that, but I was powerless to stop the habit, rolling on its way like a boulder rolling down a mountain.
I immediately hit the tray icon to stop all traffic, then unplugged the ethernet cable from the back of the PC (no wireless on that one). The malware had not gotten far after my first “accept,” as even the simplest thing often triggered a series of prompts for each thing it was doing in succession. The second prompt was already there before I even managed to turn off the net traffic, and that one was triggered by the malware trying to set a registry entry, presumably to autorun itself at boot time. I hit “block and terminate,” and it terminated the malware process.
I found the malware by looking in the HIPS logs, and I zipped it with a password and emailed it to several security companies according to their procedures. One emailed back a day or two later and said it was a previously unknown malware and that it was added to their detection database. It had managed to get in to my system via the Java plugin (not Javascript), a plugin known today for being a security risk (at least as bad as Flash, maybe more). It’s also largely obsolete now, but back then, most people used Java, and most people who ran XP did it with admin privileges, as I did. Fortunately my HIPS did its job, even though I could have performed better. At least it alerted me that something was going on.
I would have thought that I would have answered correctly when the time came, but I didn’t. Still, the habit of inspecting things and thinking about what I was doing did stick… even as I acted by force of habit, the conscious part of my mind was analyzing and came to the correct conclusion that this was probably actual malware and not a false alarm. I’d probably been robotically hitting Accept and concluding (rationally) that whatever it was that I ‘d accepted was okay after the fact for some time, but not really been aware the timing was off. This just happened to be the first time the habit and the analysis that happened afterward disagreed.
Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11) -
dmt_3904
AskWoody Lounger
-
-
Viewing 3 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
How to get Microsoft Defender to honor Group Policy Setting
by
Ralph
4 hours, 12 minutes ago -
Apple : Paragon’s iOS Mercenary Spyware Finds Journalists Target
by
Alex5723
4 hours, 51 minutes ago -
Music : The Rose Room – It’s Been A Long, Long Time album
by
Alex5723
5 hours, 57 minutes ago -
Disengage Bitlocker
by
CWBillow
7 hours, 21 minutes ago -
Mac Mini M2 Service Program for No Power Issue
by
Alex5723
7 hours, 56 minutes ago -
New Win 11 Pro Geekom Setup questions
by
Deo
9 hours, 41 minutes ago -
Windows 11 Insider Preview build 26200.5651 released to DEV
by
joep517
15 hours, 12 minutes ago -
Windows 11 Insider Preview build 26120.4441 (24H2) released to BETA
by
joep517
15 hours, 13 minutes ago -
iOS 26,, MacOS 26 : Create your own AI chatbot
by
Alex5723
19 hours, 8 minutes ago -
New PC transfer program recommendations?
by
DaveBoston
1 hour, 30 minutes ago -
Windows 11 Insider Preview Build 22631.5545 (23H2) released to Release Preview
by
joep517
23 hours, 13 minutes ago -
Windows 10 Build 19045.6029 (22H2) to Release Preview Channel
by
joep517
23 hours, 14 minutes ago -
Best tools for upgrading a Windows 10 to an 11
by
Susan Bradley
11 hours, 33 minutes ago -
The end of Windows 10 is approaching, consider Linux and LibreOffice
by
Alex5723
8 hours, 55 minutes ago -
Extended Windows Built-in Disk Cleanup Utility
by
bbearren
30 minutes ago -
Win 11 24H2 June 2025 Update breaks WIFI
by
dportenlanger
1 day, 18 hours ago -
Update from WinPro 10 v. 1511 on T460p?
by
CatoRenasci
16 hours, 7 minutes ago -
System Restore and Updates Paused
by
veteran
1 day, 20 hours ago -
Windows 10/11 clock app
by
Kathy Stevens
1 day, 7 hours ago -
Turn off right-click draw
by
Charles Billow
1 day, 23 hours ago -
Introducing ChromeOS M137 to The Stable Channel
by
Alex5723
2 days, 3 hours ago -
Brian Wilson (The Beach Boys) R.I.P
by
Alex5723
21 hours, 22 minutes ago -
Master patch listing for June 10, 2025
by
Susan Bradley
2 days, 5 hours ago -
Suggestions for New All in One Printer and a Photo Printer Windows 10
by
Win7and10
1 day, 7 hours ago -
Purchasing New Printer. Uninstall old Printer Software First?
by
Win7and10
2 days, 11 hours ago -
KB5060842 Issue (Minor)
by
AC641
23 hours, 12 minutes ago -
EchoLeak : Zero Click M365 Copilot leak sensitive information
by
Alex5723
2 days, 18 hours ago -
24H2 may not be offered June updates
by
Susan Bradley
1 day, 10 hours ago -
Acronis : Tracking Chaos RAT’s evolution (Windows, Linux)
by
Alex5723
3 days, 6 hours ago -
June 2025 updates are out
by
Susan Bradley
12 hours, 13 minutes ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.