Garin Pace

2.6K posts

Garin Pace

Garin Pace

@Garin_Pace

I like figuring out how things work. I work in the infosec & privacy (cyber) insurance space as an underwriter. Views are my own and not my employer’s.

Katılım Eylül 2015
850 Takip Edilen363 Takipçiler
Sabitlenmiş Tweet
Garin Pace
Garin Pace@Garin_Pace·
@codywamsley @jeremiahg @JeffreyLS172 Some - myself included - think that this year may be the year that the falling rates, increasing coverage and threat (recent ransomware spikes) make the market have a largely unprofitable year. Folks who are judging cyber insurance profit on pre 2013 facts need to re-examine!!
English
2
0
1
0
Garin Pace retweetledi
Rachel Tobac
Rachel Tobac@RachelTobac·
My favorite way to hack in my ethical hacking is phone call based hacking with impersonation. Why? Because it has the highest success rate. This is what we're seeing in the wild right now, too. Let's talk about how phone call attackers think and how to catch Scattered Spider style attacks for Insurance companies (that are heavily targeted right now, Aflac recently) 1. *Impersonating IT and Helpdesk for passwords and codes* They pretend to be IT and HelpDesk over phone calls and text message to ask for passwords and MFA codes or credential harvest via a link 2. *Remote Access Tools as Helpdesk* They convince teammates to run business remote access tools while pretending to be IT/HelpDesk 3. *MFA Fatigue* They will send many repeated MFA prompt notifications until the employee presses Accept 4. *SIM Swap* They call telco pretending to be your employee to take over their phone number and intercept codes for 2 factor authentication
Sean Lyngaas@snlyngaas

NEW --> Aflac is breached by cybercriminals in the latest hack of insurance industry that bears the hallmarks of Scattered Spider: prnewswire.com/news-releases/…

English
11
61
237
62.1K
Garin Pace retweetledi
Heather Adkins - Ꜻ - Spes consilium non est
Sondeos Global, an SMS gateway provider, compromised. Delivers OTP codes over SMS for million of people... I can't say this enough: it's time to deprecate SMS for 2FA!
DET SYNTETISKE PARTI@Estemuchacho1

Sondeos Global, un gateway SMS, confirmó un acceso no autorizado a sus servidores el 24 de marzo. a vulnerabilidad permitió capturar tráfico de SMS en tiempo real, afectando a clientes con OTP y otros mensajes.

English
0
26
34
12.2K
Garin Pace
Garin Pace@Garin_Pace·
@a_greenberg “We’re supposed to make any exceptions,…”? Freudian slip?
English
0
0
1
152
Garin Pace
Garin Pace@Garin_Pace·
I muted someone. Yet when they repost someone else’s post I see the original and that they reposted it. That seems odd.
English
0
0
0
63
Garin Pace
Garin Pace@Garin_Pace·
@PyroTek3 So…this is another opportunity for folks to misconfigure and create impacts they don’t fully understand?
English
2
0
4
636
Garin Pace
Garin Pace@Garin_Pace·
@AlyssaM_InfoSec @joshcorman I think carriers claiming to have access to “insights” is more marketing, though change is afoot. There are insurers out now buying or forming their own IR firms. And outside US it’s more likely to get detail, but US is biggest insurance market and location of ransomware victims.
English
1
0
0
54
Garin Pace
Garin Pace@Garin_Pace·
@AlyssaM_InfoSec @joshcorman I work at one of the bigger cyber insurers; we don’t have the access to forensics data the world thinks we do. The privilege thing in the US really hurts and it’s more common not to get detailed info about incidents we pay on than it is to get it.
English
2
0
1
77
Garin Pace retweetledi
Jim Sykora
Jim Sykora@JimSycurity·
@rucam365 - Don't use them. 99.9% tasks performed w/ these roles don't require them & can be delegated w/ least privilege. - If you must, only use from a Privileged Access Workstation (+ MFA, long unique PWs, cert-based auth) - Never leave priv account creds/tokens where they can be stolen
English
2
3
45
2.8K
Garin Pace retweetledi
Brett Callow
Brett Callow@BrettCallow·
An American Hospital Association survey reported on March 15 that almost 60% of respondents say the revenue impact is $1 million per day or higher, and 44% said the adverse effects on revenue will continue for two to four more months. #ransomware scmagazine.com/news/change-he…
English
0
7
5
1K
Garin Pace
Garin Pace@Garin_Pace·
@ebailey1367 @cisonaut @anton_chuvakin Can you share more on the segment of the market you see? My experience is rates have been falling, even before accounting for reduction in risk from control effectiveness. That doesn’t match the current threat, of course, but the market is the market.
English
0
0
0
24
Ed Bailey
Ed Bailey@ebailey1367·
Strong programs are seeing higher costs but not terrible. The weaker programs are seeing much higher premiums 4-5x but still not high enough to implement a serious security program. It’s too easy to practice check the box security and hit all the controls insurance companies want to see like do you have an MDR, do you have a SIEM but still have a super weak program. Though recently was introduced to a unicorn insurance auditor who was an actual security expert and his report was unkind to put it mildly and made the company pay attention.
English
1
0
0
39
Dr. Anton Chuvakin
Dr. Anton Chuvakin@anton_chuvakin·
Somebody cynically pointed out to me that some orgs have literally millions to pay ransom but cannot find any money for security. (1/3)
English
29
50
372
61.1K
Garin Pace retweetledi
Fabian Wosar
Fabian Wosar@fwosar·
Since people continue to fall for the ALPHV/BlackCat cover up: ALPHV/BlackCat did not get seized. They are exit scamming their affiliates. It is blatantly obvious when you check the source code of the new takedown notice. You will see code like this.
Fabian Wosar tweet media
English
5
53
241
74.4K
Garin Pace
Garin Pace@Garin_Pace·
@UK_Daniel_Card @joetidy Fully agree; “you’re paying criminals for a promise?”. However, the “there business depends on their reputation” crowd pushes hard, and it’s also hard to not spend money towards helping the folks whose data was compromised (customers I mean).
English
0
0
2
102
mRr3b00t
mRr3b00t@UK_Daniel_Card·
@Garin_Pace @joetidy yeah i can imagine some do.... I always say... once it's copied... it's copied.. so you know...
English
1
0
0
263
Joe Tidy BBC News
Joe Tidy BBC News@joetidy·
“LockBit has caused enormous harm and cost. No longer”.
Joe Tidy BBC News tweet media
English
2
19
172
34.5K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
@joetidy i don't think anyone really pays for that. they pay because their backups are fked. I've never seen personally anyone consider paying when there are available data recovery methods (only my small slice of the view)
English
4
0
28
5.5K
Garin Pace retweetledi
Joe Tidy BBC News
Joe Tidy BBC News@joetidy·
Very interesting - NCA says that whilst searching through seized servers of LockBit they found data belonging to some victims who had already paid the gang's ransom. So - more evidence that paying these criminals does not mean that your data is deleted as they promise.
English
13
114
457
261.3K
Garin Pace
Garin Pace@Garin_Pace·
Every company who says they “identified a cybersecurity incident” when they really mean “we identified ransomware encrypted our files when stuff stopped working” makes me (irrationally?) angry. You didn’t identify anything until the threat actor wanted you to.
English
0
0
3
123
Garin Pace
Garin Pace@Garin_Pace·
It wasn’t a cyber insurance policy
English
1
1
2
191
Garin Pace retweetledi
Brett Callow
Brett Callow@BrettCallow·
Production at the maker of Chrysler, Dodge, Jeep and Ram models is being affected after a cyberattack on an automotive supplier disrupted its operations, the automaker said Monday. #Ransomware? detroitnews.com/story/business…
English
0
6
13
23.2K