Ayo

1.4K posts

Ayo banner
Ayo

Ayo

@Pondis_

Cybersecurity || Cloud Security || DevSecOps, AI Security and everything cloud-related || Life-long learner and impact maker. Also a law student

Katılım Nisan 2024
271 Takip Edilen227 Takipçiler
Famous
Famous@Famous_A_A·
GET IN JOOR!!🔥 Just got accepted into @Cyblackorg SOC Academy and I’m beyond excited right now! This is a huge step in my cybersecurity journey, and I can’t wait to sharpen my skills, dive deeper into blue team operations, and level up as a SOC analyst. Special thanks to my mentor @ireteeh for your guidance and support. @jay_hunts @OnijeC @segoslavia @TemitopeSobulo
Famous tweet media
English
22
8
93
1.6K
Becca
Becca@Becca_cyber·
Big win for me 🎉 I’ve been accepted into the Cyblack SOC Academy, a huge step forward in my journey. Excited for the hands-on experience, real-world learning, and growth ahead. Special thanks to my mentor @ireteeh for your guidance and support. @segoslavia @Hubris_savvy
Becca tweet media
English
47
16
252
3.1K
Maryam Shuaibu Aliyu
Maryam Shuaibu Aliyu@Cyberhijabitech·
Hello world. I made it to the top 100 Nigeria LinkedIn creators 🎉💃
Maryam Shuaibu Aliyu tweet media
English
102
147
1.8K
22.6K
Dammy🩷
Dammy🩷@DammyReads·
Good morning🙂‍↔️ I got my acceptance mail this morning!! Thank you my mentor @ireteeh and @Cyblackorg for this opportunity!! Can't wait to get startedd!!!
Dammy🩷 tweet media
English
28
12
133
2.5K
Gabriel Odusanya | Security Engr
2 days ago, I did something very random. I walked into @keystonebankng , not to open an acct, not to fix anything, just to see if I could somehow talk to their IT or Network team and maybe find a way to get some real hands on experience in Network Operations. Thread:
Gabriel Odusanya | Security Engr tweet media
English
19
9
219
17.1K
Peace Dennis
Peace Dennis@Helendeee·
When I started the @cybersafehq API Security program, I knew APIs were the glue holding modern applications together, but I didn’t fully understand how much is at stake when that glue starts to crack.
Peace Dennis tweet media
English
4
2
47
740
Mololuwa | Cybersecurity - (The God Complex)
FCMB: Sophisticated API exploitation resulted in the successful siphoning of ₦677 million from a ₦3.5 billion fraudulent attempt. Sterling Bank: A critical middleware vulnerability enabled the exfiltration of sensitive PII for over 900,000 customers. Remita: A massive cloud misconfiguration exposed 3TB of archival data, including transaction logs and infrastructure blueprints. Here is a clean technical breakdown of these incidents: 1. FCMB: The ₦3.5 Billion Heist This was a logic based exploitation of the bank's digital transaction pipeline Attackers identified a flaw in the API reconciliation layer, specifically involving the Payattitude integration By exploiting this vulnerability, hackers initiated transactions that the system validated as successful even though the source accounts were unfunded. This is known as a Zero Balance or Double Spend exploit. While the system eventually flagged the anomaly at the ₦3.5 billion mark, the latency in the bank's real-time fraud monitoring allowed ₦677 million to be successfully routed to mule accounts and withdrawn before the kill switch was activated. 2. Sterling Bank: The 900k+ Record Exfiltration This event was kinda like a Network Intrusion targeted at customer identity data, allegedly carried out by the threat actor ByteToBreach. The breach targeted a critical vulnerability in the Oracle WebLogic Server. This middleware sits between the public facing applications and the bank’s private databases. Attackers bypassed authentication to extract roughly 2.2 GB of data. The data contained Personally Identifiable Information (PII) for over 900,000 customers, including names, contact details, and internal Customer Information File (CIF) numbers. This data is highly valuable for "Social Engineering 2.0, where scammers use real account details to trick victims into revealing OTPs or other lateral valuable infos 3. Remita: The 3TB S3 Infrastructure Exposure This was a Critical Cloud Misconfiguration representing one of the largest infrastructure level exposures in the Nigerian fintech space A massive Amazon S3 Bucket (Cloud Storage) was left in a Public Read state. This meant the data was accessible to anyone with the endpoint URL, requiring no hacking tools or passwords to download The volume 3 Terabytes indicates an entire archival Data Lake was exposed. This typically includes millions of individual files and logs accumulated over years 800GB+ of KYC Documents, Massive troves of sensitive personal data, including Passports, Government IDs, Bank Statements, and Utility Bills Core Databases: Full exports of MySQL and Postgres databases, including three primary databases and over 35,000+ password hashes The Master Keys: Exposure of Government HSM (Hardware Security Module) keys, which are used to encrypt and authorize high-level financial transactions Developer Blueprints: Source code, Docker registries, and GitKraken-to-S3 backups, providing a literal how-to guide for attackers to find further vulnerabilities in the system's logic The exposure included transaction archives, RRR (Remita Retrieval Reference) metadata, and internal system logs. Most dangerously, logs of this size often leak secrets such as API keys and session tokens, which provide a roadmap for attackers to move laterally into other connected financial systems what can we do
Mololuwa | Cybersecurity - (The God Complex) tweet media
English
32
158
400
39.8K
Ayo
Ayo@Pondis_·
Wow 😲😲😲
Mololuwa | Cybersecurity - (The God Complex)@cyber_rekk

FCMB: Sophisticated API exploitation resulted in the successful siphoning of ₦677 million from a ₦3.5 billion fraudulent attempt. Sterling Bank: A critical middleware vulnerability enabled the exfiltration of sensitive PII for over 900,000 customers. Remita: A massive cloud misconfiguration exposed 3TB of archival data, including transaction logs and infrastructure blueprints. Here is a clean technical breakdown of these incidents: 1. FCMB: The ₦3.5 Billion Heist This was a logic based exploitation of the bank's digital transaction pipeline Attackers identified a flaw in the API reconciliation layer, specifically involving the Payattitude integration By exploiting this vulnerability, hackers initiated transactions that the system validated as successful even though the source accounts were unfunded. This is known as a Zero Balance or Double Spend exploit. While the system eventually flagged the anomaly at the ₦3.5 billion mark, the latency in the bank's real-time fraud monitoring allowed ₦677 million to be successfully routed to mule accounts and withdrawn before the kill switch was activated. 2. Sterling Bank: The 900k+ Record Exfiltration This event was kinda like a Network Intrusion targeted at customer identity data, allegedly carried out by the threat actor ByteToBreach. The breach targeted a critical vulnerability in the Oracle WebLogic Server. This middleware sits between the public facing applications and the bank’s private databases. Attackers bypassed authentication to extract roughly 2.2 GB of data. The data contained Personally Identifiable Information (PII) for over 900,000 customers, including names, contact details, and internal Customer Information File (CIF) numbers. This data is highly valuable for "Social Engineering 2.0, where scammers use real account details to trick victims into revealing OTPs or other lateral valuable infos 3. Remita: The 3TB S3 Infrastructure Exposure This was a Critical Cloud Misconfiguration representing one of the largest infrastructure level exposures in the Nigerian fintech space A massive Amazon S3 Bucket (Cloud Storage) was left in a Public Read state. This meant the data was accessible to anyone with the endpoint URL, requiring no hacking tools or passwords to download The volume 3 Terabytes indicates an entire archival Data Lake was exposed. This typically includes millions of individual files and logs accumulated over years 800GB+ of KYC Documents, Massive troves of sensitive personal data, including Passports, Government IDs, Bank Statements, and Utility Bills Core Databases: Full exports of MySQL and Postgres databases, including three primary databases and over 35,000+ password hashes The Master Keys: Exposure of Government HSM (Hardware Security Module) keys, which are used to encrypt and authorize high-level financial transactions Developer Blueprints: Source code, Docker registries, and GitKraken-to-S3 backups, providing a literal how-to guide for attackers to find further vulnerabilities in the system's logic The exposure included transaction archives, RRR (Remita Retrieval Reference) metadata, and internal system logs. Most dangerously, logs of this size often leak secrets such as API keys and session tokens, which provide a roadmap for attackers to move laterally into other connected financial systems what can we do

0
0
1
36
Ayo retweetledi
esentry
esentry@esentry_mssp·
The Central Bank of Nigeria has directed Deposit Money Banks (DMBs), Payment Service Banks (PSBs), Other Financial Institutions (OFIs), Mobile Money Operators (MMOs), Switching Companies, and Payment Solution Service Providers (PSSPs) to complete and submit the Cybersecurity Self-Assessment Tool (CSAT) within the stipulated timeline. The CSAT exercise is designed to give the regulator a clearer view of how institutions are managing cybersecurity risk across critical areas such as: • Cybersecurity governance and oversight • Risk management frameworks • Incident detection and response capabilities • Third-party risk management • Operational resilience For many institutions, this exercise goes beyond simply filling out an assessment template. It requires a clear understanding of your current security posture, documented controls, and evidence that your cybersecurity practices align with regulatory expectations. Where gaps exist, they need to be identified early and addressed appropriately before submission. Through our collaboration with @cybervergent, institutions can leverage a platform that helps: • Evaluate existing cybersecurity controls • Identify gaps across governance, risk, and operational security • Strengthen responses with structured evidence and documentation • Improve overall cybersecurity maturity and readiness For institutions preparing their CSAT submission, this process provides an opportunity not just for compliance, but for strengthening cybersecurity resilience across the organization. Contact us for enquiries at services@esentry.io #esentry #CBN #CSAT #CybersecurityCompliance
esentry tweet mediaesentry tweet media
English
0
1
1
201
Ayo retweetledi
Gabriel Odusanya | Security Engr
The best time to start your career was last year. Another best time is now, whenever you want to start something just start.
English
1
3
10
151
Ayo
Ayo@Pondis_·
@ireteeh Congratulations ma🎉🎉
English
0
0
0
93
Dr Iretioluwa Akerele
My mentee got into Digiss as a Cybersecurity intern 🥂🥂🥂
Dr Iretioluwa Akerele tweet media
English
22
15
217
7.7K
Ayo retweetledi
Mololuwa | Cybersecurity - (The God Complex)
Fun Fact: the recent spike in cyber attacks and breaches is actually due to inflation, gas and rent is now expensive so threat actors also need more money to pay up Allegedly 🤧
English
5
1
30
844