Hamzah 'Lateef

4.1K posts

Hamzah 'Lateef banner
Hamzah 'Lateef

Hamzah 'Lateef

@password_ng

Cyber | Security Operations & Engineering. coordinating @ngwhitehat, building @cyberplural. CISO of Nigeria 🇳🇬

🌍 Katılım Nisan 2011
111 Takip Edilen1.2K Takipçiler
Sabitlenmiş Tweet
Hamzah 'Lateef
Hamzah 'Lateef@password_ng·
Every little piece of #information or #data you dropped somewhere on the Internet is a piece of the puzzle named YOU. When the time is right, they can always be brought together. Don't forget You are your data! #CyberAware
Abuja, Nigeria 🇳🇬 English
1
44
91
0
Hamzah 'Lateef
Hamzah 'Lateef@password_ng·
100/365. April 10th, 2026.
English
0
0
0
20
Black Jaguar
Black Jaguar@A_Feranmi·
Regulators are treating this hack in a funny way. If it was a fintech, particularly a crypto one, all hell would have been let loose.
English
6
50
163
17.5K
Gerald Okolie Esq. (KSM)
@A_Feranmi Okay. I read about it. I was thinking it's Afrinvest. So many hacks in the last coupla weeks. We are observing the regulators.
English
2
0
0
439
Hamzah 'Lateef
Hamzah 'Lateef@password_ng·
Alright, based on what was published , the internal recon section captured all the subnet on which the Kubernetes sit, the naming convention in use, and at the same time some specific service names, which I am aware was extracted from the images the attacker posted. Just as it is not that easy to change infrastructure detail for an attacker so it is not for victims, some of these information will still continue to be in use internally even after the recovery from the incident. And anyone can come up back to you website to look it up for whatever they are planning next. On the amplification issue, permit me to ask you a simple question at this point. Can you point out a single customer record from the data you analyzed as released by the attacker? The attacker claimed 900K without a single sample to be presented! Samples was given for the employees because he truly had it. Samples was given for the CEO's financial record, and others. Records targeted was that of the bank leadership at Sterling with their financials, and PII, no single evidence in file or screenshot indicates record of other customer ( the attacker having this remain an hypothesis). And in addition 3010 employees data was exfiltrated with evidence provided. Note that attacker's claim most time is to add pressure and I can show you evidence right here on X where the attacker asserted to this hypothesis. Record count is good but not great, but let us put it like this, an attacker show us you have 40 servers on a subnet during internal scan of your network. Can you tell from that alone that all 40 servers was accessed and compromised by mere looking at a screenshot. For the S3 bucket 🪣, a 588.25GB file size of KYC service with 657,242 items was shown to us in a screenshot, the question of how much data the attacker access and took from the bucket can only be validated from an internal log which is only available to the affected organization. Hence from here the amount of accessible data, exfiltrated data from the bucket remain an hypothesis that needs to be validated. And to put this in a story now depends on how we want people to see it. On the VM program coverage, if we are out to judge, that can fly, but if we are out to analyze the data based on available information provided by the attacker, no evidence support this - experience also suggest that successful exploitation doesnt mean the program doesn't exist . The bank may also have additional information that we don't about this environment and it govenance program. In cyber we say things only when we are sure to ensure we don't put ourselves and people in trouble. And when we are not sure, we report it as such, especially when we have less evidence corroborating those statements. On the aspect of peer review, we have a similar session tomorrow and I invite you to join by 3PM WAT.
English
2
0
5
449
David Odes
David Odes@chiefdavidsays·
Three weeks ago, a threat actor called ByteToBreach walked through Nigeria’s financial infrastructure using a single unpatched vulnerability at Sterling Bank as the door. What followed was nine days of undetected access with core banking data, sensitive customer information and employee records exfiltrated before the actor pivoted into Remita, Nigeria’s government payment backbone. From Remita they took everything. 3TB of data. Including sensitive and personal information of over a million Nigerians (across both breaches). I spent the last week reconstructing the full attack chain from the artefacts the actor published. I have now produced a narrative investigation on my new substack and a technical analysis on @WebSecurityLab covering the complete breach from the first CVE exploit to the published HSM key directory. This was published in the hope that the lessons from these events prove more durable than the events themselves. Security failures of this scale are painful. They are also, when documented carefully and honestly, among the most valuable contributions one can make to an ecosystem that is still maturing. Nigeria’s banking story is one of the most compelling in the world. It deserves a security culture to match. Read the full investigation here: securityintelligence.substack.com/p/sterling-ban…
David Odes tweet media
English
12
150
284
99.8K
Hamzah 'Lateef
Hamzah 'Lateef@password_ng·
@Xymbiz You know when they say don't try this at home. This is it. If not the body of knowledge (bok) of the certification body will betray you.
English
1
0
0
31
Dr Iretioluwa Akerele
What is that thing you can teach for 30 minutes effortlessly?
English
75
10
95
10.1K
Hamzah 'Lateef
Hamzah 'Lateef@password_ng·
David, you are doing a great work and I recommend you keep it up professionally. You may have given out too much information about the victims that can make them become victim again in your analysis - remember those extra info used in your analysis was lifted from the dark web post and you brought it up now to the surface web. Enough redaction on assets list may be better. I saw those disclaimers but to be very honest it doesn't work like that, so many claims in your writeup, and from the evidence released by the attacker, you may not be able to prove them all. For example, no evidence he took everything in the case of Remitta but you said so, no evidence of the bank not having a VM program covering non-prod environment? No evidence of over 1 million personal record of Nigerians may have been impacted across both breaches. Except you are looking at another data other than what the attacker published himself. This is just to point out a few up there, and to note that in our course to educate and create awareness, we don't let sensationalism take over and misinformation to become the order of the day. This can further damage the digital trust left within the ecosystem and create fear 😨. Thank you.
English
0
0
4
1.9K
Hamzah 'Lateef
Hamzah 'Lateef@password_ng·
In one of the recent cyber breaches, where the org code repo got stolen and the threat actor open sourced it. It appears the practice of writing hardcoded secret to file is still a common practice despite the great harm that could cause in the case of unauthorized access to them. In this scenario, this gives the threat actor opportunity and further access to create more damage for shared infrastructure and laterally move from one victim's environment to the other.
Mari@Tech_girlll

Devs how do you store secrets in your apps? • .env files • Secret manager • Hardcoded • Other

English
0
1
1
202
Hamzah 'Lateef
Hamzah 'Lateef@password_ng·
Phishing is a means to deliver social engineering attack. Other means could be smishing, vishing, device code, etc. One can also say phishing is a type of social engineering but phishing is not all that you can have for social engineering, but it is the primary and most common vehicle. Social engineering can be physical, it can be psychological manipulation to compromise the CIA of a target or information, it can be virtual manipulation to attain chaos in a system by destroying the trust that exist therein, which is classified under virtual societal warfare. It is all about what you want to deliver and how you chose to do it. But the main goal is to get the target to act to your interest, and deliver an environment where you attain control.
kelvinlina𖤍💜✨@cybergirl_io

What's the difference between phishing and Social Engineering ??

English
0
0
1
76
BIG FELA🏅
BIG FELA🏅@iamfelabadan·
@password_ng Exactly, me doing device timeline analysis is part of Digital forensics too
English
1
0
1
120
Hamzah 'Lateef
Hamzah 'Lateef@password_ng·
Digital forensics is not isolated maybe that is why you think many people are not into it. Within the context of incident response, fraud investigation, bringing justice to cyber crime victims and putting criminals behind bars - you will see digital forensic at play. And I know many people transition into it by starting with roles that set the foundation for success - soc analsyst, incident responder, law enforcement operatives, lawyers, journalist and co.
Code@thebellaacode

Digital Forensics is another interesting area in Cybersecurity. I don’t see much people doing it, dunno why.

English
2
9
48
3K
Hamzah 'Lateef retweetledi
Ozioma
Ozioma@Xymbiz·
There are community of specialist software engineers and all they do is write/create malware. Here's the thing, they are either writing malware for the criminal market or the intelligence agencies🤔
English
10
5
59
5K
SecInterviewHub
SecInterviewHub@sec_hub93028·
What are the must read books for anyone serious about cybersecurity?
English
8
3
53
6.3K
Hamzah 'Lateef retweetledi
NDPC Nigeria
NDPC Nigeria@ndpcngr·
Press Release! NDPC Investigates Remita and Sterling Bank for Alleged Data Breach.
NDPC Nigeria tweet media
English
36
103
301
27.6K
Hamzah 'Lateef
Hamzah 'Lateef@password_ng·
Why can't Google allow us to set the file sizes we want to back up to our Google Drive? Imagine helping me to do backup of 4GB video from Google Photo Ahha Who sent you people?
English
0
0
0
89