I listened to the Risky Business podcast (episode #700) about the
hacking of the Wagner group, run by Yvgeny Prighozin. The podcast laid
out a pretty interesting story.
At a high level, it sounded pretty cool - a google-less Android image on
their phones, an OpenVPN mesh network, and an opsec-aware head who used
a Psion device for tracking.
Then, the wheels came off the story.
Windows XP. Self-signed certs on the OpenVPN links. Use of free hosting services. Free Avast AV. Teamviewer. Skype. Psion PDA backups stored on
a file server on the network.
Not ideal opsec for a multi-faceted company with potentially shady
dealings going on.
There's more information (a lot more) about Prighozin's businesses
spanning restaurants, hospitality, security services, a troll farm,
retail and more - and their IT shared infrastructure at
https://dossier-center.appspot.com/prig-it/
It did make me think about how to make a properly secure a shady
network. There's a bounty of open-source collaboration and comms tools
out there now, along with industry standards for encryption and
well-documented best practices. Hell, the NSA publishes guidelines on
how to secure your networks!
And, I want a Psion PDA. :)
... All of my certifications are self-signed.
--- MultiMail/Win v0.52
* Origin: realitycheckBBS.org -- information is power. (700:100/20)