Image

Image

Oversharing is a risk, one an adversary will capitalize on.
Even attackers make mistakes. Sometimes these are insignificant but provide a breadcrumb trail for investigators to dismantle criminal operations. In the case of Paige A. Thompson AKA “erratic,” they committed a significant OPSEC fail which led to their immediate arrest. In July 2019, Paige was arrested by the FBI on suspicion of illegally accessing and downloading data relating to over 100 million credit card applications from Capital One in the US. However, Paige AKA “erratic” made little to no effort to hide her identity boasting about the hack on Twitter. Information about the attack was posted on her Github account. This linked to her Gitlab, which contained her CV and all her personal information. It was also reported that details of the Capital One breach and other companies was also posted on a erratic’s Slack channel called Netcrave Communications. There was literally no effort to hide the breach or erratic’s real identity, leading to a swift arrest by the FBI.Image

Image

- Provided an adversary (law enforcement), evidence that could be used to their advantage
- Linked real identities to Pseudomys- massive OPSEC fail!
- Zero consideration for their Privacy (AND) Anonymity, including admitting on public channels to allegedly conducting the attack.
Identify, Analyse, Deny - The mindset and process of OPSEC
Protecting information from the adversary is not as simple as creating a Strong Passwords, MFA (although this is helpful), multiple identities (Pseudonyms) and using VPN/Tor etc. It's about understanding your exposure and what is not only valuable to you but also an attacker. There are three stages for protecting what you care about from the enemy. These are Identify, Analyze and Deny. In this article, we are going to cover Identify. The other stages will be covered in Part III.Identify
“The important thing in strategy is to suppress the enemy's useful actions but allow his useless action” - Miyamoto Musashi, 1584-1645 Identifying information about yourself, what form it’s in and where it resides is the first step in performing OPSEC. You can’t protect what you don’t know about. The best way to remedy this is to perform open source Intelligence (OSINT) on yourself, with the emphasis on thinking like an adversary. Understanding and building a picture of your own digital footprint is both an enlightening and terrifying experience when you undertake this for the first time.Search Engines
So where should you start? The obvious place is search engines. Start with Google and DuckDuckGo. For example, let's see what search engines can find just on your name try the following searches first:- “Your Name"
- Intext:“your name”
- Inurl:”your name”
- Filetype:.doc intext:“your name”
Image

Image

Images
Next, we may want to look at where our images reside or where these are being used by an attacker. If you have a larger digital footprint, your profile may already be in use by dating scammers or fraudsters without you even knowing. There are a couple of really good reverse image tools you can use detailed below:- https://www.tineye.com/ - great reverse image tool, fairly good results with this in the past.
- https://berify.com/ - another reverse image search tool
- https://images.google.com/ - Google’s image search is still very powerful
Image

Image

Image

Case Study
A good case study is from @thecyberviking, an expert on Open Source Intelligence. He was challenged by @rag_sec to find her location from a redacted image posted on Twitter.Image

Image

Image

Image

Image

Image

Image

Data Dumps and Username Searches
The next step is trying to establish where you are exposed in Data Dumps from any third party services and applications that have been breached. Attackers will use these to understand how you construct passwords and whether you reuse passwords. They will then use the information to perform account takeovers known as ATO’s. There are many useful resources to assist you. Here are a few well known ones:- https://haveibeenpwned.com/ - will only show where your accounts have been involved in a breach. It's a free service and requires no sign up. However, it is recommended that you subscribe to receive alerts.
- https://hacked-emails.com/ - requires you to sign up, but will show where accounts and passwords have been breached.
- https://spycloud.com/ - requires you to sign up and will show where accounts have been breached. This is a paid service
- https://ghostproject.fr/ will show for free where your accounts are breached but requires you to sign up to see all the results. This is a free service and limited to the Collection Dumps only.
Image

Image

- https://github.com/jivoi/awesome-osint
- https://github.com/twintproject/twint
- https://osintframework.com/
- https://jakecreps.com/
- Privacy vs Anonymity
- Deleting yourself from the internet
- Covering your tracks (reducing your footprint and anti-tracking techniques)
- Tools and Services
- Creating Sock Puppets and Pseudonyms
- And much more.
About the Author
Image
