Subj : Wagner group exposed To : All From : poindexter FORTRAN Date : Thu Mar 23 2023 07:13:00 I listened to the Risky Business podcast (episode #700) about the hacking of the Wagner group, run by Yvgeny Prighozin. The podcast laid out a pretty interesting story. At a high level, it sounded pretty cool - a google-less Android image on their phones, an OpenVPN mesh network, and an opsec-aware head who used a Psion device for tracking. Then, the wheels came off the story. Windows XP. Self-signed certs on the OpenVPN links. Use of free hosting services. Free Avast AV. Teamviewer. Skype. Psion PDA backups stored on a file server on the network. Not ideal opsec for a multi-faceted company with potentially shady dealings going on. There's more information (a lot more) about Prighozin's businesses spanning restaurants, hospitality, security services, a troll farm, retail and more - and their IT shared infrastructure at https://dossier-center.appspot.com/prig-it/ It did make me think about how to make a properly secure a shady network. There's a bounty of open-source collaboration and comms tools out there now, along with industry standards for encryption and well-documented best practices. Hell, the NSA publishes guidelines on how to secure your networks! And, I want a Psion PDA. :) .... All of my certifications are self-signed. --- MultiMail/Win v0.52 * Origin: realitycheckBBS.org -- information is power. (700:100/20) .