- Could have hacked? Sure. Did hack? No. Let me go through why not. https://twitter.com/realDonaldTrump/status/816620855958601730 …
https://twitter.com/pwnallthethings/status/816621553643294720
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:25:25 - So the actual email used to phish John Podesta ended up in the WIkileaks dump. It's here https://wikileaks.org/podesta-emails/emailid/36355 …
https://twitter.com/pwnallthethings/status/816621973971333120
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:27:05 - But the hackers screwed up. The hackers weren't hacking one-by-one; so URL contraction wasn't done manually. It was done via the Bitly API.
https://twitter.com/pwnallthethings/status/816624203835252736
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:35:56 - Using the Bitly API requires you create an account. So the hackers had to create an account. And they forgot to make their account private.
https://twitter.com/pwnallthethings/status/816624297972273152
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:36:19 - It's no longer possible - the hackers have changed their settings - but before you could simple enumerate ALL of the contracted links.
https://twitter.com/pwnallthethings/status/816624404918652928
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:36:44 - Why did the hackers include this info? Same reason they contracted links via API. Because they're not hacking 1-by-1. Are hacking at scale.
https://twitter.com/pwnallthethings/status/816625858517618689
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:42:31 - This information lets their attack server populate fields to look more authentic (it's why it's able to pre-fill Podesta's name and picture)
https://twitter.com/pwnallthethings/status/816626085362278400
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:43:25 - But it also means this opsec screw up is bad. Bc we can see the links contracted by the account, we can see all of the spearphishing URLs
https://twitter.com/pwnallthethings/status/816626310122500096
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:44:19 - And the spearphishing URLs tells us the accounts that were targeted.
https://twitter.com/pwnallthethings/status/816626411591057408
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:44:43 - How many accounts did this "14 year old" hack? About 1800. In 2015.
https://twitter.com/pwnallthethings/status/816626566453149696
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:45:20 - (These pie charts by @SecureWorks I should add, from here: https://www.secureworks.com/research/threat-group-4127-targets-google-accounts …)
https://twitter.com/pwnallthethings/status/816627773158649856
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:50:07 - Is it possible this was all a 14 year old? Sure. Also possible I'm a bridge salesman, and boy have I got a great deal for you today.
https://twitter.com/pwnallthethings/status/816628714280800256
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:53:52 - When hackers hack at scale, they reuse infrastructure. They make mistakes. This isn't unusual. You can piece the bits together.
https://twitter.com/pwnallthethings/status/816629673820114944
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 12:57:41 - And this isn't even the DNC hack. It's just the Podesta one. And it's only one of many different strands in just the public attribution case
https://twitter.com/pwnallthethings/status/816631120196501504
— Pwn All The Things (@pwnallthethings)Wed, Jan 04 2017 13:03:25