| ▲ | cbisnett 3 days ago |
| Thanks for the feedback on not understanding what we sell from the homepage. We sell an Endpoint Detection and Response (EDR) product that we manage with our 24/7 SOC. To perform the investigations on potentially malicious activity, we can fetch files from the endpoint and review them. We log all of this activity and make it available to our customers. We are an extension of their security team, which means they trust us with this access. We’ve been doing this for more than 10 years and have built up a pretty good reputation, but I can see how that would freak some folks out. We also sell to businesses, so this is something that would be installed on a work computer. |
|
| ▲ | poemxo 3 days ago | parent | next [-] |
| Is it clear to users that their system is monitored and that they have consented to screengrabbing? Unless those screenshots were merely simulated from the Chrome history. |
| |
| ▲ | spogbiper 3 days ago | parent [-] | | This would generally be covered in your corporate acceptable use policy or employee handbook, where ever your employer describes what is allowable on corporate devices and what is monitored when you use them. Some companies also display a notification when you log in along the lines of "This is an XYZ Corp system, all activity is logged and monitored for malicious behavior" in general, if you're using a company owned device (the target for this product and many others like it) you should always assume everything is logged | | |
| ▲ | cybergreg 3 days ago | parent | next [-] | | In the US, on a corporate owned device there is no expectation of privacy. | |
| ▲ | hyperman1 3 days ago | parent | prev [-] | | Is this true outside the USA? In the EU, employees have an expectation of privacy even on their corporate laptop. It is common for e.g. union workers to use corporate email to communicate, and the employer is not allowed to breach privacy here. Even chatter between worker is reasonably private by default. I suspect, if the attacker is inside the EU, this article is technically a blatant breach of the GDPR. Not that the attacker will sue you for it, but customers might find this discomforting. | | |
| ▲ | viccis 3 days ago | parent | next [-] | | I can't imagine pen testers would be able to work in the EU without being able to access individual workstations without the users' knowledge. The key difference here is that pen testing, as well as IT testing, is very explicitly scoped out in a legal contract, and part of that is that users have to told to consent to monitoring for relevant business purposes. What happened in this blogpost is still outside of that scope, obviously. I doubt that Huntress could make the claim that their customer here was clearly told that they would be possibly monitoring their activity in the same way that a "Content to Monitoring" popup for every login on corporate machines does it. | |
| ▲ | spogbiper 3 days ago | parent | prev [-] | | It's an interesting question. Services like Huntress (there are many similar) only work by looking at what is happening on the computer. To some degree they are automated but there is a human review element to all of them where ultimately some person A will be looking at what some other person B did on the system. Not publishing it in a blog like this, but definitely violating the privacy of the valid user and/or a bad guy to some degree |
|
|
|
|
| ▲ | viccis 3 days ago | parent | prev | next [-] |
| >We are an extension of their security team, which means they trust us with this access So if <bad actor> in this writeup read your pitch and decided to install your agent to secure their attack machine, it sounds like they "trusted you with this access". You used that access to surveil them, decide that you didn't approve of their illegal activity, and publish it to the internet. Why should any company "trust you with this access"? If one of your customers is doing what looks to one of your analysts to be cooking their books, do you surveil all of that activity and then make a blog post about them? "Hey everyone here, it's Huntress showing how <company> made the blunder of giving us access to their systems, so we did a little surprise finance audit of them!" |
|
| ▲ | isatsam 3 days ago | parent | prev [-] |
| How was an individual user (in this article's case, a phishing sites developer) able to install your software and seemingly not notice the level of access they gave you to their computer? |
| |
| ▲ | cbisnett 3 days ago | parent | next [-] | | Windows doesn’t have application permissions like Mac, iOS, and Android. An app doesn’t specify what it need to be able to do, it inherits the permissions of the user that launched it. Not a great permissions model, but it’s legacy all the way back to the earliest versions of Windows. | | |
| ▲ | isatsam 3 days ago | parent [-] | | This is a surprising response - I was expecting something like "they clicked past an alert notifying that they were giving us this level of access". Just because Windows only has a generic password prompt whenever an app wants to do something dangerous, doesn't mean you can't inform the user via your app's own UI. Others like AnyDesk do exactly that. | | |
| ▲ | spogbiper 3 days ago | parent | next [-] | | this product is typically silently mass deployed to all systems within an organization, completely unknown to the individual users. afaik there is no user interface or way to interact with the software from the computer, its all managed in a central web console | |
| ▲ | cybergreg 3 days ago | parent | prev [-] | | You’re really missing the point here. Huntress is an MDR, a cybersecurity company. They protect the endpoint by monitoring it for malicious activity and responding in kind. It’s what they do, not unlike Crowdstrike, Microsoft, etc. Generally a threat actor will install a security agent like this to find a bypass in order to attack more victims. They know exactly what they’re doing. | | |
| ▲ | VladVladikoff 3 days ago | parent [-] | | >They know exactly what they’re doing. Strongly disagree. If they installed this to do some analysis they would have done that in a VM if they “knew exactly what they were doing”. Either you snared a script kiddy, or your software download and install process that followed that google ads click was highly questionable. | | |
| ▲ | galaxy_gas 3 days ago | parent [-] | | I think it´s obvious from the browser history in the blog posting that script kiddy is for sure |
|
|
|
| |
| ▲ | pcthrowaway 3 days ago | parent | prev [-] | | Poor english skills if I had to guess; the article mentions they had to translate things, and they didn't read the ToS. |
|