Josh Kamdjou

Phish connoisseur. Founder/CEO of Sublime Security (@sublime, emailrep.io). "Do what you will, make the world a better place."

2024-04-30

@kuzko @eric_capuano @sublime 👋 Josh here, founder/ceo at Sublime. our free tier’s privacy policy is the same as our Enterprise one - we don’t train models on your data. individual messages can be shared with us *manually* and *explicitly*, for example if you’re reviewing a misclassification, and this is one way our detection models improve. this offsets the cost of providing Sublime Core for free on on Cloud. you can also run Core self-managed on an uncapped number of mailboxes - we don’t incur hosting costs here so there’s no limit. and you can inspect the network traffic to verify yourself if you like

another reason we give Core away for free is because it helps create a stronger community. the more people running sublime, the more it becomes the standard/go-to for email detection and collaboration (think YARA/Snort/Zeek for email), the more rules are shared and the more effective it is for everyone (including our paid customers)

i wrote about this in our recent blog: sublime.security/blog/announci

Josh Kamdjou boosted:
2024-04-26

Did you know that @sublime has a FREE hosted offering for orgs with <100 mailboxes? The onboarding process for Google Workspace took less than 5 minutes 🔥

This platform is incredible and takes a unique perspective on email security using detection-as-code concepts. Its not only inspecting new emails in real-time, but also performs historical analysis to build baselines and surface missed threats.

This free tier is a no-brainer for small orgs looking to implement top-notch email security.

Josh Kamdjou boosted:
2024-04-18

Less than 3 weeks until RSAC - let's meet!

Stop by booth #1167 to learn about the SecOps Cloud Platform, pick up swag, and meet the team building the future of SecOps. We are also hosting a happy hour at Kona's Street Market with our friends from @runpanther and @sublime.

Check out the link in the comments to schedule a time to meet with the team or RSVP for our after hours event.

#RSAC #cybersecurity

Josh Kamdjou boosted:
2024-03-16

Sublime puts email security directly into the hands of your security teams, enabling proactive defense against email threats through Detection-as-Code and behavioral AI functionalities. By seamlessly integrating Sublime Security with LimaCharlie's SecOps Cloud Platform, you consolidate your telemetry data and streamline your response to email-borne attacks.

Join @_bromiley (Lead Solutions Engineer at LimaCharlie) and @jkamdjou (Founder & CEO of @sublime) tomorrow as they delve into the dynamic features of both platforms.

Don't miss this opportunity to learn how Detection-as-Code can be a game-changer for your email security: limacharlie.wistia.com/live/ev

#cybersecurity #infosec

Join Matt Bromiley (Lead Solutions Engineer at LimaCharlie) and Joshua Kamdjou (Founder & CEO of Sublime Security) tomorrow as they delve into the dynamic features of both platforms.
Josh Kamdjou boosted:
2024-02-26

SOC Analysts - did you know that @sublime exposes a FREE .eml analysis tool? A must-have for any analyst toolbox for analyzing suspicious emails. They even provide a free, unauthenticated API to do the same.

analyzer.sublimesecurity.com/

#secops #infosec

Josh Kamdjou boosted:
2024-02-07

📣 Discuss QR code phishing and recent attack trends with @jkamdjou at #ThursdayDefensive (12:30 CT). Register to join us! reconinfosec.com/thursday-defe #CyberSecurity

2023-02-21

Sublime Platform 1.0 is officially out today!

There’s osquery/EDR for endpoints, YARA for binaries, Sigma/EQL for logs, Semgrep for code, Snort/Suricata for packets. Now, there’s Sublime for email.

It takes under 10 minutes to be fully up and running with Docker: github.com/sublime-security/su

Josh Kamdjou boosted:
2023-01-22

So emailrep.io by @jkamdjou et al is pretty great. Anyone know of a good and similar equivalent for phone numbers? Thanks!

2023-01-13

how you know your day is going to be productive

Josh Kamdjou boosted:
Jeremi M Gosney :verified:epixoip@infosec.exchange
2022-12-24

Many of you have been asking for my thoughts on the #LastPass breach, and I apologize that I'm a couple days late delivering.

Apart from all of the other commentary out there, here's what you need to know from a #password cracker's perspective!

Your vault is encrypted with #AES256 using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). #PBKDF2 is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only #KDF that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.

Using #Hashcat with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the < 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule.

Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:

1. users for which they have previously-compromised passwords (password reuse, credential stuffing)
2. users with laughably weak master passwords (think top20k)
3. users they can phish
4. high value targets (celebs, .gov, .mil, fortune 100)

If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.

I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know?

A proper mitigation would be to migrate to #Bitwarden or #1Password, change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.

For more password insights like this, give me a follow!

2022-12-10
2022-12-08

Sublime Platform v0.38 is live which includes MQL support for detecting HTML smuggling via links in email bodies. I have been waiting for this one for *months*, I am so excited. This includes detect/block/hunt for all of these techniques in Google Workspace/Microsoft365/IMAP environments:
- Email->URL->Encrypted zip->ISO
- Email->URL->Zip->ISO->LNK
- Email->URL->Zip->IMG->VBS
- etc

Rule source: HTML smuggling link to deliver encrypted zips containing ISO, IMG, or VHD files (observed delivering Qbot): github.com/sublime-security/su

Rule source: HTML smuggling link to deliver LNK, JS, and VBA files: github.com/sublime-security/su

As usual you can also detect HTML smuggling via attachments, like double Base64-encoded zip files in HTML attachments (observed delivering Qbot): github.com/sublime-security/su

Docs/schema for LinkAnalysis and BinExplode: docs.sublimesecurity.com/docs/

@sublime is free to self-host, unlimited number of mailboxes, includes all security features.

new.sublimesecurity.com/platfo

2022-12-04

I started playing with #ChatGPT and i am completely speechless. it can explain MQL detection rules better than I can. and it even started writing them

question: what does this detection rule do? 

<rule source>

ChatGPT:

This detection rule appears to be looking for inbound email messages that meet the e I following criteria: The sender's email address is from a domain that is either a free email provider (e.g. Gmail, Yahoo, etc.) and the sender's email address is not in the list of known sender email addresses, or the sender's email address is not from a free email provider and the sender's domain is not in the list of known sender domains. The email body contains at least one link, and at least one of those links has been downloaded and analyzed, and the analysis of that file reveals that it contains encrypted data in the form of a zip file. If all of these conditions are met, the email message will be flagged as potentially malicious. This rule is likely intended to detect phishing or malware campaigns that use links to download encrypted files that can then be used to deliver malicious payloads. This content may violate our content policy. If you believe this to be in error, please submit your feedback — your input will aid our research in this area.
2022-11-30

@cmd1775 it is a hidden / unreleased feature, but it’s there :)

2022-11-30

this is so fucking sick. new feature coming soon to detect HTML smuggling via links

2022-11-27

a sublime wedding

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst