All posts by Eitan Caspi

WhatsApp group for information and cyber security news – Moved to a WhatsApp Channel

Hello all,

Following my former post, from a few months ago, about opening a WhatsApp group for information and cyber security news and content, and following concerns from group members about the privacy issues coming with a WhatsApp group – I tried to find a method to both enhance the privacy of the members of this group, and also remove the limit of 1000 members that is inherited in a WhatsApp group – So eventually I decided to move this group to be a WhatsApp Channel, which doesn’t have any limit to the number of subscribers, and also if doesn’t display the subscribers’ name and phone number to other members or to the channel admin, which is me (unless I already have your phone number in my phone address book, which means I am already in some connection with you).

Read here more about the WhatsApp channel privacy attributes at the WhatsApp article of “About safety and privacy on channels“.
A channel is practically a “one to many” content feed, somewhat similar to an RSS Feed.

I looked into moving the messaging application of “Signal”, but a Signal group is also limited to 1000 members, plus “Signal” does not have a feature similar to a broadcast channel with subscribers, so it wasn’t a suitable option to move to.

As usual – you are invited to invite relevant people to join.

So, starting 27-Jan-25 I stopped publishing new content in the group, and started publishing at the channel (which does show historical/former published content, while a group does not), found in the following link – https://whatsapp.com/channel/0029VazZmk5LNSa7uZvULT0n

I hope this change will be beneficial for all of us.

Stay safe and secure!

WhatsApp group for information and cyber security news

31-Jan-2025 – update – the group moved to be a WhatsApp channel and the content update in the group has stopped since 27-Jan-2025, in order to enhance the privacy of the group’s members and to allow the future growth in number the members. More details in a blog post, in this blog site, about this change.
For those in a hurry – the link to the channel is https://whatsapp.com/channel/0029VazZmk5LNSa7uZvULT0n

The original post:


Hello everyone,

I opened a WhatsApp group where I regularly post information / cyber security news and sometimes other interesting things in this field.

Most of the links are to content in English, but sometimes also in to content in Hebrew.

You are hereby invited to join the group, and invite more people, using the link below.

The group’s description:

Hello everyone, My name is Eitan Caspi.

In this group I will share information security news and updates from around the world, including interesting content that is not necessarily news (such as technical articles, thoughts about the field, and so on), mainly in English and a little in Hebrew.

Group members are invited to invite relevant people to join. Let’s have fun!

Link to join the group – (The link was removed due to the group being moved to be a channel. See the start of this post for more details)

My LinkedIn Profile – https://www.linkedin.com/in/eitancaspi/

My Consulting firm – https://vsec.co.il/

My Information Security Blog – https://fudie.net/

My initiative to end default passwords, “Default is a FAULT!” – https://defaultisafault.com/

Microsoft, you have a problem

Recently (some will say – for many years by now) Microsoft is being criticized for its Information Security capabilities, as that it is slow to do the move from on-premises products security to also, in addition, a cloud provider security, which is, in my opinion, even harder.

This is my recent incident about it:

I recently accepted an email from one of Microsoft’s sub domains.

I use a commercial cloud email security service to protect my email traffic, and this system stopped this email from entering because the sub domain did not have any SPF record, so my email security service stopped this email as a possible email impersonating to be from Microsoft).

This sub domain still doesn’t have an SPF record, as I write this.

It is not a big security issue, but I know that if I was in charge of this online asset and I had such an issue – I will be glad if someone would alert me about it, so I tried to find a way to report this to Microsoft, but I did not find any explicit content directing where to report online security issues, so I opened a case at MSRC (Microsoft Security Response Center)

I am aware it is not a vulnerability but a missing security measure that MS better fix and I had no better place to report this to MS.

This is the response I got as my report was set by the MSRC analyst to a status of “This closed as a non-MSRC case.” (the bold text was highlighted by me):


Hello,

Thank you for contacting the Microsoft Security Response Center (MSRC). We appreciate the time taken to submit this assessment.

Upon investigation we have determined that this does not meet the definition of a security vulnerability.

The website you reported does not contain a MX record, which indicates we do not use the domain to send email messages.  In which case SPF/DMARC records are not considered required and would not meet the bar for security servicing.

As such, this thread is being closed and no longer monitored. We apologize for any inconvenience this may have caused.

If you believe this to be a misunderstanding of the report, submit a new report at https://aka.ms/secure-at

Please include:

Relevant information previously provided in your initial report
Detailed steps required to consistently reproduce the issue
Short explanation on how an attacker could use the information to exploit another user remotely
Proof-of-concept (POC), such as a video recording, crash reports, screenshots, or relevant code samples

For more information on what qualifies as a security vulnerability please see the following:
Definition of a Security Vulnerability: https://www.microsoft.com/msrc/definition-of-a-security-vulnerability

We thank you again for taking the time to submit this report!

Regards,

<name of the analyst>
MSRC

This is sad for at least two reasons:

  1. The core claim of the analyst is simply not true, technically – ” The website you reported does not contain a MX record, which indicates we do not use the domain to send email messages.  In which case SPF/DMARC records are not considered required and would not meet the bar for security servicing.”.
    MX record is for accepting emails. It can be absent and still it is possible to send emails from the relevant sub domain. Email sending and receiving works independently of each other.
    Hence, the core claim to block my report was based on mistaken or unknowledgeable information.
  2. I know it is not a vulnerability, but I guess MS should be happy to get any information that let it know it is missing a basic security measure, even if it is regarding an online attribute of it, not of a software product vulnerability

If Microsoft put at its MSRC frontline an analyst with such level of understanding how email works – then Microsoft really, really, have a problem.

And no, I will not open a new case at MSRC to prove them wrong. I will just go on with my life and Microsoft will need to live with the consequences of how it operates.

I will not make the extra mile effort when MS doesn’t even do the basics.