cross-posted from: https://feddit.org/post/1094761

Archived version

KnowBe4 needed a software engineer for our internal IT AI team. “We posted the job, received resumes, conducted interviews, performed background checks, verified references, and hired the person,” the firm writes on its blog.

“We sent them their Mac workstation, and the moment it was received, it immediately started to load malware.”

[Special points to KnowBe4 for publishing this on its blog. If this can happen to a security awareness firm, it can happen to everyone.]

      • TrickDacy@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        2
        ·
        5 months ago

        Yep. The videos feel like they were designed by people who have never spoken to another human before. And yeah, seems like they are catering to old people who were new to email in 2003.

      • PM_Your_Nudes_Please@lemmy.world
        link
        fedilink
        English
        arrow-up
        28
        ·
        edit-2
        5 months ago

        It’s because the training materials aren’t aimed at the typical Lemmy user who knows how to dual-boot Linux and built their own hackintosh for fun. It’s aimed at Jim in accounts receivable, who is 2 years away from retirement and hasn’t learned any new tech literacy skills in the entire 23 years he’s been with the company. It’s aimed at Pam in HR, who panics and says the internet is broken because she deleted her Chrome desktop shortcut for the fifth time this week. It’s aimed at Jill in accounts payable, who called IT to say her computer wasn’t working, (the power was out in the entire building, because a trash truck hit the power lines across the street.)

        IT deals with a lot of BS, from users who don’t know anything about how computers or modern scams/hacks work. KnowBe4 is aimed that those users, because an organization’s security is only as impenetrable as its dumbest “oh hey I found a USB drive outside the front doors. I’m gonna plug it in to see what’s on it” users.

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    23
    arrow-down
    1
    ·
    5 months ago

    Hiring somebody without ever physically seeing them is a curious reality

    I’m surprised , if the intention has stated, is to work well paid job and place a resource, why load malware at all?

    If they’re just trying to remote into the device, why are they remoting indirectly to the laptop? Why not use a remote KVM that hooks up to the output and USB ports?

    • pixely@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      2
      ·
      5 months ago

      Interesting point about the KVM. To make it transparent the KVM would need to report the model of a real monitor in the display EDID data. Also if you’re monitoring the device, which is almost certainly a laptop, it would be suspicious if it was plugged in to a monitor 100% of the time.

        • femtech@midwest.social
          link
          fedilink
          English
          arrow-up
          6
          ·
          5 months ago

          Mine is either connected to a USBC dock at home or the office. I have only used it without when at a hotel.

        • pixely@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          5 months ago

          Sure, I use a ThunderBolt dock at home, but being docked 100% of the time is probably not normal.

          • 5too@lemmy.world
            link
            fedilink
            English
            arrow-up
            7
            ·
            5 months ago

            Mine has been docked for months at a time. I recently started shifting it to be near the kids when they’re home; but not undocking it wouldn’t strike me as strange at all.