Risky Business #620 -- Project Zero burns Western counterterrorism operation

We're glad we don't have to make those sort of decisions at Risky Biz HQ...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • Ubiquiti insider blows whistle on breach
  • Cyber insurer ransomwared
  • Project Zero burned a Western counterterrorism operation
  • Australian parliament, media, politicians all under attack
  • Executive Order would require vendors to notify US government of incidents
  • Much, much more…

This week’s sponsor guest is a special one. Metasploit creator and Rumble.run founder HD Moore will join us to talk all about his new venture, the Rumble asset discovery tool. It’s an absolutely fantastic interview, as you’d expect from HD.

Risky Business #619 -- REvil crew demands $50m from Acer

PLUS: Why we were wrong on Exchangapalooza '21...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • REvil demands US$50m from Acer in ransomware attack
  • Shell added to Accellion victim list
  • Governments banding together to tackle ransomware
  • BEC theft hits $1.8bn in 2021: FBI
  • Exchange tyre fire is, surprisingly, almost under control
  • MORE

Remediant’s Paul Lanzi will pop along in this week’s sponsor interview to talk about how they’ve integrated their PAM solution with Carbon Black. It’s an integration that is actually somewhat obvious in hindsight: if a box has been popped then some accounts have, too, so tying these things together does make sense.

Risky Biz Soap Box: 12 years since Operation Aurora. Have we learned anything?

Okta's Marc Rogers talks about some uncomfortable truths...

This is a wholly sponsored podcast brought to you by Okta.

In this interview we chat with Marc Rogers, the executive director of Cybersecurity at Okta.

The question that we’re exploring in this interview is whether or not we’ve managed to move the infosec needle since the Chinese government hacked Google back during the Operation Aurora attacks of 2009.

Risky Business #618 -- MS security licensing faces congressional scrutiny

US lawmakers baulk at Microsoft's "millions for basic security features" policy...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • The latest on the Exchange tyre fire
  • Lawmakers in the USA have had enough of Microsoft’s ridiculous licensing tiers
  • White House mulls software security rating system
  • Joseph Cox’s SMS adventures
  • Things didn’t quite work out for APT6920 Arson Cats
  • Much, much more

This week’s show is brought to you by VMRay. They asked us to interview one of their customers in this week’s sponsor segment so Brad Marr, the CISO of Life Fitness, pops in to walk through his VMRay use case.

Risky Biz Feature Podcast: Chasing crooks through the blockchain

Distributed ledgers give us unprecedented insight into illicit economies...

This podcast was made possible thanks to the support of the Hewlett Foundation’s Cyber Initiative. They’ve provided us with grant funding so we can do feature podcasts that will be of interest to people working in policy roles. The idea is educate people working in policy about issues that they’re in a position to do something about.

In this interview we spoke with Kim Grauer, the head of research at Chainalysis.

Chainalysis makes software that cryptocurrency exchanges, regulators, law enforcement and intelligence services use to get insight into what’s happening in terms of bitcoin and other cryptocurrencies moving around. You would have heard us talk about their reports in the news segment of Risky Biz a few times because they have a habit of publishing really interesting insights into things like the ransomware economy.

Risky Business #617 -- Exchangapalooza '21

Can open, worms everywhere...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • All the Exchange boxes on the planet have pretty much been owned lol
  • See above
  • Someone’s hacking Russian crime forums
  • The Accellion scandal keeps on truckin’
  • Dependency confusion attacks are going berserk in the wild
  • Gab got owned. Again.
  • John McAfee is in all sorts of trouble
  • Much, much more

This week’s show is brought to you by Nucleus Security. Its director of APAC operations, Gil Azaria, joins us in this week’s sponsor interview to talk about how he became a Nucleus customer before he joined the vendor as its APAC guy.

Web shells everywhere

The Risky Biz newsletter for March 9, 2021...

A China-linked espionage campaign against select US targets has exploded into a frenzy of indiscriminate exploitation that has compromised tens of thousands of Microsoft Exchange servers across the globe.

Risky Business #616 -- Exchange 0day party time for Chinese APT crew

But it's not supply chain-related, so it's no big deal, right?

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • Chinese APT crew goes berserk with Exchange 0day
  • Russia hacks Ukraine and USA, India hacks China, China hacks India
  • The NYTimes got something big wrong again (shock horror)
  • CANVAS exploit pack leaks, including their sweet, sweet Spectre exploit
  • Atlantic Council report into offensive capability vendors/contractors
  • Your vCentre gear it probably already on fire: find out why!
  • Much, much more

This week’s show is brought to you by Yubico, the makers of the Yubikey.

Risky Biz Soap Box: ExtraHop CTO and co-founder Jesse Rothstein

SolarWinds NDR alerts were often trees falling in the woods...

This is a sponsored podcast featuring ExtraHop’s co-founder and CTO Jesse Rothstein. ExtraHop is a Network Detection and Response (NDR) vendor that started out offering network health and monitoring tools before being pulled into the security space by its own customers.

Jesse joined host Patrick Gray to talk about the SolarWinds compromise from a Network Detection and Response vendor’s perspective, about cloud security and monitoring, some of ExtraHop’s backstory and more. Enjoy!

Risky Business #615 -- Dependency confusion is, uh, pretty bad

PLUS: US floats new RU sanctions, TikTok gets stay of execution...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • USA floats new sanctions against Russia
  • TikTok, WeChat get stay of execution
  • Dependency confusion is ugh
  • US indicts Lazarus crypto-thieves
  • France ties Sandworm crew to Centreon intrusion
  • MORE

This week’s show is brought to you by Thinkst Canary. Thinkst’s founder Haroon Meer is this week’s sponsor guest and he joins us to have a very Haroon-style conversation. We talk about how security controls and detections often fall over when things happen that take place outside of our assumptions: trojaned software updates, attackers hiding in unconventional places like monitors, things like that. That’s a great conversation.

Accellion customers are getting ransom notices

The Risky Biz newsletter for February 16, 2021...

The five most recent listings on the leak site of the CL0P ransomware group have two things in common. One, and most obviously, they are being extorted. And two, they’ve deployed Accellion file transfer appliances to send large files in their recent past.

Risky Biz Feature Podcast: A primer on Microsoft cloud security

Everything you want to know about Azure AD but were afraid to ask...

Recent attacks by SVR against US targets have mostly been written up under the moniker of the “SolarWinds campaign”. In our view, that’s inaccurate. The defining characteristic of this campaign wasn’t the SolarWinds supply chain stuff, it was the abuse of Microsoft cloud services.

My understanding of how contemporary cloud services work isn’t actually as good as it should be. And that got me thinking – if my understanding isn’t that great, then there’s probably a lot of other people out there who don’t quite grok this stuff, particularly on the policy side. So, I set out to prepare a primer on Microsoft cloud security.

Our guest in this podcast is Dirk-Jan Mollema. He works at Fox-IT in the Netherlands and is one of their core researchers on Azure AD and Active Directory Security. What you’re about to listen to, essentially, is me picking his brain so I can wrap my own head around this stuff. The hope is that some of you will learn along with me!

Risky Business #614 -- So was it Florida Man or an Iranian APT?

World's crappiest ICS threat actor rumbled by Sheriff Bob and team...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • The latest on the attempted Florida water poisoning incident
  • How to abuse Google Sync services for great victory
  • Why Signal’s TLS proxies for Iranians are probably a bad idea
  • OG username brokers targeted by social media legal army
  • Much, much more

This week’s sponsor interview is with Dan Guido of Trail of Bits. They’ve released an enterprise version of their iVerify tool. It’s a security tool for iOS (an Android version is in beta) that lets organisations monitor things like patch levels and passcode compliance without actually requiring the installation of MDM profiles. It’s an enterprise mobile security tool for orgs that don’t need or want full MDM.

Hackers attempt to poison American town's water supply

The Risky Biz newsletter for February 9, 2021...

Somebody used a simple remote access tool to pump up the supply of chemicals into the water supply to a small town in Florida. Was it Florida Man or Iranian APT? Either is possible, but one would be a curiosity, the other an international incident.

Risky Business #613 -- It's time to check your Accellion logs

PLUS: Hobbyists and cops vape Emotet...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • Emotet is… gone?
  • Accellion FTAs were owned everywhere, not just in ANZ
  • US courts air-gap sensitive filings in wake of Holiday Bear attacks
  • iOS 14 brings iMessage security improvements
  • Much, much more

Proofpoint’s Sherrod DeGrippo is this week’s sponsor guest. She joins the show to talk about Emotet’s demise, Trickbot’s survival, BEC, ransomware and more.

Risky Biz Soap Box: Email is a target, not just a vector

Protecting e-mail at rest with Material Security...

These Soap Box editions of the show are wholly sponsored, which means everyone you hear in one of these editions, paid to be here.

This edition of the show is brought to you by Material Security. Basically what they do is lock up your cloud-based email. They use Google and Microsoft’s APIs to redact sensitive information from your mail spool – or even redact entire messages from your spool, like, say, anything over a month old – and then kick you up to an auth challenge when you want to access that mail.

It’s a product that recognises that email isn’t just a vector – often it’s an attacker’s target.

Risky Business #612 -- DPRK slides into researcher DMs

You had me at "umm, do you research vulnerability?"

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • DPRK offers free 0day to researchers, with a pretty significant catch
  • SonicWall gets owned because it runs SonicWall gear. Big mistake.
  • Chinese trains didn’t stop running because Flash died :(
  • Dominion to sue Rudy Giuliani for $1.3bn over insecurity claims
  • The sudo bug. Lol.

This week’s show is brought to you by Cmd Security, the Linux security company. Its focus has traditionally been on restricting the type of bash commands users can enter. It’s like a control plane for Linux systems. But some of its customers manage their Linux endpoints through different, non-bash entry points. So they’ve added some features to their product to deal with that, which has also resulted in them having an IDR capability. It’s all pretty sensible stuff though, and Cmd co-founder and CEO Jake King will be along to talk us through all of that.

SonicWall's dog food bites

The Risky Biz newsletter for January 26, 2021

SonicWall customers are on high alert after the company disclosed its internal network was compromised in an attack that abused vulnerabilities in its own SSL-VPN remote access products.