Risky Business #450 -- From Mirai to mushroom clouds in five easy steps

Josh Corman walks us through the horror of the cyber 9/12 student challenge...
05 Apr 2017 » Risky Business

This week’s show is a fun one! We’ll be chatting with Josh Corman, the Atlantic Council’s Director of Cyber Statecraft. We’ll be speaking with him about an exercise he did recently with a whole bunch of students. Basically the whole thing was a simulation where students walked through various scenarios and had to respond. Unfortunately, Josh discovered that most students had a predisposition to escalating things unnecessarily. From Mirai to mushroom clouds, that’s this week’s feature interview.

This week’s sponsor interview is also an absolute corker. Rapid7 is this week’s sponsor. In addition to making enterprise security software and running a pentest practice, Rapid7 also spends a considerable amount of time and money on developing Metasploit.

Rapid7 research director Tod Beardsley and director of transportation security Craig Smith join the show this week to talk about some recent changes to Metasploit that I’m amazed haven’t made a bigger splash. You can now run Metasploit against a CAN bus and they’ve built an RF module as well. That is absolutely awesome stuff, coming up in this week’s sponsor interview, with special thanks to Rapid7!

Adam Boileau, as always, joins us to talk about the week’s security news.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes

Wikileaks releases code that could unmask CIA hacking operations | Ars Technica
Smart TV hack embeds attack code into broadcast signal—no access required | Ars Technica
Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1)
Here's How Not to Get Doxed Like FBI Director James Comey - Motherboard
Reinhold Niebuhr on Twitter: "https://t.co/L5ehuMFGat https://t.co/x53gCG7Nvc"
Verizon Rebuts Critics of Data-Collecting App | Threatpost | The first stop for security news
An Update on Verizon's AppFlash: Pre-Installed Spyware Is Still Spyware | Electronic Frontier Foundation
New Mirai Variant Roars into Action With 54 Hour DDoS Attacks | Threatpost | The first stop for security news
Publicly Attacked Microsoft IIS Zero Day Unlikely to be Patched | Threatpost | The first stop for security news
Microsoft Offers Analysis of Zero-Day Exploited By Zirconium Group | Threatpost | The first stop for security news
Hackers Are Emptying ATMs With a Single Drilled Hole and $15 Worth of Gear | WIRED
Russian Hackers Have Used the Same Backdoor for Two Decades | WIRED
Operation Cloud Hopper
Pegasus for Android: the other side of the story emerges | Lookout Blog
Someone is putting lots of work into hacking Github developers | Ars Technica
FBI Arrests Hacker Who Hacked No One - The Daily Beast
Hackers Hit Islamic State Site, Use It to Spread Malware - Motherboard
UK Cops Arrest Man Potentially Linked to Apple Extortion - Motherboard
Patrick Gray on Twitter: "Heh. I think you could call this "high confidence". https://t.co/zDCbiPmJXV"
An Unprecedented Heist Hijacked a Brazilian Bank’s Entire Online Operation | WIRED
Samsung's Android Replacement Is a Hacker's Dream - Motherboard
Patrick Gray on Twitter: "This is interesting. Apparently RU bots hammer Trump's account with conspiracy-related material when they know he's likely to be using it. https://t.co/f38WB9uIsS"
McAfee is once again an independent company - CSO | The Resource for Data Security Executives
Fake SEO Plugin Used In WordPress Malware Attacks | Threatpost | The first stop for security news
Hackers Can Easily Hijack This Dildo Camera and Livestream the Inside of Your Vagina (Or Butt) - Motherboard
Rebuttal to Pen Test Partners
Exiting the Matrix: Introducing Metasploit's Ha... | Rapid7 Community and Blog
Metasploit's RF Transceiver Capabilities | Rapid7 Community and Blog
rapid7-research-report-under-the-hoodie.pdf