Podcasts

News, analysis and commentary

Risky Business #282 -- The future of hacktivism

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's show is a cracker! We've got a great feature interview with journalist and author Parmy Olson about what the future might hold for Anonymous. Is it time for the Anonymous brand to be retired? The media has largely lost interest in its activities -- how could the hacktivism phenomenon bounce back to the same levels of notoriety as it experienced in 2011?

Tune in to find out!

This week's show is brought to you by Senetas, makers of absolutely kick-ass layer 2 encryption equipment.

In this week's sponsor interview we're chatting with Senetas co-founder and CTO Julian Fay about homomorphic encryption. This is where you can actually perform operations on data while it's still encrypted! It's all a bit twisted, but it's fascinating stuff and it's this week's sponsor interview topic.

Show notes

You can click through to the recording page here.

ASIO blueprints, Defence documents stolen - Hackers - SC Magazine Australia - Secure Business Intelligence
http://www.scmagazine.com.au/News/344763,asio-blueprints-defence-documen...

Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies - The Washington Post
http://www.washingtonpost.com/world/national-security/confidential-repor...

U.S. Government Seizes LibertyReserve.com - Krebs on Security
http://krebsonsecurity.com/2013/05/u-s-government-seizes-libertyreserve-...

Liberty Reserve Founder Indicted on $6 Billion Money-Laundering Charges | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/liberty-reserve-indicted/

Anonymous Hacktivist Jeremy Hammond Pleads Guilty to Stratfor Attack | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/hammond-plea/

Guantanamo Wi-Fi shuttered after Anonymous hacking threat | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57585420-83/guantanamo-wi-fi-shuttered-...

Twitter Enables Two-Factor Authentication | Threatpost
http://threatpost.com/twitter-enables-two-factor-authentication/

Kim Dotcom Claims Ownership of Two-Factor Authentication | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/kim-dotcom-two-factor/

Holder Signed Off on Warrant Identifying Fox News Reporter as Criminal Conspirator | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/holder-signed-off-on-warrant/

WikiLeaks Donations Down to a Trickle | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/wikileaks-donations-down/

Drupal hacked, resets passwords after millions of accounts exposed \u2022 The Register
http://www.theregister.co.uk/2013/05/30/drupal_sites_hacked/

Ruby on Rails Exploit Harvests IRC Botnet | Threatpost
http://threatpost.com/ruby-on-rails-exploit-builds-irc-botnet-of-comprom...

Report Says Active Recovery Efforts Could Deter IP Theft By Foreign Attackers | Threatpost
http://threatpost.com/report-says-active-recovery-efforts-could-deter-ip...

Hackers Who Breached Google in 2010 Accessed Company's Surveillance Database | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/google-surveillance-database/

ReVuln Discovers Zero Day Vulns in Gaming Clients | Threatpost
http://threatpost.com/researchers-discover-dozens-of-gaming-client-and-s...

PayPal to Fix XSS Flaw, But No Reward For Researcher | Threatpost
http://threatpost.com/paypal-to-fix-xss-flaw-but-no-reward-for-researcher/

Vulnerabilities Plague File Lite, File Pro iOS Apps | Threatpost
http://threatpost.com/remote-code-injection-vulnerabilities-discovered-i...

Click-Fraud Falls as Microsoft Fights ZeroAccess Malware | Threatpost
http://threatpost.com/microsofts-curbs-click-fraud-in-zeroaccess-fight/

Mac OS X Backdoor Found in Wild | Threatpost
http://threatpost.com/another-mac-os-x-backdoor-reported/

Apple Patches QuickTime on Windows, Fixes 12 Bugs | Threatpost
http://threatpost.com/new-apple-quicktime-update-patches-12-vulnerabilit...

Google Fixes More Than a Dozen Flaws in Chrome 27 | Threatpost
http://threatpost.com/google-fixes-more-than-a-dozen-flaws-in-chrome-27/

Skype Beta Plugs IP Resolver Privacy Leak - Krebs on Security
http://krebsonsecurity.com/2013/05/skype-beta-plugs-ip-resolver-privacy-...

Google Strengthening Keys on SSL Certificates to 2048 Bits | Threatpost
http://threatpost.com/google-strengthening-keys-on-ssl-certificates-to-2...

IBM open sources new approach to crypto \u2022 The Register
http://www.theregister.co.uk/2013/05/03/ibm_open_source_homomorphic_crypto/

Rokia Traor\xe9 "Sikey" - Acoustic / TV5MONDE - YouTube
http://www.youtube.com/watch?v=U2OnJvbEiHc

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency: Parmy Olson: 9780316213523: Amazon.com: Books
http://www.amazon.com/dp/0316213527

Senetas - Data Protection through Encryption
http://www.senetas.com/

,

The blueprints are already laid out. They need to execute the plan right there. - Mission Maids

Risky Business #282 -- The future of hacktivism
0:00 / 68:34

PRESENTATION: Marcus Ranum on militarisation trends

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

The following is a recording of Marcus Ranum's AusCERT keynote speech on CYBER WAR. Marcus was doing the circuit a few years ago with a talk titled "Cyber war is bullshit", which I think makes clear his position, but this one is titled Never Fight a Land War in Cyberspace. He basically argues that the application of traditional military thinking to the cyber domain is flawed. He also argues there's a massive money and power grab taking place as the military and the private sector defence base tries to set the agenda so it can profit from it. It's a really worthwhile talk, and delivered with typical MjR flair. Enjoy.

PRESENTATION: Marcus Ranum on militarisation trends
0:00 / 53:07

SPONSOR INTERVIEW: Reflections on reflections on trusting trust

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this sponsor interview with chat with Paul Ducklin of Sophos, and the topic is reflections -- 30 years on -- on the paper Reflections on Trusting Trust by Ken Thompson. So we're reflecting on reflections on trusting trust.

I started off by asking Paul to recap the paper for people who aren't familiar with it.

SPONSOR INTERVIEW: Reflections on reflections on trusting trust
0:00 / 11:22

PRESENTATION: Does Anonymous have a future?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

You're about to hear Parmy Olson's presentation from AusCERT's 2013 conference. Parmy is a journalist for Forbes, but she's also an author -- she wrote We Are Anonymous, Inside the Hacker world of LulzSec, Anonymous and the Global Cyber Insurgency. She got amazing access to the LulzSec crew and the book is well worth reading.

In this presentation she looks at why these young men got involved in such risky activity. What drove them, and what does the future of Anonymous look like?

PRESENTATION: Does Anonymous have a future?
0:00 / 26:52

PRESENTATION: Dmitri Alperovitch pitches active defence

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Active defence is the new black. It's the issue of 2013. One of the organisations that helped put the issue on to the agenda is CrowdStrike, a business founded by some senior ex technologists from McAfee. CrowdStrike was founded on the premise that simply relying on defensive measures in information security isn't enough -- you need to be able to mess with your adversaries.

One of CrowdStrike's founders was Dmitri Alperovitch. He was at AusCERT and used his speaking slot to basically deliver the thinking behind CrowdStrike's pitch. It's nothing earth shattering, but it's a really well packaged speech that presents a cogent argument for the concept of active defence. So here it is, Dmitri Alperovitch's AusCERT talk titled Offence as the Best Defence.

PRESENTATION: Dmitri Alperovitch pitches active defence
0:00 / 43:17

SPONSOR INTERVIEW: Did APT1 put "cyber" on the boardroom agenda?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this sponsor interview we're chatting with Declan Ingram of Datacom TSS.

Datacom TSS is a Canberra-based, national security firm founded by ex Australian government security specialists. These guys specialise in dealing with highly skilled adversaries... Now, when they founded this business a few years ago, there was awareness in government that highly skilled adversaries were a real challenge... but it's really been 2013 where executives at the boardroom level have sat up and taken note of security issues, particularly the issue of APT.

They've realised it isn't just the Google's of the world who are being attacked by state sponsored adversaries -- Oil companies, broadcasters and insurance companies have been absolutely nailed by teams working for the governments of North Korea and Iran, for example.

Furthermore, Mandiant's APT1 report really put the issue on the map for a lot of people who previously just weren't aware of the issues. It's that whole chicken versus egg thing -- are people becoming aware of it because of the media attention or is the media reporting on it because people are becoming aware?

So how has this affected things for a business like Datacom TSS? Declan Ingram joined me to discuss. I started off by asking him how perceptions of sophisticated threats have changed over the last couple of years.

SPONSOR INTERVIEW: Did APT1 put "cyber" on the boardroom agenda?
0:00 / 11:32

PRESENTATION: AusCERT speed debate

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

The following is a recording of the traditional closing event of the AusCERT event -- the speed debate. It's hosted by Australian television and radio presenter Adam Spencer, and it's a bit of light fun to end the whole thing on... debaters include Eugene Kaspersky, Bill Caelli, Charlie Miller, Scott McIntyre and more. I'll drop you in here as Adam sets the whole thing up. Enjoy.

PRESENTATION: AusCERT speed debate
0:00 / 56:12

PRESENTATION: Charlie Miller pwns Android NFC

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Some time ago security researcher Charlie Miller published some research that showed he could take over NFC-equipped phones just by holding them near a malicious RFID sticker. This talk takes you through his research process -- how he fuzzed devices, what he found\u2026 and how he came to realise that attacking the higher level functions of NFC functionality turned out to be the shortest path to victory.

PRESENTATION: Charlie Miller pwns Android NFC
0:00 / 41:18

SPONSOR INTERVIEW: Using BYOD devices for 3G/LTE exfiltration

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Datacom TSS is a Canberra-based, national security firm founded by ex Australian government security specialists. These guys specialise in dealing with highly skilled adversaries. One of their services is running some pretty intense Red Team exercises.

The team at Datacom TSS recnetly ported its Red Team Trojan over to the Android platform, and it's surprisingly easy to trick people into installing it. You just email it to them and ask them to install the APK package.

And what you get once you're on someone's phone is quite awesome. Not only can you turn on the microphone and snoop on boardroom conversations, but you can use the 3G or LTE connection on the device to do your exfiltration. That way you're completely bypassing the heavily watched gateway. You can also use it to bypass SMS-based authentication.

Mark Brand is the Datacom TSS guy who did the Android port. He joined me by phone to tell us all about it.

SPONSOR INTERVIEW: Using BYOD devices for 3G/LTE exfiltration
0:00 / 14:29

PRESENTATION: OSINT observation of DPRK

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

The following is a recording of David Jorm's AusCERT presentation. You might have heard Dave preview his talk on last week's episode of the regular Risky Business podcast.

Dave, who works as a security response engineer for a vendor, studies geography and mathematics at the University of Queensland and recently completed a study on long-term remote-sensing analysis of North Korea. In his talk he looks at an OSINT analysis of North Korea\u2026 he talks about the work he did as well as looking at what other North Korea watchers are up to. There's some really cool stuff in there about Red Star Linux, too -- it's a North Korean Linux distribution that's surprisingly polished.

So here he is -- it's Dave Jorm's AusCERT talk. Enjoy.

PRESENTATION: OSINT observation of DPRK
0:00 / 33:40