PSW #627 | SC Media
Bug bounties, Attack simulation, Deception, Blue team

PSW #627

November 15, 2019

 

 

Bryson Bort (Founder and CEO of SCYTHE) will demonstrate how to safely simulate ransomware and a multi-staged APT with lateral movement in your production environment! How would your organization protect, detect and respond to a ransomware attack? Bryson is also announcing the availability of the SCYTHE marketplace where red teams can collaboratively build and share threats and modules to extend the SCYTHE platform while also sharing market intelligence on what enterprises are looking for in their assessments.

Visit https://www.securityweekly.com/psw for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Simulating Ransomware Attacks with SCYTHE

Hosts

Doug White

Doug White – Professor

Jeff Man

Jeff Man – Sr. InfoSec Consultant

Lee Neely

Lee Neely – Senior Cyber Analyst

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Tyler Robinson

Tyler Robinson – Managing Director of Network Operations

Guests

Bryson Bort

Bryson Bort – Founder & CEO

Announcements

  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand

As advancements have been made in technologies new surveillance tools have been designed giving those charged with protecting citizen’s additional opportunities to prevent crimes or identify those who have violated laws or policies. While innovation has introduced a variety of new platforms there remains a concern of if the implementation of them is ethical. Additionally, there are concerns that surveillance has been and continues to be unequally applied.

Our guest for this segment is Dr. Kevin Harris, the Program Director for Information Systems Security and Information Technology Management at American Public University.

Visit https://www.securityweekly.com/psw for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

The Ethics of Surveillance

The discussion in this segment will focus on: the tools and benefits of surveillance, including consumer alarms, doorbells, cameras, motion detection, audio/video surveillance, and smart devices. Governmental technology such as body cameras, gunshot detection, drones, smartphones, redlight cameras. Privatization of surveillance including corporate-owned devices to monitor employees and/or the public, ISP monitoring, spending habits, social media, and medical data. Questions arise when multiple organizations use data, including accessing corporate surveillance systems, centrally stored data accessed by multiple agencies (jurisdiction), tracking across devices or platforms, shared consumer data, and access to DNA profiles. Ethical Considerations include security vs. privacy and the dangers of targeting specific demographics including religious groups, activists, and ethnic groups and AI biases in surveillance (gender & racial).

Hosts

Doug White

Doug White – Professor

Jeff Man

Jeff Man – Sr. InfoSec Consultant

Lee Neely

Lee Neely – Senior Cyber Analyst

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Tyler Robinson

Tyler Robinson – Managing Director of Network Operations

Guests

Dr. Kevin Harris

Dr. Kevin Harris – Program Directory Cybersecurity

Announcements

  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand

 

 

Two security researchers earned $60,000 for hacking an Amazon Echo, Amazon Kindle, Embedded devices Open to Code-Execution, This App Will Tell You if Your iPhone Gets Hacked, Two New Carding Bots Threaten E-Commerce Sites, and much more!

Visit https://www.securityweekly.com/psw for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Humans vs. Machines

Paul’s Stories

  1. US-CERT Warns of Remotely Exploitable Bugs in Medical Devices
  2. DLL Hijacking Flaw Impacts Symantec Endpoint Protection | SecurityWeek.Com
  3. New MITRE Foundation Aims to Boost Critical Infrastructure | SecurityWeek.Com
  4. Company Detected Years-Long Breach Only After Hacker Maxed Out Servers’ Storage – They need visibility into better indicators of compromise, disk space too low is way too slow: The company discovered the breach on March 7, 2016, when it began receiving alerts that one of its servers had reached its maximum capacity, which was due to a massive data archive file that the hacker created on its customers. Surprisingly, the intruder managed to breach the company at least two more times even after InfoTrax Systems became aware of the intrusion.
  5. Network complexity and lack of visibility contribute to misconfigurations and increased risk – Help Net Security
  6. Intel CPUs From Haswell to Cascade Lake Vulnerable to Zombieload V2
  7. Vulnerability in McAfee Antivirus Products Allows DLL Hijacking | SecurityWeek.Com
  8. Memes could be our secret weapon against pesky bots – This actually has meritt: They propose memes could be “one of the strongest techniques to distinguish between a human and a bot based on conscience and interpretation.” After all, bots don’t get cultural references and online humor the way humans do, the authors argue. I fondly remember “Data” (Star Trek: The Next Generation character for you non-trekkies) trying to understand humor, we all thought it was funny, but all the jokes were lost on poor Data.
  9. Intel Driver Vulnerability Can Give Attackers Deep Access to a Device | SecurityWeek.Com
  10. No, YouTube isn’t planning to jettison your unprofitable channel – But they are giving themselves as much power as they can to terminate a channel for any reason, unprofitable could be just one thing. The point is, they don’t need a reason. If they don’t like content for whatever reason, offensive, political agenda conflict, they can just disable or delete your channel and you have very little recourse. How do I know this? First-hand experiences…(Yes, plural).
  11. Project Nightingale: Google accesses trove of US patient data
  12. The five pillars of cyber security
  13. Are we living in a Blade Runner world? – This is just a really poor analogy: And we don’t need the Voight-Kampff test yet, but how many times have you been asked to mark all the traffic lights on a grid picture to prove you’re not a robot, and gain access to a website?

Jeff’s Stories

  1. Two security researchers earned $60,000 for hacking an Amazon Echo
  2. The Cybersecurity 202: Arrested Iowa hackers spark alarm among security pros um…we should pay attention to this one
  3. This App Will Tell You if Your iPhone Gets Hacked
  4. Obscure & Undetected: Hacking Into Hardware of Mission-Critical Infrastructure Using Side-Channel Attacks <insert disapproving look here> This is not new!!!
  5. U.S. manufacturing group hacked by China as trade talks intensified-sources

Lee’s Stories

  1. Feedback on the DHS Cyber Essentials initiative DHS reporting instances of ROCKEYE and CHEESETRAY malware linked to North Korea/APT38.
  2. Amazon Kindle, Embedded devices Open to Code-Execution Das U-Boot universal boot loader file system drivers can be exploited. Impacts Amazon Kindles, ARM Chromebooks, and other networking hardware. DNEX released a fix.
  3. McDonalds Hamburgler Account Attack Customers frustrated as Hamburgler attacks the McDonalds app, causing fraudulent charges, company slow to acknowledge fraudster versus ‘glitch.’ Refunds also not handled well.
  4. Genetics Startup Veritas Rocked by Datta Breach Customer portal accessed, PII & PHI data exfiltrated. Question is how could this be used to impersonate users or facilitate spear-phishing campaigns?
  5. Connectwise warns of Ransomware attacks targeting its customers. Connectwise remote IT management system vulnerability used to access an enterprise’s systems to install ransomware. Blocking access to those systems may be problematic, enable MFA at a minimum.
  6. Magento Users Urged to Apply Security Update Magento Commerce platform has RCE bug, a fix is available which deprecate product preview functionality for administrators. Cloud version already protected.
  7. Data of ZoneAlarm Forum Users Leaked after Breach Check Point’s ZoneAlarm Forum was breached and user’s PII exposed. Forum remains offline. The python script used to exploit CVE-2019-16579 is being shared.
  8. Two New Carding Bots Threaten E-Commerce Sites Two new carding bots: “canary bot” and “shortcut bot” discovered. Canary bot exploits eCommerce sites, while Shortcut bot exploits card vendor APIs used to bypass the eCommerce site entirely.
  9. Mexican Petrol Giant Pemex Hit by Ransomware Ransomware attack took billing systems offline. Reverted to manual during cleanup, ransom may have been 565 Bitcoin ($5 Mil) – likely Doppelpaymer ransomware.
  10. Motorola Razr’s back with a foldable display The Razar flip phone is back, running Android 9, folds out to a full size touch screen, $1499.

Hosts

Doug White

Doug White – Professor

Jeff Man

Jeff Man – Sr. InfoSec Consultant

Lee Neely

Lee Neely – Senior Cyber Analyst

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Tyler Robinson

Tyler Robinson – Managing Director of Network Operations

Guests

Announcements

  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
prestitial ad