Sous Vide Your Spam – PSW #729
Full Audio
View Show IndexSegments
1. Elite Hackers, HerpaDerps, Unskilled Hackers, & CyberWarfare – PSW #729
In the Security News for this week: Unskilled hacker linked to years of attacks on aviation, transport sectors, The Elite Hackers of the FSB, Bionic Eyes Go Dark, Herpaderping, & more!
Announcements
Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.
Hosts
- 1. The Rise and Fall of log4shellThe Rise and Fall of log4shell, Author: Johannes UllrichSANS Internet Storm Centerisc, sans, internet, security, threat, worm, virus, phishing, hacking, vulnerability
- 2. This Is the ‘Hacking’ Investigation Into Journalist Who Clicked ‘View Source’ on Government Website
- 3. Ubuntu addresses Linux kernel vulnerabilities
- 4. Samsung shipped ‘100m’ Android phones with flawed encryption
- 5. New Sandworm Malware Cyclops Blink Replaces VPNFilter
- 1. New Sandworm Malware Cyclops Blink Replaces VPNFilterThe United Kingdom’s National Cyber Security Centre, CISA, the National Security Agency, and the Federal Bureau of Investigation have released a joint Cybersecurity Advisory (CSA) reporting that the malicious cyber actor known as Sandworm or Voodoo Bear is using new malware, referred to as Cyclops Blink. Cyclops Blink appears to be a replacement framework for the VPNFilter malware exposed in 2018, which exploited network devices, primarily small office/home office routers and network-attached storage devices.
- 2. Expeditors shuts down global operations after likely ransomware attackSeattle-based logistics and freight forwarding company Expeditors International has been targeted in a cyber attack over the weekend that forced the organization forcing it to shut down the majority of its worldwide operations. Downtime notice: https://www.expeditors.com/022022-downtime-notification
- 3. CISA Launches New Catalog of Free Public and Private Sector Cybersecurity ServicesCISA has published a catalog of free public and private sector cybersecurity services. The Free Cybersecurity Services and Tools webpage “includes cybersecurity services provided by CISA, widely used open source tools, and free tools and services offered by private and public sector organizations across the cybersecurity community.” CISA plans to include additional tools and services in the future. Services and tools page: https://www.cisa.gov/free-cybersecurity-services-and-tools
- 4. CISA Warns Critical Infrastructure Organizations of Foreign Influence OperationsThe CISA has issued new guidance to critical infrastructure organizations about how to adequately prepare for and address foreign influence operations that use misinformation, disinformation, and malinformation (MDM) as well as other tactics in order to undermine the security of the U.S. and its allies. CISA Guidance: https://www.cisa.gov/sites/default/files/publications/cisa_insight_mitigating_foreign_influence_508.pdf
- 5. Port of LA’s new Cyber Resilience Center aims to bolster physical and digital supply chain defensesThe Port of Los Angeles has reportedly established a new "Cyber Resilience Center" that will create an automated, portwide "community cyber defense solution" intended to combat increasing threats to the physical and digital supply chains. According to reports, the center will include some 20 stakeholders that include terminal operators, shipping lines, and truck and rail freight companies.
- 6. FBI: Cybercriminals Using Virtual Meeting Platforms to Wage BEC AttacksThe FBI warned today that some business email compromise (BEC) scammers have moved their attack vectors to virtual meeting platforms, where they dupe employees into transferring money to them by posing as the CEO or CFO of the victim organization.
- 7. Unskilled hacker linked to years of attacks on aviation, transport sectorsA low-skilled hacking group tracked as "TA2541" that is believed to be operating out of Nigeria has been targeting firms operating in the aviation, aerospace, defense industries, transportation, and manufacturing sectors since 2017 leveraging off-the-shelf malware that is delivered via malicious Word documents.
2. Blame Stuxnet – Chris Sistrunk – PSW #729
Chris will tell the tale on how an electrical engineer got sucked backwards into the infosec abyss. Also, Chris will share some war stories about what he's seen...and be open to questions from Paul that his viewers will enjoy. Beware of dad jokes.
Segment Resources:
Presentations: https://www.slideshare.net/chrissistrunk
Announcements
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
Guest
Chris Sistrunk is Technical Manager on the ICS/OT Security Consulting team at Mandiant and has been focusing on helping protect critical infrastructure there for 8 years. Before Mandiant, Sistrunk was a Senior Engineer at Entergy where he was a subject matter expert for Transmission & Distribution SCADA systems. Sistrunk was awarded Energy Sector Security Professional of the Year in 2014. He is a Senior Member of the IEEE and is a registered Professional Engineer in Louisiana. He founded BSidesJackson. He holds BS Electrical Engineering and MS Engineering & Technology Management degrees from Louisiana Tech University.
Hosts
3. CISA Stories – Josh Corman – PSW #729
Josh Corman joins to describe, in vivid detail, some of his experiences working for CISA, as a fed, & from the frontlines.
Additional resources:
https://www.cisa.gov/sites/default/files/publications/CISAInsightProvideMedicalCare_Sep2021.pdf
https://www.cdc.gov/mmwr/volumes/70/wr/mm7046a5.htm?scid=mm7046a5w
https://www.cisa.gov/BadPractices
https://www.cisa.gov/publication/stuff-off-search
https://www.cisa.gov/sites/default/files/publications/AssetsShowingOverview_508c.pdf
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Announcements
We're always looking for great guests for all of the Security Weekly shows! Submit your suggestions by visiting https://securityweekly.com/guests and completing the form!
Guest
Joshua Corman is a Founder of I am The Cavalry (dot org), and recently served as Chief Strategist for the CISA COVID Task Force. He previously served as CSO for PTC, Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, and other senior roles. He co-founded RuggedSoftware and IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. His unique approach to security in the context of human factors, adversary motivations, and social impact has helped position him as one of the most trusted names in security. He also serves as an Adjunct Faculty for Carnegie Mellon’s Heinz College, and was a member of the Congressional Task Force for Healthcare Industry Cybersecurity.