Meet the Cyber Mercenary Who Can Overthrow a Government – Chris Rock – PSW #803
Chris Rock is a Cyber Mercenary who has worked in the Middle East, US and Asia for the last 30 years working for both government and private organizations. ˇHe is the Chief Information Security Officer and co-founder of SIEMonster. Chris has presented three times at the largest hacking conference in the world, DEFCON in Las Vegas on controversial vulnerabilities. Chris is also the author of the Baby Harvest, a book based on criminals and terrorists using virtual babies and fake deaths for financing. He has also been invited to speak at TED global. In the Security News: Fried squid is tasty, but the squid proxy is vulnerable, Flipper zero and other tools can now BLE Spam more than just Apple devices, Cisco IOS vulnerability in the web interface, again, is Signal vulnerable?, WinRAR being exploit, still, Math.Random is not really all that random, get your malware samples, and my inside look into Android TV devices, malware, and the horrors of the supply chain! All that and more on this episode of Paul’s Security Weekly!
Visit https://www.securityweekly.com/psw for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Full Audio
Segments
1. Meet the Cyber Mercenary who can Overthrow a Government – Chris Rock – PSW #803
Chris Rock is a Cyber Mercenary who has worked in the Middle East, US and Asia for the last 30 years working for both government and private organizations. ˇHe is the Chief Information Security Officer and co-founder of SIEMonster. Chris has presented three times at the largest hacking conference in the world, DEFCON in Las Vegas on controversial vulnerabilities. Chris is also the author of the Baby Harvest, a book based on criminals and terrorists using virtual babies and fake deaths for financing. He has also been invited to speak at TED global.
Announcements
Join our Discord channel to chat with us throughout the live show today! Visit securityweekly.com/discord to receive an invite and become part of our community.
Guest

Chris Rock is a Cyber Mercenary who has worked in the Middle East, US and Asia for the last 30 years working for both government and private organizations.
He is the Chief Information Security Officer and co-founder of SIEMonster.
Chris has presented three times at the largest hacking conference in the world, DEFCON in Las Vegas on controversial vulnerabilities including;
How hackers could create fake people and kill them using vulnerabilities in the Birth and Death Registration systems around the world.
How cyber mercenaries can overthrow a government working with coup mercenary Simon Mann.
How cyber mercenaries can bypass modern day Jammers using the earth as an antenna to trigger and IED at 2kHz
Chris is also the author of the Baby Harvest, a book based on criminals and terrorists using virtual babies and fake deaths for financing. He has also been invited to speak at TED global.
Hosts




2. Fried Squid, Flipper Zero BLM Spam, Apple Devices, Signal Vulns? & Android TV Devices – PSW #803
In the Security News: Fried squid is tasty, but the squid proxy is vulnerable, Flipper zero and other tools can now BLE Spam more than just Apple devices, Cisco IOS vulnerability in the web interface, again, is Signal vulnerable?, WinRAR being exploit, still, Math.Random is not really all that random, get your malware samples, and my inside look into Android TV devices, malware, and the horrors of the supply chain! All that and more on this episode of Paul’s Security Weekly!
Announcements
Security Weekly Listeners: We are celebrating the milestone of reaching over 1,000 members of our CISO community. The Cybersecurity Collaboration Forum is a one-stop shop for executive collaboration comprised of CISOs across various industries. If you want to be part of this growing community of CISOs, join us as a member or technology partner. To learn more, visit: securityweekly.com/cybersecuritycollaboration
Hosts

- 1. New Critical Zero-Day Vulnerability Affects Web UI of Cisco IOS XE Software & Allows Attackers to Compromise Routers
- Critical Zero-Day Vulnerability Discovered: Cisco Talos has identified a new severe zero-day vulnerability in the Web User Interface feature of Cisco IOS XE software. This flaw grants attackers full access to compromised routers, which can then be utilized for additional malicious endeavors.
- Extent of Exposure: ONYPHE's Patrice Auffret indicates that over 74,000 devices have exposed their web UI on the internet. The vulnerability has received a maximum CVSS score of 10 and is actively being exploited.
- Suspicious Activity Detected: Cisco Talos detected unusual activity from suspicious IP addresses in Bulgaria, with unauthorized users creating local user accounts, including one named “ciscotacadmin”. By October, these unauthorized activities expanded, with fraudulent actions including deployment of an implant for arbitrary command execution.
- Details on the Implant: The attackers employed an implant saved under /usr/binos/conf/nginx-conf/cisco_service.conf. This implant, comprised of 29 lines of Lua code, facilitates arbitrary command execution via HTTP POST requests. It can extract details, verify hardcoded strings, and execute commands either at the system level or at the IOS privilege level 15.
- Mitigation Strategies: Cisco suggests disabling the HTTP server feature on all internet-exposed systems, making the Web UI inaccessible. Administrators should apply access lists to the HTTP server feature, ensure that the current configuration settings are saved, and check the presence of the implant. Keeping all systems updated and patched, along with carefully monitoring local user accounts and logs, is paramount.
- 2. Malware crooks find an in with fake browser updates, in case real ones weren’t bad enough
An uptick in cybercriminals masking malicious downloads as fake browser updates is being spotted by security researchers.
Mimicking the success of the tactics adopted by the years-old SocGholish malware, researchers at Proofpoint have drawn attention to cybercriminals increasingly emulating the fake browser update lure.
Researchers have tracked SocGholish for more than five years. In the past five months, three more major campaigns have emerged. All use similar lures but deliver unique payloads.
The fear is that despite only dropping malware now, the proliferation of these campaigns could be a boon to initial access brokers, offering an effective route to infect end users with ransomware.
- 3. Lack of Patching Lets Russian, Chinese Hackers Exploit WinRAR Flaw
A known vulnerability in the file-archiving tool WinRAR continues to proliferate because not enough users are installing the patch, according to Google.
The company today warned that “multiple government-backed hacking groups” have been exploiting the flaw, dubbed CVE-2023-3883, to deliver malware. "The widespread exploitation of the WinRAR bug highlights that exploits for known vulnerabilities can be highly effective, despite a patch being available,” Google wrote in a blog post.
WinRAR actually patched the flaw on Aug. 2 with version 6.23, after hackers had been abusing it since April. The only problem is that WinRAR lacks an auto-update feature, meaning users have to manually download and install updates from WinRAR’s website to stay protected.
“A patch is now available, but many users still seem to be vulnerable,” Google says.
The company has observed state-sponsored hackers taking advantage of the flaw in recent weeks, including “Sandworm,” a Russian-state sponsored group suspected of having ties to the country’s military. Last month, Google uncovered a phishing email that looked like it came from a Ukrainian drone warfare training school targeting Ukrainian users.
- 4. Rumored zero-day exploit dismissed by Signal
Rumored zero-day exploit dismissed by Signal SC Staff SecurityWeek reports that encrypted instant messaging platform Signal has shut down reports regarding a zero-day vulnerability impacting its chat app that became viral over the weekend, saying that further investigation has revealed no evidence to support the legitimacy of the rumored flaw.
Such reports of a zero-day in Signal stemmed from a copy-pasted alert purported to be from the U.S. government that warned potential device takeovers from the exploitation of the messaging app's "generate link preview" functionality.
However, Signal noted on X, formerly Twitter, that it was not able to substantiate claims that the warning came from the federal government. Prior to the rumors, several experts had already warned about the risk of the generate link preview function, which could be leveraged to facilitate IP address and link exposures, as well as unwanted data downloads in the background, with the feature already associated with critical flaws in the WhatsApp messaging app.
- 5. Pro-Iranian Hacktivists Set Sights on Israeli Industrial Control Systems
The hacktivist group SiegedSec has claimed responsibility for a series of attacks against Israeli infrastructure and industrial control systems (ICS), but there is no indication that the listed IP addresses have experienced any attacks.
The hacking group put together a list of what it claims are its Israeli ICS targets, which was recently uncovered by SecurityScorecard's Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team. An image of the list — found via analysis of various dark Web groups — shows a series of IP addresses with the claim "we have unleashed mass attacks on Israeli infrastructure."
- 6. TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments
Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom.
"The attacker covertly spied on and harvested sensitive data from APAC government entities by exploiting a particular type of secure USB drive, protected by hardware encryption to ensure the secure storage and transfer of data between computer systems," Kaspersky said in its APT trends report for Q3 2023.
The Russian cybersecurity firm, which detected the ongoing activity in early 2023, said the USB drives offer hardware encryption and are employed by government organizations worldwide to securely store and transfer data, raising the possibility that the attacks could expand in the future to have a global footprint.


- 1. US Plans to Push Other Countries Not to Pay Hacker Ransoms
The US is pushing a group of governments to publicly commit to not make ransom payments to hackers ahead of an annual meeting of more than 45 nations in Washington later this month.
Anne Neuberger, deputy national security adviser, told Bloomberg News that she is “incredibly hopeful” about enlisting support for such a statement but acknowledged it’s a “hard policy decision.”
Charles Carmakal, chief technology officer at Mandiant Consulting, is among those who argue that an outright ban is still far from feasible.
“There’s so much more that needs to be done before you could outlaw extortion payments,” he told Bloomberg in September. “Law enforcement has to get more aggressive with threat actors and impose pain onto them.”
- 2. AI models can analyze thousands of words at a time. A Google researcher has found a way to increase that by millions.
Right now, ChatGPT can ingest a few thousand words at most. Bigger AI models can handle more, but only up to about 75,000. This Ring Attention method means that we should be able to put millions of words into the context windows of AI models, not just tens of thousands.
Liu goes further, saying that, in theory, many books and even videos can be dropped in one go into context windows in the future, and AI models will analyze them and produce coherent responses.
- 3. Uh-oh! Fine-tuning LLMs compromises their safety, study finds
As the rapid evolution of large language models (LLM) continues, businesses are increasingly interested in “fine-tuning” these models for bespoke applications — including to reduce bias and unwanted responses, such as those sharing harmful information. The researchers discovered that fine-tuning LLMs can inadvertently weaken the safety measures designed to prevent the models from generating harmful content, potentially undermining the very goals of fine-tuning the models in the first place.
- 4. “Low-Resource” Text Classification: A Parameter-Free Classification Method with Compressors
Deep neural networks (DNNs) are often used for text classification due to their high accuracy. In this paper, we propose a non-parametric alternative to DNNs that’s easy, lightweight, and universal in text classification: a combination of a simple compressor like gzip with a k-nearest-neighbor classifier. Without any training parameters, our method achieves results that are competitive with non-pretrained deep learning methods on six in-distribution datasets.It even outperforms BERT.
- 5. Using Goatse to Stop App Theft
Game aggregator" sites hosted my app inside of an iFrame so that they can steal ad revenue. I couldn't abide seeing my code monetized in this way.
The mature and responsible thing to do would have been to add a content security policy to the page. I am not mature so instead what I decided to do was render the early 2000s internet shock image Goatse with a nice message superimposed over it in place of the app if Sqword detects that it is in an iFrame.