Episode Transcript
So you know, my my wife and I have a shared grocery list app.
You know.
Yeah, so your day, i walk into Stop and Shop and I pull up the list and I'm reading it cream bread cake, meat loaf, black eyed peas.
So I do my shopping.
I'm gonna check out line and I realized read reading my music playlist.
All right, well, uh, here we go.
We got some stories for you kids.
The first one is from tech Radar Pro.
This is just amazing to me.
Wi Fi signals could be used to uniquely identify individuals.
Who Fi?
Speaker 2I mean, wasn't this on Batman?
It was?
No, You're absolutely right, there was.
Speaker 1There was no Wi Fi with Batman.
Speaker 2No, they use cell phones.
Yeah, and they turned on everybody's cell phones and they were able to use it as radar, use it as a radar to detect everybody in the book.
Speaker 1Okay, Batman is a movie?
Are you're talking about a movie?
The old TV show.
Speaker 2Or movie one of the movies?
Speaker 3Alfred turns on the signal and they hack everybody's phones.
It was a while ago too.
Speaker 2We're not talking about Adam West.
This was not recently.
Speaker 1So the rest of this headline is who fi w H o fi compliments, biometrics, prompting privacy fears.
Speaker 2This is awesome.
Speaker 1It's got a nice little graph here that the human, the green human is the input signal, and then an encoder turns that into US, passes it through a signature model, and then there's this little formula here F dash norm and.
Speaker 2Then a lot more of this stuff.
Speaker 1Then I don't know what S stands for.
And then the signature bbbbb.
Speaker 3So this is like a side channel attack and there's going to be a lot more of this with AI.
AI is going to figure out this stuff a lot more often.
Speaker 1Agreed, So what happened here?
Just explain this to me.
Speaker 2We all get bathed in radio waves all the time.
Yeah, right, even like good for the skin SCA, it's great for the complexion.
So you know, everything from you know Kiss one oh eight FM to you know, ham radio signals to your Bluetooth mouse just broadcasting bluetooth.
So Wi Fi in a building you got two point four gigahertz Wi Fi just sort of bathing everything.
And when radio signals hit something, they react with it, right, So if it's a metal something, it may bounce off or it may you know, go in a different direction or whatever.
Right, So as those radio waves hit you, they refract in different ways.
And what they're saying here is we can watch those refractions and to a ninety I think they have it in here is like ninety five ninety five point five percent accuracy.
They can have an AI predict based on the RF the spurrious signals coming off the person, right who that person is, which.
Speaker 3It's really just radar using Wi Fi signals or radio signals.
Speaker 2Yep, you're absolutely right now.
What I don't know and I read through this article looking for it and a lot of these researches and they're like listen.
They kept saying like, we don't use cameras.
There's no cameras.
It's like, okay, but did you have to put a software defined radio with an antenna and have four hundred of them around the room to detect the person accurately?
Or was it like no, I could do it across the street.
Right, So I think this is controlled environment stuff, not just does Faraday make a suit.
Speaker 3For those who don't know Faraday is Faraday bags block radiation and you'd just be a black bob.
You'd be gumby cages.
Speaker 2Right, you know what's interesting.
So it's interesting you say that.
Patrick.
Okay, so does Faraday build a suit?
If you built a suit, it would bounce off you probably sharper, let's say, dressed man.
But on top of that, what if you did the opposite, What if you did the opposite?
What if I had a suit that broadcast out just two point four giga hurt signals in all random directions.
I wonder if you could cancel so you are invisible.
You probably could.
Speaker 3If you could, you probably could could transmit back the opposite of.
Speaker 2Like a cloak of invisibility for Wi Fi we're gonna build.
We should take this offline talk to ours.
Speaker 1I still don't understand how they get your identity from your Wi Fi signals.
Speaker 2So they don't, they don't they can accurately identicy uh, Patrick, Patrick, Dwayne and Carl walk into a room.
Speaker 1I've heard this one.
Speaker 2I've seen this one.
So what they'll do is they'll they'll have Patrick walk in, they'll gauge all the signals, they'll have me walk in, They'll gauge all the signals.
Speaker 1So they have to and they have to have a baseline reading.
Okay, well that's yep, that's kind of dumb right now.
Speaker 2I mean it could be used once they have your your personal you know, signature thing.
Yeah, exactly, could you go into a different room, That would be a great question.
I be Okay, now I'm walking around an airport, could you pick me up?
Speaker 3So I predict it will and I predict that eventually this will be used for surveillance and say, well, we know that this person went into this building because of this.
Speaker 1Sure, but the person had to have been enrolled in their data gathering beforehand.
Speaker 2Had to have been identified somehow poor.
Speaker 1Yeah, you can't just like, hey, behind building number three, it's a Russian spot.
Speaker 3Well, but if they know who they suspect is the Russians, they know everybody that works at the Russian embassy, they can catalog them discreetly and then say, sure, we know you met at the Australian embassy because we had your signature.
Speaker 1We need your fingerprints.
Speaker 3Actually, they're not going to tell them.
They're either gonna put them in a black bag and take them to a dark site, or they're not going to tell them at all, and it's just going to be intel.
Speaker 1Yeah, okay, So in other words, I'm not really buying this as a scare kind of privacy problem.
Speaker 2Okay, I don't think it is either, that's what they want you to think.
I honestly don't think it is.
I mean, like the other thing is, my Wi Fi signals in my house are directed in a different way than might be in another building, So I don't know how accurate this would be, not in the controlled environment that they're in.
I'm just gonna put that out there, all.
Speaker 1Right before we move on.
I got to read a text or summarize a text that I got from my friend today purchased an automatic sprinkler system that made me download their app from the app store and connect to my Wi Fi before I can even use it.
And it's made in China.
Speaker 2That's awesome.
Speaker 1Should I return it?
And I told them the standard stuff, which is, okay, if you have a guest network and people who connect to that guest network.
Speaker 2IoT, will it run in lockdown mode?
Speaker 1People who connect to that guest network need to know that that your IoT devices are connected to it, or you can create another And he went through that whole thing, and he doesn't have the ability to create an IoT wow network, so he's sending it back and and just for fun, I got the website.
Oh and the company is rain Point, and you know they they have all sorts of automation solutions and sprinkler systems and stuff.
Speaker 2And they're cheap, Yeah, super cheap.
You know what I'd love to do is I'd love to buy one of these and tear it down and actually figure out what's we should do that?
Speaker 1Oh, you totally should?
Speaker 2All right, well do I mean we'll announce it here on the podcast one hundred bucks, you know, Patrick, and Patrick'll spring Ford.
Yep, he's good for it.
Speaker 1All right, So there you go.
I would stay away from cheap Chinese stuff that requires How does a sprinkler system require you?
Speaker 2You'd have to live in a cave.
Speaker 1To connect it to Wi Fi.
Speaker 3Why the problem is you'd have to live in a cave.
I have a sprinkler system connect to Wi Fi.
But I try to use a system that's mostly made in the Niceys.
But I'm sure some of the components are made.
Speaker 2I have a sprinkler system connected to a hose.
Speaker 3Yeah, yeah, you still have kids at home.
You can tell and move the hose, all right.
Yeah, there's only so much you can do.
Speaker 1But there's only so much.
Yeah, right, So let's move on to our third story here or a second story.
Actually, Apple patches security flaw exploited in Chrome's ero day attacks.
So Apple and Google in the same story.
And that's funny.
So Apple's really security updates to address the high severity vulnerability that has been exploited in ero day attacks targeting Google Chrome users.
Dwayne, you want to tell me what happened?
Here?
Are either of you guys?
Speaker 3Is this is this on iOS devices or on MacBooks only?
Speaker 2Now this is on iOS too.
I can't confirm or deny what we're doing on Oh no, I'm only.
Speaker 1Getting Yeah, it's iOS.
Speaker 2So yeah, yeah, And so it does say if you're using if you're using Google Chrome, right, So if you have an iOS device, they have the Safari browser, right, but you can download other browsers.
I have Chrome on my iPhone.
So if you're using Google Chrome on an Apple product, and that's iOS, iPad Os tvOS eighteen six, mac Os, Sequoia fifteen six, iPadOS seventeen dot seven, dot nine Vision Os, which I'd assume is that their eyeglass.
Speaker 1So yeah, Apple Vision Pro.
Speaker 2Yeah, I don't know, it's too expensive for me to own but year Vision OS two point six or Watch OS eleven point six, then you could be affected.
You need to go update.
So according to this, incorrect validation of untrusted input from Angle, which is the almost native graphic layer engine, can lead to injection of commands being executed on the GPU, potentially allowing them to escape the browser sandbox.
Speaker 1Wow.
Speaker 2So yeah, it's uh, I think this is super niche I don't know that you're going to see this widely exploited.
I don't think we've seen this in the wild yet.
Yeah.
And it's patched, right, Yeah, it's patching.
And Apple's really good because they control most of the landscape on pushing a lot of those patches down.
Speaker 3So oh no, it says it is it?
They tagged it as actively exploited in attacks?
Right, okay, right, I stand correctly.
Speaker 1Well, the Chrome team patched it on July fifteenth.
Oh no, I'm sorry Apple.
Speaker 2Who patched it?
Speaker 1Yeah, patched it on July fifteenth and tagged it as actively exploited in attacks.
Speaker 2Yeah.
Moral of that story.
If you have an Apple device, like we've said a bajillion times, a go patch b always make sure you have updates.
See, you should go to the app store, And I don't know how many people do this, but you should go to the app store and go to the little lap stab and make sure all of your apps are updated right.
And then on top of that, once a week, what should we do.
Restart the phone, reboot that device?
Yep, yeah, replace down No, no, no, reboot the phone.
Make sure that there's nothing sitting resonant memory.
Speaker 1Well, I read something recently and I can't remember if we shared it on the show, but that Android is actually getting a little more savvy to patches and security than previously reported by us.
Anyway, but still, there's no there's nothing better than a single company, you know, manning the gates.
So that's why we all use iPhones.
Yeah, all right, So next story, Next story, Illumina Incorporated to pay nine point eight million dollars to resolve false claims act allegations arising from cybersecurity vulnerabilities in genomic sequencing systems.
Speaker 3So this is a company that is crazy basically lied about their their paying paying lip service to security and cybersecurity, and being proven to be lying through a whistleblower.
I'm hoping that this becomes a trend because we need this to be punished.
We need this to be but it was even at nine point eight million, it's a bit of a token punishment.
Speaker 2Yeah, that's that's almost nothing.
Speaker 3Well, because because how much they're making, it's it's a it is a fraction of what they're making from the government, let alone overall.
Speaker 2I mean, if they were ransomware, they'd have to play more than So let.
Speaker 1Me get this straight.
Let me see if I understand here.
And I didn't read the article, so you'll have to fill me.
Speaker 2Out in solidarity.
I didn't read it either.
Speaker 3Not just kidding.
Speaker 2We're with you, buddy, We got you, all right.
Speaker 1Cool.
So when I gather from this is that there's this genomics sequencing system that crunches the numbers to find a genome of a of a person's DNA or whatever.
Right, and then it had some cyber vulnerabilities whatever they are in it, and that was hidden or lied about.
Speaker 3So they didn't have they didn't do any of the checks they claimed they did.
They didn't do.
It wasn't that there was a vulnerability they missed.
They didn't look right.
They were like, oh, yeah, we definitely are we're doing We're doing all the right things.
Speaker 2Right, ISO twenty seven O one, and we'd followed the CSF framework, and you know there's no bugs in that cereal right right.
Speaker 1It's like when the mother asked the teenage boy if he's cleaned his room, he said, yeah, and he's just shoved everything under the bed.
Speaker 2Our water has no lead.
Speaker 3Yeah, And so it was such a you know, it's such an egregious and they had a whistleblower who was in a position to prove that they were.
It was a bold faced lie, and so they had to slap them on the wrist.
The problem is they kept them as a vendor.
Sure they're still make it.
They probably made more money that the next week than that fine, yep.
But we're hoping that this becomes a normal part of operations that if you don't take this seriously, it's kind of a I was hoping when I read it that it would be like, yeah, they you know, they only made three million dollars on the thing, but they got fine nine point eight that would probably break up the world.
Speaker 2But it wasn't the case.
Speaker 1All Right, one more they will take a break Huntress Threat Advisory.
Speaker 2This one's big active.
Speaker 1Exploitation of sonic wall VPNs.
So this one Huntress.
Speaker 2Yeah, let me let me take this one.
Actually we just went up against Huntress anyways, Soress.
Huntress is a security researcher slash.
They run a sock They do all sorts of stuff a sock, a sock scurity operation center.
They'll monitor or network and make sure nobody's doing bad things.
So, yeah, we're constantly tiptoeing around Huntress when we're breaching networks.
But that that aside, a lot of small to medium business customers are using Sonic Wall.
Sonic walls a great little soho firewall right, small office, home office.
Speaker 1Thank you Patrick.
Speaker 2Yeah, so, but it gives you yeah, not not lower Manhattan.
I'm going to throw a lot of the tla's okay, I don't know you could use it in Lower Manhattan.
Speaker 1It's fine, we'll be the tl A police.
It's three letter acronym to law.
Speaker 2So that being said, it's a great little device.
You you know, put it in.
It does.
It does your firewall, and it allows you to have access to the Internet.
It also allows you VPN access back to your office.
That's first stuff.
So the Sonic wall is actually pretty ubiquitous and it lets people in off the Internet.
That's great, and it lets randos off the Internet, so it's interesting.
Speaker 1And it also makes Moco local, right, which is a nice beef dish local.
Speaker 2Mocho when the mutton is nice and lean nice and sorry.
Speaker 1I was just trying to trip you up with some false acronyms there.
Speaker 2Oh, thanks for that.
So this week I hadn't actually heard of this story, and I was at Martial Arts and one of the guys at Martial Arts is he's an MSP Managed Service provider, and he came out and he's like, ooh, Sonic Wall thing right, And I was like what, And he's like, we've been advised to like shut up, shut down the VPN on all of our customers firewalls because of a ero day that just came out that even Sonic Wall can't figure out what's going on.
Yeah, right, And Huntress was like, we have no idea.
Everybody should just shut this off.
Come to find out a little bit more detail has come out today.
Speaker 1Today's the seventh of we're recording on the seventh.
This story came out yesterday, yeah.
Speaker 2The sixth, so we have the story from the six They also put a story in here from the seventh, which is it appears that what happened is actually customers didn't follow the advice of Sonic Wall.
Do you remember last year twenty twenty four we mentioned Sonic Wall and there was some sort of big exploit with Sonic Wall where just randos on the Internet could attack and information off your Sonic Wall.
Well, when you were doing the migration to the new operating system, Sonic Wall said, hey, you should change all those default passwords, like you should get rid of them, and people said no and just upgraded to the latest version.
And then of course attackers already now have the user names and passwords that they need.
So this is really you know, I'm going to keep following this story.
There's a long time in the making.
Yeah.
It's either Sonic Wall's right and they're like, listen, our users are users and users didn't follow the right procedure to upgrade them, or Sonic Walls kind of pushing this under the rug and they're like, nah, it's on you man, it's your bad configuration.
I'm not really sure yet, but my gas would be Yeah, it was all the old accounts were already compromised, and when you upgraded because of last year's twenty twenty four, forty seven and sixty six CV.
You then came back with you know you had the same stuff in there.
Speaker 1So we'll post a link to the updated story that you were talking about from and it's from Bleeping Computer Sonic.
Weall finds no SSLVPN ero day links ransomware attacks to twenty twenty four flaw.
All right, so there you go.
We'll put that story up there if you want to follow it to it's and I guess it's time take a break, so we'll be right back after these very important messages don't go away, and we're back.
You're watching and listening to Security this Week.
I'm Carl Franklin, It's Dwayne Laflatt and Patrick Hines, and we hear unraveling the most important stories in security, hacking, vulnerabilities and all that stuff and how it affects you in your life.
Where doesn't you could not?
All right?
Who wants this next story?
Google?
Go ahead?
Speaker 3Patrick, So I posted this one because they buried the lead.
So Google says it's AI based bug hunter found twenty security volnaabilities and that's on tech Crunch.
Yeah, and when you read the article, it's it you know, that's very interesting and they're trying to like see how they can use ai LLM based vulnerability research or big sleep found and reported twenty flaws.
But as they go down the article, they talk about the fact that there's a lot of slop, which is like things that are really aren't reportable, aren't really to that level, And the concern is that they're going to find a lot of that low validity vulnerabilities, like saying that you know, hey, your house is vulnerable because there's a door, yeah, okay, or your house is vulnerable because somebody could pick the lock.
Speaker 1Yeah.
Speaker 3There's a concern that they're going to fill up open source and other things with requests to fix bugs that aren't really bugs.
Speaker 1How about this one.
You should never take vacation photos and posts that you're on vacation because then people will know that you're not home and they'll come and rob you.
Speaker 3M yeah, yeah, but I always keep that shotgun and that's triggered by the door opening loaded, so it's not a problem exactly.
Just in case you have a security system, you know, right right, no, I know, cameras, dogs, killer bees, yeah, or or a good recording of a dog on loop, sharks.
Speaker 4With laser beams, killer bees, a recording of killer bees, dogs, machine guns, chains, all of that stuff just on a loop.
Speaker 2You know how horrifying that would be if you broke into Patrick's house and you just hear like bees, Like know what I'm out?
Speaker 3Subwall First, we know someone who has a lot of snakes.
Speaker 2Oh my god, to borrow a couple of chest full.
Speaker 3Anyway, So it's like there's a lot of hype around AI and AI is gonna be transformational, but you have to understand that there's problems and we need to understand it's not a panacea now.
Speaker 2I mean, you look at the you look at the title of this article, and like when I was looking at I was even telling Carl before this, I was like, you know, we're gonna pack up shot pulsars out, peace out.
If you know AI is just going to find all the security flaws, that's awesome.
We'll go find something else, do you bet.
Speaker 3So we had this discussion today where there are people who are really getting into this AI and using it a lot, and what they're coming to the conclusion of, if you have three people doing a job, you might be able to get rid of two of them.
But you can't not have someone and have AI do a job.
Right, We're not there yet.
I don't know that we're going.
Speaker 2To be there.
Speaker 1I wouldn't want to be there.
Speaker 2People are hyping it, but I don't think we're going to get there anytimes.
Speaker 1So I wouldn't want to be there.
I mean, I wouldn't want anybody to be completely relying on AI.
Speaker 3No, but that's the way a lot of the remember a lot of these companies.
There's a phenomenon right now where a lot of these companies have bet the farm they need AGI, you know, artificial general intelligence to emerge in the next four years, or they've missed the bet.
Speaker 1Yeah.
Speaker 3Sure, it's literally AGI or bust.
And there's a lot of indicators that they're not going to make it.
But it's up to them to keep the hype going.
We're talking about one hundred billion, four hundred billion dollar valuations that are just insanement government contracts, and the ten billion dollar range cats and dogs living together.
Speaker 2I thank you.
I thought you'd liked that.
Speaker 3But it's in their general interest to play it up and to say what it could be.
Sure, what they don't say is that it requires like some real big breakthroughs and some big changes and some things that just aren't in evidence.
So I think it'll be transformative.
I think it'll be as big as the Internet, as big as the is the personal computer.
But it's not going to I don't think it's going to be like little consciousness is running around in three years, as many of them are claiming.
Speaker 1Well, they might be six year old consciousness with dreams and hallucinations.
You know.
Speaker 3No.
I I constantly have to explain to people that an LM not only does understand the answer it's providing, it doesn't understand the question you asked.
Speaker 2It's just really good.
It's like there was a what doesn't matter?
It does like if it can solve logic problems like code, and it can code akay, but it doesn't understand the code.
What is it?
Speaker 1All right?
We've had this conversation to a blue in the face.
I just went, let's let's read what you've ladd Leunescue said, he's.
Speaker 2Co Oh, you listen of lad but not me.
I see how it is.
Speaker 1A co founder and chief technology officer at run Sibyl, a startup that develops AI powered bug hunters, told tech crunch that Big Sleep is a legit project given that it has quote good design, people behind it know what they're doing.
Project ero has the bug finding experience, and DeepMind has the firepower and tokens to throw at it.
And then it says there's obviously a lot of promise with these tools, but also significant downside.
Several people who maintain different software projects that have complained to bug reports that are actually hallucinations.
And then the guy Lonescue said, that's the problem people are running into is we're getting a lot of stuff that looks like gold, but it's actually just crap.
Speaker 3Yep, I should I should buy a lot of drink.
I agree, you should.
Speaker 2But that odd owns a company that is a startup that develops AI powered bug hunting.
Speaker 1That's right.
Speaker 2Yeah, and even he's but yet at least he's honest about the fact that there's.
Speaker 1A down said he's saying that.
Yeah.
Crap, crap, says Vlad.
Speaker 2Thanks for thanks, thanks, Flad, thanks.
Speaker 1Okay, hacker new says researchers uncover ec scape flaw and x escape.
I don't know how to say that.
And Amazon e c S enabling cross task credential theft no I don't like the sound of that.
No, I do not one bed.
I do not like that at all.
Speaker 2You'll it's once you explain it.
Explain it from escape flaw, it would be excellent.
Listen, it's okay, it's cybersecurity researchers have demonstrated an end to end privilege escalation chain.
Okay, so let's sort of store that away.
We have a low prive account, so we had to get a low prive account of some sort, and we do have the ability to then escalate that account.
Okay, excalate what are we escalating that account on.
Well, we're escalating it on an elastic container in AWS.
So if I'm running a workload in Amazon Web Services and i have a high privilege workload running in the same container that I have a low privilege workload running, and the attacker takes over the low privilege workload, they then can take over the high privileged workload.
So is it important?
Yes, But it's not like saying, oh my god, I was able to spin up my own ECS instance and then take over Microsoft's instants running whatever.
Right, it's because it's not running on the same container.
It's not part of the same elastic.
You know, service.
Speaker 3Privileged escalations is I have not I have a water leak.
It's how big the water leak is.
You need that initial entry, so it's it's bad news if they're already in the wire.
It's not bad news if they're not.
Speaker 1And what direction is the leak going in?
That's coot, that's.
Speaker 2That's always important INTE your electrical system.
Speaker 1Well, yeah, it's it going out or coming in.
Speaker 2That's way right.
So this one's I don't know what did they school, but I would just say the only advice they say is okay, well then don't do that.
Don't don't don't run here's when I do this.
Don't do that.
It's the classic advice.
They're like, listen, don't run low privileged tasks on the same container that has higher privileged tasks.
Don't do it the only tasks with tasks.
I mean you could you could isolate it so that each task run on its own instance of easys.
Then that's fine too.
Speaker 1So I did a I looked up score and the only one I found was on fifteen sixty eight, which is score of an eight point eight.
Speaker 2What is that on?
That's it's enabling unauthorized codes to chromium, mos, chromium os, chromium, dart and basil.
Speaker 1Well anyway, so we don't think this is as big a deal for the general public to panic on, but it's still bad.
And if you are in that situation on Amazon Aws with container in ECS, check your TLAs.
Speaker 2Yeah, then make sure you've isolated, you've isolated your tasks.
If you have a high privileged task isolated on its own easys, that's all right.
Speaker 1Right, Microsoft Exchange remember that.
Speaker 2Oh, this one's big.
Speaker 1Yeah, high severity flaw in hybrid exchange deployments.
Speaker 2We gave up RID a long time ago.
Speaker 1So a hybrid exchange deployment is what some on prem and some in the cloud.
Speaker 2Yeah, yeah, yeah, So.
Speaker 1Microsoft warns of a high severity flaw in this kind of setup.
It's what happened.
Speaker 3So we when we were hosting exchange on prem, it just became impossible to keep it secure.
So we went fully hosted.
But you could like have part of the solution on on prem, like for better performance and casing and things like.
Speaker 1That, file systems or something or yeah.
Speaker 2Just different roles for the server.
Speaker 3I don't know if this is a bell weather for what's to come, but it would it's difficult to see this not happening more and more often.
And so you know, the lesson is, if you're going to you're in for the penny, in for a pound with the cloud.
You're either hosting it there or you're not.
I don't know of really good reasons why you wouldn't go fully hosted, but this is a good reason too.
Speaker 1Well, let's say you are in a hybrid situation.
So this this is a vulnerability that can allow attackers to escalate privileges prevesque and exchange online cloud environments undetected.
Speaker 2Yeah.
Speaker 3Yeah, they're getting in on the on prem component and then they're using that admin access everywhere.
Speaker 2Okay, right, but according to this, if I've read this correctly, an attacker first has to compromise the on prem exchanger and have administrative right.
Yeah, so there has to be a way that a user, some attacker is going to compromise an exchangeer for on prem right, right, So there in lies the you know, any complexity still has to happen.
It's not like okay, so it's kind of like the privilege esk.
Speaker 1Right, it's a secondary attack.
So the first attack is to your local deployment.
They have to get in there, and once they're in there, they can get in.
Speaker 2Once they're in there, they can forge a token that allows them to move into the cloud in its stealthy way.
If if you want to make a small fortune, start with a large four.
So needless to say, this is but this is a this is an important thing, and uh, there was just an issued order.
SISA has issued an emergency directive order to all Federal Civilian Executive branches.
Easy for me to say that agencies to migrate to the critical Exchange Hybrid vulnerability tracked as CVE twenty twenty five five three seven eighty six by Monday morning at nine am.
So a lot of Federal Civilian Executive branches are going to be very busy this weekend making sure that they patch and have the hot fixes for their on prem exchange overs.
So I don't know if that means they've seen this actively in the wild or they've seen this targeting federal agencies.
But SIS has never taken this strong of an approach where they're like, hey, you guys specifically need to go patch right now and by Monday.
Speaker 3Well there's this that there was something in here about.
Yeah, there's something in here about.
For instance, at least ten hacking groups exploited proxy log on in March twenty twenty one, including Chinese threat actors as tracked as half Neum and Silk Typhoon.
And so I think I think we're getting the government's getting basically owned by this whole hybrid thing, the SharePoint thing that happened a couple a week ago, two weeks ago.
Yeah, so I think we might see less of that.
Speaker 1So there's a do you see on the article where it says total domain compromise?
Yeah, so it says SISA issued a separate advisory addressing the issue and advised network defenders who want to secure their Exchange hybrid deployments against potential attacks to install.
And I thought this was interesting.
Install Microsoft's April twenty twenty five Exchange server hot fix updates April it's August.
Yeah, So is that does that mean that's how long the vulnerability has been out there since April?
Speaker 2I would I would assume so before.
I haven't seen the details on the interesting Yeah, April twenty twenty five hot fix.
I mean that might just be a like make sure you've run this, Yeah, not.
You're safe if you've run.
Speaker 1This okay, yeah yeah, and if all else fails, get rid of Exchange.
Speaker 2Yeah.
According to the article I was reading, it says apply the hot fix install April twenty twenty five Exchange hot fix deployed dedicated hybrid app swich from a shared service principle to a dedicated exchange hybrid application.
Reset any of your shared credentials, So if you have O ofth or hybrid shared credentials, if you reset so on and so forth.
So you know, if you're compromised, we always say the same thing.
Lots of people ask us like, oh I was compromised.
I patched it now, am I good?
It's like, well, the attackers could have taken anything, added user accounts, it's all sorts of stuff that can happen.
Speaker 3Deployed dedicated exchange hybrid app seems like an extra step that you might not get in a normal patching.
Yes, yeah, exactly, And so maybe that's this hidden sauce.
Speaker 1And you know, I said don't use exchange.
That's just a joke, folks.
I know that what are you going to do?
You're going to replace it with something else that you know nothing about, that may have a whole new host of problems.
So it's really about the architecture, isn't it.
And if you're going to do this kind of hybrid on prem cloud architecture thing, I would want to use Microsoft stuff because at least they're on top of it.
Speaker 3I'm a pretty big fan of Microsoft.
But it felt sure like they were retreating from you just having an on prem exchange server and making it so that it was impossible to have an on prem exchange server, not.
Speaker 2Just an on prem exchange server like on prem anything Microsoft Office.
Speaker 3Yeah, and they had a motivation to allow that to happen or to make that to happen.
And so maybe the same thing is going on here.
I mean Microsoft's again, great products.
I love the company.
I have a lot of friends with them.
Speaker 1My friends friends or Microsoft's people say, again, some of my best friends are Microsoft.
Speaker 2Microsoft.
Speaker 1Yeah, it's true, that's true, actually true.
Speaker 2We love you Microsoft down well.
Speaker 3And I was really pissed about that that article the other day where they were letting, you know, foreign actors access sensitive networks.
Speaker 2I haven't forgiven them for that yet.
So well, you better before we go to that conference when we do that thing.
Speaker 1Yeah, Oh, that conference.
Speaker 2Is going to be a lot of Microsoft people there.
I can take them.
Speaker 1We're we're doing a security this week live at what is it, cyber Intersection.
Speaker 2I didn't want to break the news, but you're right.
The dev Intersection conference is cyber Insection Intersection cyber.
Speaker 1Yeah, the cyber dev Intersection Conference, and I think down down in Orlando, Michelle's going to join us on stage.
It's going to be just like this but live.
Speaker 2So if you're at the Dev Intersections cyber Section prints, join us.
Okay, yeah, that'd be awesome.
Come over and watch the live taping of this very show.
Speaker 1Okay, before we get to the clickbait Twain, anything you want to say about our discord.
Speaker 2Server Discord's been awesome.
Actually, there are still a lot of really great conversations, a lot of really good articles coming in from people.
I really appreciate that.
That helps out a ton when we're looking I mean, listen, cybersecurity news is fast.
We're seeing at least thirty or forty articles the day, and we're trying to pick the top one.
So it's really good for you guys to throw them in there and let us know what's super important to you.
So by all means like jump in the discord, say hi, and we'll be there.
Speaker 3Yeah, we're like gallant getting We're grabbing a five gallon bucket once a week from a river, and so we try to pick ones that we can talk about, bring up things and reinforce stuff.
Speaker 1Yeah, all right, here we go, folks.
Story from Politico.
Federal court filing system hit in sweeping hack.
Now that might just sound like something you can ignore, but check this out.
The identities of confidential court informants are feared compromised in a series of breaches across multiple US states.
The Administrative Office of the US Courts, which manages the federal court filing system, along with Justice Department and individual district courts around the country.
They're still trying to determine the full extent of this incident.
Oh my god.
Speaker 3So in the past, there's been hacks that never showed up on the dark web.
So, for example, the most famous one I can think of is the Marriotte hack of years ago, which was then suspected and still suspected.
I believe to have been Chinese government actors because they wanted the data for their own purposes.
I wonder if this will end up the same way where somebody did this for their own purposes, and you know they're trying to get Jackie two coats or whoever the you know, whoever they're trying to get.
That's a nickname we gave my brother at one point he wore two coats in a winter to some event and we said, oh, Jackie two coats.
Speaker 1But hey, my drummer's name is Tommy five times.
Speaker 3So it could be that we never know who did this, or or you know, who did it is is not confirmed, or this information could end up in the dark weapon which case it's just some schmuck who decided that they wanted to do something because they could.
Speaker 1You know, you think that the government would be able to protect your identity?
Would you?
Would you think that?
I don't know, would you really?
Speaker 2Says says, wait, you didn't, I don't know.
Did you see the hack of the o PM where ye complying for secret clearance was released.
Speaker 3I believe we could predict protects, but I don't think the government can protect.
Speaker 2No offense to the government.
We have a lot of government friends.
We really right, Yeah, yeah, we love you.
Speaker 1Don't deport us some of my best friends.
Speaker 2Your government.
Speaker 1And they weren't for Microsoft.
Speaker 2Yeah, Microsoft Government best friends.
Speaker 3I could talk some real trash in a few months when everybody's retired, though.
Speaker 2Give it, give it a couple of months.
Speaker 1All right.
Well, I guess that's it for this week.
We will see you next week on Security this week, good bye, bye, my guys.