From Paul's Security Weekly
Jump to: navigation, search

Hack Naked News #131

Recorded June 28, 2017 at G-Unit Studios in Rhode Island!

Episode Audio


  • Doug White
    Cybersecurity professor, President of Secure Technology, and Security Weekly network host.
  • Jason Wood
    Security consultant, penetration tester, sysadmin, and Founder of Paladin Security.
  • News

    1. -- Shadowbrokers continue their exploits by planning to dox a hacker who worked for the NSA. They also keep reasing the price for subscriptions.
    2. ELSA, basically uses local hotspots to determine the location of the laptop and then stores that information. Even without an internet connection it's still using wifi to try and determine the loations of the device. Serious spy stuff. Bond has to go in and retreive the laptop later.
    3. -- Way back! You were warned in this oped from 2012. The DoD can't protect it's networks because it uses an all or nothing type approach.
    4. -- So, what happens when your really expensive military equipment runs Windows XP? C'mon, really. What's next tanks using Windows Me. Don't be shocked. Military design projects take years (lots of years) to complete and everthing has to be speced YEARS ago. Change the spec, start over.
    5. -- Wow, now I can't even pay the guy to get the key.
    6. -- This healthcare operation in PA confirmed they were indeed hit with Petya yesterday.
    7. -- When Petya isn't enough, use Double Pulsar. Cover up your exploits with ransomware afterthoughts.

    Expert Commentary: Jason Wood, Paladin Security

    When nations' offensive technical strengths meet their defensive weaknesses

    Basically, the countries around the world are getting (or have) themselves in position to cause major disruptions of enemy/adversary countries. The USA is doing it, Russia is doing it, China is right there along with up and coming players like Iran and North Korea. You can also include the UK, France, etc. Add in to that mix, a number of tools used by the USA have been released publicly and are being used by ransomware crews. The latest outbreak of ransomware using those tools have kicked off today. In short, it's a big ugly mess.

    If one country decides to unload their attacks on another and that country decides to respond in kind, it could very messy very fast. It appears that the USA and Russia could cause some major mayhem if they decided to. We depend heavily on our computer and network systems for pretty much everything. Buying food, getting gas, having power at home, etc. If the current vulnerabilities in the systems we have weren't enough, we continue to race to put more things online and in control of more things we want or need. What happens when someone lights a match in the right place at the wrong time?

    The major take away that I have is that we need to be prepared for things to start breaking on us at some point. That includes tested backup and recovery processes, basic security hygiene being performed, and getting rid of the idea that "it can't happen to use because we [are too small | don't have anything interesting ] and it's too expensive anyways. We can't control what occurs in the Kremlin or in Washington DC. What we can control is what we are doing in our own organizations and homes.

    Source articles: How an entire nation became Russia's test lab for cyberwar

    Senators push Trump for answers on power grid malware attack

    Obama reportedly ordered implants to be deployed in key Russian networks