PSWEpisode635

From Paul's Security Weekly
Revision as of 20:07, 16 January 2020 by Jeff (talk | contribs)
Jump to: navigation, search

Recorded January 16, 2020 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor
  • Jeff Man
    Cryptanalyst,
    infosec analyst, pioneering ex-NSA pen tester, PCI specialist,
    Tribe of Hackers, & InfoSec Curmudgeon.
    Currently a Sr. InfoSec Consultant for Online Business Systems.
  • Tyler Robinson
    Managing Director of Network Operations at Nisos, Inc .


  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Security News - 6:00-6:45PM

    Paul's Stories

    1. Powerful GPG collision attack spells the end for SHA-1
    2. Artificial Personas and Public Discourse - Schneier on Security
    3. Unpatched Citrix Flaw Now Has PoC Exploits
    4. How Cyber Security Affects SEO
    5. Cisco addressed a high-severity bug in Webex that could allow Remote Code Execution
    6. Security pitfalls to avoid when programming using an API - Help Net Security
    7. Lottery hacker gets 9 months for his 5 cut of the loot
    8. 5G Security - Schneier on Security
    9. Exploit that gives remote access affects ~200 million cable modems
    10. Perfect Sense unveils Gyro to simplify cloud infrastructure management - Help Net Security
    11. Serious back door Vulnerabilities spotted in Tik Tok
    12. Malicious npm package taken down after Microsoft warning
    13. Windows 10: NSA reveals major flaw in Microsoft's code
    14. Trump Slams Apple for Refusing to Unlock Suspected Shooters iPhones
    15. PussyCash adult webcam data breach exposes highly sensitive data of models
    16. How to Reduce Your Attack Surface with 11 Proven Tips

    Larry's Stories

    Jeff's Stories

    1. Yo, sysadmins! Thought Patch Tuesday was big? Oracle says 'hold my Java' with huge 334 security flaw fix bundle
    2. Microsoft's Chain of Fools
    3. Tom Ptacek Analysis of Windows 10 Vulnerability from Hacker News
    4. Windows 10 Has a Security Flaw So Severe the NSA Disclosed It Let's talk the NSA angle
    5. Russia Hacked Ukrainian Company Linked To Trump Impeachment, Security Firm Says Let's Get Political?
    6. U.S. Army Hacked By 52 Hackers In Five Weeks
    7. The dark side of IoT, AI and quantum computing: Hacking, data breaches and existential threat

    Lee's Stories

    1. PayPal patches high severity password vulnerability Security token exposure in CAPTCHA process resolved. No evidence of abuse found.
    2. DOI halting use of DJI drones over concerns of Chinese Tech DOI has over 800 DJI drones which may have surveylence capabilities. Decision to replace rather than repair.
    3. Maze ransomware operators publish 14GB of Southwire files Southware refused to pay the ransom, and obtained an injunction aginst the first publisher of their data. Maze raises the stakes. REvil similarly inclined.
    4. AA20-014A: Critical Vulnerabilities in Microsoft Windows Operating Systems CryptoAPI spoofing vulnerability - CVD-2020-0601, Windows RDP vulnerabilities - CVD-2020-0609, CVD-2020-0610, CVD-2020-0611 - impacts Server 2012 and newer, Windows 7 and newer. Apply January patch bundle.
    5. DHS Emergency Directive 20-02 - MS January Patch bundle DHS mandates all US Government agencies apply the MS January updates by January 29th, with reporting/accountability.
    6. Russian Hacking group targets Barisma Holdings ATP28 is targeting Ukrainian gas company at center of impeachment debate.
    7. 29 Million records from LimeLeads put up for sale Records from B2B lead generation company LimeLeads data breach found up for sale by "Omnichorus." Data good for supporting identity theft.

    Tyler's Stories

    Tech Segment: Ryan Speers & Jeff Spielberg, River Loop Security, LLC - 6:45PM-7:30PM

    Ryan Speersis a Security Researcher at River Loop Security, LLC.
    Ryan is a managing partner of River Loop Security and has assessed a wide range of embedded devices, finding vulnerabilities by physical attacks, network access, firmware reversing, and other techniques. He has led design of remediations or new systems, frequently focusing on their cryptographic protocols and protections. Ryan is also known for his research on the security of radio protocols, including IEEE 802.15.4/ZigBee and maintenance of the KillerBee framework frequently used to assess these protocols.

    He also has unique experience analyzing intrusion attempts and malware from sophisticated cyber actors as well as developing strategy and operations. He participated in discovering and countering of the most sophisticated cyber threats from nation states and foreign organized crime. Finally, Ryan has developed specialized tools for Windows, performed protocol analysis, designed custom protocols, and performs static and dynamic application analysis.

    He has published peer-reviewed articles at USENIX WOOT (Packets in Packets: In-Band Signaling Attacks for Modern Radios), HICSS (wireless tools), Workshop on Embedded System Security (USB as a “network” attack surface for embedded systems), and MILCOM. Additionally, he has presented at the ShmooCon, ToorCon Seattle, DefCon Wireless Village, Ekoparty, and Troopers information security conferences. Ryan also is the inventor on a number of patents related to key management and encryption at scale.

    Ryan has worked as a security researcher and developer for the USG, a fraud detection company, a university, and a VC-backed start-up enterprise security and encryption company. He holds a Computer Science degree from Dartmouth College and various other trainings.





    Jeff Spielbergis a Managing Partner of River Loop Security, LLC.

    Jeff Spielberg is a managing partner of River Loop Security. An electrical engineer by training, his primary cybersecurity interests and research focus on low-level hardware reverse engineering on embedded devices. He has performed security penetration testing on a wide array of embedded devices and often works on secure design and architecture projects for critical embedded and IoT applications.

    Segment Topic:
    Embedded Product Security: Left of Ship

    Segment Description:
    The world continues to see a proliferation of highly insecure IoT/embedded products. How can companies making embedded products design security in from the start, and why don’t they do it today? Importantly, security needs to be baked in while remaining lean and moving quickly towards an MVP product. Discussions will range from hardware chip selection, cryptographic protocol design, and firmware security -- both at the design and security pen test phases.

    Segment Resources:
    • Background
    1. Problem Space

    - We keep seeing the same vulnerabilities in embedded / IoT – hardcoded passwords, outdated open source packages, unnecessary network exposure. While some exploited vulns are complex chains, most remain simple, fixable issues. However, we continue to see thousands of new embedded devices (consumer IoT to industrial and critical system) that don’t fix these issues (summary of landscape from f-prime at https://s3-eu-central-1.amazonaws.com/evermade-fsecure-assets/wp-content/uploads/2019/04/01094545/IoT-Threat-Landscape.pdf). This creates the need to start identifying these issues earlier in development since patching cycle times in embedded are long.

    1. Shifting security left

    - We looked at our past data from 10 years of services work, and found that it’s more expensive for firms to respond to 1 vulnerability disclosure than it is to do an end-to-end embedded secure design process https://www.riverloopsecurity.com/blog/2019/08/proactive-reactive/

    • Where security teams/expertise can help
    1. Considerations for embedded

    - There’s a special order of operations when it comes to embedded systems – hardware changes can be incredibly expensive (for a PCB turn), and there’s a goal to always minimize BOM cost. This manifests itself as issues with chip selection and hardware design which create vulnerabilities from the start – that have no easy fix in the field. This makes the initial threat modeling, architecture, and key design decisions (e.g. chip selection) critical to get right

    1. Using tooling

    - We’ve open sourced some things that may be relevant, such as https://www.riverloopsecurity.com/blog/2019/04/secure-embedded-development-banned-h/ to help developers avoid memory safety issues in the first place as much as possible. Firmware Security Analysis – quickly growing field - There are tools for firmware evaluation, including some open source ones such as https://github.com/cruise-automation/fwanalyzer and more in-depth commerical ones such as one we launched, https://pilot-security.com. If you want, we could talk about what such types of tools can/can’t do - and how people can use them to find bugs early in development.

    Hacker Culture Roundtable - 7:30-8:30PM



    To see all hosts on this show, visit our wiki page and all of the show notes are here as well!

    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+