Recorded January 16, 2020 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Security News - 6:00-6:45PM
- Powerful GPG collision attack spells the end for SHA-1
- Artificial Personas and Public Discourse - Schneier on Security
- Unpatched Citrix Flaw Now Has PoC Exploits
- How Cyber Security Affects SEO
- Cisco addressed a high-severity bug in Webex that could allow Remote Code Execution
- Security pitfalls to avoid when programming using an API - Help Net Security
- Lottery hacker gets 9 months for his 5 cut of the loot
- 5G Security - Schneier on Security
- Exploit that gives remote access affects ~200 million cable modems
- Perfect Sense unveils Gyro to simplify cloud infrastructure management - Help Net Security
- Serious back door Vulnerabilities spotted in Tik Tok
- Malicious npm package taken down after Microsoft warning
- Windows 10: NSA reveals major flaw in Microsoft's code
- Trump Slams Apple for Refusing to Unlock Suspected Shooters iPhones
- PussyCash adult webcam data breach exposes highly sensitive data of models
- How to Reduce Your Attack Surface with 11 Proven Tips
- Yo, sysadmins! Thought Patch Tuesday was big? Oracle says 'hold my Java' with huge 334 security flaw fix bundle
- Microsoft's Chain of Fools
- Tom Ptacek Analysis of Windows 10 Vulnerability from Hacker News
- Windows 10 Has a Security Flaw So Severe the NSA Disclosed It Let's talk the NSA angle
- Russia Hacked Ukrainian Company Linked To Trump Impeachment, Security Firm Says Let's Get Political?
- U.S. Army Hacked By 52 Hackers In Five Weeks
- The dark side of IoT, AI and quantum computing: Hacking, data breaches and existential threat
- PayPal patches high severity password vulnerability Security token exposure in CAPTCHA process resolved. No evidence of abuse found.
- DOI halting use of DJI drones over concerns of Chinese Tech DOI has over 800 DJI drones which may have surveylence capabilities. Decision to replace rather than repair.
- Maze ransomware operators publish 14GB of Southwire files Southware refused to pay the ransom, and obtained an injunction aginst the first publisher of their data. Maze raises the stakes. REvil similarly inclined.
- AA20-014A: Critical Vulnerabilities in Microsoft Windows Operating Systems CryptoAPI spoofing vulnerability - CVD-2020-0601, Windows RDP vulnerabilities - CVD-2020-0609, CVD-2020-0610, CVD-2020-0611 - impacts Server 2012 and newer, Windows 7 and newer. Apply January patch bundle.
- DHS Emergency Directive 20-02 - MS January Patch bundle DHS mandates all US Government agencies apply the MS January updates by January 29th, with reporting/accountability.
- Russian Hacking group targets Barisma Holdings ATP28 is targeting Ukrainian gas company at center of impeachment debate.
- 29 Million records from LimeLeads put up for sale Records from B2B lead generation company LimeLeads data breach found up for sale by "Omnichorus." Data good for supporting identity theft.
Tech Segment: Ryan Speers & Jeff Spielberg, River Loop Security, LLC - 6:45PM-7:30PM
Ryan is a managing partner of River Loop Security and has assessed a wide range of embedded devices, finding vulnerabilities by physical attacks, network access, firmware reversing, and other techniques. He has led design of remediations or new systems, frequently focusing on their cryptographic protocols and protections. Ryan is also known for his research on the security of radio protocols, including IEEE 802.15.4/ZigBee and maintenance of the KillerBee framework frequently used to assess these protocols.
He also has unique experience analyzing intrusion attempts and malware from sophisticated cyber actors as well as developing strategy and operations. He participated in discovering and countering of the most sophisticated cyber threats from nation states and foreign organized crime. Finally, Ryan has developed specialized tools for Windows, performed protocol analysis, designed custom protocols, and performs static and dynamic application analysis.
He has published peer-reviewed articles at USENIX WOOT (Packets in Packets: In-Band Signaling Attacks for Modern Radios), HICSS (wireless tools), Workshop on Embedded System Security (USB as a “network” attack surface for embedded systems), and MILCOM. Additionally, he has presented at the ShmooCon, ToorCon Seattle, DefCon Wireless Village, Ekoparty, and Troopers information security conferences. Ryan also is the inventor on a number of patents related to key management and encryption at scale.
Ryan has worked as a security researcher and developer for the USG, a fraud detection company, a university, and a VC-backed start-up enterprise security and encryption company. He holds a Computer Science degree from Dartmouth College and various other trainings.
Jeff Spielberg is a managing partner of River Loop Security. An electrical engineer by training, his primary cybersecurity interests and research focus on low-level hardware reverse engineering on embedded devices. He has performed security penetration testing on a wide array of embedded devices and often works on secure design and architecture projects for critical embedded and IoT applications.
Embedded Product Security: Left of Ship
The world continues to see a proliferation of highly insecure IoT/embedded products. How can companies making embedded products design security in from the start, and why don’t they do it today? Importantly, security needs to be baked in while remaining lean and moving quickly towards an MVP product. Discussions will range from hardware chip selection, cryptographic protocol design, and firmware security -- both at the design and security pen test phases.
- Problem Space
- We keep seeing the same vulnerabilities in embedded / IoT – hardcoded passwords, outdated open source packages, unnecessary network exposure. While some exploited vulns are complex chains, most remain simple, fixable issues. However, we continue to see thousands of new embedded devices (consumer IoT to industrial and critical system) that don’t fix these issues (summary of landscape from f-prime at https://s3-eu-central-1.amazonaws.com/evermade-fsecure-assets/wp-content/uploads/2019/04/01094545/IoT-Threat-Landscape.pdf). This creates the need to start identifying these issues earlier in development since patching cycle times in embedded are long.
- Shifting security left
- We looked at our past data from 10 years of services work, and found that it’s more expensive for firms to respond to 1 vulnerability disclosure than it is to do an end-to-end embedded secure design process https://www.riverloopsecurity.com/blog/2019/08/proactive-reactive/
- Where security teams/expertise can help
- Considerations for embedded
- There’s a special order of operations when it comes to embedded systems – hardware changes can be incredibly expensive (for a PCB turn), and there’s a goal to always minimize BOM cost. This manifests itself as issues with chip selection and hardware design which create vulnerabilities from the start – that have no easy fix in the field. This makes the initial threat modeling, architecture, and key design decisions (e.g. chip selection) critical to get right
- Using tooling
- We’ve open sourced some things that may be relevant, such as https://www.riverloopsecurity.com/blog/2019/04/secure-embedded-development-banned-h/ to help developers avoid memory safety issues in the first place as much as possible.
Firmware Security Analysis – quickly growing field
- There are tools for firmware evaluation, including some open source ones such as https://github.com/cruise-automation/fwanalyzer and more in-depth commerical ones such as one we launched, https://pilot-security.com. If you want, we could talk about what such types of tools can/can’t do - and how people can use them to find bugs early in development.
Hacker Culture Roundtable - 7:30-8:30PM
To see all hosts on this show, visit our wiki page and all of the show notes are here as well!