There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg.
These weekly podcasts come in two main flavors. We’re either ranting about themes close to the heart of us security types, or we’re discussing threats and vulnerabilities that have hit headlines – or slipped under the radar – in recent weeks.
Join Chris Pace (tech advocate and keeper of the coloring pencils), Kev Breen (pro blue teamer, also known as 'Mr Nothing to CVE here...'), Max Vetter (former dark web detective and pretty cool guy), and Paul Bentham (ex-gov. type and Immersive Labs product guru) as they wend their way through the murky world of Cyber Humanity.
35: Exchange Hack: We don’t need no attribution
We haf to talk about HAFNIUM.
You can't have missed the news of the Exchange Server hack that's been running the InfoSec world in circles for the past few weeks. Of course we had to get the crew together to go through all things Exchange!
From attribution and exploitation to... deception? We dip our toes in some tasty conspiracy theories (because who doesn't love a good conspiracy theory?!) and take a dive into the tech behind it all to see how this incident went from small fry to 'holy sh*t it's everywhere!'.
34: So you want to hack a car...
We love looking at how to hack things you didn't think would or could be hacked. Last time, it was an election. This time, it's cars.
We're joined by car hacking expert, https://www.linkedin.com/in/cybermaggedon/ (Mark Adams), to help us navigate our way through these murky waters. From car jacking to car hacking, we take a deep dive into CANBus, the potential motivations for hacking a vehicle (or a fleet of vehicles), and the kind of damage that can be done. We cover everything from cyber extortion to good old-fashioned theft, and explore how uniquely vulnerable vehicles can truly be.
If you'd rather read – and get hands-on with CANBus – https://www.immersivelabs.com/resources/blog/introducing-your-vehicles-nervous-system-canbus/ (head over to our latest blog) to learn more about how to hack a car.
Find out more:
https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (Hackers Remotely Kill a Jeep on the Highway—With Me in It)
https://www.thedrive.com/tech/32170/meet-the-man-who-sells-devices-to-hack-your-cars-keyless-entry (Meet the Man Who Sells Devices to Hack Your Car's Keyless Entry)
33: Parler’s proper privacy palaver
Have you ever lost an irretrievable password? Max knows that pain – as does a certain programmer from San Francisco who is one lost password away from $250million in Bitcoin. Ouch...
Next up, the Parler palaver. Trump has been 'de-platformed' and Parler is seeing huge back-lash for its role in recent political happenings.
And just when you thought you'd had enough of it, we come back round to SolarWinds. Kev delves into the third malware strain directly involved in the SUNBURST attack: SUNSPOT.
"Hacking" Titan 2FA:
32: Breaches, Damned Breaches, and Statistics
SolarWinds and SUNBURST are still consuming the Infosec community and a few things have happened since our last episode. Since the Department of Justice has admitted that they were breached and that email inboxes were accessed, Kev tells us just how bad it is. We cover the saga from all angles, from Jetbrains to attribution and techniques to stock prices.
Next up, cyber crackdowns and criminal marketplaces as the UK's National Crime Agency goes softly, softly.
And finally, in "Hackers Could ..." Google's ReCaptcha can hack itself?
JetBrains in Solarwinds supply chain
Justice Department breached
WhatsApp, Facebook, and our data
Hacking audio ReCaptcha with Google speech to text
21 arrests in cyber crackdown
31: Sunburst: Too Cozy To Bear
Unless you’ve been living under a rock for the past few days, you would have heard about Sunburst – a sprawling cyberattack allegedly masterminded by Russian nation-state hackers, UNC2452 (also known as Cozy Bear). Because we love talking about stuff like this, we couldn’t resist getting the crew together to go over the events of the past few days with a fine-tooth comb. There’ll be no cruising into Christmas for us!
From what SolarWinds is exactly all the way through to the impact of the attack, Chris, Kev and Paul take a proper look at Sunburst, SolarWinds, and what this means for 2021. And, because we’re a generous bunch and it is Christmas after all, we’ve created a series of labs dedicated to helping you understand and get hands-on with Sunburst – that you can access entirely for free. https://community.immersivelabs.online/browse/category/cyber-threat-intelligence/sunburst-supply-chain-compromise (Check them out here.)
Fireeye summary (including detections):
First reports of Solarwinds compromise:
30: Cold Chain Hype Train.
All aboard the hype train! We jump straight into the latest news that the supply "cold chain" for the much-awaited COVID vaccine could have been compromised. Apparently, a cyber espionage campaign has targeted the supply chain for the cold storage. BUT – and this is a big but – this all sounds a little tenuous to the team. Considering we didn't even know we had a vaccine by September, which is when the campaign was supposed to have started, how could attackers have already started targeting the supply chain?
The team also strays into 'flat earth' territority for a brief and surprising pitstop – listen out for Kev "the Director of Truth's" excellent rant, it's very enjoyable.
We also get into firmware. When was the last time you updated your firmware? From anti-adultery mattresses (yup, you read that right) to smart mugs (and you read that right too!), we somehow end up with a long episode of 'hackers could...'.
Insightful and Hilarious!
These guys are great-! Smart, witty and filled with insight.