Risky Business - Risky Business #827 -- Iranian cyber threat actors are down but not out

Episode Date: March 4, 2026

On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover: The US-Israeli attack on Iran had a whole lot... of cyber. It’s clearly in the playbook now! The NSA Triangulation / L3 Harris Trenchant iOS exploit kit is on the loose, and being used by Chinese crypto scammers So long Maddhu Gottumukkala, but CISA’s annus horribilis continues Adam “humbug” Boileau complains about the Airsnitch wifi attack just being three ethernets in a trenchcoat ASD’s Cisco SD-WAN threat hunting guide is clearly borne of … experience This week’s episode is sponsored by AI threat hunting platform Nebulock. Sydney Marrone joins to talk about how useful AI models are on the hunt, and her work building out an open source framework and maturity model. It’s methodology agnostic, so you can adapt it for your environment, and the github link is in the show notes! This episode is also available on Youtube. Show notes Inside the plan to kill Ali Khamenei Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran | TechCrunch Matthew Prince 🌥 on X: "Counter to what some cyber vendors are saying, there’s been a dramatic drop in Iranian cyber operations. Likely as the operators are sheltering. They may pick back up, but right now there’s a noticeable lull." / X Cyber Command disrupted Iranian comms, sensors, top general says | The Record from Recorded Future News Iranian Hackers Use Elon Musk’s Starlink To Stay Online Exclusive | U.S. Smuggled Thousands of Starlink Terminals Into Iran After Protest Crackdown - WSJ Attacks on GPS Spike Amid US and Israeli War on Iran | WIRED Amazon Data Centers on Fire After Iranian Missile Strikes on Dubai A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals | WIRED Canceled contracts, a failed polygraph and personal disputes: Inside the turbulent tenure of Noem’s former cyber czar - POLITICO CISA CIO Robert Costello exits agency | CyberScoop OpenAI alters deal with Pentagon as critics sound alarm over surveillance Inside Anthropic’s Killer-Robot Dispute With the Pentagon - The Atlantic Read the full transcript of our interview with Anthropic CEO Dario Amodei - CBS News CBP Tapped Into the Online Advertising Ecosystem To Track Peoples’ Movements Large-Scale Online Deanonymization with LLMs Hackers Weaponize Claude Code in Mexican Government Cyberattack - SecurityWeek New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises - Ars Technica CISA orders agencies to patch Cisco devices now under attack | Cybersecurity Dive CISCO SD-WAN THREAT HUNT GUIDE ClawJacked attack let malicious websites hijack OpenClaw to steal data Area Man Accidentally Hacks 6,700 Camera-Enabled Robot Vacuums | WIRED Intellexa founder, three others sentenced to 8 years in prison over Greek spyware scandal | The Record from Recorded Future News Moscow man accused of posing as FSB officer to extort Conti ransomware gang | The Record from Recorded Future News Farewell, Felix · The Recurity Lablog Atmos Sphere 2026 | Atmos The Agentic Threat Hunting Framework | Nebulock blog GitHub - Nebulock-Inc/agentic-threat-hunting-framework: ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy. · GitHub

Transcript
Discussion (0)
Starting point is 00:00:00 Hi everyone and welcome to risky business. My name's Patrick Gray. Absolutely jam-packed show this week. We've got a bunch of news to get through. And Adam Bwalo and James Wilson will be joining me in just a moment to walk through all of that. And then we'll be hearing from this week's sponsor. And this week's show is brought to you by Nebulok, which is a startup that does AI-based threat hunting. And in this week's sponsor interview, Nebulauk's head of threat hunting, Sydney Moroni is joining us to talk about a gentic threat hunting guide that she has written. But yes, Sydney Maroni is this week's sponsor guest and that interview is coming up after this week's news,
Starting point is 00:00:45 which starts now. And Adam, of course, the big news this week is the war against Iran. You know, he's kicked off by none other than the FIFA Peace Prize laureate Donald Trump. the president of peace. Donald Trump is bombing the absolute crap out of Iran in conjunction with Israel. And, you know, it didn't take long for the cyber angles to emerge here. Of particular interest is this piece from the Financial Times that cites some, you know, anonymous sources talking about how the, you know, IP traffic cameras and whatnot in Tehran have been compromised for just years and years and years.
Starting point is 00:01:28 Yeah, I mean, it's one of the things we've seen. seen in a number of conflicts around the world is the importance of internet connected cameras for reconnaissance, for battle damage assessment, for all kind of like on the ground situation awareness remotely. Like the sort of things that previously you would have relied on, you know, human sources for or surveillance, you know, overflying, that kind of thing, like actually being able to see on the ground what something looks like really does it appear make a pretty big difference. And in this case, Israel's access to the the camera systems there seem to have been pretty important at tracking movements in and out
Starting point is 00:02:05 of the compound where Alecimini was, you know, was eventually killed, understanding the pattern of life around that. I mean, that's, you know, you can certainly see how those dots are we joined together. And of course, Israel, you know, has been up in Iran's business so much over the years, you know, with the big gas pumps and camera systems and, you know, all sorts of things like that. There were also reports that they were, all the Americans, whoever it was, it was in the mobile phone system around the compound and was able to disable communications for bodyguards in the time leading up to the attacks or they weren't getting any advance warning of incoming aircraft or whatever else.
Starting point is 00:02:47 So, you know, the cyber angle to this seems like it may well have been, you know, kind of more, you know, important, perhaps than in other conflicts that we've seen. Yeah, I do think this really does cement the idea that IP cameras are a risk, right? And it sort of explains why a bunch of the SIGAN agencies for years have been so absolutely terrified of like Hick Vision cameras and there's initiatives to rip them out of places. And, you know, so yeah, that's one aspect to this. I think another interesting thing here is a lot of the reporting is suggesting that the timing of this war kicking off. I'm sorry, it's a special combat operation. Special military operation was taken.
Starting point is 00:03:25 So they've gone for special combat operation, I think. But yeah, the reason this kicked off when it did is because they had the opportunity to actually get Kermainei because they knew where he was. So that might actually explain the timing where it was like, well, you know, we know that this meeting is happening. Let's go. And yeah, following people around on traffic cameras through Tehran, building pattern of life. You know, no surprise there that the cyber angle here is largely about intelligence gathering. We also have a write-up here from TechCrunch. Lorenzo has done a bit of a round-up of, you know,
Starting point is 00:04:03 just a round-up of some of the cyber activities that have been reported, including, like, there was a prayer app that got hacked and, you know, was giving people messages to lay down their arms and whatever and, you know, join an uprising against the government. I think there was some TV stations hacked as well, and they had Netanyahu and others, you know, broadcast onto Iranian TV. I mean, most of it is much as much as you expect, right? Yeah, yeah.
Starting point is 00:04:25 I mean, we've certainly seen, you know, that I'm thinking like all the episodes of between two nerds that we've had over the last couple of years about the conflict in Ukraine and the extent to which cyber hasn't really been that impactful here. And there are certainly some elements of that here. Like, I mean, things like hacking a prayer app to tell people to lay down their arms. You know, that's the sort of thing that Tom and Gruck would probably be like, you know, come on. That's not really, you know, that's not the good cyber. But, you know, there really is a gamut of legitimate uses here from, you know, Patent of Life stuff through to some of the disruption we've seen of air defense systems, like certainly going into Venezuela. We've got, I guess, like a preview of what that looked like.
Starting point is 00:05:06 And then, you know, there's been a number of stories about, both in this set of conflicts against Iran and the earlier strikes about the extent to which, you know, air defense was not particularly effective and, you know, where we saw, like, what, power cut off to radar sites or something. something prior to the previous attacks. So, you know, there are a set of things that cyber is legitimately being, is legitimate useful for that are being used, you know, now several times. We see a whole, this is a playbook now. It's not a one-off, right?
Starting point is 00:05:35 This is clearly the way that they're going to do this in the future. And everyone else is going to be paying attention. There is cyber doctrine now, right? And, you know, we have seen some comments from US military officials along the lines of, you know, there was cyber and space-based, you know, operations against their defense and whatnot. So yeah, it does look like there is a playbook for this stuff now. We've seen a comment from Matthew Prince of Cloudflare. He says, said on X, counter to what some cyber vendors are saying, there's been a dramatic
Starting point is 00:06:04 drop in Iranian cyber operations, likely as the operators are sheltering, they may pick back up, but right now there's a noticeable lull. Our read on this, you know, we had a, all of us had a meeting yesterday, had a bit of a discussion. And Tom Uren, our colleague suggested that perhaps they're not hiding from the bombs, but they're normal offices are being absolutely deduced to smithereens. And I think that is actually a fairly likely scenario. Yeah, I mean, either way, access to the internet in the country is pretty heavily restricted. So, like, there is a great many reasons why they might be somewhat occupied and not really able to,
Starting point is 00:06:36 you know, contribute. You know, most of the talks of counterattacks we've seen so far have been of the, like, missile and drone variety towards other states in the Gulf. You know, we may see some cyber coming, but yeah, right now they've probably got other things going on in their lives, you know, regardless of whether it's packets or bombs. Yeah, and of course, Cyber Command's out there talking about how they've disrupted Iranian comms and whatnot. So, you know, I think just trying to get anything done in Iran at the moment would be actually quite difficult. But that's not to say that once this calms down, we won't
Starting point is 00:07:05 start seeing Iranian threat actors really kicking up and causing a stink. I mean, I am not entirely sure how worried we should be about this yet, but my feeling is that it's not. trivial, like that we could see a bunch of nuisance attacks coming out of Iran eventually. Yeah, because when else are they going to do it? Like, if not now, what were they preparing for? What was all of the preparing the battle space? I mean, what's the escalation risk now, right? Exactly, right, exactly.
Starting point is 00:07:34 Like, why, what reasons would hold them back now after they've had their leader, you know, bombed by an adversary? Like, why wouldn't they go on and throw everything they've got? They're launching, you know, missiles and everything else. if they've got anything left in the tank cyber-wise, like surely we are going to see it in the very near future. Yeah, well, and look, there's the other wildcard here too, which is that we don't know how any of this is going to play out yet, right?
Starting point is 00:07:59 I mean, I think where I am with this and where most of the people I know are with this is that we have no idea what's going to happen here. And you can sort of really hope for a positive outcome, but it seems like a pretty narrow opportunity to get that outcome, Right? So this is a massively destabilizing event that's going to have all sorts of, has potential to have all sorts of second order effects. And we just don't know how that's going to work out. But, you know, only time we'll tell. We've also seen a bunch of Starlink related news. Adam. We've got a report here from Forbes that says that Iranian hackers are using Starlink to stay online. Are these script kitties or is this like state-sponsored activity? I think, well, one of the groups is Handala, which is linked to the IRGC. I'm sorry, the Ministry of Intelligence and Security.
Starting point is 00:08:49 So, like, they are very much state aligned. But, you know, I think anyone who's getting online from Iran at the moment is getting online through Starlink, it seems. So there isn't very many other options. So you get a little bit of everything as to whether, you know, the MOIS-linked hackers are able to go really operate in these circumstances. We don't really know. But, yeah, I think anyone using the internet in Iran right now,
Starting point is 00:09:11 probably on Starlink, for better or for worse. And, you know, staying with Starlink, it looked like the United States, according to this report from the Wall Street Journal, the United States has actually smuggled thousands of Starlink terminals into Iran. This happened amid the protest crackdowns. So, you know, that's a bit of a wildcard
Starting point is 00:09:27 in all of this as well. But it's like, yeah, I'd imagine the networks are not working particularly well over there. And Starlink is that, yeah, it's a bit of a wildcard. Yeah, I mean, it certainly has changed how we deal with communications, you know, in places where the local infrastructure that doesn't exist or the government, the regulatory environment doesn't want it to exist.
Starting point is 00:09:45 And, you know, anyone who's looking at building, you know, their own isolated internet, I'm looking at you, Russia, you know, has to contest now with the existence of a global network that's very hard to block other than, you know, direction-finding terminals or looking on people's roofs or whatever else, which, you know, Iran has been very much trying to do. Yeah, yeah, indeed. Now staying with wireless stuff, don't rely on your GPS in the straight-of-all-muse at the moment, Adam, I think it would be the TLDR. Yeah, I've been looking at some of the flight tracking sites and the boat tracking sites,
Starting point is 00:10:15 and yeah, GPS is just all over the place in that region. You know, the planes, you know, flipping around the world instantaneously with, you know, spoofed signals or faked responses up to the receivers for the ADSB data, and yet the same in the shipping environment. So, you know, we've seen large-scale GPS disruption for it. It's kind of expected as part of any modern conflict. Yeah, I mean, I've color me completely. unsurprised that this is happening right yeah yeah all right now we're going to
Starting point is 00:10:44 bring James into this one because this story is actually kind of funny in that I mean is it funny I don't know but a missile has hits an Amazon data center in Dubai leading to an absolutely hilarious statement from Amazon saying that an object hit their data center causing sparks and fire which is an interesting way to say that your data center got bombed But there's a whole dimension to this that Adam and I, you know, we were completely unaware of, but James, you worked for Amazon. You're much more familiar with how they run their data centers.
Starting point is 00:11:22 And from what you've told us, recovering from this is going to be an absolute nightmare. Yeah, I wouldn't be surprised if they have to essentially scorch the earth and start again with the entire data center. So the thing with Amazon data centers is that they, They are largely something where equipment goes in and it only comes out wrecked. And what I mean by that is when you go into a facility, there's parts of the facility in particular the data center halls where you cannot take any electronic equipment into. You don't have your phone.
Starting point is 00:11:54 You certainly don't have any USB devices. You go through all manner of metal detectors to make sure that it's literally just the human flesh and blood that is walking in to the data center. And anything that gets removed out of there, especially servers that might be carrying hard drives and SSDs, they're physically destroyed, right? We would drill through the drives. We would drill through the main boards before they would be permitted
Starting point is 00:12:13 and they'd be inspected before they're taken out. So when you've got a situation where an object has broken the physical perimeter of a data center, it raises the question of, well, how can they reestablish that lineage of trust of any of the hardware in there? What's to say someone didn't sneak in there while there's a big hole in the wall and implant a bunch of things with a USB drive? You just don't know them because you don't know. I can't imagine you've got to start again from scratch.
Starting point is 00:12:37 So the recovery from this, I think, will be quite lengthy. Yeah, I mean, you just sort of wonder if given the scale of this as a problem that maybe an exception is made or a secondary process has worked out, like, I don't know, maybe there's someone at Amazon who worked on a procedure for this and it's in a binder somewhere. I mean, is that possible? Possibly, but I just don't see how they reestablish the trust with their customers, you know. We made an exception here because it was an object that went through the wall and, you know, trust us. it's fine. But the reason they do such extreme care around devices go in and they're certified that they're blank. And when they leave, they're destroyed is that's how people universally trust. Okay, well, I'm going to put my data in a data center. So I just don't think an exception would even be
Starting point is 00:13:21 entertained here. But at the same time, this is the first time we've seen a multi-AZ outage that hasn't been caused by a software bug. So we're definitely in some pretty uncharted territory. Yeah. And look, full credit to whoever wrote that statement, because that is, you know, know, just incredible BS. That is like 10 out of 10 BS that an object struck the data center causing sparks and fire. And of course, you know, you made the point to us earlier that it's not just about, you know, a hole going into the wall, but presumably there were some firefighters and whatnot on the scene. And, you know, people who are not Amazon staff who had not been, you know, they brought in their hose.
Starting point is 00:13:55 That's not just, you know, just a fleshy meat sack going into the old data center there. So, yeah. Probably someone at Amazon's having a hard day is the TLDR there. on that one. Now, we're going to move on to this story by Andy Greenberg that implies a bunch of stuff. I'm going to throw some weight behind what Andy Greenberg is implying in this story.
Starting point is 00:14:22 I'm going to be pretty light on details about how I came to form a series of opinions that I'm going to share with the listeners right now. Now, the story, the headline is a possible US government iPhone hacking toolkit is now in the hands of foreign spies and criminals. And the story basically, it's along the lines that the exploits that were a part of the triangulation campaign that targeted, I think it was over a thousand devices in Russia,
Starting point is 00:14:47 that exploit chain is now being used by criminals to steal cryptocurrency. Now, this story also sort of implies that this exploit chain may have been the one that was stolen by Peter Williams, who was a manager at L3 Trenchin, and sold to a Russian exploit broker. It has been my opinion, and Adam I'm sure you'll back me up on this, that I'm not making it up now. It has been my opinion for several months that the exploit chain that Peter Williams did sell to a Russian broker
Starting point is 00:15:22 was the triangulation exploit chain. It has been my opinion for several months that the reason the Russians discovered the triangulation campaign is because Peter Williams sold those exploits to a Russian exploit broker and somehow they wound up in the hands of the Russian government and from there the Russian government coordinated with Kaspersky to come up with a parallel explanation for how they found this tool chain. So if people have wondered why I've been saying that Peter Williams got off extremely light in his sentence which was what seven and a half years or something, I mean this is
Starting point is 00:16:02 is scandalous what's happened here. Now, Andy doesn't explicitly say, oh, that's what happened. But look, it's long been my feeling that that's what's happened. I have varying levels of confidence in little bits and pieces of it, but I can say that, and as I said, you'll back me up that I've been saying this for a while, it is my opinion. And I haven't wanted to say it publicly, but it is my opinion that what Peter Williams walked out of L3 trenchant was the triangulation kit.
Starting point is 00:16:29 and it caused a massive harm to the security interests of the United States and its allies and Ukraine in particular. Adam, I mean, what do you even say here, right? The story around triangulation and Kasperski's discovery had always, you know, it always felt like there was more to say there. And, you know, we very rarely see so much of these stories, I guess, you know, now coming out into the public eye. and, you know, seeing what that full chain looks like, you know, seeing some of the details of that. Google published the write-up.
Starting point is 00:17:05 We've got a bunch of indicators of compromise from, I think I verify have also been, they got a hold of a copyright from a Chinese, like, as you say, cryptocurrency, you know, criminals that were using it, managed to X fill it out. They apparently got a debug build of it out of that process, I think they said, and they found a bunch of internal details in naming, or maybe it was Google that got the debug,
Starting point is 00:17:26 but anyway, someone managed to get a debug build of it that had a bunch of these. internal names. And, you know, the story is just we don't normally see the inside of this unless you are in that kind of quite rarefied world. So it's interesting to see the details. It's interesting to tie it back, you know, to that campaign triangulation and just kind of see what the, you know, what the big end of the market looks like, what the, you know,
Starting point is 00:17:52 the expensive stuff looks like and it looks pretty good. Yeah, I mean, at the time that triangulation was quote, unquote, discovered, you know, we said well, they were operating a pretty massive scale, so it was kind of inevitable that they would have got caught. But you have to wonder how much longer could that campaign have operated for if one of the insiders wasn't flogging off the exploits for chicken feed. Like this guy deserves way more time in prison. Like this is serious stuff, you know? This is serious stuff when this is presumably an NSA operation targeting a thousand devices in Russia in a time of when one of its allies is at war with Russia. I mean, to undermine that is just mind-boggling.
Starting point is 00:18:34 And to do it just for such a relatively small amount of money. Like, this guy is an idiot. He's a moron. And especially given that he came out of ASD and, you know, the intelligence world, like, you know, he understood what that mission was. Like, he worked with people, you know, who lived and breathed this mission to then sell them out.
Starting point is 00:18:55 You know, I've been to a bar with some people that worked at, you know, L3 Harris trenchant. And they've all got a lot of feelings about this. Oh, yeah. As do spooks and, you know, some of the other people. And, you know, to sell it out for so little does just seem a little bonkers, you know. Yeah, no, it's unbelievable. And, yeah, the feelings are strong from people on those, you know, I too know some of those people.
Starting point is 00:19:16 And I think if you put this guy in a room alone with some of his former colleagues, you know, he would not be emerging unscathed. Let's put it that way. So yeah, look, that's, you know, I'm going to go ahead and just say Andy Greenberg's reporting there is bang on. And, you know, what a scandal. What a scandal. What an idiot. Absolute moron. Yeah, really. All right. So we're going to move on now just to some, just briefly. We mentioned, I think, you know, a couple of weeks ago, this acting assistant director, Madhu Gotta Mukala.
Starting point is 00:19:50 You know, we sort of tell you about how there's, they just kept being this steady drumbeat of weird news about the guy. and he seemed like he was a bit strange and not exactly good at making friends in Cicester. He's out now and Politico has, you know, written a like really fierce write-up on his departure. It's, yeah, the interim chief of the nation's top cyber defense agency had convinced many people he was not up to the task long before his sudden reassignment late Thursday. Now, that's a lead. Well done to Politico, but yeah, he's gone. And there's details in this story.
Starting point is 00:20:26 I think one of the funny ones is that he drives a cyber truck. He's a cyber truck guy. And I think that sort of underscores the idea that he might be a jerk. But he would leave it in the charging bay and not move it. And he actually stood down an employee who was caught on security camera walking past his cyber truck and flipping it the finger. Right. So he winds up like suspending that guy, which is, it seems a bit nuts. It does. I think it was the cameras on the cyber truck that caught it.
Starting point is 00:20:54 So, like, he had to go dig through and find that himself. So, like, yeah, this guy does not seem like he was good news. And you're right, the Politico piece is just savage, right? I mean, describing him as, you know, asleep at the wheel and, you know, has a bunch of examples of, you know, things where he, you know, is kind of, you know, for example, one of the briefings, he asked specifically about hackers from India, where, you know, his ethnic kind of roots are, derailing the briefing, which was about actual threats, you know, that they actually face as opposed to, you know, whatever was his personal. bug bear. So little things like that that just really don't make you feel good about his leadership and sure enough yes out the door and I think you know so it's going to take a while to recover from the kind of savage mess that it's been over the last little while. Yeah as I've described it's sis's century of humiliation continues and it's CIA Robert Costello is gone as well
Starting point is 00:21:47 yes and the the deck on this cyberscoop piece is his nearly five year tenure had been had recently been marked by turmoil. Yeah. No kidding. All right. So now let's follow up on a story that we talked about last week. You know, we had a chat about Anthropic trying to put technical guardrails on its models. And Pete Hagsith, Secretary of Defense, getting really shirty about that and basically saying, no, you can't do that. We will designate you a supply chain risk. Look, and that's what they've done, which is just insane. This is obviously going to be challenging. in court because Anthropic didn't budge but you know I was actually fairly sympathetic to the government's case but the correct way to go about
Starting point is 00:22:32 addressing that is to maybe you know go to a court and use the the what is it the Defense Production Act to argue your case right not to say well we're gonna try to harm your business we're gonna we're gonna take this punitive measure now of course this is wonderful news for Open AI because Sam Altman has just swept in and scooped up this contract but now we know a lot more about why it is that Anthropic was feeling uneasy. There had been some very vague reporting about, well, it's about autonomous weapons and surveillance. Now we know much more about the details of that. James, what exactly were Anthropics
Starting point is 00:23:09 concerns here? Yeah, super interesting turn of events. So the, again, the two red lines were this cannot be used for mass surveillance of US citizens and it cannot be used in fully autonomous weapons. Now, the interesting subtext that we've since discovered about the latter point, is they're actually completely fine with their AI being used in autonomous weapons. Just not yet. They felt that it's not ready and that at the right time, they'll happily provide the models to ensure that autonomous weapons could be used. This was not a moral stance.
Starting point is 00:23:37 This is like, you want to kill a robot. Man, we would love to help you with that, but our models just aren't ready. Like, let's just wait a little bit more time and we'll make you a killer robot that, like, the best killer robot. Yeah, the current killer robots in beta, and we just don't think that's right to deploy it just yet. So that became the actual sticking point. And yes, like Sam went from Friday morning, wow, we solidly support you guys. You're like putting out statements of solidarity with Anthropic, right?
Starting point is 00:24:05 Yeah, to Friday afternoon. We've signed the deal. It's going to be amazing. But the, you know, we know so much more now about the anthropic side of things and what their challenges were. But we actually know a lot less about what Open AI has actually agreed to. The only part of the contract that have been made public at this stage are really, things that are self-serving for open AI's interest. But if you read between the lines of some of the things
Starting point is 00:24:28 that Anthropic was rejecting, it's that the government would sort of acquiesce and say, yeah, yeah, yeah, okay, we won't use your model for autonomous weapons, and then they'd throw in an MDASH, ironically, and say, unless appropriate. Yeah, or as appropriate or as, you know, you can see. Yeah, so they were, they were sprinkling gotchas through their, through their contracts.
Starting point is 00:24:49 But again, like, I think the real issue here, And when it comes to the mass surveillance, the sticking point seemed to be that Anthropic was really concerned that various bits of the US government were going to start doing very powerful intelligence processing on commercially available information. Now, this is the stuff that data brokers sell. There are loopholes galore when it comes to the Fourth Amendment in the United States where, you know, government agencies can just buy this stuff, that it would be illegal for them to collect themselves and then just apply a bunch of processing to it. Anthropics like, well, no, we don't think this is this is appropriate. However, the strange thing is none of these contracts touch NSA, for example. So are they concerned that the Pentagon is going to be doing mass surveillance of US citizens? To what end?
Starting point is 00:25:36 Like, I don't understand. I still don't quite understand the concerns here. And I think if you're concerned about commercially available information and privacy and the Fourth Amendment and these sorts of things in the United States, you know, the correct group to remedy this is Congress. not the chief executive of an AI company and certainly not the Secretary of Defense, right? So, like, I think what everybody has landed on here is that this is Congress's job
Starting point is 00:26:02 and they're missing in action, basically. Yeah, exactly. And I think, you know, you and I've had a lot of spicy conversations about this, that even when I hear your very well-reasoned arguments, Pat, it comes down to, yes, but that's all based on trust and norms and laws. And those things seem to increasingly not being paid attention to by the administration. And so it's difficult to work out where exactly the line is between,
Starting point is 00:26:25 is this just Silicon Valley paranoia or is there something significant here? I don't know, but it's just, it's so weird to see this playing out so openly. And like, as you say, the people that should be the adults in the room making this decision are absolutely absent. Adam, you know, what's your read on this? Like, I don't quite understand the, like the people I'm concerned about using commercially available information if I were American, it would be the local police and it would be the FBI because they're the ones who are going to actually arrest me. I would be less concerned
Starting point is 00:26:57 about the Pentagon doing it because what are they going to do? Like, airstrike my house. Like, that's just, it's just not what the Pentagon is for. But like, where did you land on all of this, right? Because it is, it is a complicated issue. Yeah. I mean, I think, you know, your argument that, like, what's the DOD going to do with this information, you know, makes kind of sense. But I guess the thing that I, you know, that struck me about this is like, it really is a result of the cultural context in the US at the moment, right? There's so much distrust of the government. There's so much distrust of, like, the government as a whole, like not DOD, you know, not just DHS. Like, it's just the government in general, whether it's law enforcement, whether it's military,
Starting point is 00:27:33 whatever it is, is just, you know, currently doing things that many Americans find abhorrent. And so, of course, you know, they want to do something about it. And so many feel disenfranchised by their, you know, political representatives not doing what they want, that they, you know, are they doing it any way they can. And, you know, some of, I don't know, I don't know whether I'm cynical that anthropic and to a degree open AI are trying to, you know, sort of virtue signal like this, or whether it is just generally they are so distressed as a country that it's hard to, you know, for all of the arguments to be sensible and logical.
Starting point is 00:28:07 Yeah, no, I mean, I get that. But it's always, it's always been the case for us as Australians when talking about America because, well, you know, you're not Australian, I should say, me as an Australian and you as a Kiwi, but I think, you know, in our part of the world, you know, we just have a different attitude towards the state in that we recognize that the state is, you know, mostly concerned with doing the right thing by its citizens and is a necessary thing that is, you know, generally good but not amazing and can always be better, whereas in the United States, they think the government is out to get them and sometimes it is.
Starting point is 00:28:40 So it's always a little bit of a challenge for us when analyzing the United States and and the things that happened there. But look, on the topic of commercially available information, we actually have a report from 404 Media, which looks at CBP Customs and Border Protection, having bought a bunch of data to track people out of the advertising ecosystem. I mean, this is stuff that our colleague, Tom Uren, has written about a lot over the last few years
Starting point is 00:29:07 in the seriously risky business newsletter. I mean, clearly some legal reform is required here. I mean, this stuff, to be honest, like this concerns me, If I were American, this would concern me more than the Pentagon stuff. James, do you have any thoughts on this piece here? Yeah, look, I was thinking about how when you first time you launch an app and you get that pop up that seems to be in every app now that's like, do you wish to ask this app not to track?
Starting point is 00:29:33 And I think when you've got a story like this, you've got to realize that it's far more than just the app and the advertisers that you're touching when you say don't track or ask not to track. This actually proliferates out to data sets that will be readily available by, as you said, local police. DHSS, et cetera, et cetera, FBI. So, yeah, maybe the string's too long to fit in the button,
Starting point is 00:29:52 but it really should say, ask DHS and ICE not to track when you launch that up. Yeah, I got 99 problems with the Pentagon 8.1, right? It would be my takeaway there. And look, we've got another really interesting piece here that touches on privacy and AI. This is about large-scale de-anonymization using LLMs, where you can basically take, what is it, like a writing sample and then tie it to other online personas that may be anonymous? Is that about it, Jant?
Starting point is 00:30:20 Yeah, look, this one is really frightening, if I'm honest. So, yes, essentially, what they proved here is that using an LLM and a novel way to use LLMs and the embedding technology that I'll get to in a second, they can do essentially cross-platform de-anonymization. So if you've got your LinkedIn profile, but you run an anonymous Reddit account, an anonymous hacker news account or whatever else. It is now quite trivial, they've demonstrated, at scale is the other key element here, to stitch those profiles together and essentially uncover who you are on these other platforms,
Starting point is 00:30:57 even though you are technically operating as an anonymous user. What's super interesting about this is they talk back to the Netflix Prize data set, which is a 2008 paper that came out that said researchers took this large corpus of data, anonymous data from Netflix and they applied some pretty great at the time techniques to de-anonomize you out of that with only sort of two maybe three data points. And this was shortly before I joined Apple and that was absolutely our focus. You know, de-anonymizing wasn't enough. You had to de-anonymize the de-anonomized information because correlation was so easy. But the problem with that exercise was it didn't scale. And the scary thing about this paper coming out about this LLM being used
Starting point is 00:31:41 de-anonymization is that first of all, they did this with entirely publicly available APIs. So there's no custom-trained model. There's no huge financial barrier here that would make this unworkable for any given entity that has access to a frontier model LLM. And the second thing is because they've used LLM embeddings, which is essentially using the LLM's multidimensional space and understanding of language to create a database of relevant and related terms and language structures, they've demonstrated that this can be done at scale
Starting point is 00:32:11 where the efficiency drops off really gracefully as opposed to the previous techniques which just fell apart at scale and like I'm trying not to be cynical but it's incredible timing that this article drops right as there's so much concern about mass surveillance being facilitated with LLMs. Yeah I mean I'm going to go ahead and just say
Starting point is 00:32:28 that's a coincidence in my view but it is holy dolly like it is you know it's the sort of thing that you know has been theorized, right, for a long time, this sort of analysis. But to be able to like auto, do it, put it on auto and just get her done. Like, that is the new part. And I think so much of what AI delivers is around scale, which is something that has come up, uh, again, again, it's speaking of, man. Like, what was it? Last week, James, you said when we were talking about these fortigates getting owned by Claude Code, you know, and it was pretty rudimentary stuff.
Starting point is 00:33:04 You said, look, it's a matter of time before someone just tricks Claude into doing. an end-to-end compromise, you know, just by asking it nicely. And a couple days after we had that conversation last week, out popped this story, which is everywhere about the Mexican government losing like gigabytes upon gigabytes of data to a Claude-based attack that looked like exactly what you described. Yeah, again, it's low rent hacking by all accounts and interestingly, it hit many, many different properties throughout the Mexican government. This is not like, you know, one service got popped and they just siphoned out the database.
Starting point is 00:33:41 This is like multiple places hit, multiple different data sets taken, but it all tied back to use of Claude and Open AI. And, you know, the moral to the story here, to the point I was making last week, if you break a offensive cyber campaign down into small enough chunks, every single bit of those chunks, every one of those little chunks can be made to look like. It is just defensive cyber work that it will gladly help you with. but then you roll them all up and it's just straight up hacking. Matt, I actually last night did a sponsor interview with Tony Delafonte,
Starting point is 00:34:13 who is the founder of, you know, Proula, right? Which is a online, you know, it's a cloud security scanner. And what's really interesting is if you ask Claude to go and help you with your cloud security, you know, posture, it actually will try on its own and then give up and it downloads and runs Proula, right? Which is kind of funny, but, you know, we got to this situation where AI means that that, you know, nailing down your cloud infra in particular and getting all of that stuff configured
Starting point is 00:34:40 correctly is so important now because every little skid with access to an LLM these days, like if you don't find it, they're going to. I mean, Adam, do you agree with that sort of view on this, which is that like you've got to get your ducks in a row these days because the, you know, script kitty mark twos, they're coming and they're using LLMs. Yeah, I mean, in the end, the important thing now is that someone wants to hack you, not that they're, can hack you, right? They, if they show up and just say, hey, I would like this organization to be compromised, they give that to Claude or whatever to go get done. Like, that's what you're defending against, like a kid with intent, but all of the means is now,
Starting point is 00:35:18 you know, automated by machines, which yeah, it's a hell of a wild time. And yeah, you just got to get everything right all the time. There's no longer, you know, you can, we've always said, like, security through obscurity doesn't really work. Like, but now we've got, you have to get everything right all the time. for real now, not for pretend like it's been for the last, you know, 25, 30 years. Yeah, I mean, it's a bit satisfying, I guess, being able to say no for real. Like, it's not, this isn't theoretical anymore. But yeah, anyway, wild times.
Starting point is 00:35:47 Now, we've got a write-up here from Dan Gooden on this thing that they're calling an air snitch. Now, the premise here, I've seen this do in the rounds, big time. But you're like very lukewarm on this, Adam. I think it's really cool. So the idea is there's a bunch of like old-school techniques you can use to buy. bypass the isolation between a guest network and the primary network on a wireless access point. I mean, I think that's going to be actually quite useful to a bunch of attackers in a bunch of
Starting point is 00:36:12 different contexts. But you were like, this is all just Ethernet tricks. Ethernet wasn't designed to separate like this. Not really surprising. So you bar humbugged this when I was like, all excited. I mean, honestly, both of those things are true, right? It absolutely is interesting. And being able to go from someone's public Wi-Fi to their internal.
Starting point is 00:36:34 network or to steal traffic or interact with devices on internal network. Like that is useful, but on the other hand, it is still all old bar humbug Ethernet. So the guts of this research is essentially manipulating the layer to traffic flows of the Ethernet, and Wi-Fi is just Ethernet over radio, to make traffic go where it's not supposed to. And the kind of concept of both client isolation and, you know, you know, guest networks or having multiple networks on the same piece of networking hardware, so having one access point that runs multiple SSIDs. That's all kind of implemented on top of Ethernet,
Starting point is 00:37:16 and Ethernet was never really designed for this type of segregation. And so the guts of the trick is manipulating, say, like, the cam tables, the tables that map, Mac addresses to the port, you know, the physical Ethernet port that are devices out. And on wireless, that port is a logical, instruct and force by crypto and on wide network, obviously it's a physical wired port. And by saying like if you send a packet that says, hi, my Mac address is 12, then annual Mac address isn't somebody else's is.
Starting point is 00:37:46 The network will learn that station 12 is in your direction and start sending you traffic towards it. And that gets you traffic in one direction. There's other tricks, forgetting traffic in the other direction. And so they can manipulate the layer to routing to cause traffic essentially to do man in the middleware traffic between stations that you wouldn't otherwise be able to see get delivered to you. And in a wireless contest, that means delivered to you with crypto keys that you know about, because you've negotiated your connection to the network.
Starting point is 00:38:15 So it's legitimately interesting work, but on the other hand, my Kiwicon one talk, which is what, 2007, was doing this on Metro Carrier Metro Ethernet Networks to bypass client isolation on Ethernet, large-scale Metro Ethernet Networks. I remember that talk. Yeah, this was like the Enterprise. great Ethernet stuff and you could just like hop your way through like every other customer basically. I remember that talk. 19 years.
Starting point is 00:38:38 This is it. But Wi-Fi. Yeah. Yeah. Well, cool. Yeah. I guess I should have thought to go back and try it against Wi-Fi stuff. No, so like it's 2026 man.
Starting point is 00:38:49 So if you want to talk about hacking, like it's now you just get a fish kit, right? And you do the SaaS and the, you know, anyway. Everything's changed. Everything's changed so much. We just ask Claude to do it now. Yeah, you just ask Claude and it's done. Real quick, we're just going to mention this. this one, SISA has ordered an agency to patch a bunch of Cisco devices.
Starting point is 00:39:08 Not really interesting in and of itself. What is interesting though is when you were reading about this, you stumbled across the Australian Signals Directorate guide to threat hunting. And you were like, oh, okay, this is actually, this is actually really cool. So there's the Cisco SD-Wan threat hunt guide from February 2026, version 2.4. There's some light reading for you. But you just wanted to get that in the show notes because you said it's actually a good read. Yeah, I mean, Cisco SD-Wan gear.
Starting point is 00:39:32 is everywhere, especially in telco environments, and like that's so far so normal. But yeah, the threat hunting guide from ASD just says, we have been here and had to hunt for stuff in this environment a lot because we're at version, whatever it was, 2.4 of this dock, and the dock's very good. And that just says, you know, a bunch of people up and a bunch of SD-Wans in Australia. And I just thought that was interesting and also good job ASD. And James, this one you wanted included in the week's show, which is a security. bug in OpenClaw and I'm like what is it some sort of like you know prompt injection thing and you're like no it's heaps stupider and I'm like wow stupider than prompt injection let's hear it so tell us yeah so good I got such a great laugh out of this so the default stance for security for open claw is they say you know the back end process only binds to local host so it's safe you know no one can access it from the outside but we forgot to realize that any browser can happily talk to and a lot of
Starting point is 00:40:32 local host because that's not covered by the origin restrictions that generally prevent that sort of cross-site access in a browser. So it's such a trivial vector here. Any JavaScript running in a browser can access the local open claw service and they've got to put rate limits around how many times you could make attempts to authenticate to that web socket port on local host and so very easy to just brute force access into your open claw. So just hilarious for the fact that like local host you think, yeah, of course that's safe.
Starting point is 00:41:07 I can't access from the outside world. But buddy, the browser is where that boundary is now. So yeah, good for the lolls. And you pulled out this one too, which is a guy doing some research into his robot vacuum, some clod-based research, I think, into his robot vacuum,
Starting point is 00:41:24 managed to pull down some, like, an API key or something where he's like, oh, cool, now I can get access to my back-end for robot vacuum and he's like used it and it's like all of the backends for all of the robot vacuums and there's like 6,700 of them. Yeah, you got to read the article for this one for a couple of reasons. One, yeah, he was his whole use case here was I want to use my PS5 controller to control my robot VAC which what an awesome weekend project gets out ClaudeCode to do this and ClaudeCode
Starting point is 00:41:50 happily finds that there's an API key that you can use to access the backend services for these robots and then he discovers it's the same backend key that's used for all of them. But one of the best bits about this is when you look through the article, he shared some of the screenshots and it's like Claude Code mocked up this like gorgeously late 90s hacker kid kind of world map and pings of where all of these vacuums were. But, you know, the vulnerability itself is a bit like, yeah, I appreciate key, but just the fact that this was found by accident and reverse engineered by Claude Code, you're going to see more of these. Yeah, got to love it. Now, meanwhile, Suzanne Smalley over ads, the record has reported that a Greek court on Thursday,
Starting point is 00:42:29 they sentenced the founder of the Interlexa Consortium and three associates to prison for their role in a sprawling spyware scandal that has dominated Greek headlines since it came to light in 2022. I think this is good. I mean, we're not used to seeing these people sent actually to prison, Adam. I mean, do you think this sends a message to, you know, to other people who might be thinking about cutting some corners when selling these tools and when knowing what they're being used for when what they're being used for is not good? I mean, you know, Do you think this sends a message there? I think it will send a message. I mean, the founder and there was another associate from Intellexa itself. I don't know that they're necessarily in Greece or within the immediate jurisdiction. I'm sure they will be, if they're smart, they'll be out of the jurisdiction. But yeah, it's got to provide some pause for other people playing in this game, that you will get some blowback.
Starting point is 00:43:21 What's interesting in Greece, though, is that none of the people who bought and used it have so far, you know, faced any particular consequences, you know, because this was used in the context of spying on political opponents and stuff. So, like, you would expect there to be some consequences for that kind of use of it. But so far we've only seen Interlexa and, I think, the local reseller, you know, facing some consequences. But, you know, I am sure it has to send some chilling message, some chilling effect to other people who play in this game. And, you know, ultimately being, you know, found guilty in Europe, you know, the arm of Europe's extradition treaties and other things you know that's pretty long and getting away from that i imagine it's going to be
Starting point is 00:43:59 difficult for them yep now uh moving on to some more law and order related stuff darina anton york over at the record again uh has a report and this is kind of our skateboarding dog this week adam which is a guy in moscow he's been accused uh of posing as an fsb person to extort the conti ransomware gang so it's it's good there's some arrests around uh conti uh Unfortunately, it's someone who was trying to shake them down. This was after someone hacked Conti and leaked a bunch of their internal chats and that out of a bunch of identities and cryptocurrencies and then so on and so forth. Yeah, this guy apparently read the Conti leaks and just decided that the right life choice
Starting point is 00:44:42 was to go shake down some criminals for money, claiming to be the FSB. And, like, of course this was going to end well for him. So I don't know. Mr. was the name, Rustland. Ruslin Satychin. He is probably going to have a bad time. I imagine he's ending up either on the front or in a special penal colony
Starting point is 00:45:01 or whatever else happens to you in Russia. But it's like, what were you thinking, buddy? What were you thinking? He wanted to get paid. I just think it's funny that the Conti people, like the Conti operators, didn't get arrested, but the guy who tried to shake him down did. You know, like that's...
Starting point is 00:45:14 And the fact that it's a perfectly reasonable scam to pretend to be the police in Russia to solicit bribes and people are going to go, oh, okay, you know, they're going to believe you because that's what the cops there do. Anyway, we're going to end on a sad note, which is FX, Felix FX, who is a was, I'm sorry, he's passed away.
Starting point is 00:45:34 He was a very well-known hacker and security researcher, a tremendously intelligent guy. He'd been on the show at least once, I think maybe a couple times. I'd met him before as well. I liked him. I hadn't seen him in a very long time. Either way, Felix is no longer, he's no longer with us. and that sucks.
Starting point is 00:45:54 Yeah, no, that's real sad. Like, he was, you know, his name was one that I remember reading in old school text files and things. I mean, the work on some of the tools that came out of Fenlett and the other kind of European hack and crews. Yeah, his name was all over that. And, you know, he was, you know, a lot of people credit him with making, you know, introductions around the industry and in the scene and, you know, just being one of those people that, A, is a great hacker,
Starting point is 00:46:17 but B, also, you know, is just a lovely person to be, and it makes great connections between people. and, you know, those people are, you know, outsized in our communities and, you know, we value them very much. So, Valé, Felix FX, Lindner. And, yeah, that's, it was very sad. Bummer, bummer way to end the week. Sorry about that, everybody. But, yeah, and I'll just let people know, too, after we're finished recording today, I'm actually getting on a plane.
Starting point is 00:46:42 I'm heading down to Sydney. And I will be speaking, well, I'm on a panel at a conference down there. It's the Atmos. Atmos are running a conference down there called Svear, 2026. it's a one-day event. So I imagine some of you listening to this are going to be there. So come and say hello, by all means. They've got a great lineup, actually, of speakers and whatnot.
Starting point is 00:47:00 And Chris Krebs is coming down too, so I'm going to catch up with him, which is going to be great. So, yeah, I'll catch some of you down there. But that is actually it for the week's news. Big thanks to you, Adam Bwalo, big thanks to you, James Wilson. And we'll do it all again next week. Thanks for us, Pat. I will see you then. Thanks, Pat.
Starting point is 00:47:16 See you then. That was Adam Bualo and James Wilson there with a check of the week. Security News. Now a little bit of housekeeping before we get into this week's sponsor interview and we have launched two new podcast feeds we have launched at the Risky Business Features channel James is publishing podcasts in there he's recording chats with Brad Arkin who is the former chief security officer of Adobe Cisco and Salesforce so they have some fabulous conversations and there's other interviews and stuff going on in there so do head to risky.biz and find that
Starting point is 00:47:59 feed there or just search through your podcatcher for risky business features. So do check that one out. We've also launched a product catalog on the site. So if you head to risky.combs and hit catalog, basically it's like a sponsor directory at this stage. It's just very plain language descriptions of what some of these companies do. And we're planning on building that out and adding more and more entries over time.
Starting point is 00:48:24 So yeah, please do head to risky. combs to subscribe to James's podcast. We've also got RiskyBus Stories, risky business stories, which is where we're going to publish some of the stuff that Amberley's working on, so you can subscribe to that one too. Please do subscribe to these feeds. It really does help us, and yeah, that would be great. Now, it is time for this week's sponsorative view now with Sidney Moroni, who is the head of threat hunting at Nebulok, our sponsor for this week's show. Nebulauk does AI-based threat hunting, so you can do vibe hunting, which is a lot of fun. and Sidney Maroni actually wrote the guide on agentic threat hunting.
Starting point is 00:49:02 I've linked through to the GitHub page for that guide in this week's show notes, but she decided to come along onto the show to talk about that guide a little bit and agentic threat hunting in general. And here's what she had to say. This is just an easy way for people to apply it to their threat hunting and also give their threat hunting memory and context, which I think are huge. So right now, if you run a threat hunt, you might not know what you ran a year ago.
Starting point is 00:49:31 So you start from scratch every time. And with a framework like I've created, you don't stretch from scratch. You have some sort of memory to go from. I mean, it really does feel like people are just now realizing that these things don't have a memory. Correct. You know, these LLMs, they don't remember anything. So you've got to sort of prime up with the correct context every time you run a query. And that ain't, you know, then you're back to having the sorts of plumber.
Starting point is 00:49:56 that you need in a typical enterprise solution in the first place. There's going to be a database. There's going to be some structured data. There's going to be like some sort of query language, like, you know, that the agent has to know instead of a human operator and like this is this is where we are. Exactly. And that's part of the framework. The first step is to implement a repository. And so I use an example of like Git. So storing all your hunting knowledge, your past hunts and your current hunts in Git. and then using that and running queries against your Git repository to find out information about your hunts and your program. Where are enterprises at these days with trying to go agenetic with their threat hunts, right?
Starting point is 00:50:43 Because I would imagine that there are few organizations that are trying to do this. I'm guessing the ones that are trying to do this are the ones who have threat hunt teams already, right? and they're just trying to now automate some of that with AI agents. Correct. I think a lot of this is more cutting edge and like pushing the boundaries of where AI is going. Most companies are stuck using a certain model or a certain tool when it comes to AI. And so they have a lot of limitations. And therefore it can be really hard to implement.
Starting point is 00:51:19 I've been working with a global manufacturing company that has implemented the Gentic through hunting framework. And they are struggling just like any other global company to move up towards the gentic layers because there's just so much process and it's just such a large company. So that's why as part of the framework, I have a maturity model. So you can start from just documenting your hunts into adding AI and using AI to run against the hunts and building agents out, connecting MCP servers. So you really layer on top and start gradually, then throwing a bunch of agents or doing agentic AI against your threat hunting.
Starting point is 00:52:06 Now, we were chatting before we got recording, and you are what I would describe as a heavy Claude user. You spend a lot of time in Claude. I guess one thing that I find interesting about this whole, like, you know, Claude code in the enterprise, like SaaS evaluations, tanking and whatever. And the idea that, you know, coding is essentially free for some stuff these days is, you know, just going back to what I was saying earlier about how you need to provide these models with context and everything. And you need to actually build stuff. You need to build an architecture that these models can then use to be more useful in threat hunting. I mean, is that easy now with some of these AI building tools? Or is it still, is software design, for something like this still hard? I'd say it's getting easier. I think if you have an idea,
Starting point is 00:52:57 you typically can build it with AI, but you still need to ensure that there's that structure and sometimes that's the difficult part to figure out. And so I've done threat hunting for about seven years now. I helped build the peak threat hunting framework at Splunk, where you apply structure to everything. So it's built on those foundations. think those foundations and knowing those are still going to be important and applying those with
Starting point is 00:53:24 the AI to build out things is going to be key instead of just letting the AI do everything. And you'd be like, it did something. I don't know what it did. But knowing those foundations is going to be crucial. Yeah. Now, I totally understand where you're coming from with like a maturity model for this sort of thing, which is where people are using like a co-pilot approach to document the things that they've been doing on a manual threat hunt.
Starting point is 00:53:47 That might be your lower level. and then you're getting up to like the full stack solution probably something along the lines of what you've built at Nebulaque but I got to ask like you know you've got about seven years experience in threat hunting right you are newer at you know you've been like what four months with Nebulauk now
Starting point is 00:54:08 I mean how much is this changing the game how much is the agentic stuff actually changing the game and in what ways right like I'm guessing a lot of it's going to come down to speed and volume and being able to go down rabbit holes that like manually you never would have been able to go down. But then the question becomes, is that useful? Like, are you actually turning up interesting stuff doing that? So I guess, yeah, I'm after a threat hunter's perspective on, you know, what the actual benefit is here? Because there's so many imagined benefits, but what are the real benefits here of AI in this space,
Starting point is 00:54:44 given that you are the expert in this space and have gone from, you know, as you say, previously working at Splunk doing this stuff, writing the peak framework, and now you're moving on into the AI side of things. So yeah, where is this all going and why? And like, what's the point? Big question. Such a wonderful question. If you would have asked me last year where I thought Threatening was going, I would tell you it's going to change incredibly in the next year. And that is because of AI. AI is going to speed things up and allow you to do more. You Nailed it. I used to run threat hunts in two to four weeks, I would say, manually, running the queries, doing all the research, everything involved in running the threat hunt.
Starting point is 00:55:31 And now I can do a threat hunt in an hour, maybe a few hours, just depending on the scope. And it is just impressive at some of the analysis that it can do. of course there's a lot of double checking of work we all know we need to trust but verify AI so I I do think it's going to change a lot of our work and it is currently I think a lot of teams are starting to realize that yeah so I mean is it the case though that you can you know that the agents because they can operate at speed and scale will run down you know lines of inquiry that you wouldn't bother with manually and then actually find something interesting, or is it more the case that they wind up going down dead end rabbit holes, right? Because I imagine
Starting point is 00:56:20 maybe a bit of both, right? It's a little bit of both. And I think that's where something like memory can be really helpful. With agentic threat hunting framework, I've started building memory pieces in in the, I've named it sessions, and that it records some of your queries and the results you get and how you determine something and why you determine something good or bad. Yeah, the result of what when it came back to the human operator, it's like, yeah, you've done this 10 times and every time it turned out to be nothing. Exactly. Because that's something that we tend to forget.
Starting point is 00:56:55 And like, I don't remember what I hunted a year ago, let alone what my colleague hunted three months ago. So that's where the framework comes into play and helps with the memory. And then those sessions can really help with remembering what decisions. you make and helping you make better decisions in the future. Like, that's the idea behind it. Now, correct me if I'm wrong because I'm not an AI expert, I am a podcaster. But when we look at these agents and trying to give them, prime them with context every time
Starting point is 00:57:24 we want to run a query, is there sort of like an upper bound limit to how much context we can give them before they start getting confused? Because that's sort of my basic understanding of these things is you can only really give them so much context before they start getting a bit overloaded. and their little digital brains just start freaking out. Mm-hmm. The hallucinations, yes. It's going to depend on your scope.
Starting point is 00:57:49 It's like when you use chat GPT or any clod, any tool, if you give it some enormous scope, it's going to get confused. If you scope it down properly, which I try to do with threat hunting or if I'm using clawed code or whatever tool, then it does better at the context and not getting confused. but it's always a problem and I think that's something that is the consumer right now is trying to figure out and all the companies, the models, they're trying to figure out how to resolve this. So I think we're all in it together really.
Starting point is 00:58:25 Yeah, I mean, as I said earlier, I can't remember if this was before or after I hit record, but you know, I just think of like these agents as self-sourcing bash scripts instead of like, you know, incredible, super intelligent e-beings. and I find that's a useful way to think about it. It is a lot of it's just scripting. I mean, if you think of something like OpenClaw, it's just running a bunch of cron jobs, running reminders for you.
Starting point is 00:58:51 It's not, it's a little bit, it has a little bit of knowledge and memory, but still it's just code on the back end. So look, you know, we, you've come here to talk about your agentic threat hunting framework and we've barely talked about anything. You know, we've talked about the need for content. and the, you know, different maturity levels and stuff. What, you know, what are the other big things that you've squeezed into this thing
Starting point is 00:59:14 that you think people should know about before they go and, you know, check it out? So one of the features of the framework is something called the lock pattern. And this is just a pattern that a human and an AI tool can follow to do threat hunting. So right now, there's not a lot out there on documentation as far as when we are threat hunting. and I know documentation isn't exciting, but everyone in security knows that this is incredibly important. So it gives the path to document that both a human and AI can understand. So when you get to that point where you're using AI and maturing,
Starting point is 00:59:50 you can feed it in and you can let your tool use it just as you would and probably understand it even more and do better analysis. And be a little bit more consistent as well. Exactly. All right. Now, where can people find this framework? You can find the framework on GitHub or just check out agenticthreateningframwork.com. And it'll point you to a blog post that will then lead to our GitHub repo that has everything.
Starting point is 01:00:19 Again, it's open source and vendor agnostic. So it's just a methodology. So go check it out. Awesome. I will drop a link to the GitHub in this week's show notes. Sydney Moroni, thank you so much for joining me to talk about AI in Threather. hunting. Very interesting stuff. All right. Thank you.
Starting point is 01:00:38 That was Sydney Maroni of Nebulauk there. Big thanks to her for that. And big thanks to Nebulaugh for being this week's risky business sponsor. And that's it for this week's show. I do hope you enjoyed it. I'll be back soon with more security news and analysis. But until then, I've been Patrick Gray. Thanks for listening.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.