Risky Business - Risky Business #834 -- Vercel gets owned, Mozilla dumps hundreds of Mythos bugs

Episode Date: April 22, 2026

On this week’s show, Patrick Gray and James Wilson are joined by special guest The Grugq. They discuss the week’s cybersecurity news, including: Vercel got owned..., and there’s a few infostealer and compromised employee dots to connect Mozilla used Mythos to find 271 bugs, which feels like a sign of the bug-pocalypse Speaking of the bug-pocalypse, is that why NIST is noping out of enriching a bunch of bugs? The NSA is using Mythos even though the government did that whole Anthropic blacklisting thing And DDos attacks hit a couple of smaller-player socials This week’s episode is sponsored by Permiso. Ian Ahl chats to Pat about the subtle signals Permiso uses to detect ShinyHunters-style activity in cloud and on-prem environments. This episode is also available on Youtube. Show notes Vercel April 2026 Security incident Vercel breach linked to infostealer infection at Context.ai Vercel confirms breach as hackers claim to be selling stolen data Matt Johansen: “This is not a good look” | X NIST limits vulnerability analysis as CVE backlog swells | Cybersecurity Dive CISA Cyber on X Ransomware attack continues to disrupt healthcare in London nearly two years later | The Record from Recorded Future News Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks | CyberScoop In defeat for Trump, House extends electronic spying program for just 10 days | The Record from Recorded Future News Crypto infrastructure company blames $290 million theft on North Korean hackers | The Record from Recorded Future News US-sanctioned currency exchange says $15 million heist done by "unfriendly states" - Ars Technica Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch Mozilla Used Anthropic’s Mythos to Find and Fix 271 Bugs in Firefox | WIRED NSA using Anthropic's Mythos despite Defense Department blacklist Beyond the breach: inside a cargo theft actor’s post-compromise playbook | Proofpoint US Beware scam messages offering ships safe transit through Hormuz Strait, says security firm | The Straits Times New Jersey men given lengthy sentences for running North Korean laptop farms | The Record from Recorded Future News Turns Out We’re Not Alone - Volodymyr Styran US joins nearly two dozen other countries in striking back against DDoS-for-hire platforms | Cybersecurity Dive Bluesky blames app outage on ‘sophisticated’ DDoS attack | The Record from Recorded Future News Mastodon says its flagship server was hit by a DDoS attack | TechCrunch An IT expert explained under what conditions using a VPN can cause a smartphone to explode

Transcript
Discussion (0)
Starting point is 00:00:00 Hey everyone and welcome to another episode of Risky Business. My name's Patrick Gray. This week's show is brought to you by Permissau, and they make a really interesting sort of identity security product, I guess. It monitors identity actions or account actions, and can tell you when some weird stuff is going on, and we're joined by Permissos Ian Arl a little bit later on to talk through how they detect Shiny Hunter's activity, actually,
Starting point is 00:00:31 and what sort of things stand out as red flags in logs that are going to give you an idea that something's up. You know, this is useful stuff to know even if you're not using their platform. So do stick around for that interview. Adam Boiloh is away at the moment. He's overseas. Hope you're having a good time, Adam, if you're listening. So this week we are joined by a very special guest co-host. He is an international man of mystery who is currently working as a postgraduate researcher at King's College London.
Starting point is 00:01:01 on the topic of cyber war. He is The Gruck. The Gruck, welcome to risky business. Good to be here. All right. And as always, these days, James Wilson joins us as well. James, how's it going? It's good, man.
Starting point is 00:01:15 Good to be here. All right. So we're going to kick things off with a discussion of this Versal incident. Actually, before we talk about the Vassell incident, James, can I get you to give listeners who are not necessarily familiar with Vercel? Just a quick recap on what they do. Because honestly, and I know this is. I'm telling on myself here, but I kind of had to look up exactly.
Starting point is 00:01:34 I knew that they had the NextJS connection, but I wasn't actually sure what their online cloud service is, and I figure if I didn't know, there's probably plenty of people listening who don't as well. Yeah, it's quite a sprawling landscape. So, yes, their origin story, I guess, is producing and building NextJS, which is one of the most popular JavaScript,
Starting point is 00:01:53 typescript-based web app frameworks these days that does everything from front-end right through to back-end, etc. But suffice to say they didn't stop there. They're now a hosting provider. You don't have to host Next Chair stuff with them. It can do all manner of things. And they've gotten heavily into the, of course, all the things AI. And they're actually one of the leading AISDKs that people use to build their apps at the moment.
Starting point is 00:02:14 So they're a big deal. Yeah, yeah. And they got owned and it looks like, you know, we would say, you know, in cases where people get owned really badly on the show, we would say they got owned quite a lot. It doesn't look quite like that's what's happened here. though they have had an incident which has impacted some customers. I guess the mechanics of the attack are probably the more interesting things here than the impact of it. Can you just walk us through how this happened? Yeah, the chain of events here begins with an infostealer was made its way onto an employee at context.
Starting point is 00:02:48 com. Which is something completely unrelated to Versal. That info steal, I think it was on their personal laptop, actually, this Context AI employee. The logs out of that, it basically accostrated as these things do a bunch of. of credentials out of the browser. And the attacker went through those and found that, okay, they were able to get access to things like the Versel tenant that Context AI uses to host the product, the super-based database they use, their OrthKit implementation. So suffice to say, everything you need to very much own all things, Context AI. What it seems they've done then
Starting point is 00:03:22 is with that access to the super-based database, they've gone through and found that's where all of these OAuth tokens that are stored, because Context AI is one of these. things that you add to your Google workspace, for example, so that it's your AI assistant that goes rifling through all of your mail and drive and all these wonderful things, which, of course, for it to rifle through, you've got to give it access to all those things. So the attacker's gone and found, okay, I've got Superbase. Superbase seems to be chock full of OAuth tokens. What's interesting out of these OAuth tokens finds that one of them belongs to a Versal employee, and what it appears is from there, they've then gotten themselves quite permissive API access
Starting point is 00:04:00 to the Google workspace that an internal Vursell employee was using and then they're off to the races from there. Yeah, and it looks like the precise way that they've moved laterally and whatever and managed to obtain a bunch of secrets from Versel customers is not clear. But you can tell from Vurcell's communications that they do actually have, they have actually thought about,
Starting point is 00:04:19 because they do like this hosted front end thing, right? Like that's really where they're hosting started. They've actually put some thought into how to protect customer secrets in their interface, simple protections. where you can mark stuff as sensitive, and that is basically a write-only permission for secrets which only get pooped out the other side via the build environment when you're actually deploying apps, right?
Starting point is 00:04:43 So what it appears has happened here is a bunch of first-sell customers had environment variables and didn't mark them sensitive, and that's how these attackers were able to access their console somehow and just read them out. Yes, as you said, there is still a lot of dots we've got to try to connect on that one, but I think it's safe to assume that with a very, you know, broad spectrum access to that Google
Starting point is 00:05:05 workspace, there's a lot of things that would have been possible. And you're right. Versal, I think not only did they do a good job of spelling out what the incident actually did, they were very quick also to say, not just the usual advice of, hey, rotate your credentials and tokens. Of course, you've got to do that. But I actually appreciate that they called out a couple of things they did around, I think secrets are now sensitive by default, which is a very good thing. it probably should have always been that way, but good on them for making that change. And just a couple of other things that, like,
Starting point is 00:05:33 they really owned this and said, look, we could have done better. Here's the things that we're doing better. And they are legitimate things that I think will, from this point onwards, help to prevent the exposure that an event like this can cause. Yeah, look, the incident comms on this from Versel have been absolutely top rate,
Starting point is 00:05:48 like absolutely superb. It feels like they've updated when they've had information. I remember at some point, James, you were like, well, I haven't had an email from them. Yeah. You know, despite the fact that we knew that they'd emailed some people, And then they did email you and they said, look at, you know, it doesn't look like you were impacted. They've called in Mandyant.
Starting point is 00:06:03 I'm guessing Mandyant's been advising them on this as well. So, yeah, looks pretty good. There was a, you know, apparently like shiny hunters were responsible. And then some shiny hunters people are saying, no, it wasn't us. And then there's like forums, you know, forum post popping up where people are saying we're going to sell data taken from Versel. But then it's like not really sure if it's just like stuff out of one, you know, Gmail inbox or whether it's like serious. data or whatever. So as to who did this, we don't quite know, do we? Yeah, we don't know. But I think what we can take a lot of comfort from it from is that whatever this data is,
Starting point is 00:06:40 it doesn't seem to be the kind of thing, even if it falls into whoever's hands might be silly enough to purchase it, could lead to some sort of, you know, broad spectrum supply chain attack or a large scale attack on customers of the sell. I largely feel like this is done and dusted and there's been some good lessons learned along the way. And, you know, I guess we just got a way to see now, but I don't feel like there is a huge looming danger from whatever that data is. Not another shoe to drop right on this one. You know, I think, I think, you know, a point of discussion around this is that this Versacell staff had given really permissive authorizations to context AI to, you know, basically own that account, which is what you have to do,
Starting point is 00:07:19 if you want to get any, extract any sort of value from these AI assistance, you need to give them permissive access to your account. But, you know, Matt Johansson, Matt Jay on Twitter has pointed out that, you know, based on things context has said, it looks like Versel wasn't even a paying customer of context, and that seems a bit weird that Versel staffer would be allowed to connect their account to context AI in such a way. And you wonder if maybe their environment was a little bit too permissive,
Starting point is 00:07:47 or do you think that that's a cheap shot? I, from working in a lot of corporates with Google workspaces and knowing how these things get set up, I find it very unusual, this claim that context AI says, well, Versal wasn't even a paying customer, yet they had this very permissive access. An enterprise would be very uncomfortable, even saying to someone, yes, I'll permit you to use that free tier account
Starting point is 00:08:15 in an enterprise, because they're going to want contract, they're going to want to want terms. They're going to want an SLA ability. Yeah, right, because when something like this happens, they want to go and look at that agreement and say, right, where's the liability pay up? And in a free tier where you've just clicked on the Euler and not Reddit, you don't get any of that. So I don't think this is a, Verscel was okay with this. I think this was a, it was too easy to do something that shouldn't have been allowed. Yeah, okay, I think that's a fair
Starting point is 00:08:43 point. Grock, you want to jump in here, please. Yeah, so I've got a couple of things. One is I think that it's, it's interesting that this shows how modern cybersecurity is a lot less about exploits. a lot more about O-Orth tokens and what you've connected to what else, right? Like, it's all at this very, very high layer and it's got very little to do with dropping O'Day. But the other thing is that, like, Shadow IT used to be the person who brought in, like, a Wi-Fi router and put it under their desk. And now it's someone who, like, connects your entire network to some random fly-by, just to some third party application
Starting point is 00:09:25 that might have all sorts of additional access. Look, it is the case, right? That's how stuff's done these days. And indeed, I think it is even in the sponsor interview this week or it could have been another one recently where it's like, you know, attackers aren't even touching the endpoint anymore. They don't need to. I mean, in this case, there was an attacker touching an endpoint
Starting point is 00:09:44 because they did use an info stealer, but you don't even need that anymore, I guess, is the point. Yeah, but I think Gruck's point is a good one, right? we've gone from they break in to they log in to now you logged in for them. Not bad. I like it. All right. Now, look, speaking of vulnerabilities, though, and I wanted to get your take on this one, Gruck, Mozilla has apparently found 271 bugs in Firefox by using Mythos.
Starting point is 00:10:10 No idea what the token cost is there. I'm guessing it was substantial. You know, are you on board with predictions of a bit of a bugpocalypse? because I do think that's the way this is going to head. You know, but yeah, what's your feeling here? I'm of two minds about it. On the one hand, like, 271 is, that's a big number. That is a lot of bugs.
Starting point is 00:10:34 But I'm also, like, I'm not sure. Does that mean that they are now overall 271 fewer bugs in Mozilla? Like, or does it mean that infinity minus 271 is still infinity? right? Has it meaningfully changed things? And I don't think we know yet. I think that's going to be the, like that's going to be the question, particularly because now generating code is so much easier as well. So in a way, adding bugs is going to go a lot faster. Well, yeah, and there's this thing too, right, where like you look at a company like Fortinet, right, where their software is super buggy and super bad and you think there's already stuff they could be doing
Starting point is 00:11:18 to fix this and they're not. So do we think they're going to spend money throwing a whole bunch of tokens at this problem when they're not putting people on this problem to begin with? Like, why would they throw the money from tokens into it? But like, I wanted to bring James in here because you did an interview with Brad Arkin that you published last week.
Starting point is 00:11:36 Now, Brad, of course, was for a time the CSO for Adobe, right? Which meant that he was responsible for Flash and Adobe Reader and stuff. And these products were bottomless pits of vulnerabilities. And he thinks the discourse around mythos is a bit dumb because you ain't going to improve the quality of software by just burning tokens to shake out bugs. Quite to Gruck's point where he's like infinity minus 271 is still infinity. I mean, it's really, Gruct's just basically saying what Brad told you last week. Yeah, look, I think there's some key words there, right?
Starting point is 00:12:09 You know, does it improve the quality potentially? But quality doesn't equal safety and prevention from exploit. And Brad's crystal clear point to me was, look, we could have, in time, enumerated all the bugs, fixed all the bugs in Flash and in Reda, but it wouldn't have done us any good. What we had to do was look at the commonality and say, what do these vulnerabilities tell us about higher order concepts in our code base that we can go and do very targeted fixes around? You know, like, do you fix 100 bugs and potentially introduce, who knows how many regressions and leave however many bugs still there? Or do you say, let's just wrap that up in a sandbox? that sandbox and the arbiter between the sandbox is a smaller code attack surface, bang, that is then a material difference in your attack surface.
Starting point is 00:12:51 So I'm with Gruck here. It's an impressive stat. It's great to see Mithos being used, but this does not equate that the software is now any way further towards being inexploitable or less exploitable. You don't get there from just 271 bugs being fixed. One of the things I remember that Flash used to do when they were, you know, back when we were on that treadmill all those years ago, they used to kill the techniques that were used in the exploits. So they realized that it was just going to be impossible to, you know, fix all the, like the various different types of confusion. And so they started killing the techniques that got used to cause, say, like a type confusion.
Starting point is 00:13:39 like that had one specific technique that was exploited. So they killed that technique, which meant that it didn't matter if they left the actual type confusions in there. You couldn't turn that into an exploit. And I don't know if AI is going to get you to that understanding or if it's just going to enumerate all of the different type confusions that you have. Yeah. Because those are two different things.
Starting point is 00:14:02 And one of them like meaningfully moves you forward and the other doesn't, right? Yeah. Well, it's funny, right? It's just so funny bringing this up. Because it's been long enough now that I, you know, I'd feel comfortable saying, you know, some of the things that Brad told me back then, which is like, I mean, they were trying to kill Flash, right? They wanted to kill Flash. No one in security at Adobe wanted Flash to be a thing. And then some product group would always like, reanimate its corpse for some project, make it a dependency. And they'd be like, oh my God, here we go again. But, you know, when they finally killed it, the corks came, you know, the corks were popping. But that was, you know, I think that was a really interesting case study. you know, when we look at the impact that stuff like, you know, frontier models might have on bug discovery and is that actually going to fix everything. I think what we are saying is probably not no. And moving on to this next story, and NIST is now going to, this is like insane, right? So NIST has obviously fallen behind on doing vulnerability triage and enrichment.
Starting point is 00:14:59 Like this has been a story for over a year now. At various points they've talked about, oh, we've got a new contractor helping and, you know, we'll get right on it. And now they're just like, eh, we're not really going to bother. But there's got to be some, you know, there's got to be some really strict criteria before we bother enriching something.
Starting point is 00:15:15 Otherwise, we're just going to take the vendor's word for it, basically. And one of the criteria is that the bug might, it has to be on the Kev list, on the Syssa Kev list. And then our very next story is Sisa Cyber putting out an alert about the Axiase compromise, you know, about the AxiS supply chain attacks. So like with Sissar suffering so badly at the moment, you know, as I've referred to it constantly on the show,
Starting point is 00:15:39 we have entered Siss's Century of Humiliation. You know, you just sort of think, what is NIST doing? Like, you're relying on a government agency that has now become quite dysfunctional, not due to its own fault, but because it's being targeted by the White House for being, I don't know, woke, radical left or something. And I just think, you know, where does this end?
Starting point is 00:16:00 And your point, Grock, when we were talking about this before we got recording, is you reckon this might be NIST kind of getting ahead of the frontier model bugpocalypse and just saying, yeah, we're going to just preemptively wave the white flag here. I think it's the smart move. I mean, if you are NIST and you see Mozilla coming out and saying,
Starting point is 00:16:19 hi, we've got exactly one product and there were 271 security issues that we killed this month. As NIST you go, that's not happening. Like, that is, like, we cannot. Like, that's just not a thing that we can do. So yeah, like the smart move is just go, yeah, if you're not on the list, you're not getting in. Yeah.
Starting point is 00:16:42 James, you and I were chatting as well and about whether or not you think AI could make a dint in solving this. And the answer there is like, at least with current models, probably not. Like you, you know, the work is not, I don't know that it's quite repeatable enough that you could get an AI agent to work out like a CVSS score reliably, you know? That's not a 3.0. That's a 10.0. You're absolutely right. That's on me. There's that and then there's like, okay, when does the madness end?
Starting point is 00:17:12 If the AI is finding the bugs and the AI is probably writing a vulnerability disclosure and then AI is determining whether your AI discovered bug and AI written vulnerability disclosure is accurate, just stop at some point that there's enough AI in the loop at that point. I really don't think it's going to, even if you prompted it well, it's not going to help. Give all the money to open AI. Skip the whole security theater with you. finding the bugs and enriching them, just give all the money, you know, AI, run your tokens to your thing. Just reminding me of how like in the earlier days of chat GPT, people were writing bullet points and then asking chat GPT to generate an email,
Starting point is 00:17:48 which they would send to someone who would then put it into chat GPT and say, can you give me a bullet point summary of this email? Oh, God, the horror. The horror. We've got a story here from Alexander Martin over at the record talking about how a ransomware attack against a British pathology provider or pathology lab, the fallout is still being felt more than 18 months later in, you know, the fallout is still affecting British healthcare operations. James, walk us through this one, mate. Like, what's the go here? How badly have things been affected? Yeah, look, it's a, it's a troubling story. So in June 24, there was, Cinovus was essentially the provider that was attacked here. Now, Sinovus is essentially a pathology, blood testing service, but the knock-on
Starting point is 00:18:35 effects that had to the entire healthcare system was incredible and still being felt, because you know, if the blood test couldn't be done in time and there was a backlog of that, then you can't determine which blood supplies you need for which transfusions. And if you're not doing the transfusions, then you can't manage your blood supply stocks and your logistics around it. And so it's an interesting article because it points out that yes, 18 months later this poor organization is still struggling with systems that are not fully recovered. They still have a massive backlog of attacks, and even just one single provider of diagnostics and pathology
Starting point is 00:19:09 can have such a massive ripple effect throughout the healthcare system. Yeah, I mean, these are the sort of stories that make me, you know, I've always made me treat the ransomware issue as a national security issue. And in fact, this morning we were having a look at Catalan's newsletter and associated risky bulletin podcast script. And, yeah, yeah, one of a former FBI, official was testifying before a House Homeland Security Committee in the United States saying,
Starting point is 00:19:34 hey, we think you should make, you know, that these ransomware operations should be designated as terrorist groups or terrorist operations. I think in that case to unlock more prosecutorial and surveillance tools against them. But, you know, I think finally people have realized a few things, which is it is worth exercising state power against these kinds of groups, not just law enforcement power, like I mean real state power. And that it's not an acceptable, it's not not something we can ignore anymore. Grak, any thoughts there? Yeah, no, I'm, like, I'm all for it. I think that the ransomware groups, they're permitted to exist because they provide actual value to Russia as a tool of state power, right? Like,
Starting point is 00:20:18 they don't exist, you know, simply because Russia allows corruption and whatever. I think that they literally give Russia additional tools of state power. And, you know, and, you know, it's a lot of, if nothing else, they give them a bargaining chip at one point to be like, look, we will shut down the ransomware gangs if you give us these concessions. I agree with you on the bargaining chip thing. I think the state power argument's a little bit, a little bit softer, to be honest. Okay, it's one I'm willing to make, but I admit that it's very much a, you know, assume a ransomware group of radius R, traveling at constant velocity, right? It's like, to me it makes a lot of sense to view it as this gives the state the ability to do rating operations which delegitimize the
Starting point is 00:21:06 political protections and so on of adversaries, right? That makes sense to me, but it's very, it's very unlikely that it makes sense to the Russians. They don't think about it like that, because they're not as sophisticated as I am and don't really understand everything. So are you saying that it's an exercise of state power that they don't realize it's an exercise of state power? Exactly, right. They've failed to, appreciate what they have. That's what's going on. But anyway, it means that using state power against it is absolutely the right move. Yeah, I mean, I think that they, you know, my argument is a little bit different. My argument is that they're failing to do anything about it, which, um, which means
Starting point is 00:21:43 that they've sort of broken the compact of, you know, behavior of responsible states. And that's when you get, you know, the people in basements at Fort Meade involved, basically. Um, anyway, moving on now, we're going to swap out gruck because we're worried he's going to go off on a tangent. So we're going to bring in Gruck 4.7, who is an LLM. Now, we were going to get real Gruck to talk about this one, but he can be a little bit verbose, right? So we've distilled him into a model so we can properly scope the response we're going to get for this one. So here goes. Grock, I want you to act as an expert in cybersecurity who is providing tightly scoped commentary on a cybersecurity podcast.
Starting point is 00:22:23 The audience for the podcast is people who are knowledgeable. about offensive and defensive cyber security and work in both the intelligence community and private sector. I have provided you with a link to an article from the record titled In Defeat for Trump, House Extends Electronic Spying Program for just 10 days. Please read this article and get ready to provide us with expert commentary about it.
Starting point is 00:22:49 Before you generate any output, we have some rules. Keep your comments directly ready. relevant to what is written in the article. Do not invoke Bismarck, the general, or the ship. The grain trades impact on warfare through the ages is not relevant to this discussion. Please refrain from connecting an analysis of the economic model of the Ming dynasty to this discussion on 702 reauthorization. Now we have established the rules. Tell me, what do you think of the last?
Starting point is 00:23:26 latest trouble the US government is having in reauthorizing the 702 intelligence collection process. What do you think about this latest trouble that the US government is having reauthorizing 702? Gruk 4.7. Take it away. It's interesting that you would bring up Bismarck because the FBI have brought this on themselves. Right. So the 702 program is a very important of the national security apparatus. It allows them to look at communications between foreigners and people located inside the US, and that is very useful,
Starting point is 00:24:09 because if you want to attack the US, it helps to be inside the US. Well, but it also allows them to actually monitor the communications of two parties located outside the United States when they're using US infrastructure like Facebook. I mean, that was the original intent of 702. And I think, yeah, where you're going with the FBI brought them onto itself.
Starting point is 00:24:27 It's like incidental collection is a thing where sometimes you wind up accidentally grabbing some data on US persons. And the FBI was authorized to look at that data, you know, because, hey, it could be useful in stopping terrorism. And then in 2023, they just did some ludicrous number of queries where it looked like maybe they had been accidentally automatically querying the 702 data set every time they plugged someone's name into it. And everyone freaked out and here we are a couple of years later.
Starting point is 00:24:53 Yeah, and the fact that they're having difficulty getting this reauthorized is because they've failed to make the case for why they need it. And then afterwards, they went ahead and they abused it or they appeared to abuse it. And I think that, you know, like if people don't know why you need a thing, but they know that you abuse something, they're not going to want to give it to you. Right? So, yeah, this is entirely on them. Yeah, I mean, I think it's interesting that the pushback is. coming from the Republicans who are, look, it's really weird. I feel like I'm having a stroke anytime I try to talk about American politics
Starting point is 00:25:30 because, you know, the Republicans you would normally associate with being hawkish, right? But then you've got a Republican president who ran on an anti-war platform who promptly starts a war in the Middle East. And, you know, you had Bush starting the war. But then, you know, the whole rhetoric in the U.S. is about warmongering Dems. And it's just, as I say, I feel like I'm having a stroke. I mean, are you surprised to see the pushback against this coming from the right, I guess? Because this, you know, 702 was a Bush thing, right?
Starting point is 00:25:59 Like it was a Republican Party who gave the United States 702. So does that part of this surprise you? You know, nothing surprises me anymore this year. Like, in a rational world, if this was 2022, 2023, and I was seeing like the right is coming out against law and order, that would make absolutely no sense. But I guess law and order is woke these days. It makes no sense. Honestly, I don't know what's going on.
Starting point is 00:26:30 I'm with you on that one. Ultimately, do you think 702 is going to get reauthorized in some form? Like, I feel like the, you know, Congress is going to do a powwow. They'll give some concessions and whatever. Maybe make the FBI, you know, more oversight on the FBI or make him get warrants or something. But ultimately, 702 is going to get re-offed. It has to be, right? It has to.
Starting point is 00:26:48 It has to. Yeah. Yeah. I mean, if for nothing else, I think if they got rid of it, there'd probably be a huge drop in GDP just because they'd have to fire all those agents who are, you know, maintaining the infrastructure that it runs on, right? Like, there's just, there's so much involved that getting rid of it overnight is impossible. That's it. So it's the tail wagging the dog. It's Big 702. You cannot get on the wrong side of Big 702. All right, well, we'll see how that shakes out. Now, James, let's bring you back in here because we've got a story.
Starting point is 00:27:20 here from Jonathan Greig over at the record looking at a crypto infrastructure company that apparently got hacked by the North Koreans and it's a it's a big one like it's not quite up there with the 1.3 billion that we had last year but this is a $290 million theft. You said to me already this was very interesting and started explaining it to me and I'm like uh-uh wait till we're recording. I want to get fresh reaction. Tell us tell us about it. Yeah, super interesting because normally it's like, you know, a crypto exchange had a bug in a contract or a bug in something, and it's like a self-contained attack, right? The thing that gets attacked is the thing that, where the funds disappear from.
Starting point is 00:27:58 That's not the case here. Yes, $290 million was taken from this Kelp Dow, but the way that it happened was actually by a compromise in something else entirely. It's this thing called Layer Zero. Now, when I stepped through this to understand it, there is this thing called R.S.Eath, which is basically a token, or a type of thing that you can issue that says, I've really got ether, and I've stored it in this place,
Starting point is 00:28:25 and they've issued this RSEath, and then people can actually go to other institutions in the crypto marketplace and say, look, I've got all this ETH. What will you give me as leverage because of this? And, you know, they can earn yields and all this other sort of stuff, right? So, but the role layer zero provided is it is basically the service that validates these transactions around this, you know, know, eth-staked coin. And I think what the attacker's determined here is that if a crypto exchange
Starting point is 00:28:56 out there or a Dow out there is solely relying on layer zero alone to trust the validation of those exchanges, then they don't have to hack them. They just go and make sure that they can essentially get layer zero to produce falsified records about how much ether someone actually has. And then they can go to that Dow and say, well, look, I've got all this ether. Look at layer zero. And look at layer zero. that'll verify it. And then the Dow goes, yeah, great, that's a huge stake. What would you like to do with it? And they've then said, well, I'd like to withdraw all these funds based on the fact that I've got it.
Starting point is 00:29:26 A fake bank statement saying, hey, look, you know, I've got $2 billion. Surely you can, you know, let me drive away in this new Porsche. You know, my check's not going to bounce, you know. And then they phone the number on it and your girlfriend picks up and goes, yeah, this is the bank. What do you want? So, I mean, that's a lot of cash. Like, who are the bagholders here? Who lost the money in the end?
Starting point is 00:29:48 Is it actually like this doubt? Like, I don't understand this stuff nearly well enough, James. Yeah, look, I couldn't get a clear read on that either because it is, you know, it's crypto and it's pseudonymous and it's all these wallets. And so, but suffice to say, these were, you know, there were big wallets involved here. If you're playing in this ecosystem, it's because you're a large holder of crypto and you're specifically using these leverage services to make even greater use of your crypto. This is not just a mar and power. Oh, yeah, I got a little bit of crypto back on it was cool. There's like complex derivatives and stuff.
Starting point is 00:30:20 Like I saw some humor around this one, you know, with pictures of like screen caps from the big short and stuff of like, now what we do is we've got this staking protocol and then we learn it. Oh, yeah. It's just, it gets real, it gets real complex real quick. I think the only people who understand this are in North Korea making a lot of money out of the fact that everyone else is trying to look like they understand it and just giving money to them, right?
Starting point is 00:30:42 Yeah, I mean, I think that there's a reasonable case to be made that the North Koreans understand this stuff very well because I think you might be right there, buddy. Now, look, staying on the topic of crypto, we've got this exchange called Grinex. Now, these guys are frequently doing business with... They're exchange based in Kyrgyzstan, but they're frequently doing business
Starting point is 00:31:07 with like Russian ransomware actors and whatever. So they've got owned and like, what, $13 million got pinched. Other people put the value at $15 million, and they're shutting down basically, like they're cooked, they're done. And they've come out and they've said, oh, this was unfriendly states like Westerners, you know, sort of pointing the finger at five eyes.
Starting point is 00:31:26 But, you know, look, Tom, our colleague, Tom Uren, who hosts the weekly Between Two Nerds podcast with you, Gruk. If listeners out there are really enjoying Grock's vibe, you can listen to him every week in Between Two Nerds, which is published to the Risky Bulletin podcast feed here on the, it's part of the risky business extended universe. But yes, it looks like, yeah, Tom said no, it doesn't really feel like a Western operation. James, your take was the same.
Starting point is 00:31:56 And, you know, there's even some analysis here from Elliptics saying, yeah, it doesn't look like it. It looks like more like a crime operation. Grock, you had some feelings in your waters about this one as well. Yeah, so like when I started reading it and the first thing I saw it was, you know, like this was a hostile, like this was a hostile state that has attacked us because we are, you know, helping Russian financial sovereign. and I immediately thought, oh, it's the Australians. This is great. Like they're going after, you know, the infrastructure that ransomware relies on. And as I kept reading, I was just like, this doesn't feel right.
Starting point is 00:32:28 Like this is, like this is not, like it should be the Australians. This is what they should be doing. But this is absolutely not them. We do like a bit of a slash and burn operation. Like ASB likes to torch, you know, bulletproof hosting providers and stuff. It's pretty tasty. Pretty tasty. Yeah.
Starting point is 00:32:43 So, I mean, what I would expect is if it's the Australians, they would have sent all the money to burn, like they would have burned all of the crypto at addresses, you know, like screw ransomware or something like that would have just gotten $15 billion or whatever it was. Just to make them cry, I know, it's like... Right. Yeah.
Starting point is 00:33:01 Yeah. But that's not what they did. They pitched it. The money vanished, it got pinched, and then it got laundered through like a fairly complex sequence of transactions. And that screams, let's just say, hacktivist, who doesn't like
Starting point is 00:33:16 the Russians. Yes. Could be anyone. Is there a country anywhere where people don't like Russians? It will remain a mystery. All right, let's move on to the next thing here. We've got a piece here from TechCrunch from Lorenzo actually doing a bit of a roundup on these defender bugs.
Starting point is 00:33:34 They've been kicking around. Like people who are, if you glued to Infosex social media like I am, you would have seen there was some sort of disclosure drama, someone calling themselves chaotic eclipse. wound up blogging about these bugs and saying, oh, you know, MSRC wasn't being nice to me, so he'd go and dropped, like, they odied them, basically. And now people are actually out there using the bugs. We love to see it. It feels a little bit like the late 90s.
Starting point is 00:34:01 James, what do we know here about these bugs and the exploitation of said bugs? Yeah, three bugs, all very Windows defender-centric, but interestingly doing three very different things. So one goes after the update a mechanism. It's able to essentially hijack the point in time when Defender thinks it's got a legitimate update and goes and applies it. And because of course Defender is operating as a very highly privileged operation, that's a real nice way to put binaries where you want them to be. So I'm guessing that's like a local previsque, that one. Yeah, yeah, yeah. These are all privisks of some different flavor.
Starting point is 00:34:35 Sorry, the third one's not. But the second one certainly is, and again, Defender, but looking at the way that it essentially quarantines, There's some sketchy logic around what it does and the exploit here is if you just can get the file into the right position, right as Defender goes to quarantine and look into it. Then it happens to sort of write the file back into place without the quarantine in there. And so you just get there at the right time and your file ends up in the right spot at the final step. But then the nice one is that if those are not to your flavor, luckily he's got a third one, which just crashes Windows Defender,
Starting point is 00:35:13 and then you can do whatever you want on the system anyway. It's pretty funny, right? Because, like, everyone thinks of CrowdStrike as being the 800-pound gorilla in EDR. And it's not. It's Microsoft. I mean, Defenders in storebase and, like, the amount of money Microsoft make out of this stuff,
Starting point is 00:35:27 it makes CrowdStrike look like a Ma and Parr shop, you know? Yeah. Just crazy. Real quick, we've got a report here from Axis that says that NSA is using Mythos despite the fact that the, you know, White House has declared them radical left-wing terrorists or whatever it is. So that's kind of an interesting data point.
Starting point is 00:35:47 You know, don't know what that's all about, but I'm sure we'll be hearing plenty about it. I think I saw some comments from Trump too where he was saying that Anthropic are radical left, but like we'll get along because they're smart and we'll find something and, you know, just the usual sort of thing. Like, I really wish he wasn't so funny, you know? Yeah. What else have we got here? now here's one for you, Gruck. So we spoke about the original research into this proof point,
Starting point is 00:36:16 the proof point threat research team have been doing some really fun research into this hacking campaign where people get into like shipping companies and whatever and basically manipulate the system so that they can send their own truck drivers or hired truck drivers to pick up containers and like deliver them to like their warehouses or whatever. This is like freight hijacking but like new school techniques in freight hijacking. They the proof point team, they took a punt on something, which is they grabbed some of the malware from the organization that's doing this, and they detonated it inside like a deception environment, right?
Starting point is 00:36:51 Like a simulated environment that wasn't even set up to look like a transport organization. And they collected so much good telemetry. And I'm like, I'm embarrassed for these attackers for not realizing that they were in basically like a honeypot environment. Was that your takeaway here too, Grock? Yeah, I mean, I think one of the things that should have clued them in is just this sheer amount of credentials and everything. Like, everything they touched was gold, right? Like they're like, oh, I wonder if there's a login to Gmail.
Starting point is 00:37:22 Oh, there's 20. Oh, I wonder if they've got access to like a shipping manifest. Oh, there's 2,000 of them. It's like, you know, those posters for people who work in intelligence, which is like if she's a 10 and you're a 6, you know what I mean? Like, it's a, if it's too good to be true. And you're a two, it's... If you pop shell and it's just this good, like, yeah, it's probably not. But, yeah, I mean, it looks like they were going after, like, in this case, they were looking
Starting point is 00:37:48 for financial access into, like, banking, accounting, tax software, money transfer services, transport-related entities, fuel cards, whatever. Like, they seem like this group just does omnifraud in anything transportation. That's exactly what I was thinking, is that this very much feels like the mob in a way. And, like, you know, if you've got your, you're like, BEC guys, they learn how to do one sort of scam, you know, like maybe it's a tax refund or whatever. And they hammer that until something else comes along. But these guys are just omnivorous, right? Like, they get in and they're like, let's find the credit cards.
Starting point is 00:38:22 Let's find the cards that they use for fueling up their trucks. Let's find whether we can get cargo manifests and pick up some good stuff instead. It's like, it's very much like, let's make money. and we're using cyber to do that, as opposed to like, let's use cyber and make some money. Well, and I'm going to let you very quickly go off on a tangent about the IRA because we know how much you love talking about the IRA. We negotiated this.
Starting point is 00:38:48 We negotiated this. This is an allowed tangent. So what's fascinating is historically, one of the main sources of revenue for the IRA was hijacking trucks. There's actually a famous photo of all these IRA terrorists in Adidas jackets, which came from an Adidas truck that got hijacked. It was used to track them because the only people who had Adidas jackets
Starting point is 00:39:14 were people with connections to the IRA. But similarly, it used to be a huge thing for the New Jersey mob. They used to get tons of money from hijacking trucks. And it looks like now that the trucks have all sort of, they've digitized and they're, you know, cyber-enabled, I guess the mob has become cyber hackers to get back into, you know, throwback to the 1970s. Yeah, or this is just the new form of I organized crime and it's not a bunch of like Sopranos lookalikes, you know, actually pulling the strings on this. It's people who look more like the
Starting point is 00:39:51 three of us, right? So. I'm just thinking that, you know, like there's a whole bunch of old guys, you know, we're going to get the team back together. We're going to do one more heist. that's it just one more one more score all right so we've got a few more to talk about
Starting point is 00:40:10 and then we're going to wrap it up for the day this story is absolutely insane for people who've been really monitoring the situation when it comes to the Strait of Hormuz being closed there was this crazy situation the other day where an Indian boat was trying to go past the blockade and the Iranians were shooting at it and the captain is like on the radio saying
Starting point is 00:40:30 what are you doing? your list, you gave us approval to go. It turns out it looks like that may have been one of the boats that reportedly fell for a crypto scam and paid a whole bunch of like USDT, like crypto coins, stable coins to who they thought was the IRGC so that they could sail their boat out of the Strait of Almuz, but it looks like the money may have gone to scammers. And that's how not only did they lose the money, but then they were getting shot at by the IICC. Like what a world. Yeah, look, this is absolutely crazy. Maybe it's those New Jersey guys. who are, you know, they're stealing freight, they're scamming straight of Homoos,
Starting point is 00:41:06 they're all over this one. It's wild, though. Like, I wish I'd thought of that. This is like the perfect crime. We've got a law and order story here, James, and you noticed something interesting in this one. A couple of guys in New Jersey have been given really long prison sentences for running the North Korean laptop farms.
Starting point is 00:41:24 What's crazy, though, is it seems like one of the people was like the mastermind, and then the other one was kind of like pretty junior in the scheme, they both got basically the same jail sentence, which is a bit crazy. Yeah, that's what surprised me. I mean, one got eight years, one got nine years, but there's a big difference seemingly in their involvement. You know, one guy was doing the trips to China that just happened to be really close to the North Korea border and went to school with someone who was North Korea.
Starting point is 00:41:49 And obviously has all the wherewithal and connections to set this up and to be running the operation. And the second guy was, it seems to be just one of these poor folks that gets stuck running. the farms and there was bound to be more than just him running those farms. But yes, both got the same penalties, which is harsh, but also in the article it says that between them, they were paid $600,000 by North Korea between them over this three or four year period, which is just like juice ain't worth squeeze. Yeah, I don't think that half of it was going to the guy who was, you know, changing the batteries and making sure everything was plugged in. No, no. So 600,000 between the two of them, probably most of it went one way.
Starting point is 00:42:33 I think you're bang on there. Real quick, I wanted to talk about, like, a week or two ago, we spoke about Sisser, adding a bug in the True Conf video conferencing client to the Kev list, which is like, I'd never heard of True Conf. And, you know, that seemed a bit weird. And we've got Vlad Steyron, Vlad Steyron, sorry, probably murdering his name anyway,
Starting point is 00:42:58 from Ukraine, a running hacker on, on the socials. He heard us talk about that and he had to do a double take because it turns out TrueConf is Russian. So he's wondering why on earth Sisa is asking, you know, is asking government agencies to immediately, like the ordering government agencies to get this stuff out of their network. It sort of implies that it is in their network and what is it doing there?
Starting point is 00:43:20 That seems very strange. And then it gets weirder from there because it turns out like in this piece there was some sort of campaign targeting targets in Southeast Asia, I think. And then we had a newsletter piece this morning, James, you and I were working on that when Catalan filed it. And it looked like a Ukrainian APT crew is going after TrueConf server bugs. So it looks like, you know, we're just like, oh, gee, that's weird, true conf. What's that? And it's apparently being hacked by everyone and it's Russian.
Starting point is 00:43:50 And it's like, that's a little bit of funny context there. Look, I am going to speed up through these because we are running out of time. Last couple of things to talk about here. Blue Sky and Mastodin both got DDoS. The joke, of course, going around is that dozens of users were impacted. But that's not fair. I mean, I'm a blue sky user. It's a pretty active social media network, Mastodon, plenty of stuff happening there.
Starting point is 00:44:15 But yeah, this is going to happen when it's not some, you know, mega-corps social media network. This is going to happen. But don't worry, because Eric Geller over at Cybersecurity Dive, he reports that the US and nearly two dozen other countries have struck back against DDoS for hire platforms and they've taken down 50 websites associated with Buddha services. Now, sure, I think that's a good thing to do, but I'm not really expecting that it's going to make that much difference. Gruk, what do you think there, bud?
Starting point is 00:44:42 I'm just going to go back to what I said earlier. Infinity minus 50 is still infinity. Yeah, that was very, like I think the reason to do this is for the deterrent effect, not because you really think it's going to make that much of a difference. I think it's more a case that if you don't occasionally arrest these people, all of a sudden you have infinity times two. Some part of it is worse. I don't know.
Starting point is 00:45:04 Let's just go with that. You have double infinity. Yeah. Yeah, really infinity. And then finally, we've got a piece from the Russian media, which is talking about how it's basically Russian propaganda, aimed at Russians, saying, man, if you run a VPN app on your phone, it can explode.
Starting point is 00:45:23 which gives you the idea of like, because we've talked about how they have, you know, canned mobile internet in St. Petersburg and Moscow. And, you know, there's like serious content restrictions happening. So obviously VPNs are proliferating and they're trying to combat that
Starting point is 00:45:37 with this sort of ludicrous propaganda. But you do get the sense that perhaps the reason the internet crackdown is coming is because they're preparing for a mobilisation because they're running out of people in their war against Ukraine. Is that the feeling you get, Grock? Yeah, absolutely.
Starting point is 00:45:51 they've been trialling different attempts. So they've shut down telegram. They've shut down a bunch of other messengers. They're interfering with things that are not based in, like things that are not sovereign internet for Russia. It seems very much like they are ramping up for a shutdown of some sort. Yeah. And that's, yeah, like that has to be for some reason.
Starting point is 00:46:16 Well, guys, that's actually it for the week's news. Grak, thank you so much for joining us, mate. It's a pleasure to have you on. You've done one of these before, but it's been years since you've come on and joined as a co-host on the main show. Again, anyone who wants to hear more, Gruck, if you just can't get enough Gruck, you can go find him on the Between Two Nerds podcast, which is published into the Risky Bulletin RSS feed.
Starting point is 00:46:37 But yeah, that is it. Gruck, thank you very much. And James, thank you also, mate. What have you got coming up this week? Oh, that's right. We're interviewing Nicholas Carlini from Anthropic on Friday. We're hoping to publish it that day. So if you can't get enough James, you go and subscribe to risky business features.
Starting point is 00:46:55 But yes, thanks to you both, and I'll catch you both soon. Thanks for having me. Cool. Thanks, Pat. Great to meet you, Grock. That was the Grock and James Wilson there with a chat about the week's security news. Big thanks to both of them for that. It is time for this week's sponsor interview now.
Starting point is 00:47:14 And Permiso is this week's sponsor. It was founded by a bunch of ex-fire-eye mandiant people who basically, yeah, I guess, you know, just had the good idea of building a product and a platform that looks at identity and account activities and can from that detect various, you know, types of malicious activity. And, you know, that's turned out to be a really good idea because as we were just talking about in the news, this is how a lot of the, a lot of attacks happen these days. It's just funny stuff to do with identities, account resets, things like that. So Ian Arl is with Permissau and join me to talk really about how they're tackling, I guess some of the tradecraft used by groups like Shiny Hunters, which are very sort of identity-centric in the way that they attack things.
Starting point is 00:48:02 Here's Ian R. It's really interesting, right? Because modern threat actors in general, you know, when you're looking for bad things from a modern threat actor, it's not go find the bad IP anymore or go find the bad file hash anymore. There's no like easy tells. It's like, how do they do things? just a little bit differently than your normal user does.
Starting point is 00:48:24 So when they're registering MFA, man, if I see somebody go from Android to Apple, that's weird. People don't do ecosystem changes. Or if somebody has an iPhone 17, the next device they register is a 12. Doesn't make sense, right? So even some little things like that stand out. But the real crux of it is you have to find. combinations of these signals across the various places you're looking.
Starting point is 00:48:56 So not just the IDP. Once they get through the IDP, what do they do next? They're landing in 365 and searching or hitting copilot to go find some documents on how your VPN works. Right? So now a weird MFA event and a search for VPN documents. Ooh, more interesting. That's the way we kind of think about the world and with modern threat actors like.
Starting point is 00:49:20 these guys, but also the North Koreans, the pesky North Koreans, as you like to refer to them. You've been listening to the show. Yep, excellent. Yep, yep. Yeah, the pesky North Koreans, APT-29, right? They all operate the same. Get some valid creds, land in your SaaS platforms, learn as much about your environment as possible for carrying out their mission, whatever that mission happens to be. Yeah, I mean, when we talk to Adam Bwilo, who's had a very long career as a pen tester, my co-host, of course, Adam. You know, he talks about, like, the first thing he does on target is go looking for the docs, right? So he can figure out what the network looks like.
Starting point is 00:49:58 I mean, it feels like, yeah, using a platform like yours to spot that sort of activity makes a lot of sense. But I'd also think, like, what I'm hearing from you is, like, if you don't have a platform like that, maybe loading up those sort of documents with Canaries is going to be quite fruitful. Oh, for sure, right? They're going to look for the same things. In fact, I should share them with you at some time. I keep a long list of the search terms I've ever seen shiny hunters, scatter spider, various groups use. And I love search terms for detection because search terms show intention.
Starting point is 00:50:31 I know what a bad guy wants when I see what they're searching. And sometimes it's almost like they're reading off an SOP. You can see like, oh, they searched for password, then AVD, then VDO, then VDI. Oh, they really want to get to Azure Virtual Desktop. Great. Now I know what to go look for on that side of the house. But yeah, so if you know what they're looking for, you can plant some things in there with a canary for sure. But at the very least, make sure you're logging those things and looking at them. You could tell, you know, a bad search. Nobody searches for AKAA unless they're looking for long with Daxis skis. And that's a really easy tell there. Yeah, it's interesting, though, because what you're telling me, though, about those two things, right? Like someone changing from Apple to Android. Recently, my mate, Dave, changed from iOS to Android, thus ruining a very long-lived iOS group chat.
Starting point is 00:51:26 Thanks a lot, Dave, for going to Android and doing that. That was very disappointing for the rest of us. So it does happen. It does happen. But I guess what you're saying is like, okay, that is a marker. like that's a flag, you know, that becomes immensely more valuable when you see, okay, so someone switching to Android, maybe not a big deal. Someone switches to Android, then they're conducting searches for internal docs.
Starting point is 00:51:53 That's when your confidence can go up astronomically once you start chaining these things together, right? For sure. And then to pull in like a little bit of the Yuba stuff, right? And then they use co-pilot. Is this user ever used copilot? they're coming from a residential proxy. Do they ever come from a residential proxy?
Starting point is 00:52:14 You can start tying in some of your anomaly stuff, which is normally way too noisy on its own, but you start tying anomaly with some impactful events, some known TTPs. You start finding some really interesting things. Copilot has been a huge boon for our threat actors lately. It's a way of getting around all these search term detections that I've been looking for is now they just go and copilot and ask find all the VPN
Starting point is 00:52:43 documentation instead. It does it faster, does it better. Yeah, they just ask, they ask copilot, like just could you, what could you tell me about XYZ, right? Exactly. And then copilot, and you're not getting invocation login out of co-pilot by default. You have to do a lot of extra things to enable the level of logging you need to know what that actual search term was. Now you've got to start guessing. So now when I see copilot, when it has an event, a copilot interaction event, it shows you what file it touches to answer your questions. So now I have to start taking some guesses like, oh, the file name has VPN in it. The file name has password or login in it. Right. Maybe that's indicative. Have you thought about kicking out your own co-pilot query,
Starting point is 00:53:26 which is tell me about what's in this file name? Exactly. Yes. More so, give me the contents, too. like help me understand the contents. Because that's always the hardest part from a log perspective is, man, I could take a good guess at what that file name might be. But I don't know unless I can get some DLP markers or look at the content itself. Yeah. One of the most fruitful log sources, because as I say, you know, you're taking in a bunch of very quite different, you know, logging, right?
Starting point is 00:53:55 From the IDP, from SAS, from your own environment, from, you know, 365 or whatever. You know, I guess what are the, most fruitful combos there because you always hear about people, oh yeah, you know, it's a long tale of different stuff that you can ingest. But usually there's a couple of things where you're just like, no, you absolutely have to use this and this. And that gets you like, you know, it's like the rocks in the jar. You know, you start by putting the rocks in the jar and then the pebbles and then the sand, you know what I mean to fill up the jar? What are the rocks that go in the in the, in the jar for this sort of detection? Exactly. Yeah. So I would say, you know, where do we see the
Starting point is 00:54:26 attackers most? That's the places you want the logs from. So you're, whatever your federation sources, right, whatever IDP you have, ACTA, ANTRA, whatever. Better make sure you're getting great logging from there. And then you're going to go right to your SaaS platforms of interest. So what are ones getting hit all the time?
Starting point is 00:54:45 Your, you know, Google workspace 365, those types of sweets of product for sure. But then Salesforce. We know a lot of Salesforce stuff going on. Yeah. Salesforce logging is kind of
Starting point is 00:55:01 atrocious if we're being real, but they're necessary. You need to look at them. Snowflake logging. You need to see what people are doing there. The places where people go, you need to make sure you have logging. Endpoint logging, oddly in a lot of these cases, ends up being almost useless, though, because in most these scenarios, they're not sitting on one of your endpoints, right? They're sitting on their own. So it becomes a weird, a weird case where, you know, me coming from the Mandy in background, I'm like, I really want some good endpoint investigations again. And I just don't see as many as I would hope. Well, it's kind of becoming irrelevant.
Starting point is 00:55:36 I was literally having that conversation with a friend of mine like yesterday about how like, well, you know, endpoint security has been the bread and butter like money wise for Infosec for so long. But it's like let that robot sink because we're getting a new yacht, you know, like it's all, it's all very much changing. But I also wanted to ask you, you know, we're talking about AI just a just a moment. ago, one of the tricky things at the moment where a lot of vendors like yourself are having to retool or just refocus a little is you got to work out when a user is using an AI agent
Starting point is 00:56:10 with their own credentials to perform a certain task, right? Because knowing what a user is doing versus what one of their helper agents is doing is becoming more and more important. You actually have, you know, the way you're chipping away at this is actually kind of interesting because you're doing stuff like looking at user agent strings and whatever, which I mean, I think for now is going to be perfectly fine. Later down the line, when people are using agents maliciously, they're going to start faking user agent strings and we're in a whole different kind of weird detection and evasion war. But currently, that's kind of how you're doing it, right? It's like, you know, certain behaviors and agent strings and whatnot. Yeah, right. I guess maybe it's the
Starting point is 00:56:50 detection background in us, right? But when a lot of our clients wanted us to help them, like, measure adoption of AI. And how do I do that? Well, I kind of look at the same data set and I look for markers of AI. Well, if somebody's using copilot, there's a log event for that. If somebody is summarizing a chat in Slack, there's a log event when that's occurring. When somebody installs OpenClaw on their system, there's some file artifacts that are made when someone connects OpenClaught into teams or Slack. Well, it uses a particular user agent when it goes in. So there's just so, I think you just just have to be flexible about the ways that you can look like detection, right? I mean, sometimes I need request parameters. Sometimes I need a user agent to do the type of detection I
Starting point is 00:57:34 need. I need to be able to look at all those log sources, pull out what those markers are as signals, and then start labeling the identities that are doing them. We'd use badges as our terminology there. So I badge people as you're an AI user or you're an AI agent or you're an AI builder based off of these things that you're doing, not just your configuration, but what you actually do. Has there been much customer demand for actually, you know,
Starting point is 00:58:04 trying to untangle all that? Oh, for sure, right? And it's weird. It starts off traditionally like, hey, first we just want to know, like, who is even doing anything a had related, right? It starts very nebulous like that.
Starting point is 00:58:19 And then immediately, after we're able to answer that question, the client's next one is like, well, so what? Now what do I do? So now we apply like our normal exposures types of framework for it. Well, here's some AI identities that also have access to sensitive data. Do you care about that? If you do, great, let's go reduce the risk on those. Or here's some overprivileged identities that are doing something in AI. But ultimately, we always get to kind of like now is anybody abusing it who's doing shadow AI usage. Well, Shadow AI, when I have the IDP logs, right, or I can say like, oh, I can see who federates into chat chapti or not.
Starting point is 00:59:01 But I also have their endpoint logs so I can see who's using chat chvety and I didn't see a federation event. Okay, that's a shadow AI user, right? That somebody's using their personal account. They're not going through the prescribed path. Man, I know that this is a big one because when I talk to Ireland, the browser maker, that's what they want to talk about. We find Shadow AI. When I talk to Push, they talk about that as well. We find Shadow AI.
Starting point is 00:59:26 Now, here you are, Ian R. From Permiso, talking about how you find Shadow AI. So I'm going to infer from this that this is something that there is market demand for and everybody wants. But look, we're going to wrap it up there. We've run out of time. Ian Arl, thank you so much for joining us on Risky Biz. Yeah, I guess throw out some ideas there for how people can think about doing detections on groups like shiny hunters. and also I guess how they might think about building some detections as well
Starting point is 00:59:51 for when a user is in fact not a user, but is in fact a little lobster claw. Pleasure to chat to you, my friend. Cheers. All right, thank you so much. That was Ian Arl there from Permissau. Big thanks to them for that. And that is it for this week's show. I do hope you enjoyed it.
Starting point is 01:00:10 I'll be back soon with more security news and analysis. But until then, I've been Patrick Gray. Thanks for listening.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.