<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 16 Apr 2026 23:55:30 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Malware”</title>
    <link>https://techsnap.systems/tags/malware</link>
    <pubDate>Fri, 06 Sep 2019 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>411: Mobile Security Mistakes</title>
  <link>https://techsnap.systems/411</link>
  <guid isPermaLink="false">b9fd8f0e-82a3-44bb-b373-eea0ac62412d</guid>
  <pubDate>Fri, 06 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/b9fd8f0e-82a3-44bb-b373-eea0ac62412d.mp3" length="21338406" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</itunes:subtitle>
  <itunes:duration>29:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs. 
</description>
  <itunes:keywords>iOS, iPhone, mobile, mobile apps, app security, Apple, jailbreak, security, mobile security, exploit chain, zeroday, project zero, google, libxpc, IPC, webkit, malware, android, v4l2, video4linux, privilege escalation, AMD, Epyc, NUMA, benchmarks, exploit market, Zerodium, cpu load balancing, linux, open source, USB, USB4, USB-C, Thunderbolt, USB Power Delivery, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>400: Supply Chain Attacks</title>
  <link>https://techsnap.systems/400</link>
  <guid isPermaLink="false">c46ae690-b668-4708-a781-8e923bc4baf4</guid>
  <pubDate>Thu, 28 Mar 2019 20:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c46ae690-b668-4708-a781-8e923bc4baf4.mp3" length="23436770" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</itunes:subtitle>
  <itunes:duration>32:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.
Plus an update from the linux vendor firmware service, your feedback, and more! 
</description>
  <itunes:keywords>ASUS, ASUS Malware, ShadowHammer, ASUS Live Update firmware, shadowpad, cccleaner, badusb, ssd firmware, microcontroller, reflections on trusting trust, compiler, c runtime, UEFI, BIOS, intel management engine, machine learning, unsupervised learning, malware, backdoor, command and control server, mac address, windows, linux, linux vendor firmware service, fwupd, package managers, node, npm, python, pypi, ken thompson, supply chain, supply chain attacks, gigabyte, hardware manufacturers, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</p>

<p>Plus an update from the linux vendor firmware service, your feedback, and more!</p><p>Links:</p><ul><li><a title="Joren Verspeurt on Twitter" rel="nofollow" href="https://twitter.com/JorenYuuji/status/1109040022341275648">Joren Verspeurt on Twitter</a> &mdash; The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.</li><li><a title="Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers" rel="nofollow" href="https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers">Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers</a> &mdash; The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.</li><li><a title="Malicious updates for ASUS laptops" rel="nofollow" href="https://www.kaspersky.com/blog/shadow-hammer-teaser/26149/">Malicious updates for ASUS laptops</a> &mdash; A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.</li><li><a title="Asus Live Update Patch Now Availabile" rel="nofollow" href="https://www.theregister.co.uk/2019/03/26/asus_live_update_patch/">Asus Live Update Patch Now Availabile</a> &mdash; Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.</li><li><a title="ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups" rel="nofollow" href="https://www.asus.com/News/hqfgVUyZ6uyAyJe1">ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups</a> &mdash; ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.</li><li><a title="The Messy Truth About Infiltrating Computer Supply Chains" rel="nofollow" href="https://theintercept.com/2019/01/24/computer-supply-chain-attacks/">The Messy Truth About Infiltrating Computer Supply Chains</a> &mdash; The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”</li><li><a title="Inside the Unnerving CCleaner Supply Chain Attack" rel="nofollow" href="https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/">Inside the Unnerving CCleaner Supply Chain Attack</a> &mdash; Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.</li><li><a title="ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/2017_shadowpad-how-attackers-hide-backdoor-in-software-used-by-hundreds-of-large-companies-around-the-world">ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World</a> &mdash; ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. </li><li><a title="Gaming industry still in the scope of attackers in Asia" rel="nofollow" href="https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/">Gaming industry still in the scope of attackers in Asia</a> &mdash; Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.</li><li><a title="Microsoft Security Intelligence Report Volume 24 is now available" rel="nofollow" href="https://www.microsoft.com/security/blog/2019/02/28/microsoft-security-intelligence-report-volume-24-is-now-available/">Microsoft Security Intelligence Report Volume 24 is now available</a> &mdash; Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.</li><li><a title="Microsoft Security Intelligence Report Volume 24" rel="nofollow" href="https://clouddamcdnprodep.azureedge.net/gdc/gdcVAOQd7/original">Microsoft Security Intelligence Report Volume 24</a></li><li><a title="Supply Chain Attacks Spiked 78 Percent in 2018" rel="nofollow" href="https://www.nextgov.com/cybersecurity/2019/02/supply-chain-attacks-spiked-78-percent-2018-cyber-researchers-found/154996/">Supply Chain Attacks Spiked 78 Percent in 2018</a></li><li><a title="Supply Chain Security: A Talk by Bunnie Huang" rel="nofollow" href="https://www.bunniestudios.com/blog/?p=5519">Supply Chain Security: A Talk by Bunnie Huang</a> &mdash; I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.</li><li><a title="Attack inception: Compromised supply chain within a supply chain poses new risk" rel="nofollow" href="https://www.microsoft.com/security/blog/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks/">Attack inception: Compromised supply chain within a supply chain poses new risk</a> &mdash; The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.</li><li><a title="Supply Chain Attacks and Secure Software Updates" rel="nofollow" href="https://paragonie.com/blog/2017/09/supply-chain-attacks-and-secure-software-updates">Supply Chain Attacks and Secure Software Updates</a> &mdash; In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.</li><li><a title="Bad USB, Very Bad USB" rel="nofollow" href="https://lmgsecurity.com/bad-usb-very-bad-usb/">Bad USB, Very Bad USB</a> &mdash; The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.</li><li><a title="Reflections on Trusting Trust by Ken Thompson" rel="nofollow" href="https://dl.acm.org/citation.cfm?id=358210">Reflections on Trusting Trust by Ken Thompson</a></li><li><a title="LVFS Project Announcement - The Linux Foundation" rel="nofollow" href="https://www.linuxfoundation.org/blog/2019/03/lvfs-project-announcement/">LVFS Project Announcement - The Linux Foundation</a> &mdash; The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.</li><li><a title="LVFS: Vendor Status" rel="nofollow" href="https://fwupd.org/vendorlist">LVFS: Vendor Status</a></li><li><a title="Two new supply-chain attacks come to light in less than a week" rel="nofollow" href="https://arstechnica.com/information-technology/2018/10/two-new-supply-chain-attacks-come-to-light-in-less-than-a-week/">Two new supply-chain attacks come to light in less than a week</a> &mdash; Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.</li><li><a title="Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months" rel="nofollow" href="https://snyk.io/blog/malicious-code-found-in-npm-package-event-stream/">Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</p>

<p>Plus an update from the linux vendor firmware service, your feedback, and more!</p><p>Links:</p><ul><li><a title="Joren Verspeurt on Twitter" rel="nofollow" href="https://twitter.com/JorenYuuji/status/1109040022341275648">Joren Verspeurt on Twitter</a> &mdash; The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.</li><li><a title="Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers" rel="nofollow" href="https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers">Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers</a> &mdash; The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.</li><li><a title="Malicious updates for ASUS laptops" rel="nofollow" href="https://www.kaspersky.com/blog/shadow-hammer-teaser/26149/">Malicious updates for ASUS laptops</a> &mdash; A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.</li><li><a title="Asus Live Update Patch Now Availabile" rel="nofollow" href="https://www.theregister.co.uk/2019/03/26/asus_live_update_patch/">Asus Live Update Patch Now Availabile</a> &mdash; Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.</li><li><a title="ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups" rel="nofollow" href="https://www.asus.com/News/hqfgVUyZ6uyAyJe1">ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups</a> &mdash; ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.</li><li><a title="The Messy Truth About Infiltrating Computer Supply Chains" rel="nofollow" href="https://theintercept.com/2019/01/24/computer-supply-chain-attacks/">The Messy Truth About Infiltrating Computer Supply Chains</a> &mdash; The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”</li><li><a title="Inside the Unnerving CCleaner Supply Chain Attack" rel="nofollow" href="https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/">Inside the Unnerving CCleaner Supply Chain Attack</a> &mdash; Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.</li><li><a title="ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/2017_shadowpad-how-attackers-hide-backdoor-in-software-used-by-hundreds-of-large-companies-around-the-world">ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World</a> &mdash; ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. </li><li><a title="Gaming industry still in the scope of attackers in Asia" rel="nofollow" href="https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/">Gaming industry still in the scope of attackers in Asia</a> &mdash; Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.</li><li><a title="Microsoft Security Intelligence Report Volume 24 is now available" rel="nofollow" href="https://www.microsoft.com/security/blog/2019/02/28/microsoft-security-intelligence-report-volume-24-is-now-available/">Microsoft Security Intelligence Report Volume 24 is now available</a> &mdash; Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.</li><li><a title="Microsoft Security Intelligence Report Volume 24" rel="nofollow" href="https://clouddamcdnprodep.azureedge.net/gdc/gdcVAOQd7/original">Microsoft Security Intelligence Report Volume 24</a></li><li><a title="Supply Chain Attacks Spiked 78 Percent in 2018" rel="nofollow" href="https://www.nextgov.com/cybersecurity/2019/02/supply-chain-attacks-spiked-78-percent-2018-cyber-researchers-found/154996/">Supply Chain Attacks Spiked 78 Percent in 2018</a></li><li><a title="Supply Chain Security: A Talk by Bunnie Huang" rel="nofollow" href="https://www.bunniestudios.com/blog/?p=5519">Supply Chain Security: A Talk by Bunnie Huang</a> &mdash; I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.</li><li><a title="Attack inception: Compromised supply chain within a supply chain poses new risk" rel="nofollow" href="https://www.microsoft.com/security/blog/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks/">Attack inception: Compromised supply chain within a supply chain poses new risk</a> &mdash; The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.</li><li><a title="Supply Chain Attacks and Secure Software Updates" rel="nofollow" href="https://paragonie.com/blog/2017/09/supply-chain-attacks-and-secure-software-updates">Supply Chain Attacks and Secure Software Updates</a> &mdash; In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.</li><li><a title="Bad USB, Very Bad USB" rel="nofollow" href="https://lmgsecurity.com/bad-usb-very-bad-usb/">Bad USB, Very Bad USB</a> &mdash; The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.</li><li><a title="Reflections on Trusting Trust by Ken Thompson" rel="nofollow" href="https://dl.acm.org/citation.cfm?id=358210">Reflections on Trusting Trust by Ken Thompson</a></li><li><a title="LVFS Project Announcement - The Linux Foundation" rel="nofollow" href="https://www.linuxfoundation.org/blog/2019/03/lvfs-project-announcement/">LVFS Project Announcement - The Linux Foundation</a> &mdash; The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.</li><li><a title="LVFS: Vendor Status" rel="nofollow" href="https://fwupd.org/vendorlist">LVFS: Vendor Status</a></li><li><a title="Two new supply-chain attacks come to light in less than a week" rel="nofollow" href="https://arstechnica.com/information-technology/2018/10/two-new-supply-chain-attacks-come-to-light-in-less-than-a-week/">Two new supply-chain attacks come to light in less than a week</a> &mdash; Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.</li><li><a title="Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months" rel="nofollow" href="https://snyk.io/blog/malicious-code-found-in-npm-package-event-stream/">Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 377: Linux Under Pressure</title>
  <link>https://techsnap.systems/377</link>
  <guid isPermaLink="false">01754d0c-6956-4f6e-a545-e7ec9f178bb5</guid>
  <pubDate>Wed, 01 Aug 2018 10:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/01754d0c-6956-4f6e-a545-e7ec9f178bb5.mp3" length="25089856" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</itunes:subtitle>
  <itunes:duration>29:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.
Plus the death of a TLD, the return of SamSam, and more! 
</description>
  <itunes:keywords>PSI, oomd, Facebook, out-of-memory, oom, SamSam, Ransomeware, Malware, cryptoware, Open source Jobs, Sysadmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</p>

<p>Plus the death of a TLD, the return of SamSam, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="psi: pressure stall information for CPU, memory, and IO v2" rel="nofollow" href="https://lwn.net/Articles/759658/">psi: pressure stall information for CPU, memory, and IO v2</a> &mdash; PSI aggregates and reports the overall wallclock time in which the
tasks in a system (or cgroup) wait for contended hardware resources.</li><li><a title="Chinese “hackers” are sending malware via snail mail" rel="nofollow" href="https://techcrunch.com/2018/07/30/chinese-hackers-are-sending-malware-via-snail-mail/">Chinese “hackers” are sending malware via snail mail</a> &mdash; The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.</li><li><a title="The death of a TLD" rel="nofollow" href="https://blog.benjojo.co.uk/post/the-death-of-a-tld">The death of a TLD</a></li><li><a title="SamSam: The (almost) $6 million ransomware" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/07/31/samsam-the-almost-6-million-ransomware/">SamSam: The (almost) $6 million ransomware</a> &mdash; Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.</li><li><a title="Open sourcing oomd, a new approach to handling OOMs" rel="nofollow" href="https://code.fb.com/production-engineering/open-sourcing-oomd-a-new-approach-to-handling-ooms/">Open sourcing oomd, a new approach to handling OOMs</a> &mdash; As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.</li><li><a title="Tyler&#39;s recent job story" rel="nofollow" href="https://pastebin.com/FnfbWygS">Tyler's recent job story</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</p>

<p>Plus the death of a TLD, the return of SamSam, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="psi: pressure stall information for CPU, memory, and IO v2" rel="nofollow" href="https://lwn.net/Articles/759658/">psi: pressure stall information for CPU, memory, and IO v2</a> &mdash; PSI aggregates and reports the overall wallclock time in which the
tasks in a system (or cgroup) wait for contended hardware resources.</li><li><a title="Chinese “hackers” are sending malware via snail mail" rel="nofollow" href="https://techcrunch.com/2018/07/30/chinese-hackers-are-sending-malware-via-snail-mail/">Chinese “hackers” are sending malware via snail mail</a> &mdash; The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.</li><li><a title="The death of a TLD" rel="nofollow" href="https://blog.benjojo.co.uk/post/the-death-of-a-tld">The death of a TLD</a></li><li><a title="SamSam: The (almost) $6 million ransomware" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/07/31/samsam-the-almost-6-million-ransomware/">SamSam: The (almost) $6 million ransomware</a> &mdash; Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.</li><li><a title="Open sourcing oomd, a new approach to handling OOMs" rel="nofollow" href="https://code.fb.com/production-engineering/open-sourcing-oomd-a-new-approach-to-handling-ooms/">Open sourcing oomd, a new approach to handling OOMs</a> &mdash; As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.</li><li><a title="Tyler&#39;s recent job story" rel="nofollow" href="https://pastebin.com/FnfbWygS">Tyler's recent job story</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 349: All Natural Namespaces</title>
  <link>https://techsnap.systems/349</link>
  <guid isPermaLink="false">1f0cbb01-a231-4cf6-9f5d-f3ded5714065</guid>
  <pubDate>Thu, 21 Dec 2017 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1f0cbb01-a231-4cf6-9f5d-f3ded5714065.mp3" length="36892159" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
</itunes:subtitle>
  <itunes:duration>50:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back. 
</description>
  <content:encoded>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
