Risky Business #722 -- Microsoft embraces Zero Trust... Authentication?
Sep 19, 2023
auto_awesome
Adam Bateman, Co-founder of Push Security, discusses Microsoft's 38TB data leak, MGM's compromised Okta, cyber knife fights, and Google Authenticator abuse. The podcast delves into ransomware attacks in the hospitality industry, challenges attributing cyber attacks, and the risks of sharing personal info for security. Additionally, security risks in Electron apps, NSO Group malware, and SaaS-based attacks are explored.
Microsoft exposed sensitive signing keys in a 38TB data leak, highlighting security culture vulnerabilities.
Google Authenticator seeds synchronized through a hacked Workspace account underscore the need for robust account protection.
A retro USB malware tactic resurfaces in Africa, showcasing the enduring efficacy of traditional attack vectors.
Deep dives
Ransomware and the Complex Landscape of Attackers
Ransomware attacks continue to rise globally, impacting various sectors including healthcare, government, and hospitality. The White House urges countries not to pay ransoms, emphasizing the need to establish norms in cybercrime. Offensive actions against ransomware operators are proposed to disrupt their operations and increase costs. Addressing ransomware requires a multifaceted approach, considering the evolving tactics of attackers.
Security Concerns with Google Workspace Authenticator Sync Feature
A company faced a security incident where a malicious actor synchronized Google Authenticator seeds through a hacked Workspace account. While the feature aims to enhance user convenience, it raised questions regarding security vulnerabilities. Ensuring robust account protection remains crucial, with suggestions to leverage FIDO2 keys for enhanced defense against unauthorized access.
Persistent USB Malware Resurgence in Africa
A retro USB malware tactic resurfaces in Africa, reportedly linked to a Chinese APT group. USB-based attacks, targeted through shared drives in internet cafes, remain effective in certain regions. The reemergence highlights the ongoing cybersecurity challenges faced in Africa and serves as a reminder of the enduring efficacy of traditional attack vectors.
Exploring SaaS Security Threats
The discussion delves into the vulnerabilities of Software as a Service (SaaS) applications, highlighting the risks associated with compromised SaaS platforms. Attack scenarios, such as credential stuffing and exploiting automation apps like Zapier, are examined. The vulnerability of commonly used SaaS applications to attacks, despite SSO (Single Sign-On) implementation, is discussed as a key concern. The episode underscores the importance of understanding and mitigating security threats in the SaaS environment.
Incidents Involving NSO Group and Pegasus Spyware
The podcast features insights on NSO Group's Pegasus spyware being used against Russian journalists, particularly focusing on an incident involving malware discovered on the phone of a prominent media figure. Speculation surrounds the motives behind the attack, suggesting possible third-party collection tactics by European nations targeting exiled Russian journalists to access sensitive information. The episode sheds light on cybersecurity incidents involving surveillance tools like Pegasus and the ongoing challenges in attributing such attacks in the digital landscape.