

Risky Business #782 -- Are the USA and Russia cyber friends now?
22 snips Mar 5, 2025
Vincent Stouffer, Field CTO at Corelight, brings his expertise in network visibility and attacker detection to the discussion. The conversation covers North Korea's impressive cyber theft tactics, particularly the Bybit hack. They analyze the U.S.'s shifting stance on Russian cyber threats and how that impacts global security. Stouffer emphasizes the importance of monitoring network traffic to uncover hidden threats while underscoring the challenges of credential management. The dialogue also highlights innovative authentication methods evolving in the cybersecurity landscape.
AI Snips
Chapters
Transcript
Episode notes
Bybit Attack Method
- North Korean hackers compromised Bybit's cryptocurrency wallets by targeting the JavaScript in the AWS CDN.
- This allowed them to manipulate transactions, resulting in a significant theft.
Hardware Wallet Security
- Verify all transactions carefully, especially when using hardware wallets for large sums.
- Implement robust processes for approving transactions, such as double-checking values against external records.
Bybit Attack - No Malware Involved
- Despite initial reports, North Korean hackers did not install malware directly onto Bybit devices.
- The attack's success still highlights the need for stringent transaction verification processes.