Advanced Persistent Threats Explained Through Mr. Robot

Advanced persistent threats represent one of the most dangerous cyber security challenges facing organizations today. These long-term, stealthy attacks allow hackers to maintain undetected access to networks for extended periods. In this episode, we analyze multiple APT scenarios from Mr. Robot, including the Evil Corp hack, Ollie's compromised laptop, and the Dark Army's infiltration of Allsafe. We explore how threat actors establish footholds, maintain persistence, and operate across different network segments. From raspberry pi devices hidden in executive washrooms to compromised thermostats communicating with other facilities, we examine the various ways APTs can manifest. Our discussion covers detection methods, the importance of monitoring new devices, and why proper incident response goes far beyond simple malware scans. Learn the red flags to watch for and why machine learning tools are becoming critical for identifying suspicious network behavior.
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:This episode, we continue our Mr. Robot series by breaking down advanced
Speaker:persistent threats, those sneaky attacks that stick around in your
Speaker:network way longer than they should.
Speaker:We're talking about how they get in, how they set up shop, operate
Speaker:undetected for weeks or even months.
Speaker:You'll learn about dwell time, why you need to monitor, uh, new devices,
Speaker:uh, also why the scan and restore approach to ransomware recovery is
Speaker:really kind of just asking for trouble.
Speaker:I hope you enjoy this episode on advanced persistent threats.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery for
Speaker:over 30 years, ever since.
Speaker:I had to tell my boss that there were no backups of the
Speaker:production database we just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the show.
Speaker:Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy
Speaker:that I know is 100% super jealous of the shirt I'm wearing right now
Speaker:You know how many years I've been asking you to get merchandise?
Speaker:So for those of you who don't catch us on YouTube, we are on YouTube
Speaker:under the backup wrap up channel.
Speaker:And there today for, uh, today's
Speaker:first time.
Speaker:see, yeah, for the first
Speaker:Yeah.
Speaker:you could see the new shirts, which says the backup wrap up.
Speaker:It's a
Speaker:Um, yeah.
Speaker:Yeah.
Speaker:Um, and we're, and we're not even, we're not selling the merch or
Speaker:anything, at least not yet, but, um,
Speaker:If
Speaker:yeah,
Speaker:let us know.
Speaker:yeah.
Speaker:us or leave a comment on your favorite pod catcher and let us
Speaker:Absolutely.
Speaker:Absolutely.
Speaker:Um, yeah, so, um,
Speaker:Five
Speaker:so I finally, I finally ordered it What.
Speaker:Five years.
Speaker:So I finally received it and now I have it.
Speaker:It got, both of 'em got shipped to my house,
Speaker:Hmm.
Speaker:my shirt, and your tiny, your tiny little shirt.
Speaker:Medium.
Speaker:He says medium.
Speaker:I'm like, what is a medium?
Speaker:I don't even, I don't even know they made such sizes.
Speaker:Um, anyway, so, um, you'll look forward to receiving your shirt
Speaker:when I decide to grace it upon you.
Speaker:It's sitting in my bedroom.
Speaker:Um,
Speaker:that's
Speaker:oh, you're
Speaker:it's, whenever it's ready.
Speaker:It'd be amazing.
Speaker:Okay,
Speaker:so, so wait,
Speaker:what.
Speaker:I wanna know when do I get my shirt?
Speaker:When, when I decide to send it to you, it's, oh, by the way, it's right here.
Speaker:There's your shirt.
Speaker:There's your little, little tiny, the one with the with the M on it.
Speaker:There you go.
Speaker:There's your M.
Speaker:You know, if you
Speaker:Yeah.
Speaker:if you look at it upside down, it's a w.
Speaker:Yeah.
Speaker:For women's, that's, uh.
Speaker:So there you go.
Speaker:Uh, that's the big day Today we finally have a, a branded shirt where
Speaker:it's like, we're like a real podcast.
Speaker:Um, so hey, we are gonna get right into it today.
Speaker:Um, and we're gonna talk about, I, I I, a topic that comes up quite a bit.
Speaker:We're continuing our coverage of Mr. Robot, which I'm now one episode
Speaker:in the future and I now know why Mr. Robot is called Mr. Robot
Speaker:tell me.
Speaker:I have not
Speaker:Y.
Speaker:yet.
Speaker:Yeah.
Speaker:So, um, yeah.
Speaker:Um, and.
Speaker:This episode, which as you may recall, uh, we we're, we're doing two episodes,
Speaker:do two podcast episodes on one Mr.
Speaker:Robot episode.
Speaker:Uh, last week we talked about the concept of honeypots, and this week
Speaker:we're talking about, um, the, the cyber attack that happens on All Safe.
Speaker:So if.
Speaker:technically we're doing two episodes on two episodes.
Speaker:Yeah, you're right, you're right.
Speaker:That's kind of why we did it.
Speaker:'cause the one episode had hardly anything in it.
Speaker:Right?
Speaker:Yeah.
Speaker:So, um, but one of the things that happens in these two episodes, which
Speaker:were episodes seven and eight, AKA 1.6, and 1.7, um, that, uh, in the episode,
Speaker:the main episode that we're talking about in this episode is White Rose,
Speaker:which we, we are actually introduced to the character of White Rose.
Speaker:But in the midst of all of this, there is a cyber attack of Allsafe.
Speaker:And it was, it was really kind of, it was kind of cool how it all went down.
Speaker:So, uh, Gideon is over there visiting Tyrell and he's telling them about all
Speaker:the stuff that they've done to, um.
Speaker:To regarding basically the initial hack that caused the,
Speaker:the email leak and all of that.
Speaker:Uh, and, and in the midst of that, his phone starts blowing up with, uh, 9 1 1.
Speaker:Everything is down.
Speaker:Yep.
Speaker:So all you know, we, we, at that point, you know, anybody who follows the
Speaker:show would know that they got hacked.
Speaker:yeah,
Speaker:Um,
Speaker:and Elliot gets paged as well.
Speaker:I don't know if you caught that.
Speaker:yeah, yeah, Elliot gets Paige as well.
Speaker:Uh, but the thing that I liked about the scene with Gideon and, and, um.
Speaker:And Tyrell is, uh, Gideon gets, you know, um, you know, e everything's down.
Speaker:And then Tyrell's next line was, well, I really appreciate your transparency.
Speaker:Yeah,
Speaker:which of course he is not being transparent at that exact moment.
Speaker:And he goes back and his first response is, um, basically
Speaker:we've got to figure this out.
Speaker:If this gets out, we're toast.
Speaker:Right?
Speaker:sorry.
Speaker:Clarification.
Speaker:I thought he goes and tells Tyrell that he, the DAT file was compromised.
Speaker:That, but that's separate.
Speaker:That's referring to the original hack.
Speaker:That's right.
Speaker:And then doesn't he also tell him not that they've been attacked
Speaker:because they don't know that yet?
Speaker:I thought he tells 'em think that we found something left behind.
Speaker:He said he, he said that he's gonna continue to like look into that hack.
Speaker:Okay.
Speaker:Right?
Speaker:Um, and, and we've got the, we, we, we put the honeypot and all of that.
Speaker:That's what that was about.
Speaker:But then what we have is, while this is happening, he finds out
Speaker:essentially that they've been hacked.
Speaker:And his first reaction is not transparency,
Speaker:Yep.
Speaker:his first reaction, he gets back and he's like.
Speaker:We gotta figure this out.
Speaker:Uh, you know, gimme all the logs and everything and, and, and
Speaker:if this gets out, we're toast.
Speaker:yep.
Speaker:um, uh, which.
Speaker:the accounts, all the sales calls,
Speaker:Yeah.
Speaker:That cancel all the sales calls you, you know, no one's gonna figure out anything.
Speaker:Uh, and, and that of course, uh, backfires because f Society who caused the attack,
Speaker:um, they take over their, uh, again, with the, the hat we've talked about it.
Speaker:You know, before the hack of the, of the tv.
Speaker:So they hack the TV and um, and they play the, you know, it's
Speaker:the, this is like, this is the, this is what it's in the movies.
Speaker:It's always in the movies where they do this, right.
Speaker:Where they take over the
Speaker:mask.
Speaker:TV and they play the message and the remote doesn't work.
Speaker:Ah, can't even the, even the electrical plug.
Speaker:Yeah.
Speaker:It's like, no, I wanna see it.
Speaker:And what you see, see is that basically f society, and again, this is, this is all.
Speaker:Whatever, but, but f Society's message to them is you have helped
Speaker:protect Evil Corp and therefore we are going to take you out as well.
Speaker:You are com complicit in Evil Corp's evilness and um, what?
Speaker:but the entire reason they did that though was it was a misdirection.
Speaker:Yes, yes.
Speaker:Again, but what they're being told is right.
Speaker:We're, we're gonna do this.
Speaker:Right.
Speaker:And, uh, and they also said that they even posted it to their website
Speaker:so, so much for, you know, not, uh, not letting the world know.
Speaker:Yep.
Speaker:but yeah.
Speaker:it was a misdirection.
Speaker:So Elliot can steal the MFA from Gideon
Speaker:Right.
Speaker:actually send an email telling them to shut down the honeypot and they have
Speaker:Yeah.
Speaker:hours.
Speaker:Yeah, exactly.
Speaker:Um, which is, um, did I miss anything in the summary, which is, um, let,
Speaker:that's relevant to this, to this
Speaker:well, the one thing you did miss.
Speaker:Uhhuh
Speaker:Is when, uh, told Terrell about, well there are two things.
Speaker:One, when Gideon told Tyrell about the dat file
Speaker:Uhhuh.
Speaker:and honey
Speaker:Mm-hmm.
Speaker:right, the first thing Tyrell did is he logged into the server,
Speaker:Right, right.
Speaker:right?
Speaker:And
Speaker:Yeah.
Speaker:he sort of was like, let me hunt ter around and see
Speaker:what I don't have access to.
Speaker:And he noticed an F Society file before he like has to leave all of a
Speaker:sudden because the police are there.
Speaker:Right, right.
Speaker:Because of
Speaker:one.
Speaker:the murder.
Speaker:Yeah.
Speaker:Yeah.
Speaker:So the thing that happened to Ollie was they weren't letting go of him.
Speaker:Remember?
Speaker:And they still had access to the networks.
Speaker:Right.
Speaker:And
Speaker:Yeah.
Speaker:where they wanted,
Speaker:in this
Speaker:sorry.
Speaker:They as a dark army and
Speaker:Right, right,
Speaker:Elliot.
Speaker:To have this meeting with White Rose, which is what
Speaker:Darlene was trying to arrange.
Speaker:right.
Speaker:Right?
Speaker:And they literally still had access to the networks because remember Angela
Speaker:had put the CD in the computer and had put the virus out there and they still
Speaker:had access to the network and they were doing things, and this is where Ollie.
Speaker:Comes up to Elliot in the middle of this attack, by the way,
Speaker:Yeah.
Speaker:is freaking out.
Speaker:Everyone's in the room,
Speaker:Right.
Speaker:Everyone is like panicking and trying to figure out what's
Speaker:going on and all hands on deck.
Speaker:Elliot sits down at his desk, He's like, okay, let me start doing some research.
Speaker:And then all, he just kind of strolls up and he's like the sales guy, right?
Speaker:And he is like, yo, bro, I got two hard drives for you.
Speaker:Take it over to the recovery place or the shredding place.
Speaker:Yeah, and he's like, what about one of the IT guys, gophers?
Speaker:He is like, no, man, it has to be you.
Speaker:Elliot thinks, and he is like, oh, this is why Dark Army wanted me
Speaker:Yeah, yeah,
Speaker:all of this was because the Dark Army still had a foothold inside of allsafe.
Speaker:Right, right.
Speaker:Yeah.
Speaker:So, yeah.
Speaker:So those, those were, uh, two, uh, kind of important things that
Speaker:are relevant to the topic here.
Speaker:So this week we're gonna talk about, uh, I think the formal term would be
Speaker:called advanced persistent threat.
Speaker:Right.
Speaker:Yeah.
Speaker:And this idea of you've got a threat actor that is, that has, as you mentioned,
Speaker:a foothold that has, you know, they've used maybe an initial access broker.
Speaker:Maybe they, you know, somehow they are in the network and they're, they are
Speaker:operating undetected in the network.
Speaker:And, um, because they're able to do that.
Speaker:They're able to, you know, to do a, a lot of things, right?
Speaker:So in this case, what we see is they, they're, they're able to
Speaker:control one of the employees.
Speaker:They're able to control sort of a second employee in the
Speaker:case of, uh, Elliot, right?
Speaker:Mm-hmm.
Speaker:Um, and then also you've got two sort of.
Speaker:Um, two persistent threats going on because, uh, because they have
Speaker:the, the connection and all safe, they're also able to, to facilitate
Speaker:this, the, what do you call it?
Speaker:Um, f society is able to do this hack whose entire purpose was
Speaker:redirection, as you mentioned.
Speaker:Right.
Speaker:Um, because we want to be able to do this, this thing with the phone and, um.
Speaker:So that he could get in and, and, uh, get that, get that M-F-A-M-F-A.
Speaker:Again, as we've discussed, m FFA is not perfect if you let your battery run down.
Speaker:I like how he run the, he ran the battery down, uh, by the way,
Speaker:um, story from back in the day.
Speaker:Um, so this is in my very first job and I, I don't know if I've told you
Speaker:this story before, but my very first job we used to have, we were at a.
Speaker:We were, it was a, a DEC shop, right?
Speaker:It was, it was, it was, uh, Ultrix, which was the, the DEC, this
Speaker:is before digital Unix, right?
Speaker:This was Ultrix and we had, our servers were Ultrix and uh,
Speaker:and our desktops were Ultrix.
Speaker:Important part of the story.
Speaker:Both the servers and the desktops were Ultrix.
Speaker:And one of the things that.
Speaker:We would do back in the day.
Speaker:Um, gosh, I don't, I don't, I don't think this lasted, but if you wanted
Speaker:to run a, um, an application on.
Speaker:The server and have the UI of that application display
Speaker:its UI onto your server.
Speaker:X
Speaker:had to run this command right to, to allow that to happen.
Speaker:And it was common in our environment to just run that, that command as
Speaker:part of like your login, like, like you always ran that because you
Speaker:always wanted to, um, to do that.
Speaker:That left you open.
Speaker:For anyone to open up
Speaker:Yep.
Speaker:X display
Speaker:yep.
Speaker:thing on your, on your desktop.
Speaker:And, uh, there was a program called Stars
Speaker:Hmm.
Speaker:it was a, uh, it was a screensaver
Speaker:Okay.
Speaker:Yeah.
Speaker:Yeah.
Speaker:and if you wanted to crash someone's server, you would just
Speaker:run a quick for loop and fire off stars like a thousand times.
Speaker:Right.
Speaker:And um, one day, you know, one of the guys in the shop was gonna
Speaker:do that to one of the other guys.
Speaker:And so he just did it, is like in the middle of the workday,
Speaker:you know, and, uh, he said, boom.
Speaker:And you set your display to that workstation and then you fire it off.
Speaker:And, um, he did that.
Speaker:And then we're waiting for the reaction.
Speaker:No reaction.
Speaker:And then, and then, uh, this guy is like, Hey Joe, how's your workstation?
Speaker:And Joe's like, it's fine.
Speaker:Why pregnant?
Speaker:Pause.
Speaker:Oh shit.
Speaker:And he had his display set to the server,
Speaker:Oh no.
Speaker:so he had just crashed a production server in the middle of the
Speaker:workday as a practical joke.
Speaker:Career ending move.
Speaker:Uh, no, no.
Speaker:That guy had, that guy was like a, like a nine lives of a cat.
Speaker:'cause he definitely did some, some serious CLMs.
Speaker:Um, yeah.
Speaker:so
Speaker:It, yeah.
Speaker:Go ahead.
Speaker:back, back to the,
Speaker:Back, back to the scope.
Speaker:Yeah.
Speaker:one thing about, about this entire like F Society hack on Evil Core,
Speaker:Mm-hmm.
Speaker:Elliot goes, right.
Speaker:He flies in the data center, right in the earlier episodes.
Speaker:He fixes it.
Speaker:He gets everything back.
Speaker:They never follow the best practices when it comes to
Speaker:recovering from ransomware, right?
Speaker:Right.
Speaker:they do?
Speaker:They just scanned the server and they're like, yeah, it's good to go.
Speaker:Let's
Speaker:Yeah.
Speaker:It looks good.
Speaker:Yeah.
Speaker:Yeah.
Speaker:They didn't quarantine it really,
Speaker:Right,
Speaker:for like the 30 seconds, whatever.
Speaker:When
Speaker:right.
Speaker:they didn't rebuild it.
Speaker:Yeah.
Speaker:still left it in production.
Speaker:It was
Speaker:Right.
Speaker:available.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And, and the thing is, with with, you know, when we talk about APTs, the
Speaker:thing to understand about this is the, the length of the dwell time, right?
Speaker:So you wanna define dwell time.
Speaker:Yeah, the dwell time is basically long ransomware sits on your
Speaker:system before it either starts running or it's been detected.
Speaker:Yeah.
Speaker:And um, you know, in this case it was there for quite a long time and, um.
Speaker:That's, yeah.
Speaker:Yeah.
Speaker:Well, and you had, you had a couple of different APTs going on here, right?
Speaker:You had the one going on at Ollie's home,
Speaker:Yep.
Speaker:Uh, and then you had the one going on in the Evil Corp
Speaker:network, by the way, isn't it?
Speaker:Evil Corp? I think you're saying Evil Corp
Speaker:Evil, evil
Speaker:or, okay.
Speaker:my, my P is very silent.
Speaker:Oh, so,
Speaker:Yeah.
Speaker:um, the, um, go ahead.
Speaker:missing one,
Speaker:What's the third one?
Speaker:the fourth,
Speaker:What the, what?
Speaker:there's a four.
Speaker:So what, so I just remembered two.
Speaker:There is a fourth one that you missed.
Speaker:Well wait, we didn't get to a third,
Speaker:Okay,
Speaker:it,
Speaker:first is Evil Corp. Hack by F Society.
Speaker:yeah,
Speaker:The second is Ollie's laptop at home.
Speaker:yeah.
Speaker:The third is, uh, dark Armies Hack on All Safes Network, right?
Speaker:Right.
Speaker:Technically the fourth is FSO Society, but I don't think it's
Speaker:really a persistent threat 'cause that was like a one time hack.
Speaker:Okay.
Speaker:Right.
Speaker:But I would say that the actual fourth one, and this is one that was very subtle,
Speaker:you may not have picked up on Elliot Hack on Steel Mountain of the thermostats.
Speaker:Oh, right.
Speaker:Yeah.
Speaker:Right.
Speaker:That was definitely an a PT right there.
Speaker:Right.
Speaker:Um, he had a foothold in there.
Speaker:Yep.
Speaker:So, you know, you go back a few episodes and we talked about their plan with,
Speaker:um, steel Mountain was to hack the.
Speaker:The, uh, climate control system and then set off, uh, the, you know, basically
Speaker:make it too hot in the, the data center for tapes and have the tapes melt.
Speaker:We discussed that that was kind of bs, but that was the plan.
Speaker:And their plan succeeded.
Speaker:They, they had gained, they, they, you know, they put a raspberry pie in the
Speaker:right place, which of course, everyone knows where your, uh, climate control
Speaker:system controls are, are in the executive.
Speaker:Washroom.
Speaker:Everybody knows that.
Speaker:Yeah,
Speaker:Um, and that's, that's where they put it.
Speaker:Um, and yeah.
Speaker:And so they, they had this, this problem sitting there ready to go
Speaker:anytime that they needed to do it.
Speaker:Yeah.
Speaker:Right.
Speaker:and, but then did you remember also during that episode, because remember by
Speaker:this time the Dark Army had an attack.
Speaker:They weren't able to raise a temperature on the data center and
Speaker:burn the tapes, right, ruin the tapes.
Speaker:But what they did have is they had that device and still connected
Speaker:Yep.
Speaker:and they realized that the company that manufactures that thermostat
Speaker:has networked is has a cloud,
Speaker:Right,
Speaker:and they're using this exact same thermostat at all the
Speaker:other steel mounted facilities.
Speaker:right.
Speaker:And so do they, do they end up controlling all of the thermostats or.
Speaker:they have done nothing yet.
Speaker:Okay.
Speaker:So they just know that Yeah.
Speaker:And this is why Elliot asks and meets White Rose and says, Hey, need time.
Speaker:I, or I need you guys to act now.
Speaker:Right.
Speaker:And this is
Speaker:Right.
Speaker:Rose tells him, I will give you 43 hours or
Speaker:Yeah.
Speaker:Some, some very,
Speaker:think it was
Speaker:some very precise time.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And so that's why Elliot's in this rush trying to get like turn
Speaker:off the honey pot so then they
Speaker:Right.
Speaker:go do the rest of the hack and hopefully try to destroy Steel Mountain and
Speaker:Yeah.
Speaker:Army attack the China data center.
Speaker:Yeah.
Speaker:And we can play with the, the thing of the honeypot and how that, the way
Speaker:he described how the honeypot is that if the honeypot is what it says it is,
Speaker:that they, they wouldn't be detected because it's not on the network.
Speaker:But anyway, I,
Speaker:Yeah.
Speaker:you know, yeah.
Speaker:the fact, and even the fact that like right?
Speaker:That's in the thing.
Speaker:The
Speaker:Mm-hmm.
Speaker:it's been days, no one's recogni, like you scan the network, right?
Speaker:No one's realized, Hey, what is this thing that's on
Speaker:Yeah.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And, and that's, and that's kind of what we need to talk about a little bit is
Speaker:there are ways to detect APTs, right?
Speaker:You're looking for, and I think.
Speaker:There's, there's two things, right?
Speaker:There's a couple of things.
Speaker:One is you are looking for devices that have IP addresses on your network
Speaker:that they didn't, so how do you, you know, that they're not supposed to
Speaker:have, or that, that, that they're new.
Speaker:Every new IP address on your network should be registered
Speaker:and should be known, right?
Speaker:Uh, both from a wireless perspective and a and a wired perspective.
Speaker:And certainly anything if you, if you have wireless, if you have.
Speaker:Unregistered, like guest wireless access, that's one thing, right?
Speaker:And they have access just to the internet, but not to the corporate network.
Speaker:You could probably allow unregistered devices there, but if you're allowing
Speaker:a device to gain a IP address on your corporate network and you don't know
Speaker:what this device is, this is a problem.
Speaker:Yeah, and just a slight correction.
Speaker:You're probably referring to a Mac address, at least at the minimum.
Speaker:You had said IP address of
Speaker:What's, why is that a problem?
Speaker:Because anyone can have an ip, sorry, the MAC address is what they would
Speaker:typically use to register against the network to then get the IP address.
Speaker:Uh, yeah.
Speaker:Okay.
Speaker:I, you know, you're,
Speaker:authentication mechanisms like
Speaker:yeah,
Speaker:other things
Speaker:but I'm just saying
Speaker:secure.
Speaker:a, a new device was given an IP address, right?
Speaker:A New Mac address to, you know, to use, to use your, um,
Speaker:Well, a device
Speaker:to know.
Speaker:a nuke Mac address was given an IP address and the
Speaker:Okay.
Speaker:not.
Speaker:No.
Speaker:Yeah.
Speaker:Okay.
Speaker:Okay.
Speaker:Okay.
Speaker:That, that's perfectly correct.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Tomato potato.
Speaker:Um, so
Speaker:but
Speaker:but, but you've got a new device that got it, that's gi, but given an IP
Speaker:address on the network and no one seems to notice and it's there for how long?
Speaker:at least three days,
Speaker:Yeah.
Speaker:Yeah, I, I'd like to think that a new device, you know, if you're doing
Speaker:this properly, especially if you're at a place like Steel Mountain, no
Speaker:new device should be given an IP address, no New Mac address, right?
Speaker:Should be given a new IP address that isn't already known to the network.
Speaker:Right?
Speaker:exactly.
Speaker:Uh, now we know that that actually happens all the time.
Speaker:We actually did an episode a while back, I dunno if you remember this,
Speaker:but we did an episode a while back on like wireless hacking where people are
Speaker:creating devices that, that get sent to the network to be able to get on
Speaker:the wireless network to then be able to get onto the corporate network.
Speaker:Um, and, and.
Speaker:like what he did with the cop car.
Speaker:It is a little bit like what he did with the cup card.
Speaker:Yeah.
Speaker:Um, and, uh, and we know that that happens.
Speaker:We know that corporations all the time allow new devices to be registered
Speaker:on the network, get IP addresses and communicate with the network completely
Speaker:unmonitored, you know, completely unmonitored like you would think at,
Speaker:at a minimum you would if you do allow.
Speaker:An unregistered address, you know, you would then monitor that device like crazy.
Speaker:What is this device doing?
Speaker:Right?
Speaker:Oh, it's communicating to all my other facilities, you know,
Speaker:Yeah, that's probably not
Speaker:or
Speaker:idea.
Speaker:Yeah, or lock it down.
Speaker:Good point.
Speaker:Right?
Speaker:Lock it down so that it can only communicate with whatever.
Speaker:I don't know.
Speaker:internet.
Speaker:I mean, so, uh, the other thing that, again, this would help minimize.
Speaker:The blast radius of an a PT, and that is devices, servers should really only, you
Speaker:should also be following, um, the concept of least privilege for them as well.
Speaker:Mm-hmm.
Speaker:Smart devices like, uh, thermostat controlling the network or
Speaker:controlling your, your, um, cooling system should not be also be able
Speaker:to talk to servers, you know.
Speaker:what was it?
Speaker:Was it Home Depot or Albertson?
Speaker:Was Target.
Speaker:the
Speaker:target.
Speaker:attack, right.
Speaker:Yeah.
Speaker:Yeah,
Speaker:How did they get in?
Speaker:it was.
Speaker:Yeah.
Speaker:commercials.
Speaker:Yeah, yeah.
Speaker:So again, we know what happens.
Speaker:Yep.
Speaker:But how, but how do we, how do we stop this, right?
Speaker:Yeah.
Speaker:I would say one of the first things is to detect for new devices.
Speaker:That's the one to stop new, like this kind of attack.
Speaker:But many times the device that's doing the communicating is an existing device
Speaker:that's been, uh, compromise in some way.
Speaker:And so I think.
Speaker:The only way for that to work is either, either a human being that's really good at
Speaker:monitoring the different types of traffic or, you know, use of machine learning,
Speaker:um, to, to watch what is normal traffic, what are the servers and things that
Speaker:we normally talk to, and if suddenly a thermostat that controls the, you know.
Speaker:Whatever the Toronto facility is, suddenly talking to all the other thermostats,
Speaker:but but
Speaker:that's a problem.
Speaker:also remember, I think it was when we had.
Speaker:Mike, I wanna say it might have been an episode with Mike.
Speaker:are Mike Saylor, by the way, who is Curtis's co-author on
Speaker:the upcoming O'Reilly book,
Speaker:Very excited.
Speaker:Yes.
Speaker:Um, he'll add one more to the shelf behind you.
Speaker:Um, so.
Speaker:I think it was Mike who had mentioned like, people are now starting to
Speaker:exfiltrate, uh, exfiltrate data,
Speaker:Right,
Speaker:by communicating directly to another server, but by sending DNS packets
Speaker:right.
Speaker:doing lookups.
Speaker:So very, very small amounts of data and that's really, really hard to catch.
Speaker:Yeah.
Speaker:Well, it is.
Speaker:It is, and it's not right.
Speaker:So.
Speaker:The, the person that we had, uh, that talked about that talked about how
Speaker:that you actually can recognize, you can have, you can f first off you can.
Speaker:Yeah, you can.
Speaker:The, the, the domains that are used for these types of things for command and
Speaker:control, for, uh, you know, malware.
Speaker:They look really weird.
Speaker:They're not normal.
Speaker:Um, so again, I, I go back to machine learning.
Speaker:This is not a normal, uh, type request.
Speaker:Right?
Speaker:Um, he also talked about looking for communication to new domains, right?
Speaker:Um, things like that, right?
Speaker:Um, the, um, um,
Speaker:But
Speaker:but I.
Speaker:is really around like the active persistent threats, right?
Speaker:It's like.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And really I think the, the thing that you've got to do is you, you just
Speaker:have to be monitoring your network.
Speaker:You've got to be looking for behaviors, looking for behavior anomalies.
Speaker:Uh, you do need an EDR system, uh, to, to watch for that sort of stuff.
Speaker:But again, as we discussed, I believe in last week's episode, the
Speaker:EDR is only helpful on the way in.
Speaker:Yeah.
Speaker:Right.
Speaker:Um, the, the, the EDR might, uh, that's, um, endpoint detection and response.
Speaker:It, depending on where it is, it might detect an a PT
Speaker:Yeah.
Speaker:that a PT tries to then, uh,
Speaker:Yeah.
Speaker:move outside where it currently is.
Speaker:it did in the case of Darlene trying to hack the police department, right?
Speaker:They
Speaker:Yeah.
Speaker:software run being like, Hey, you should not be loading this file.
Speaker:Right.
Speaker:Right.
Speaker:Yeah.
Speaker:Yeah.
Speaker:But I think the challenge, or one thing I wanted to mention with APTs is, right,
Speaker:if I look at the all, uh, the Evil Corp exercise right where they hacked
Speaker:and they still left things behind.
Speaker:The fact that they're not monitoring the network continually or looking
Speaker:for these sort of activities
Speaker:Right.
Speaker:a little scary because I think I was reading.
Speaker:Some statistics or some article about ransomware gangs, right?
Speaker:And it's not like they come in, they attack, they steal some data,
Speaker:they encrypt data, and then you pay them and then they go away, right?
Speaker:They might come back into your network again to extort you for more money.
Speaker:Yeah.
Speaker:sell that attack, right?
Speaker:Or that, uh, the initial attack to another ransomware group, right?
Speaker:So now
Speaker:Yeah.
Speaker:you.
Speaker:And
Speaker:Yeah.
Speaker:If you don't make sure that you've closed off all the gates, right,
Speaker:you're still leaving yourself open.
Speaker:Yeah.
Speaker:Agreed.
Speaker:Agreed.
Speaker:The episodes we've done with Mike have been enlightening because he really
Speaker:understands like what the recovery process looks like and how companies recover.
Speaker:And it's fascinating to see, a lot of times on TV it's like,
Speaker:oh, they got hit with ransomware, boom, they're back up and running.
Speaker:Or what?
Speaker:You imagine it's
Speaker:Yeah.
Speaker:it's a quick operation.
Speaker:But no, these could be weeks
Speaker:Yeah.
Speaker:before they really know what was impacted.
Speaker:And it takes time and people are careful.
Speaker:Yeah, the, the, the, um, containment and eradication phase
Speaker:is the single biggest phase.
Speaker:The actual restoring of servers is the easy part, assuming that you,
Speaker:you know, backed up all the things.
Speaker:Um, well, I think that can end our coverage of advanced persistent
Speaker:threats from, uh, season one, episode eight, AKA 1.7 of Mr.
Speaker:Robot.
Speaker:Thanks.
Speaker:Thanks again, Prasanna.
Speaker:No, this was a good episode and don't tell me what happens 'cause
Speaker:I want to see what Mr. Robot is.
Speaker:Okay.
Speaker:And, uh, with that, thanks to our listeners.
Speaker:That is a wrap.
Speaker:The backup wrap up is written, recorded and produced by me w Curtis Preston.
Speaker:If you need backup or Dr. Consulting content generation or expert witness
Speaker:work, check out backup central.com.
Speaker:You can also find links from my O'Reilly Books on the same website.
Speaker:Remember, this is an independent podcast and any opinions that you
Speaker:hear are those of the speaker.
Speaker:And not necessarily an employer.
Speaker:Thanks for listening.
Speaker:I.