Sept. 15, 2025

Advanced Persistent Threats Explained Through Mr. Robot

Advanced Persistent Threats Explained Through Mr. Robot

Advanced persistent threats represent one of the most dangerous cyber security challenges facing organizations today. These long-term, stealthy attacks allow hackers to maintain undetected access to networks for extended periods. In this episode, we analyze multiple APT scenarios from Mr. Robot, including the Evil Corp hack, Ollie's compromised laptop, and the Dark Army's infiltration of Allsafe. We explore how threat actors establish footholds, maintain persistence, and operate across different network segments. From raspberry pi devices hidden in executive washrooms to compromised thermostats communicating with other facilities, we examine the various ways APTs can manifest. Our discussion covers detection methods, the importance of monitoring new devices, and why proper incident response goes far beyond simple malware scans. Learn the red flags to watch for and why machine learning tools are becoming critical for identifying suspicious network behavior.

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

This episode, we continue our Mr. Robot series by breaking down advanced

Speaker:

persistent threats, those sneaky attacks that stick around in your

Speaker:

network way longer than they should.

Speaker:

We're talking about how they get in, how they set up shop, operate

Speaker:

undetected for weeks or even months.

Speaker:

You'll learn about dwell time, why you need to monitor, uh, new devices,

Speaker:

uh, also why the scan and restore approach to ransomware recovery is

Speaker:

really kind of just asking for trouble.

Speaker:

I hope you enjoy this episode on advanced persistent threats.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup, and I've been passionate about backup and recovery for

Speaker:

over 30 years, ever since.

Speaker:

I had to tell my boss that there were no backups of the

Speaker:

production database we just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the show.

Speaker:

Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy

Speaker:

that I know is 100% super jealous of the shirt I'm wearing right now

Speaker:

You know how many years I've been asking you to get merchandise?

Speaker:

So for those of you who don't catch us on YouTube, we are on YouTube

Speaker:

under the backup wrap up channel.

Speaker:

And there today for, uh, today's

Speaker:

first time.

Speaker:

see, yeah, for the first

Speaker:

Yeah.

Speaker:

you could see the new shirts, which says the backup wrap up.

Speaker:

It's a

Speaker:

Um, yeah.

Speaker:

Yeah.

Speaker:

Um, and we're, and we're not even, we're not selling the merch or

Speaker:

anything, at least not yet, but, um,

Speaker:

If

Speaker:

yeah,

Speaker:

let us know.

Speaker:

yeah.

Speaker:

us or leave a comment on your favorite pod catcher and let us

Speaker:

Absolutely.

Speaker:

Absolutely.

Speaker:

Um, yeah, so, um,

Speaker:

Five

Speaker:

so I finally, I finally ordered it What.

Speaker:

Five years.

Speaker:

So I finally received it and now I have it.

Speaker:

It got, both of 'em got shipped to my house,

Speaker:

Hmm.

Speaker:

my shirt, and your tiny, your tiny little shirt.

Speaker:

Medium.

Speaker:

He says medium.

Speaker:

I'm like, what is a medium?

Speaker:

I don't even, I don't even know they made such sizes.

Speaker:

Um, anyway, so, um, you'll look forward to receiving your shirt

Speaker:

when I decide to grace it upon you.

Speaker:

It's sitting in my bedroom.

Speaker:

Um,

Speaker:

that's

Speaker:

oh, you're

Speaker:

it's, whenever it's ready.

Speaker:

It'd be amazing.

Speaker:

Okay,

Speaker:

so, so wait,

Speaker:

what.

Speaker:

I wanna know when do I get my shirt?

Speaker:

When, when I decide to send it to you, it's, oh, by the way, it's right here.

Speaker:

There's your shirt.

Speaker:

There's your little, little tiny, the one with the with the M on it.

Speaker:

There you go.

Speaker:

There's your M.

Speaker:

You know, if you

Speaker:

Yeah.

Speaker:

if you look at it upside down, it's a w.

Speaker:

Yeah.

Speaker:

For women's, that's, uh.

Speaker:

So there you go.

Speaker:

Uh, that's the big day Today we finally have a, a branded shirt where

Speaker:

it's like, we're like a real podcast.

Speaker:

Um, so hey, we are gonna get right into it today.

Speaker:

Um, and we're gonna talk about, I, I I, a topic that comes up quite a bit.

Speaker:

We're continuing our coverage of Mr. Robot, which I'm now one episode

Speaker:

in the future and I now know why Mr. Robot is called Mr. Robot

Speaker:

tell me.

Speaker:

I have not

Speaker:

Y.

Speaker:

yet.

Speaker:

Yeah.

Speaker:

So, um, yeah.

Speaker:

Um, and.

Speaker:

This episode, which as you may recall, uh, we we're, we're doing two episodes,

Speaker:

do two podcast episodes on one Mr.

Speaker:

Robot episode.

Speaker:

Uh, last week we talked about the concept of honeypots, and this week

Speaker:

we're talking about, um, the, the cyber attack that happens on All Safe.

Speaker:

So if.

Speaker:

technically we're doing two episodes on two episodes.

Speaker:

Yeah, you're right, you're right.

Speaker:

That's kind of why we did it.

Speaker:

'cause the one episode had hardly anything in it.

Speaker:

Right?

Speaker:

Yeah.

Speaker:

So, um, but one of the things that happens in these two episodes, which

Speaker:

were episodes seven and eight, AKA 1.6, and 1.7, um, that, uh, in the episode,

Speaker:

the main episode that we're talking about in this episode is White Rose,

Speaker:

which we, we are actually introduced to the character of White Rose.

Speaker:

But in the midst of all of this, there is a cyber attack of Allsafe.

Speaker:

And it was, it was really kind of, it was kind of cool how it all went down.

Speaker:

So, uh, Gideon is over there visiting Tyrell and he's telling them about all

Speaker:

the stuff that they've done to, um.

Speaker:

To regarding basically the initial hack that caused the,

Speaker:

the email leak and all of that.

Speaker:

Uh, and, and in the midst of that, his phone starts blowing up with, uh, 9 1 1.

Speaker:

Everything is down.

Speaker:

Yep.

Speaker:

So all you know, we, we, at that point, you know, anybody who follows the

Speaker:

show would know that they got hacked.

Speaker:

yeah,

Speaker:

Um,

Speaker:

and Elliot gets paged as well.

Speaker:

I don't know if you caught that.

Speaker:

yeah, yeah, Elliot gets Paige as well.

Speaker:

Uh, but the thing that I liked about the scene with Gideon and, and, um.

Speaker:

And Tyrell is, uh, Gideon gets, you know, um, you know, e everything's down.

Speaker:

And then Tyrell's next line was, well, I really appreciate your transparency.

Speaker:

Yeah,

Speaker:

which of course he is not being transparent at that exact moment.

Speaker:

And he goes back and his first response is, um, basically

Speaker:

we've got to figure this out.

Speaker:

If this gets out, we're toast.

Speaker:

Right?

Speaker:

sorry.

Speaker:

Clarification.

Speaker:

I thought he goes and tells Tyrell that he, the DAT file was compromised.

Speaker:

That, but that's separate.

Speaker:

That's referring to the original hack.

Speaker:

That's right.

Speaker:

And then doesn't he also tell him not that they've been attacked

Speaker:

because they don't know that yet?

Speaker:

I thought he tells 'em think that we found something left behind.

Speaker:

He said he, he said that he's gonna continue to like look into that hack.

Speaker:

Okay.

Speaker:

Right?

Speaker:

Um, and, and we've got the, we, we, we put the honeypot and all of that.

Speaker:

That's what that was about.

Speaker:

But then what we have is, while this is happening, he finds out

Speaker:

essentially that they've been hacked.

Speaker:

And his first reaction is not transparency,

Speaker:

Yep.

Speaker:

his first reaction, he gets back and he's like.

Speaker:

We gotta figure this out.

Speaker:

Uh, you know, gimme all the logs and everything and, and, and

Speaker:

if this gets out, we're toast.

Speaker:

yep.

Speaker:

um, uh, which.

Speaker:

the accounts, all the sales calls,

Speaker:

Yeah.

Speaker:

That cancel all the sales calls you, you know, no one's gonna figure out anything.

Speaker:

Uh, and, and that of course, uh, backfires because f Society who caused the attack,

Speaker:

um, they take over their, uh, again, with the, the hat we've talked about it.

Speaker:

You know, before the hack of the, of the tv.

Speaker:

So they hack the TV and um, and they play the, you know, it's

Speaker:

the, this is like, this is the, this is what it's in the movies.

Speaker:

It's always in the movies where they do this, right.

Speaker:

Where they take over the

Speaker:

mask.

Speaker:

TV and they play the message and the remote doesn't work.

Speaker:

Ah, can't even the, even the electrical plug.

Speaker:

Yeah.

Speaker:

It's like, no, I wanna see it.

Speaker:

And what you see, see is that basically f society, and again, this is, this is all.

Speaker:

Whatever, but, but f Society's message to them is you have helped

Speaker:

protect Evil Corp and therefore we are going to take you out as well.

Speaker:

You are com complicit in Evil Corp's evilness and um, what?

Speaker:

but the entire reason they did that though was it was a misdirection.

Speaker:

Yes, yes.

Speaker:

Again, but what they're being told is right.

Speaker:

We're, we're gonna do this.

Speaker:

Right.

Speaker:

And, uh, and they also said that they even posted it to their website

Speaker:

so, so much for, you know, not, uh, not letting the world know.

Speaker:

Yep.

Speaker:

but yeah.

Speaker:

it was a misdirection.

Speaker:

So Elliot can steal the MFA from Gideon

Speaker:

Right.

Speaker:

actually send an email telling them to shut down the honeypot and they have

Speaker:

Yeah.

Speaker:

hours.

Speaker:

Yeah, exactly.

Speaker:

Um, which is, um, did I miss anything in the summary, which is, um, let,

Speaker:

that's relevant to this, to this

Speaker:

well, the one thing you did miss.

Speaker:

Uhhuh

Speaker:

Is when, uh, told Terrell about, well there are two things.

Speaker:

One, when Gideon told Tyrell about the dat file

Speaker:

Uhhuh.

Speaker:

and honey

Speaker:

Mm-hmm.

Speaker:

right, the first thing Tyrell did is he logged into the server,

Speaker:

Right, right.

Speaker:

right?

Speaker:

And

Speaker:

Yeah.

Speaker:

he sort of was like, let me hunt ter around and see

Speaker:

what I don't have access to.

Speaker:

And he noticed an F Society file before he like has to leave all of a

Speaker:

sudden because the police are there.

Speaker:

Right, right.

Speaker:

Because of

Speaker:

one.

Speaker:

the murder.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

So the thing that happened to Ollie was they weren't letting go of him.

Speaker:

Remember?

Speaker:

And they still had access to the networks.

Speaker:

Right.

Speaker:

And

Speaker:

Yeah.

Speaker:

where they wanted,

Speaker:

in this

Speaker:

sorry.

Speaker:

They as a dark army and

Speaker:

Right, right,

Speaker:

Elliot.

Speaker:

To have this meeting with White Rose, which is what

Speaker:

Darlene was trying to arrange.

Speaker:

right.

Speaker:

Right?

Speaker:

And they literally still had access to the networks because remember Angela

Speaker:

had put the CD in the computer and had put the virus out there and they still

Speaker:

had access to the network and they were doing things, and this is where Ollie.

Speaker:

Comes up to Elliot in the middle of this attack, by the way,

Speaker:

Yeah.

Speaker:

is freaking out.

Speaker:

Everyone's in the room,

Speaker:

Right.

Speaker:

Everyone is like panicking and trying to figure out what's

Speaker:

going on and all hands on deck.

Speaker:

Elliot sits down at his desk, He's like, okay, let me start doing some research.

Speaker:

And then all, he just kind of strolls up and he's like the sales guy, right?

Speaker:

And he is like, yo, bro, I got two hard drives for you.

Speaker:

Take it over to the recovery place or the shredding place.

Speaker:

Yeah, and he's like, what about one of the IT guys, gophers?

Speaker:

He is like, no, man, it has to be you.

Speaker:

Elliot thinks, and he is like, oh, this is why Dark Army wanted me

Speaker:

Yeah, yeah,

Speaker:

all of this was because the Dark Army still had a foothold inside of allsafe.

Speaker:

Right, right.

Speaker:

Yeah.

Speaker:

So, yeah.

Speaker:

So those, those were, uh, two, uh, kind of important things that

Speaker:

are relevant to the topic here.

Speaker:

So this week we're gonna talk about, uh, I think the formal term would be

Speaker:

called advanced persistent threat.

Speaker:

Right.

Speaker:

Yeah.

Speaker:

And this idea of you've got a threat actor that is, that has, as you mentioned,

Speaker:

a foothold that has, you know, they've used maybe an initial access broker.

Speaker:

Maybe they, you know, somehow they are in the network and they're, they are

Speaker:

operating undetected in the network.

Speaker:

And, um, because they're able to do that.

Speaker:

They're able to, you know, to do a, a lot of things, right?

Speaker:

So in this case, what we see is they, they're, they're able to

Speaker:

control one of the employees.

Speaker:

They're able to control sort of a second employee in the

Speaker:

case of, uh, Elliot, right?

Speaker:

Mm-hmm.

Speaker:

Um, and then also you've got two sort of.

Speaker:

Um, two persistent threats going on because, uh, because they have

Speaker:

the, the connection and all safe, they're also able to, to facilitate

Speaker:

this, the, what do you call it?

Speaker:

Um, f society is able to do this hack whose entire purpose was

Speaker:

redirection, as you mentioned.

Speaker:

Right.

Speaker:

Um, because we want to be able to do this, this thing with the phone and, um.

Speaker:

So that he could get in and, and, uh, get that, get that M-F-A-M-F-A.

Speaker:

Again, as we've discussed, m FFA is not perfect if you let your battery run down.

Speaker:

I like how he run the, he ran the battery down, uh, by the way,

Speaker:

um, story from back in the day.

Speaker:

Um, so this is in my very first job and I, I don't know if I've told you

Speaker:

this story before, but my very first job we used to have, we were at a.

Speaker:

We were, it was a, a DEC shop, right?

Speaker:

It was, it was, it was, uh, Ultrix, which was the, the DEC, this

Speaker:

is before digital Unix, right?

Speaker:

This was Ultrix and we had, our servers were Ultrix and uh,

Speaker:

and our desktops were Ultrix.

Speaker:

Important part of the story.

Speaker:

Both the servers and the desktops were Ultrix.

Speaker:

And one of the things that.

Speaker:

We would do back in the day.

Speaker:

Um, gosh, I don't, I don't, I don't think this lasted, but if you wanted

Speaker:

to run a, um, an application on.

Speaker:

The server and have the UI of that application display

Speaker:

its UI onto your server.

Speaker:

X

Speaker:

had to run this command right to, to allow that to happen.

Speaker:

And it was common in our environment to just run that, that command as

Speaker:

part of like your login, like, like you always ran that because you

Speaker:

always wanted to, um, to do that.

Speaker:

That left you open.

Speaker:

For anyone to open up

Speaker:

Yep.

Speaker:

X display

Speaker:

yep.

Speaker:

thing on your, on your desktop.

Speaker:

And, uh, there was a program called Stars

Speaker:

Hmm.

Speaker:

it was a, uh, it was a screensaver

Speaker:

Okay.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

and if you wanted to crash someone's server, you would just

Speaker:

run a quick for loop and fire off stars like a thousand times.

Speaker:

Right.

Speaker:

And um, one day, you know, one of the guys in the shop was gonna

Speaker:

do that to one of the other guys.

Speaker:

And so he just did it, is like in the middle of the workday,

Speaker:

you know, and, uh, he said, boom.

Speaker:

And you set your display to that workstation and then you fire it off.

Speaker:

And, um, he did that.

Speaker:

And then we're waiting for the reaction.

Speaker:

No reaction.

Speaker:

And then, and then, uh, this guy is like, Hey Joe, how's your workstation?

Speaker:

And Joe's like, it's fine.

Speaker:

Why pregnant?

Speaker:

Pause.

Speaker:

Oh shit.

Speaker:

And he had his display set to the server,

Speaker:

Oh no.

Speaker:

so he had just crashed a production server in the middle of the

Speaker:

workday as a practical joke.

Speaker:

Career ending move.

Speaker:

Uh, no, no.

Speaker:

That guy had, that guy was like a, like a nine lives of a cat.

Speaker:

'cause he definitely did some, some serious CLMs.

Speaker:

Um, yeah.

Speaker:

so

Speaker:

It, yeah.

Speaker:

Go ahead.

Speaker:

back, back to the,

Speaker:

Back, back to the scope.

Speaker:

Yeah.

Speaker:

one thing about, about this entire like F Society hack on Evil Core,

Speaker:

Mm-hmm.

Speaker:

Elliot goes, right.

Speaker:

He flies in the data center, right in the earlier episodes.

Speaker:

He fixes it.

Speaker:

He gets everything back.

Speaker:

They never follow the best practices when it comes to

Speaker:

recovering from ransomware, right?

Speaker:

Right.

Speaker:

they do?

Speaker:

They just scanned the server and they're like, yeah, it's good to go.

Speaker:

Let's

Speaker:

Yeah.

Speaker:

It looks good.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

They didn't quarantine it really,

Speaker:

Right,

Speaker:

for like the 30 seconds, whatever.

Speaker:

When

Speaker:

right.

Speaker:

they didn't rebuild it.

Speaker:

Yeah.

Speaker:

still left it in production.

Speaker:

It was

Speaker:

Right.

Speaker:

available.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

And, and the thing is, with with, you know, when we talk about APTs, the

Speaker:

thing to understand about this is the, the length of the dwell time, right?

Speaker:

So you wanna define dwell time.

Speaker:

Yeah, the dwell time is basically long ransomware sits on your

Speaker:

system before it either starts running or it's been detected.

Speaker:

Yeah.

Speaker:

And um, you know, in this case it was there for quite a long time and, um.

Speaker:

That's, yeah.

Speaker:

Yeah.

Speaker:

Well, and you had, you had a couple of different APTs going on here, right?

Speaker:

You had the one going on at Ollie's home,

Speaker:

Yep.

Speaker:

Uh, and then you had the one going on in the Evil Corp

Speaker:

network, by the way, isn't it?

Speaker:

Evil Corp? I think you're saying Evil Corp

Speaker:

Evil, evil

Speaker:

or, okay.

Speaker:

my, my P is very silent.

Speaker:

Oh, so,

Speaker:

Yeah.

Speaker:

um, the, um, go ahead.

Speaker:

missing one,

Speaker:

What's the third one?

Speaker:

the fourth,

Speaker:

What the, what?

Speaker:

there's a four.

Speaker:

So what, so I just remembered two.

Speaker:

There is a fourth one that you missed.

Speaker:

Well wait, we didn't get to a third,

Speaker:

Okay,

Speaker:

it,

Speaker:

first is Evil Corp. Hack by F Society.

Speaker:

yeah,

Speaker:

The second is Ollie's laptop at home.

Speaker:

yeah.

Speaker:

The third is, uh, dark Armies Hack on All Safes Network, right?

Speaker:

Right.

Speaker:

Technically the fourth is FSO Society, but I don't think it's

Speaker:

really a persistent threat 'cause that was like a one time hack.

Speaker:

Okay.

Speaker:

Right.

Speaker:

But I would say that the actual fourth one, and this is one that was very subtle,

Speaker:

you may not have picked up on Elliot Hack on Steel Mountain of the thermostats.

Speaker:

Oh, right.

Speaker:

Yeah.

Speaker:

Right.

Speaker:

That was definitely an a PT right there.

Speaker:

Right.

Speaker:

Um, he had a foothold in there.

Speaker:

Yep.

Speaker:

So, you know, you go back a few episodes and we talked about their plan with,

Speaker:

um, steel Mountain was to hack the.

Speaker:

The, uh, climate control system and then set off, uh, the, you know, basically

Speaker:

make it too hot in the, the data center for tapes and have the tapes melt.

Speaker:

We discussed that that was kind of bs, but that was the plan.

Speaker:

And their plan succeeded.

Speaker:

They, they had gained, they, they, you know, they put a raspberry pie in the

Speaker:

right place, which of course, everyone knows where your, uh, climate control

Speaker:

system controls are, are in the executive.

Speaker:

Washroom.

Speaker:

Everybody knows that.

Speaker:

Yeah,

Speaker:

Um, and that's, that's where they put it.

Speaker:

Um, and yeah.

Speaker:

And so they, they had this, this problem sitting there ready to go

Speaker:

anytime that they needed to do it.

Speaker:

Yeah.

Speaker:

Right.

Speaker:

and, but then did you remember also during that episode, because remember by

Speaker:

this time the Dark Army had an attack.

Speaker:

They weren't able to raise a temperature on the data center and

Speaker:

burn the tapes, right, ruin the tapes.

Speaker:

But what they did have is they had that device and still connected

Speaker:

Yep.

Speaker:

and they realized that the company that manufactures that thermostat

Speaker:

has networked is has a cloud,

Speaker:

Right,

Speaker:

and they're using this exact same thermostat at all the

Speaker:

other steel mounted facilities.

Speaker:

right.

Speaker:

And so do they, do they end up controlling all of the thermostats or.

Speaker:

they have done nothing yet.

Speaker:

Okay.

Speaker:

So they just know that Yeah.

Speaker:

And this is why Elliot asks and meets White Rose and says, Hey, need time.

Speaker:

I, or I need you guys to act now.

Speaker:

Right.

Speaker:

And this is

Speaker:

Right.

Speaker:

Rose tells him, I will give you 43 hours or

Speaker:

Yeah.

Speaker:

Some, some very,

Speaker:

think it was

Speaker:

some very precise time.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

And so that's why Elliot's in this rush trying to get like turn

Speaker:

off the honey pot so then they

Speaker:

Right.

Speaker:

go do the rest of the hack and hopefully try to destroy Steel Mountain and

Speaker:

Yeah.

Speaker:

Army attack the China data center.

Speaker:

Yeah.

Speaker:

And we can play with the, the thing of the honeypot and how that, the way

Speaker:

he described how the honeypot is that if the honeypot is what it says it is,

Speaker:

that they, they wouldn't be detected because it's not on the network.

Speaker:

But anyway, I,

Speaker:

Yeah.

Speaker:

you know, yeah.

Speaker:

the fact, and even the fact that like right?

Speaker:

That's in the thing.

Speaker:

The

Speaker:

Mm-hmm.

Speaker:

it's been days, no one's recogni, like you scan the network, right?

Speaker:

No one's realized, Hey, what is this thing that's on

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

And, and that's, and that's kind of what we need to talk about a little bit is

Speaker:

there are ways to detect APTs, right?

Speaker:

You're looking for, and I think.

Speaker:

There's, there's two things, right?

Speaker:

There's a couple of things.

Speaker:

One is you are looking for devices that have IP addresses on your network

Speaker:

that they didn't, so how do you, you know, that they're not supposed to

Speaker:

have, or that, that, that they're new.

Speaker:

Every new IP address on your network should be registered

Speaker:

and should be known, right?

Speaker:

Uh, both from a wireless perspective and a and a wired perspective.

Speaker:

And certainly anything if you, if you have wireless, if you have.

Speaker:

Unregistered, like guest wireless access, that's one thing, right?

Speaker:

And they have access just to the internet, but not to the corporate network.

Speaker:

You could probably allow unregistered devices there, but if you're allowing

Speaker:

a device to gain a IP address on your corporate network and you don't know

Speaker:

what this device is, this is a problem.

Speaker:

Yeah, and just a slight correction.

Speaker:

You're probably referring to a Mac address, at least at the minimum.

Speaker:

You had said IP address of

Speaker:

What's, why is that a problem?

Speaker:

Because anyone can have an ip, sorry, the MAC address is what they would

Speaker:

typically use to register against the network to then get the IP address.

Speaker:

Uh, yeah.

Speaker:

Okay.

Speaker:

I, you know, you're,

Speaker:

authentication mechanisms like

Speaker:

yeah,

Speaker:

other things

Speaker:

but I'm just saying

Speaker:

secure.

Speaker:

a, a new device was given an IP address, right?

Speaker:

A New Mac address to, you know, to use, to use your, um,

Speaker:

Well, a device

Speaker:

to know.

Speaker:

a nuke Mac address was given an IP address and the

Speaker:

Okay.

Speaker:

not.

Speaker:

No.

Speaker:

Yeah.

Speaker:

Okay.

Speaker:

Okay.

Speaker:

Okay.

Speaker:

That, that's perfectly correct.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Tomato potato.

Speaker:

Um, so

Speaker:

but

Speaker:

but, but you've got a new device that got it, that's gi, but given an IP

Speaker:

address on the network and no one seems to notice and it's there for how long?

Speaker:

at least three days,

Speaker:

Yeah.

Speaker:

Yeah, I, I'd like to think that a new device, you know, if you're doing

Speaker:

this properly, especially if you're at a place like Steel Mountain, no

Speaker:

new device should be given an IP address, no New Mac address, right?

Speaker:

Should be given a new IP address that isn't already known to the network.

Speaker:

Right?

Speaker:

exactly.

Speaker:

Uh, now we know that that actually happens all the time.

Speaker:

We actually did an episode a while back, I dunno if you remember this,

Speaker:

but we did an episode a while back on like wireless hacking where people are

Speaker:

creating devices that, that get sent to the network to be able to get on

Speaker:

the wireless network to then be able to get onto the corporate network.

Speaker:

Um, and, and.

Speaker:

like what he did with the cop car.

Speaker:

It is a little bit like what he did with the cup card.

Speaker:

Yeah.

Speaker:

Um, and, uh, and we know that that happens.

Speaker:

We know that corporations all the time allow new devices to be registered

Speaker:

on the network, get IP addresses and communicate with the network completely

Speaker:

unmonitored, you know, completely unmonitored like you would think at,

Speaker:

at a minimum you would if you do allow.

Speaker:

An unregistered address, you know, you would then monitor that device like crazy.

Speaker:

What is this device doing?

Speaker:

Right?

Speaker:

Oh, it's communicating to all my other facilities, you know,

Speaker:

Yeah, that's probably not

Speaker:

or

Speaker:

idea.

Speaker:

Yeah, or lock it down.

Speaker:

Good point.

Speaker:

Right?

Speaker:

Lock it down so that it can only communicate with whatever.

Speaker:

I don't know.

Speaker:

internet.

Speaker:

I mean, so, uh, the other thing that, again, this would help minimize.

Speaker:

The blast radius of an a PT, and that is devices, servers should really only, you

Speaker:

should also be following, um, the concept of least privilege for them as well.

Speaker:

Mm-hmm.

Speaker:

Smart devices like, uh, thermostat controlling the network or

Speaker:

controlling your, your, um, cooling system should not be also be able

Speaker:

to talk to servers, you know.

Speaker:

what was it?

Speaker:

Was it Home Depot or Albertson?

Speaker:

Was Target.

Speaker:

the

Speaker:

target.

Speaker:

attack, right.

Speaker:

Yeah.

Speaker:

Yeah,

Speaker:

How did they get in?

Speaker:

it was.

Speaker:

Yeah.

Speaker:

commercials.

Speaker:

Yeah, yeah.

Speaker:

So again, we know what happens.

Speaker:

Yep.

Speaker:

But how, but how do we, how do we stop this, right?

Speaker:

Yeah.

Speaker:

I would say one of the first things is to detect for new devices.

Speaker:

That's the one to stop new, like this kind of attack.

Speaker:

But many times the device that's doing the communicating is an existing device

Speaker:

that's been, uh, compromise in some way.

Speaker:

And so I think.

Speaker:

The only way for that to work is either, either a human being that's really good at

Speaker:

monitoring the different types of traffic or, you know, use of machine learning,

Speaker:

um, to, to watch what is normal traffic, what are the servers and things that

Speaker:

we normally talk to, and if suddenly a thermostat that controls the, you know.

Speaker:

Whatever the Toronto facility is, suddenly talking to all the other thermostats,

Speaker:

but but

Speaker:

that's a problem.

Speaker:

also remember, I think it was when we had.

Speaker:

Mike, I wanna say it might have been an episode with Mike.

Speaker:

are Mike Saylor, by the way, who is Curtis's co-author on

Speaker:

the upcoming O'Reilly book,

Speaker:

Very excited.

Speaker:

Yes.

Speaker:

Um, he'll add one more to the shelf behind you.

Speaker:

Um, so.

Speaker:

I think it was Mike who had mentioned like, people are now starting to

Speaker:

exfiltrate, uh, exfiltrate data,

Speaker:

Right,

Speaker:

by communicating directly to another server, but by sending DNS packets

Speaker:

right.

Speaker:

doing lookups.

Speaker:

So very, very small amounts of data and that's really, really hard to catch.

Speaker:

Yeah.

Speaker:

Well, it is.

Speaker:

It is, and it's not right.

Speaker:

So.

Speaker:

The, the person that we had, uh, that talked about that talked about how

Speaker:

that you actually can recognize, you can have, you can f first off you can.

Speaker:

Yeah, you can.

Speaker:

The, the, the domains that are used for these types of things for command and

Speaker:

control, for, uh, you know, malware.

Speaker:

They look really weird.

Speaker:

They're not normal.

Speaker:

Um, so again, I, I go back to machine learning.

Speaker:

This is not a normal, uh, type request.

Speaker:

Right?

Speaker:

Um, he also talked about looking for communication to new domains, right?

Speaker:

Um, things like that, right?

Speaker:

Um, the, um, um,

Speaker:

But

Speaker:

but I.

Speaker:

is really around like the active persistent threats, right?

Speaker:

It's like.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

And really I think the, the thing that you've got to do is you, you just

Speaker:

have to be monitoring your network.

Speaker:

You've got to be looking for behaviors, looking for behavior anomalies.

Speaker:

Uh, you do need an EDR system, uh, to, to watch for that sort of stuff.

Speaker:

But again, as we discussed, I believe in last week's episode, the

Speaker:

EDR is only helpful on the way in.

Speaker:

Yeah.

Speaker:

Right.

Speaker:

Um, the, the, the EDR might, uh, that's, um, endpoint detection and response.

Speaker:

It, depending on where it is, it might detect an a PT

Speaker:

Yeah.

Speaker:

that a PT tries to then, uh,

Speaker:

Yeah.

Speaker:

move outside where it currently is.

Speaker:

it did in the case of Darlene trying to hack the police department, right?

Speaker:

They

Speaker:

Yeah.

Speaker:

software run being like, Hey, you should not be loading this file.

Speaker:

Right.

Speaker:

Right.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

But I think the challenge, or one thing I wanted to mention with APTs is, right,

Speaker:

if I look at the all, uh, the Evil Corp exercise right where they hacked

Speaker:

and they still left things behind.

Speaker:

The fact that they're not monitoring the network continually or looking

Speaker:

for these sort of activities

Speaker:

Right.

Speaker:

a little scary because I think I was reading.

Speaker:

Some statistics or some article about ransomware gangs, right?

Speaker:

And it's not like they come in, they attack, they steal some data,

Speaker:

they encrypt data, and then you pay them and then they go away, right?

Speaker:

They might come back into your network again to extort you for more money.

Speaker:

Yeah.

Speaker:

sell that attack, right?

Speaker:

Or that, uh, the initial attack to another ransomware group, right?

Speaker:

So now

Speaker:

Yeah.

Speaker:

you.

Speaker:

And

Speaker:

Yeah.

Speaker:

If you don't make sure that you've closed off all the gates, right,

Speaker:

you're still leaving yourself open.

Speaker:

Yeah.

Speaker:

Agreed.

Speaker:

Agreed.

Speaker:

The episodes we've done with Mike have been enlightening because he really

Speaker:

understands like what the recovery process looks like and how companies recover.

Speaker:

And it's fascinating to see, a lot of times on TV it's like,

Speaker:

oh, they got hit with ransomware, boom, they're back up and running.

Speaker:

Or what?

Speaker:

You imagine it's

Speaker:

Yeah.

Speaker:

it's a quick operation.

Speaker:

But no, these could be weeks

Speaker:

Yeah.

Speaker:

before they really know what was impacted.

Speaker:

And it takes time and people are careful.

Speaker:

Yeah, the, the, the, um, containment and eradication phase

Speaker:

is the single biggest phase.

Speaker:

The actual restoring of servers is the easy part, assuming that you,

Speaker:

you know, backed up all the things.

Speaker:

Um, well, I think that can end our coverage of advanced persistent

Speaker:

threats from, uh, season one, episode eight, AKA 1.7 of Mr.

Speaker:

Robot.

Speaker:

Thanks.

Speaker:

Thanks again, Prasanna.

Speaker:

No, this was a good episode and don't tell me what happens 'cause

Speaker:

I want to see what Mr. Robot is.

Speaker:

Okay.

Speaker:

And, uh, with that, thanks to our listeners.

Speaker:

That is a wrap.

Speaker:

The backup wrap up is written, recorded and produced by me w Curtis Preston.

Speaker:

If you need backup or Dr. Consulting content generation or expert witness

Speaker:

work, check out backup central.com.

Speaker:

You can also find links from my O'Reilly Books on the same website.

Speaker:

Remember, this is an independent podcast and any opinions that you

Speaker:

hear are those of the speaker.

Speaker:

And not necessarily an employer.

Speaker:

Thanks for listening.

Speaker:

I.