The ArcGIS Hack That Turned Backups Into a Malware Repository

This episode examines a sophisticated ArcGIS hack that remained undetected for 12 months. The threat group Flax Typhoon compromised an ArcGIS server by exploiting weak credentials and deploying a malicious Java extension that functioned as a web shell. The attack highlights critical failures in traditional security approaches: the malware was backed up along with legitimate data, signature-based detection tools completely missed the custom code, and the lack of multi-factor authentication made the initial breach possible. Curtis and Prasanna discuss why behavioral detection is now mandatory, how password length trumps complexity, and the importance of cyber hygiene practices like regular system audits and extension management. They also cover ReliaQuest's recommendations for preventing similar attacks, including automated response playbooks and monitoring for anomalous behavior. If you're running public-facing applications or managing any IT infrastructure, this episode provides actionable lessons you can't afford to ignore.
https://reliaquest.com/blog/threat-spotlight-inside-flax-typhoons-arcgis-compromise
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we talk about a real nightmare scenario.
Speaker:It was a hack of an app called Arc, GIS, and it went undetected for 12 months.
Speaker:That's right an entire year.
Speaker:The threat group was called Flax Typhoon, and they compromised an arc
Speaker:GIS server, and turned a legitimate Java extension into a web shell.
Speaker:And every time the customer backed up their system, they were actually
Speaker:backing up the malware too.
Speaker:Uh, we talk about how this happened and why traditional security tools
Speaker:completely missed it, and what you could do most importantly to prevent
Speaker:something like this from happening to you.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup.
Speaker:And I've been passionate about backup and recovery and now
Speaker:cyber recovery for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss that we had no backups of the production
Speaker:database that we just lost.
Speaker:I don't want that to happen to you.
Speaker:That's why I do this.
Speaker:On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the show.
Speaker:Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy that
Speaker:started poking around in my software Prasanna Malaiyandi, How's it going?
Speaker:Prasanna,
Speaker:Good.
Speaker:Curtis, how are you doing?
Speaker:do, doing okay.
Speaker:You can't just go into my thing and make changes and not tell me.
Speaker:Well, this is 'cause you complained that I don't do enough stuff.
Speaker:So I started doing stuff and now you complain the other way.
Speaker:You just gotta, you just gotta tell me.
Speaker:I, I mean, we're researching, in this show, we're talking about
Speaker:software that you use all the time, being used against you.
Speaker:And I log in and I, there were changes.
Speaker:I didn't, I didn't know there were changes.
Speaker:I got scared.
Speaker:I thought, I, I thought that the, that our show about being hacked had been hacked.
Speaker:So, so let's, uh, let's, let's jump in this thing, this story.
Speaker:Uh, and by the way, for our listeners, we're actually gonna try something new.
Speaker:We're gonna try not to talk so dang much.
Speaker:Um, our, our shows have typically gone 30 to 40 minutes.
Speaker:We're gonna try to keep 'em a little shorter, uh, see how that works.
Speaker:I think the primary problem with that is me.
Speaker:But, um.
Speaker:to talk?
Speaker:I do like to talk.
Speaker:Yeah.
Speaker:Hmm.
Speaker:So, uh, we're gonna talk about this, um, this story of a customer of arc. Arc.
Speaker:Is it Arc, GISI guess Is that somebody that, that, that would be pronounced?
Speaker:So, so this is a geographic information service?
Speaker:Is that, what, is that what that's called?
Speaker:I've heard about this.
Speaker:You can use it for like data analytics and other things about
Speaker:different areas and gather different statistics based off of it,
Speaker:Yeah.
Speaker:so it helps you do analysis of a lot of different data
Speaker:And what it appears is that it was an actual piece of software that was
Speaker:installed on a server, and it turned out that a group called Flax Typhoon,
Speaker:That's a new one.
Speaker:Yeah.
Speaker:It's, I I hadn't heard of it.
Speaker:Yeah.
Speaker:Uh, and they're a, a China based, uh, a PT. Threat group or a PT group, right.
Speaker:Advanced persistent threat.
Speaker:Uh, and they had managed to, um, what, what would you call it?
Speaker:Um, well hack it.
Speaker:I guess we, we'll just call it.
Speaker:Well,
Speaker:Yeah,
Speaker:did
Speaker:go ahead.
Speaker:they hacked it, right?
Speaker:They found administrator credentials to the software.
Speaker:They accessed it, and then they basically deployed an extension
Speaker:Yeah.
Speaker:Yeah.
Speaker:J they call it the Java server object Extension.
Speaker:SOE.
Speaker:Yeah.
Speaker:Yeah, and they used that as sort of a backdoor into the system and gained
Speaker:access into the network and other things.
Speaker:And it all just looked normal.
Speaker:And I think one of the big things was, you know how we always talk about,
Speaker:okay, the best way to recover from ransomware is to have a backup that you
Speaker:Right, right.
Speaker:this case, because of how these extensions work, people were
Speaker:actually backing up the extension.
Speaker:So if you ever tried to restore from your backups, which is
Speaker:Yeah, yeah,
Speaker:restore the extension and therefore the malware.
Speaker:yeah.
Speaker:And so basically they turned this SOE into a functioning web shell
Speaker:that could do whatever they want.
Speaker:I think my favorite part of the story is that they put a password.
Speaker:In their hack.
Speaker:So they had this back door that could do whatever they want, and then
Speaker:they went and put a password on it.
Speaker:That, that basically said, only we can use the hack.
Speaker:exactly.
Speaker:Um, and, and how long, how long Prasanna were they in this customer's
Speaker:environment before they were discovered or
Speaker:months, I wanna say.
Speaker:12? Months,
Speaker:Yep.
Speaker:let that sit with our listeners.
Speaker:They were in their environment for 12 months.
Speaker:Now, I just want to say it appears that nothing that none of this, this
Speaker:was not Arc C, arc GIS was not hacked.
Speaker:Right?
Speaker:This was not a vulnerability of Arc G. Arc GIS.
Speaker:Um, this was.
Speaker:This was a compromise, uh, but a compromise that was made
Speaker:possible in my professional opinion based on, uh, user error.
Speaker:Right?
Speaker:User, user misconfiguration, uh, and then also, uh, and we're
Speaker:gonna, we're gonna talk about that.
Speaker:Um, basically, and, and also it was the reason it was allowed to stay
Speaker:so long is because of, I think the inherent trust that people put in.
Speaker:Stuff that they install and they use all the time.
Speaker:And just to add one more thing to this is the way Arc GIS is deployed
Speaker:in this environment is you sort of had a public facing thing.
Speaker:Right.
Speaker:then they also had an internal arc, GIS instance, which would kind of do all
Speaker:the work, but the public one would proxy request to the internal one, and so
Speaker:they also compromised things that way.
Speaker:So they were able to get access to the internal network because of
Speaker:that public facing arc, GIS server.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Good times.
Speaker:Uh, and so what it, what it appears is that they got, uh, they, they
Speaker:somehow got a password from a, uh, an administrative account.
Speaker:And then I do think it's funny that it does show in the article that they then.
Speaker:Um, changed the password of the administrative account, uh,
Speaker:which, which I find interesting.
Speaker:Like nobody, does nobody ever log into the admin account,
Speaker:Like
Speaker:know?
Speaker:it up and running, it's like why bother going?
Speaker:It may not be one of those systems you're constantly checking and monitoring
Speaker:Yeah, yeah.
Speaker:Uh, so basically they had, they had this web shell that could do
Speaker:literally whatever they wanted.
Speaker:Uh, they poked around the customer's environment.
Speaker:They tried to go after a couple of different workstations.
Speaker:It was it workstations.
Speaker:'cause they wanted to be able to get other credentials and
Speaker:access to other resources too.
Speaker:Yeah, yeah.
Speaker:And you know, and I, I, so the first thing I want to talk about is the,
Speaker:the, the backup issue that you stated.
Speaker:So while, while you're right, we do always recommend, uh,
Speaker:backups of, of everything, right?
Speaker:I, and, and, and I tell people, even though I do think that you
Speaker:should be restoring data and apps and, and the os like differently,
Speaker:uh, just, just back it all up.
Speaker:Right, just back up everything.
Speaker:I'd much rather you just back up everything and have wasted space than,
Speaker:than to selectively select things and, uh, and accidentally miss something important.
Speaker:But I do think that, uh, if they were trying to selectively restore
Speaker:this environment, um, it doesn't quite go the way I would think that
Speaker:you should if you think you have.
Speaker:If you've suspected an attack, um, at least, at least I know in the upcoming
Speaker:book, uh, that would be learning ransomware response and Recovery.
Speaker:We do recommend that for the operating system and for applications, you should
Speaker:be, you should be restoring this as I make quotes in the air from, uh,
Speaker:a golden image, not from a backup.
Speaker:You know, that was taken anytime, anytime recently.
Speaker:Right.
Speaker:And, and that, I think if they had done that.
Speaker:If they had restored it from a golden image, then I think perhaps
Speaker:I would've addressed this issue.
Speaker:Having said that, there is, there is that concern that you talked about if
Speaker:they were actually backing up these, these extensions as something like
Speaker:extra, then that might have been, they still might have reinfected themselves.
Speaker:Ex. Yeah.
Speaker:And also in the article that they, I think we'll post a link in the show description
Speaker:from this article, but they also mentioned that the only way, so this company
Speaker:or this customer got attacked, right?
Speaker:And then they brought in this other company security company
Speaker:to do the investigation.
Speaker:I think they're called ReliaQuest.
Speaker:Yeah.
Speaker:I rely a quest.
Speaker:Yeah.
Speaker:Rely Quest.
Speaker:And so one of the things they talked about is they actually went through to
Speaker:try to figure out like which extensions are valid and which ones are not, because
Speaker:Mm-hmm.
Speaker:didn't even know like which ones were supposed to be on
Speaker:this server to start with.
Speaker:Interesting.
Speaker:And so I think that becomes a challenge.
Speaker:Just to what you were saying, Curtis, it's you restore it.
Speaker:How do you know what was supposed to be there and what wasn't?
Speaker:It's if you don't know what those are and what seems to be legitimate traffic
Speaker:Right.
Speaker:behavior from the application versus what is anomalous.
Speaker:And, and the closest analogy that I have to, that is, you know,
Speaker:I use, uh, WordPress, right?
Speaker:For the website.
Speaker:And WordPress has extensions.
Speaker:Right.
Speaker:And the, and, and it's very easy to install.
Speaker:Install, and, you know, activate.
Speaker:It's like, it tastes like two clicks.
Speaker:Install and activate.
Speaker:Install and activate.
Speaker:And it's very common for you to install it, activate, play with it
Speaker:for a little bit, decide not to use it, and then just leave it there.
Speaker:Yep.
Speaker:Bad juju, right?
Speaker:Because you do not want the problem that they had.
Speaker:You wanna know what, you wanna know, what your system inventory is.
Speaker:You wanna know what any, uh, extensions, applications, et cetera,
Speaker:that are running in your environment.
Speaker:And ones that are ones that are not.
Speaker:Actively being used should be either removed, like you
Speaker:said, and and also patched.
Speaker:Yes.
Speaker:Actively patched.
Speaker:Yeah.
Speaker:Um, and, um, so they did ultimately get, uh, they did
Speaker:ultimately get rid of this problem.
Speaker:I don't know, did they talk in the article?
Speaker:I didn't see, did they figure out what damage was done?
Speaker:Uh, they looked to see the spread, but they didn't find
Speaker:Yeah.
Speaker:Okay.
Speaker:Um, they don't, they don't really know, I guess is what that is.
Speaker:Yeah,
Speaker:Yeah, yeah.
Speaker:warn that just given the behavior of, what's it called, flax, typhoon.
Speaker:Yeah.
Speaker:Given the behavior of flax typhoon, it's one of these groups that plans
Speaker:methodically before attacking.
Speaker:So they were mentioning that they've probably also already figured out what
Speaker:they're going to do next, and it's just a matter of time before they act.
Speaker:Hmm.
Speaker:Yay.
Speaker:Yay.
Speaker:so let's talk about what they could have done, uh, differently.
Speaker:And of course this is this, this article that we're reading is a blog
Speaker:post by ReliaQuest, and of course one of ReliaQuest is strategies.
Speaker:Uh, is to use, uh, ReliaQuest, uh, software, right?
Speaker:Um, one of which is called Ag Agentic ai.
Speaker:And, and you know, not necessarily that, but I agree with their
Speaker:recommendation in that.
Speaker:The problem here was that the, the tools that they were using were
Speaker:typically, uh, hunting for IOCs.
Speaker:You want to talk about what that is,
Speaker:Yeah, this is in indications of compromise,
Speaker:right?
Speaker:that help you understand, okay, I was compromised because I might see a log file
Speaker:or a binary with this sort of signature on it and other things to indicate
Speaker:that yes, something has attacked me.
Speaker:Yeah.
Speaker:And so instead of ho hunting for known bad software, you can hunt
Speaker:for unknown behavior, right?
Speaker:So it is, this is this, because the problem is this was
Speaker:essentially custom software.
Speaker:Yep.
Speaker:so, so anything that's hunting for known signatures is not
Speaker:gonna find anything wrong.
Speaker:But if they had been watching the activity of what this thing was doing,
Speaker:then they would've seen these odd, uh, requests and they, they go ahead.
Speaker:But one thing though that, and I don't know, maybe the customer didn't have
Speaker:the best tools in place, but they were doing things like creating services on
Speaker:startups, seeing if it failed, restarting, like all of these things, which I would
Speaker:assume you would flag regardless as,
Speaker:Right.
Speaker:this is some bad behavior.
Speaker:I should go look at it.
Speaker:If.
Speaker:almost sort of like your basics, right?
Speaker:If you're watching for that sort of thing, right?
Speaker:A lot of people, especially people that are not, not cyber,
Speaker:Yeah.
Speaker:don't know, savvy, not terribly cyber savvy, but they talked about that they
Speaker:had the ability to do, uh, automated response playbooks and at the first time
Speaker:the this command started running weird.
Speaker:Who am I?
Speaker:Yeah.
Speaker:like who runs a who am I, uh, command?
Speaker:Right.
Speaker:As soon as they did that, they said they would've quarantined that server.
Speaker:It wouldn't have been able to talk to other people.
Speaker:Also, as soon as it started talking to C two servers, what are C two servers?
Speaker:Uh, Prasanna.
Speaker:Command and control servers.
Speaker:Yeah.
Speaker:Yeah.
Speaker:think of it as servers out there on the internet that these malicious actors
Speaker:control, that send commands to these end points telling it what to do.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And so as soon as it saw that it was talking to, uh, uh, command and
Speaker:control servers, it would've, it would've basically blocked that ip.
Speaker:So there, there, so basically, and we've talked about this, I recommend
Speaker:the, the, you know, it, it, it's, it's.
Speaker:AI is not the silver bullet for everything, but this is one thing where AI
Speaker:and machine learning can be very helpful, where you can watch how applications
Speaker:typically behave and then when they start doing stuff that they're not normally
Speaker:doing, uh, you can flag it and you can go, maybe you do auto, maybe you do
Speaker:it automatically, but maybe you don't.
Speaker:Uh, but, but at least you flag it.
Speaker:Right.
Speaker:And, and at least they wouldn't have been there for a year.
Speaker:Can I add something to
Speaker:Yeah, sure.
Speaker:Uh, not directly related to what ReliaQuest talked about, but I think
Speaker:periodically you should be going and doing an inventory of your systems.
Speaker:Yeah.
Speaker:And figuring out what's running.
Speaker:Do I have just like patch management, right?
Speaker:Do I
Speaker:Right.
Speaker:patches on all the systems?
Speaker:Are people using these extensions?
Speaker:Do the right people have access to the systems that need access?
Speaker:Are there people I should be kicking off?
Speaker:Right?
Speaker:Yeah.
Speaker:these other things should be sort of like
Speaker:like
Speaker:hygiene.
Speaker:Yeah, cyber hygiene.
Speaker:Thank
Speaker:Yeah.
Speaker:Yeah.
Speaker:people should be doing that could have prevented some of these things.
Speaker:Like
Speaker:I may,
Speaker:is a long time.
Speaker:I may or may not have been recently editing a. A, a chapter that
Speaker:used to phrase cyber hygiene.
Speaker:So I had it right.
Speaker:I had it right at the ready.
Speaker:So, uh, so they've got an action plan here of four things.
Speaker:And I, you know, I, I couldn't, couldn't agree with, couldn't
Speaker:agree more with, with all of them.
Speaker:Right.
Speaker:Uh, although.
Speaker:Well, they just have, they just, they use bigger words than I would use.
Speaker:So they talk about audit and hardening public facing applications.
Speaker:So if you have an application that is talking to the internet, uh, this
Speaker:is one that you really need to be, uh, locking down that server and
Speaker:that application as much as you can, more so than a server that simply
Speaker:runs inside your IT environment.
Speaker:And today, what isn't a public facing application, that's what I want to say,
Speaker:well, I think in this case they're also talking about things that are
Speaker:visible from the internet rather than things that might need internet access.
Speaker:Well, what I'm saying though is like everybody uses SaaS apps, so like all
Speaker:SaaS apps are public facing applications.
Speaker:That's what I'm saying.
Speaker:Like the, the days of we've got, we've got, you know, three apps in
Speaker:the cloud and or, or three apps that are public facing and the rest of our
Speaker:apps are just inside the data center.
Speaker:It's like, what's a data center?
Speaker:Yeah,
Speaker:Right.
Speaker:So I'm saying everything seems to be public facing, but go ahead.
Speaker:but yes.
Speaker:SaaS apps, I agree.
Speaker:But I would say from a customer perspective, the SaaS
Speaker:apps are not their problem.
Speaker:But I'm gonna have, I'm gonna have
Speaker:vendor's problem minus basic access controls and other things they should be
Speaker:ag Agreed.
Speaker:Agreed.
Speaker:but there's very little that they can control in a SaaS app's case
Speaker:A Yes.
Speaker:Agreed.
Speaker:I I guess what they're saying is if you do have actual apps running in
Speaker:your data center, uh, that are public facing, then, then you really should
Speaker:be, um, you know, auditing and harting.
Speaker:Yes.
Speaker:and blah, blah, blah.
Speaker:Right.
Speaker:Yeah.
Speaker:They, we talked about it already, but they talked about moving
Speaker:beyond IOC based detection.
Speaker:You need to be looking at behavioral based detection at this point.
Speaker:Right.
Speaker:I
Speaker:And, and
Speaker:you.
Speaker:yeah, sure
Speaker:Does your book cover any of this?
Speaker:it does.
Speaker:Okay.
Speaker:Yeah.
Speaker:Uh, I, I think so.
Speaker:Hmm.
Speaker:I.
Speaker:It's all up in my head, like, you know, going through all this stuff.
Speaker:Yeah.
Speaker:I mean, we talked about, um, we do talk about, um, well, I'll just say this.
Speaker:The book is focused on an assumed breach standpoint.
Speaker:The focus of the book is not.
Speaker:How to stop all ransomware, right?
Speaker:The focus of the book is you're probably gonna get ransomware,
Speaker:so here's how to stop it.
Speaker:There is one chapter in the book that says, look, you
Speaker:really need to do these things.
Speaker:And we do, we do.
Speaker:In that chapter, and I, it was literally that chapter I was
Speaker:just editing in that chapter.
Speaker:Um.
Speaker:We do talk about like the things that you absolutely have to do,
Speaker:and one of them is this next one, which is strong credential hygiene.
Speaker:Right.
Speaker:Uh, I pulled, I just pulled a, a recent copy of this,
Speaker:um, of this, um, the, from a,
Speaker:not good.
Speaker:yeah.
Speaker:So it, it's uh, from a company called HI Systems and they have a password.
Speaker:Length guessing time table, right?
Speaker:And, um, the, if you have a password length of, um, if you just have letters,
Speaker:um, you know that they've got like a password length of 12 is 27,000 years.
Speaker:But, uh, the, the, the, the key here is that length, length
Speaker:is better than complexity.
Speaker:Right.
Speaker:Um, so like for example, if you've got numbers, upper and lowercase
Speaker:letters and symbols, and your password length is six characters long.
Speaker:So it's says complex as it could possibly be, and it's six characters long.
Speaker:How long do you think it takes to guess that
Speaker:One year
Speaker:two weeks?
Speaker:If it's seven characters long, it's two years, right?
Speaker:At eight now it's 164 years.
Speaker:Right?
Speaker:So the, the real key is like,
Speaker:can
Speaker:length is better than complexity.
Speaker:So, yeah.
Speaker:So if, if, here's, here's the beautiful thing.
Speaker:If all I do is have a long password,
Speaker:Yeah.
Speaker:12 character password, and all I do is use lowercase letters.
Speaker:So 12 character password.
Speaker:Now mind you, over there we had a six character password, but it was
Speaker:as complex as it could possibly be.
Speaker:That was two weeks.
Speaker:I'm gonna have a 12 character password and it's lowercase letters only.
Speaker:Mm-hmm.
Speaker:long do you think it takes?
Speaker:Uh, 172 years.
Speaker:27,000 years.
Speaker:So what have we learned?
Speaker:Length is better than complexity, right?
Speaker:yeah.
Speaker:So, um,
Speaker:a single word.
Speaker:It could be a sentence,
Speaker:yes, it can, yes.
Speaker:Like Prasanna is awesome.
Speaker:That's one.
Speaker:But, but yeah.
Speaker:But yeah, so that's the thing is like you, you need, so they had a,
Speaker:they had a guessable password, or they stole password, and then what?
Speaker:So they got a password.
Speaker:What did they also not have?
Speaker:If they had had this thing, they would've stopped this password that they guessed.
Speaker:Yes.
Speaker:Thank you.
Speaker:MFA, please, for the love of God, everybody, can you please, if you're
Speaker:still using passwords, please put MFA on everything that matters.
Speaker:How hard is this?
Speaker:It's, it is just killing me.
Speaker:Right?
Speaker:Um, you know, look at PAs keys.
Speaker:If you can't do PAs keys, at least put on an MFA and if your ap, if,
Speaker:if your app, the response from your support from your app is like, what?
Speaker:It's MFA time to get a new app, right?
Speaker:But, um, and it, so, yeah.
Speaker:So if, if they, if you got password management and MFA,
Speaker:uh, then this would've, this, if they had just turned on MFA, that
Speaker:would've, uh, solved this problem.
Speaker:And then also, yes, patch management, right?
Speaker:Um, potentially if the, if this, uh, SOE was part of the overall package.
Speaker:Perhaps if they had updated, uh, the, the package, it would've
Speaker:actually overwritten the, the SOE.
Speaker:Um, don't, don't actually know that much about that thing, but,
Speaker:Yeah,
Speaker:but, um, yeah, I, I don't know.
Speaker:So basically, uh, get better passwords, uh, turn MFA on for
Speaker:anything that matters and investigate.
Speaker:Those are the things you, you have to do.
Speaker:Right?
Speaker:Investigate behavioral based detection that IOC based detection is.
Speaker:So, uh, last year.
Speaker:Yeah.
Speaker:And well, and I think the other thing that I took away from the article is not just.
Speaker:Don't expect that someone is just gonna have a malware EXE file running somewhere.
Speaker:Yeah,
Speaker:could be part of your normal software stack and tools that
Speaker:you have out there that look
Speaker:absolutely.
Speaker:Yeah.
Speaker:that they've compromised, so,
Speaker:And don't trust them.
Speaker:Right.
Speaker:Just, uh, you should be watching to see what they normally do.
Speaker:And then see when they do weird things
Speaker:Yep.
Speaker:and when they do weird things, I go, whoop, whoop.
Speaker:But off the clocks on alert.
Speaker:All right, well this has been fun, Prasanna.
Speaker:Likewise, Curtis, although I do miss your stories,
Speaker:I just didn't have it.
Speaker:I just didn't have any this time.
Speaker:We'll see, you know, we're working on this new format.
Speaker:let us know what you think.
Speaker:this was good.
Speaker:It, it was a really complex topic to cover in, in a shorter format.
Speaker:It would've been a lot easier to talk about this for 40 minutes, but I'm trying
Speaker:listeners, if you like this
Speaker:Yeah.
Speaker:don't like, leave us a comment on your favorite pod catcher.
Speaker:We have YouTube videos.
Speaker:You can look at our gorgeous faces,
Speaker:Yeah.
Speaker:YouTube.
Speaker:So leave us a comment there.
Speaker:We love to hear from you, but let us know what you think of this.
Speaker:One of us has a gorgeous face.
Speaker:The other has long hair.
Speaker:All right.
Speaker:Thank you very much, Prasanna.
Speaker:It's been fun.
Speaker:Likewise, Curtis, you have a good one.
Speaker:And thanks listeners.
Speaker:You know you're, why we do this?
Speaker:That is a wrap.