Oct. 20, 2025

The ArcGIS Hack That Turned Backups Into a Malware Repository

The ArcGIS Hack That Turned Backups Into a Malware Repository

This episode examines a sophisticated ArcGIS hack that remained undetected for 12 months. The threat group Flax Typhoon compromised an ArcGIS server by exploiting weak credentials and deploying a malicious Java extension that functioned as a web shell. The attack highlights critical failures in traditional security approaches: the malware was backed up along with legitimate data, signature-based detection tools completely missed the custom code, and the lack of multi-factor authentication made the initial breach possible. Curtis and Prasanna discuss why behavioral detection is now mandatory, how password length trumps complexity, and the importance of cyber hygiene practices like regular system audits and extension management. They also cover ReliaQuest's recommendations for preventing similar attacks, including automated response playbooks and monitoring for anomalous behavior. If you're running public-facing applications or managing any IT infrastructure, this episode provides actionable lessons you can't afford to ignore.

https://reliaquest.com/blog/threat-spotlight-inside-flax-typhoons-arcgis-compromise

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we talk about a real nightmare scenario.

Speaker:

It was a hack of an app called Arc, GIS, and it went undetected for 12 months.

Speaker:

That's right an entire year.

Speaker:

The threat group was called Flax Typhoon, and they compromised an arc

Speaker:

GIS server, and turned a legitimate Java extension into a web shell.

Speaker:

And every time the customer backed up their system, they were actually

Speaker:

backing up the malware too.

Speaker:

Uh, we talk about how this happened and why traditional security tools

Speaker:

completely missed it, and what you could do most importantly to prevent

Speaker:

something like this from happening to you.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup.

Speaker:

And I've been passionate about backup and recovery and now

Speaker:

cyber recovery for over 30 years.

Speaker:

Ever since.

Speaker:

I had to tell my boss that we had no backups of the production

Speaker:

database that we just lost.

Speaker:

I don't want that to happen to you.

Speaker:

That's why I do this.

Speaker:

On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the show.

Speaker:

Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy that

Speaker:

started poking around in my software Prasanna Malaiyandi, How's it going?

Speaker:

Prasanna,

Speaker:

Good.

Speaker:

Curtis, how are you doing?

Speaker:

do, doing okay.

Speaker:

You can't just go into my thing and make changes and not tell me.

Speaker:

Well, this is 'cause you complained that I don't do enough stuff.

Speaker:

So I started doing stuff and now you complain the other way.

Speaker:

You just gotta, you just gotta tell me.

Speaker:

I, I mean, we're researching, in this show, we're talking about

Speaker:

software that you use all the time, being used against you.

Speaker:

And I log in and I, there were changes.

Speaker:

I didn't, I didn't know there were changes.

Speaker:

I got scared.

Speaker:

I thought, I, I thought that the, that our show about being hacked had been hacked.

Speaker:

So, so let's, uh, let's, let's jump in this thing, this story.

Speaker:

Uh, and by the way, for our listeners, we're actually gonna try something new.

Speaker:

We're gonna try not to talk so dang much.

Speaker:

Um, our, our shows have typically gone 30 to 40 minutes.

Speaker:

We're gonna try to keep 'em a little shorter, uh, see how that works.

Speaker:

I think the primary problem with that is me.

Speaker:

But, um.

Speaker:

to talk?

Speaker:

I do like to talk.

Speaker:

Yeah.

Speaker:

Hmm.

Speaker:

So, uh, we're gonna talk about this, um, this story of a customer of arc. Arc.

Speaker:

Is it Arc, GISI guess Is that somebody that, that, that would be pronounced?

Speaker:

So, so this is a geographic information service?

Speaker:

Is that, what, is that what that's called?

Speaker:

I've heard about this.

Speaker:

You can use it for like data analytics and other things about

Speaker:

different areas and gather different statistics based off of it,

Speaker:

Yeah.

Speaker:

so it helps you do analysis of a lot of different data

Speaker:

And what it appears is that it was an actual piece of software that was

Speaker:

installed on a server, and it turned out that a group called Flax Typhoon,

Speaker:

That's a new one.

Speaker:

Yeah.

Speaker:

It's, I I hadn't heard of it.

Speaker:

Yeah.

Speaker:

Uh, and they're a, a China based, uh, a PT. Threat group or a PT group, right.

Speaker:

Advanced persistent threat.

Speaker:

Uh, and they had managed to, um, what, what would you call it?

Speaker:

Um, well hack it.

Speaker:

I guess we, we'll just call it.

Speaker:

Well,

Speaker:

Yeah,

Speaker:

did

Speaker:

go ahead.

Speaker:

they hacked it, right?

Speaker:

They found administrator credentials to the software.

Speaker:

They accessed it, and then they basically deployed an extension

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

J they call it the Java server object Extension.

Speaker:

SOE.

Speaker:

Yeah.

Speaker:

Yeah, and they used that as sort of a backdoor into the system and gained

Speaker:

access into the network and other things.

Speaker:

And it all just looked normal.

Speaker:

And I think one of the big things was, you know how we always talk about,

Speaker:

okay, the best way to recover from ransomware is to have a backup that you

Speaker:

Right, right.

Speaker:

this case, because of how these extensions work, people were

Speaker:

actually backing up the extension.

Speaker:

So if you ever tried to restore from your backups, which is

Speaker:

Yeah, yeah,

Speaker:

restore the extension and therefore the malware.

Speaker:

yeah.

Speaker:

And so basically they turned this SOE into a functioning web shell

Speaker:

that could do whatever they want.

Speaker:

I think my favorite part of the story is that they put a password.

Speaker:

In their hack.

Speaker:

So they had this back door that could do whatever they want, and then

Speaker:

they went and put a password on it.

Speaker:

That, that basically said, only we can use the hack.

Speaker:

exactly.

Speaker:

Um, and, and how long, how long Prasanna were they in this customer's

Speaker:

environment before they were discovered or

Speaker:

months, I wanna say.

Speaker:

12? Months,

Speaker:

Yep.

Speaker:

let that sit with our listeners.

Speaker:

They were in their environment for 12 months.

Speaker:

Now, I just want to say it appears that nothing that none of this, this

Speaker:

was not Arc C, arc GIS was not hacked.

Speaker:

Right?

Speaker:

This was not a vulnerability of Arc G. Arc GIS.

Speaker:

Um, this was.

Speaker:

This was a compromise, uh, but a compromise that was made

Speaker:

possible in my professional opinion based on, uh, user error.

Speaker:

Right?

Speaker:

User, user misconfiguration, uh, and then also, uh, and we're

Speaker:

gonna, we're gonna talk about that.

Speaker:

Um, basically, and, and also it was the reason it was allowed to stay

Speaker:

so long is because of, I think the inherent trust that people put in.

Speaker:

Stuff that they install and they use all the time.

Speaker:

And just to add one more thing to this is the way Arc GIS is deployed

Speaker:

in this environment is you sort of had a public facing thing.

Speaker:

Right.

Speaker:

then they also had an internal arc, GIS instance, which would kind of do all

Speaker:

the work, but the public one would proxy request to the internal one, and so

Speaker:

they also compromised things that way.

Speaker:

So they were able to get access to the internal network because of

Speaker:

that public facing arc, GIS server.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Good times.

Speaker:

Uh, and so what it, what it appears is that they got, uh, they, they

Speaker:

somehow got a password from a, uh, an administrative account.

Speaker:

And then I do think it's funny that it does show in the article that they then.

Speaker:

Um, changed the password of the administrative account, uh,

Speaker:

which, which I find interesting.

Speaker:

Like nobody, does nobody ever log into the admin account,

Speaker:

Like

Speaker:

know?

Speaker:

it up and running, it's like why bother going?

Speaker:

It may not be one of those systems you're constantly checking and monitoring

Speaker:

Yeah, yeah.

Speaker:

Uh, so basically they had, they had this web shell that could do

Speaker:

literally whatever they wanted.

Speaker:

Uh, they poked around the customer's environment.

Speaker:

They tried to go after a couple of different workstations.

Speaker:

It was it workstations.

Speaker:

'cause they wanted to be able to get other credentials and

Speaker:

access to other resources too.

Speaker:

Yeah, yeah.

Speaker:

And you know, and I, I, so the first thing I want to talk about is the,

Speaker:

the, the backup issue that you stated.

Speaker:

So while, while you're right, we do always recommend, uh,

Speaker:

backups of, of everything, right?

Speaker:

I, and, and, and I tell people, even though I do think that you

Speaker:

should be restoring data and apps and, and the os like differently,

Speaker:

uh, just, just back it all up.

Speaker:

Right, just back up everything.

Speaker:

I'd much rather you just back up everything and have wasted space than,

Speaker:

than to selectively select things and, uh, and accidentally miss something important.

Speaker:

But I do think that, uh, if they were trying to selectively restore

Speaker:

this environment, um, it doesn't quite go the way I would think that

Speaker:

you should if you think you have.

Speaker:

If you've suspected an attack, um, at least, at least I know in the upcoming

Speaker:

book, uh, that would be learning ransomware response and Recovery.

Speaker:

We do recommend that for the operating system and for applications, you should

Speaker:

be, you should be restoring this as I make quotes in the air from, uh,

Speaker:

a golden image, not from a backup.

Speaker:

You know, that was taken anytime, anytime recently.

Speaker:

Right.

Speaker:

And, and that, I think if they had done that.

Speaker:

If they had restored it from a golden image, then I think perhaps

Speaker:

I would've addressed this issue.

Speaker:

Having said that, there is, there is that concern that you talked about if

Speaker:

they were actually backing up these, these extensions as something like

Speaker:

extra, then that might have been, they still might have reinfected themselves.

Speaker:

Ex. Yeah.

Speaker:

And also in the article that they, I think we'll post a link in the show description

Speaker:

from this article, but they also mentioned that the only way, so this company

Speaker:

or this customer got attacked, right?

Speaker:

And then they brought in this other company security company

Speaker:

to do the investigation.

Speaker:

I think they're called ReliaQuest.

Speaker:

Yeah.

Speaker:

I rely a quest.

Speaker:

Yeah.

Speaker:

Rely Quest.

Speaker:

And so one of the things they talked about is they actually went through to

Speaker:

try to figure out like which extensions are valid and which ones are not, because

Speaker:

Mm-hmm.

Speaker:

didn't even know like which ones were supposed to be on

Speaker:

this server to start with.

Speaker:

Interesting.

Speaker:

And so I think that becomes a challenge.

Speaker:

Just to what you were saying, Curtis, it's you restore it.

Speaker:

How do you know what was supposed to be there and what wasn't?

Speaker:

It's if you don't know what those are and what seems to be legitimate traffic

Speaker:

Right.

Speaker:

behavior from the application versus what is anomalous.

Speaker:

And, and the closest analogy that I have to, that is, you know,

Speaker:

I use, uh, WordPress, right?

Speaker:

For the website.

Speaker:

And WordPress has extensions.

Speaker:

Right.

Speaker:

And the, and, and it's very easy to install.

Speaker:

Install, and, you know, activate.

Speaker:

It's like, it tastes like two clicks.

Speaker:

Install and activate.

Speaker:

Install and activate.

Speaker:

And it's very common for you to install it, activate, play with it

Speaker:

for a little bit, decide not to use it, and then just leave it there.

Speaker:

Yep.

Speaker:

Bad juju, right?

Speaker:

Because you do not want the problem that they had.

Speaker:

You wanna know what, you wanna know, what your system inventory is.

Speaker:

You wanna know what any, uh, extensions, applications, et cetera,

Speaker:

that are running in your environment.

Speaker:

And ones that are ones that are not.

Speaker:

Actively being used should be either removed, like you

Speaker:

said, and and also patched.

Speaker:

Yes.

Speaker:

Actively patched.

Speaker:

Yeah.

Speaker:

Um, and, um, so they did ultimately get, uh, they did

Speaker:

ultimately get rid of this problem.

Speaker:

I don't know, did they talk in the article?

Speaker:

I didn't see, did they figure out what damage was done?

Speaker:

Uh, they looked to see the spread, but they didn't find

Speaker:

Yeah.

Speaker:

Okay.

Speaker:

Um, they don't, they don't really know, I guess is what that is.

Speaker:

Yeah,

Speaker:

Yeah, yeah.

Speaker:

warn that just given the behavior of, what's it called, flax, typhoon.

Speaker:

Yeah.

Speaker:

Given the behavior of flax typhoon, it's one of these groups that plans

Speaker:

methodically before attacking.

Speaker:

So they were mentioning that they've probably also already figured out what

Speaker:

they're going to do next, and it's just a matter of time before they act.

Speaker:

Hmm.

Speaker:

Yay.

Speaker:

Yay.

Speaker:

so let's talk about what they could have done, uh, differently.

Speaker:

And of course this is this, this article that we're reading is a blog

Speaker:

post by ReliaQuest, and of course one of ReliaQuest is strategies.

Speaker:

Uh, is to use, uh, ReliaQuest, uh, software, right?

Speaker:

Um, one of which is called Ag Agentic ai.

Speaker:

And, and you know, not necessarily that, but I agree with their

Speaker:

recommendation in that.

Speaker:

The problem here was that the, the tools that they were using were

Speaker:

typically, uh, hunting for IOCs.

Speaker:

You want to talk about what that is,

Speaker:

Yeah, this is in indications of compromise,

Speaker:

right?

Speaker:

that help you understand, okay, I was compromised because I might see a log file

Speaker:

or a binary with this sort of signature on it and other things to indicate

Speaker:

that yes, something has attacked me.

Speaker:

Yeah.

Speaker:

And so instead of ho hunting for known bad software, you can hunt

Speaker:

for unknown behavior, right?

Speaker:

So it is, this is this, because the problem is this was

Speaker:

essentially custom software.

Speaker:

Yep.

Speaker:

so, so anything that's hunting for known signatures is not

Speaker:

gonna find anything wrong.

Speaker:

But if they had been watching the activity of what this thing was doing,

Speaker:

then they would've seen these odd, uh, requests and they, they go ahead.

Speaker:

But one thing though that, and I don't know, maybe the customer didn't have

Speaker:

the best tools in place, but they were doing things like creating services on

Speaker:

startups, seeing if it failed, restarting, like all of these things, which I would

Speaker:

assume you would flag regardless as,

Speaker:

Right.

Speaker:

this is some bad behavior.

Speaker:

I should go look at it.

Speaker:

If.

Speaker:

almost sort of like your basics, right?

Speaker:

If you're watching for that sort of thing, right?

Speaker:

A lot of people, especially people that are not, not cyber,

Speaker:

Yeah.

Speaker:

don't know, savvy, not terribly cyber savvy, but they talked about that they

Speaker:

had the ability to do, uh, automated response playbooks and at the first time

Speaker:

the this command started running weird.

Speaker:

Who am I?

Speaker:

Yeah.

Speaker:

like who runs a who am I, uh, command?

Speaker:

Right.

Speaker:

As soon as they did that, they said they would've quarantined that server.

Speaker:

It wouldn't have been able to talk to other people.

Speaker:

Also, as soon as it started talking to C two servers, what are C two servers?

Speaker:

Uh, Prasanna.

Speaker:

Command and control servers.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

think of it as servers out there on the internet that these malicious actors

Speaker:

control, that send commands to these end points telling it what to do.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

And so as soon as it saw that it was talking to, uh, uh, command and

Speaker:

control servers, it would've, it would've basically blocked that ip.

Speaker:

So there, there, so basically, and we've talked about this, I recommend

Speaker:

the, the, you know, it, it, it's, it's.

Speaker:

AI is not the silver bullet for everything, but this is one thing where AI

Speaker:

and machine learning can be very helpful, where you can watch how applications

Speaker:

typically behave and then when they start doing stuff that they're not normally

Speaker:

doing, uh, you can flag it and you can go, maybe you do auto, maybe you do

Speaker:

it automatically, but maybe you don't.

Speaker:

Uh, but, but at least you flag it.

Speaker:

Right.

Speaker:

And, and at least they wouldn't have been there for a year.

Speaker:

Can I add something to

Speaker:

Yeah, sure.

Speaker:

Uh, not directly related to what ReliaQuest talked about, but I think

Speaker:

periodically you should be going and doing an inventory of your systems.

Speaker:

Yeah.

Speaker:

And figuring out what's running.

Speaker:

Do I have just like patch management, right?

Speaker:

Do I

Speaker:

Right.

Speaker:

patches on all the systems?

Speaker:

Are people using these extensions?

Speaker:

Do the right people have access to the systems that need access?

Speaker:

Are there people I should be kicking off?

Speaker:

Right?

Speaker:

Yeah.

Speaker:

these other things should be sort of like

Speaker:

like

Speaker:

hygiene.

Speaker:

Yeah, cyber hygiene.

Speaker:

Thank

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

people should be doing that could have prevented some of these things.

Speaker:

Like

Speaker:

I may,

Speaker:

is a long time.

Speaker:

I may or may not have been recently editing a. A, a chapter that

Speaker:

used to phrase cyber hygiene.

Speaker:

So I had it right.

Speaker:

I had it right at the ready.

Speaker:

So, uh, so they've got an action plan here of four things.

Speaker:

And I, you know, I, I couldn't, couldn't agree with, couldn't

Speaker:

agree more with, with all of them.

Speaker:

Right.

Speaker:

Uh, although.

Speaker:

Well, they just have, they just, they use bigger words than I would use.

Speaker:

So they talk about audit and hardening public facing applications.

Speaker:

So if you have an application that is talking to the internet, uh, this

Speaker:

is one that you really need to be, uh, locking down that server and

Speaker:

that application as much as you can, more so than a server that simply

Speaker:

runs inside your IT environment.

Speaker:

And today, what isn't a public facing application, that's what I want to say,

Speaker:

well, I think in this case they're also talking about things that are

Speaker:

visible from the internet rather than things that might need internet access.

Speaker:

Well, what I'm saying though is like everybody uses SaaS apps, so like all

Speaker:

SaaS apps are public facing applications.

Speaker:

That's what I'm saying.

Speaker:

Like the, the days of we've got, we've got, you know, three apps in

Speaker:

the cloud and or, or three apps that are public facing and the rest of our

Speaker:

apps are just inside the data center.

Speaker:

It's like, what's a data center?

Speaker:

Yeah,

Speaker:

Right.

Speaker:

So I'm saying everything seems to be public facing, but go ahead.

Speaker:

but yes.

Speaker:

SaaS apps, I agree.

Speaker:

But I would say from a customer perspective, the SaaS

Speaker:

apps are not their problem.

Speaker:

But I'm gonna have, I'm gonna have

Speaker:

vendor's problem minus basic access controls and other things they should be

Speaker:

ag Agreed.

Speaker:

Agreed.

Speaker:

but there's very little that they can control in a SaaS app's case

Speaker:

A Yes.

Speaker:

Agreed.

Speaker:

I I guess what they're saying is if you do have actual apps running in

Speaker:

your data center, uh, that are public facing, then, then you really should

Speaker:

be, um, you know, auditing and harting.

Speaker:

Yes.

Speaker:

and blah, blah, blah.

Speaker:

Right.

Speaker:

Yeah.

Speaker:

They, we talked about it already, but they talked about moving

Speaker:

beyond IOC based detection.

Speaker:

You need to be looking at behavioral based detection at this point.

Speaker:

Right.

Speaker:

I

Speaker:

And, and

Speaker:

you.

Speaker:

yeah, sure

Speaker:

Does your book cover any of this?

Speaker:

it does.

Speaker:

Okay.

Speaker:

Yeah.

Speaker:

Uh, I, I think so.

Speaker:

Hmm.

Speaker:

I.

Speaker:

It's all up in my head, like, you know, going through all this stuff.

Speaker:

Yeah.

Speaker:

I mean, we talked about, um, we do talk about, um, well, I'll just say this.

Speaker:

The book is focused on an assumed breach standpoint.

Speaker:

The focus of the book is not.

Speaker:

How to stop all ransomware, right?

Speaker:

The focus of the book is you're probably gonna get ransomware,

Speaker:

so here's how to stop it.

Speaker:

There is one chapter in the book that says, look, you

Speaker:

really need to do these things.

Speaker:

And we do, we do.

Speaker:

In that chapter, and I, it was literally that chapter I was

Speaker:

just editing in that chapter.

Speaker:

Um.

Speaker:

We do talk about like the things that you absolutely have to do,

Speaker:

and one of them is this next one, which is strong credential hygiene.

Speaker:

Right.

Speaker:

Uh, I pulled, I just pulled a, a recent copy of this,

Speaker:

um, of this, um, the, from a,

Speaker:

not good.

Speaker:

yeah.

Speaker:

So it, it's uh, from a company called HI Systems and they have a password.

Speaker:

Length guessing time table, right?

Speaker:

And, um, the, if you have a password length of, um, if you just have letters,

Speaker:

um, you know that they've got like a password length of 12 is 27,000 years.

Speaker:

But, uh, the, the, the, the key here is that length, length

Speaker:

is better than complexity.

Speaker:

Right.

Speaker:

Um, so like for example, if you've got numbers, upper and lowercase

Speaker:

letters and symbols, and your password length is six characters long.

Speaker:

So it's says complex as it could possibly be, and it's six characters long.

Speaker:

How long do you think it takes to guess that

Speaker:

One year

Speaker:

two weeks?

Speaker:

If it's seven characters long, it's two years, right?

Speaker:

At eight now it's 164 years.

Speaker:

Right?

Speaker:

So the, the real key is like,

Speaker:

can

Speaker:

length is better than complexity.

Speaker:

So, yeah.

Speaker:

So if, if, here's, here's the beautiful thing.

Speaker:

If all I do is have a long password,

Speaker:

Yeah.

Speaker:

12 character password, and all I do is use lowercase letters.

Speaker:

So 12 character password.

Speaker:

Now mind you, over there we had a six character password, but it was

Speaker:

as complex as it could possibly be.

Speaker:

That was two weeks.

Speaker:

I'm gonna have a 12 character password and it's lowercase letters only.

Speaker:

Mm-hmm.

Speaker:

long do you think it takes?

Speaker:

Uh, 172 years.

Speaker:

27,000 years.

Speaker:

So what have we learned?

Speaker:

Length is better than complexity, right?

Speaker:

yeah.

Speaker:

So, um,

Speaker:

a single word.

Speaker:

It could be a sentence,

Speaker:

yes, it can, yes.

Speaker:

Like Prasanna is awesome.

Speaker:

That's one.

Speaker:

But, but yeah.

Speaker:

But yeah, so that's the thing is like you, you need, so they had a,

Speaker:

they had a guessable password, or they stole password, and then what?

Speaker:

So they got a password.

Speaker:

What did they also not have?

Speaker:

If they had had this thing, they would've stopped this password that they guessed.

Speaker:

Yes.

Speaker:

Thank you.

Speaker:

MFA, please, for the love of God, everybody, can you please, if you're

Speaker:

still using passwords, please put MFA on everything that matters.

Speaker:

How hard is this?

Speaker:

It's, it is just killing me.

Speaker:

Right?

Speaker:

Um, you know, look at PAs keys.

Speaker:

If you can't do PAs keys, at least put on an MFA and if your ap, if,

Speaker:

if your app, the response from your support from your app is like, what?

Speaker:

It's MFA time to get a new app, right?

Speaker:

But, um, and it, so, yeah.

Speaker:

So if, if they, if you got password management and MFA,

Speaker:

uh, then this would've, this, if they had just turned on MFA, that

Speaker:

would've, uh, solved this problem.

Speaker:

And then also, yes, patch management, right?

Speaker:

Um, potentially if the, if this, uh, SOE was part of the overall package.

Speaker:

Perhaps if they had updated, uh, the, the package, it would've

Speaker:

actually overwritten the, the SOE.

Speaker:

Um, don't, don't actually know that much about that thing, but,

Speaker:

Yeah,

Speaker:

but, um, yeah, I, I don't know.

Speaker:

So basically, uh, get better passwords, uh, turn MFA on for

Speaker:

anything that matters and investigate.

Speaker:

Those are the things you, you have to do.

Speaker:

Right?

Speaker:

Investigate behavioral based detection that IOC based detection is.

Speaker:

So, uh, last year.

Speaker:

Yeah.

Speaker:

And well, and I think the other thing that I took away from the article is not just.

Speaker:

Don't expect that someone is just gonna have a malware EXE file running somewhere.

Speaker:

Yeah,

Speaker:

could be part of your normal software stack and tools that

Speaker:

you have out there that look

Speaker:

absolutely.

Speaker:

Yeah.

Speaker:

that they've compromised, so,

Speaker:

And don't trust them.

Speaker:

Right.

Speaker:

Just, uh, you should be watching to see what they normally do.

Speaker:

And then see when they do weird things

Speaker:

Yep.

Speaker:

and when they do weird things, I go, whoop, whoop.

Speaker:

But off the clocks on alert.

Speaker:

All right, well this has been fun, Prasanna.

Speaker:

Likewise, Curtis, although I do miss your stories,

Speaker:

I just didn't have it.

Speaker:

I just didn't have any this time.

Speaker:

We'll see, you know, we're working on this new format.

Speaker:

let us know what you think.

Speaker:

this was good.

Speaker:

It, it was a really complex topic to cover in, in a shorter format.

Speaker:

It would've been a lot easier to talk about this for 40 minutes, but I'm trying

Speaker:

listeners, if you like this

Speaker:

Yeah.

Speaker:

don't like, leave us a comment on your favorite pod catcher.

Speaker:

We have YouTube videos.

Speaker:

You can look at our gorgeous faces,

Speaker:

Yeah.

Speaker:

YouTube.

Speaker:

So leave us a comment there.

Speaker:

We love to hear from you, but let us know what you think of this.

Speaker:

One of us has a gorgeous face.

Speaker:

The other has long hair.

Speaker:

All right.

Speaker:

Thank you very much, Prasanna.

Speaker:

It's been fun.

Speaker:

Likewise, Curtis, you have a good one.

Speaker:

And thanks listeners.

Speaker:

You know you're, why we do this?

Speaker:

That is a wrap.