Insider Threat Prevention: Protecting Your Backups from Within

The insider threat represents one of the most dangerous and overlooked cybersecurity challenges facing organizations today. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna explore the three distinct types of insider threats that can devastate your organization from within.
From malicious employees seeking revenge to careless workers who fall for social engineering, insider threats come in many forms. The hosts examine real-world cases including the Coinbase breach through compromised contractors, Apple's lawsuit against an employee who stole Vision Pro secrets, and the infamous logic bomb attack that destroyed an entire company's data.
Learn practical strategies for implementing least privilege access, immutable backup protection, and multi-person authentication controls. Discover why 83% of companies experienced some form of insider threat attack in 2024, and get actionable advice on security training, vendor management, and incident response planning to protect your organization's most critical assets.
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we look at insider threats.
Speaker:Everyone's so focused on ransomware and external attacks, but what about
Speaker:the person sitting right next to you?
Speaker:You know the one with admin privilege who just got passed over for a
Speaker:promotion or that contractor in another country who just got offered
Speaker:six months salary to copy some files.
Speaker:We break down the three types of insider threats, the malicious actor, the careless
Speaker:employee, and the compromised insider.
Speaker:I share some war stories from consulting.
Speaker:Persona, brings up some recent cases like the Coinbase and Apple breaches.
Speaker:I hope you enjoy it.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss that there were no backups of the production
Speaker:database that we had just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated backup admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the show.
Speaker:I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy who's
Speaker:really good at asking questions, but not necessarily when I need them.
Speaker:Asked.
Speaker:Persona, how's it going?
Speaker:I am good, Curtis.
Speaker:Uh, I do ask a lot of questions.
Speaker:It's not my fault because usually when we're having these conversations,
Speaker:you're in the middle of something and I'm in the middle of something.
Speaker:Right.
Speaker:we're both in the middle of something.
Speaker:You go, have you thought about the x, Y, Z parameter?
Speaker:And I'm like, that's really good thing.
Speaker:Like I'm driving, you're working.
Speaker:I.
Speaker:One of us should probably write that down.
Speaker:Yeah.
Speaker:No, no, no.
Speaker:We do write it down.
Speaker:We do.
Speaker:We text it, but then the problem is it gets lost in all the texts and that,
Speaker:would help if we didn't text each other like 157 times a day.
Speaker:I think it's actually 158, but yes.
Speaker:Yeah, yeah.
Speaker:So now I'm like, dude, I need the questions.
Speaker:And you, what did you give you?
Speaker:Like structure, gimme structure.
Speaker:Gimme a document
Speaker:Yes.
Speaker:to write it in.
Speaker:Because I'm so good at structure.
Speaker:knows, anybody that knows anything about me, knows structure.
Speaker:Well, and literally all you had to do was create a blank document in Google
Speaker:Docs and just add and share it with me.
Speaker:That's all you had to do.
Speaker:You didn't have to put any content, nothing.
Speaker:It took, it took so long to do that.
Speaker:Persona was so long, so much effort.
Speaker:Oh, Curtis,
Speaker:Anyway,
Speaker:but, but here's what, here's what.
Speaker:But, but wait.
Speaker:But before we go on, so I think one of the problems you're gonna find though, is.
Speaker:Like, you know, like in my conversations when I ask a question,
Speaker:then a follow up, then another follow up, then another follow up.
Speaker:It's like I don't always have everything up front, so I think
Speaker:the document might turn into that.
Speaker:So you might need to comment and respond or chat live about the co. The questions.
Speaker:So then we can get to the next level of questions.
Speaker:Google Meet.
Speaker:Is that what you want me to
Speaker:No, I'm just saying use it over the phone call and we'll have to
Speaker:go over the questions because it might spawn additional questions.
Speaker:Spawn.
Speaker:Spawn.
Speaker:That is that.
Speaker:a movie.
Speaker:Did you ever see that spawn?
Speaker:I did not see the movie.
Speaker:It was a graphic novel and then turned into a movie.
Speaker:I literally don't remember anything about the movie other
Speaker:than that there was a creature.
Speaker:it's also what they do in video games when like you spawn somewhere, like you come
Speaker:Yeah.
Speaker:You
Speaker:to.
Speaker:Yeah.
Speaker:Yeah.
Speaker:So this week we're gonna talk about something that comes up a
Speaker:lot, and there are some people.
Speaker:You know, there's a term that comes up a lot called rogue admin,
Speaker:which is a sort of a subset of this topic that we're gonna talk about.
Speaker:And there's some people that think that that's a boogeyman
Speaker:and that doesn't really exist.
Speaker:What we're talking about is insider threats.
Speaker:What, uh, and I think it's something that people should be concerned with.
Speaker:Do, do you agree?
Speaker:Oh yeah, a hundred percent.
Speaker:And I think the big thing with the insider threat, like these
Speaker:are people you are trusting to do something for your company, right?
Speaker:You've hired them, right?
Speaker:They have a job, they have a responsibility.
Speaker:Maybe they're managing your IT infrastructure or your application,
Speaker:but at a flip of a switch, they could do something that exposes
Speaker:your company and could potentially cause it irreparable financial harm.
Speaker:Yeah.
Speaker:Either, either accidentally or.
Speaker:I was about to say on purposely, intentionally, either
Speaker:accidentally or intentionally.
Speaker:Yeah, and, and it actually, since you did talk about the accidentally
Speaker:or intentionally, I think it, one thing that we, before this call you
Speaker:were talking about is sort of like the three types of insider threats
Speaker:Yeah,
Speaker:that exist.
Speaker:Do you want to kind of go over those?
Speaker:yeah.
Speaker:So there are, there are three types of insider threats.
Speaker:One is like the active, actual person that is, um, actually.
Speaker:Looking to do harm to your organization.
Speaker:Right?
Speaker:then the second is the,
Speaker:you know, the, the, the careless person or you know, the person that isn't
Speaker:following policy or isn't concerned about security and they do things that
Speaker:cre that could create the third type of insider threat, which is technically
Speaker:not an insider, but it's an insider.
Speaker:has been compromised
Speaker:Yeah.
Speaker:they downloaded the wrong piece of software.
Speaker:They put their, uh, password on a sticky note, you know, they got on a Zoom call
Speaker:and the sticky note is in the background.
Speaker:Yeah.
Speaker:Um, you know, all, all that sort of stuff.
Speaker:are sort of the,
Speaker:Yeah.
Speaker:types that we'll talk about,
Speaker:Yeah.
Speaker:And, and, and just quickly on that too, I know a lot of times when, or
Speaker:when I mentioned it too, right, it's insider, we normally think about, oh,
Speaker:it's an employee of the company, but remember it might be a partner, it might
Speaker:be a service provider you're using.
Speaker:It might be a contractor.
Speaker:Right.
Speaker:It might not even be someone in tech.
Speaker:I think when most people think about the insider threat, they think about the first
Speaker:category, which is an actual insider.
Speaker:And, and it could be an employee, a partner, uh, a contractor,
Speaker:but someone that you have given access to your company.
Speaker:Right?
Speaker:And I do think that, uh, there, there was a, a lecture I, I saw one day.
Speaker:was actually about the merger of Cray and SGI,
Speaker:Mm-hmm.
Speaker:um, and the, the person was the cybersecurity person and he was
Speaker:describing the cybersecurity.
Speaker:Um, what would you call it?
Speaker:The, the mo of each organization.
Speaker:And he described one and I honestly, to this day, I don't remember which one was,
Speaker:which one he described as a hard crunchy interior with a soft, gooey exterior.
Speaker:And the other was a hard crunchy exterior with a soft chewy interior.
Speaker:And I think most companies are the latter.
Speaker:They have,
Speaker:Perimeter defenses.
Speaker:Perimeter defenses, but once you're inside, that's it.
Speaker:And all
Speaker:No.
Speaker:off.
Speaker:Right?
Speaker:So.
Speaker:can think of one company that I worked with that was the former,
Speaker:and it was because the type of data that they had was so sensitive.
Speaker:They were, they were very concerned about insider threats and so.
Speaker:It wasn't assumed that once you were in, you were okay.
Speaker:You needed to, you needed specific access to access different
Speaker:resources, not just from a
Speaker:you know, and, and, and like that, but also like, like where
Speaker:you were and what you were doing.
Speaker:Uh, only then would you, would
Speaker:Was this, was this the same company that basically did not
Speaker:let you do backups because backups needed to touch everything in the
Speaker:environment and they were like, Nope.
Speaker:Okay.
Speaker:Yeah.
Speaker:Well, well, I, I think that's a slight mischaracterization of that company.
Speaker:There, there was a group that didn't want to give me access to
Speaker:everything, and, and somebody had to like, Hey, hey, hey, Curtis is
Speaker:doing the thing Leave Curtis alone.
Speaker:We'll figure it out when the project is done.
Speaker:Once, once everything has access to everything, then we'll figure
Speaker:out how to sort of lock it down.
Speaker:Yeah,
Speaker:Um, but Curtis has a big enough project enough to do.
Speaker:I worked on that project 95 hours a week
Speaker:yeah.
Speaker:close to a year.
Speaker:Yeah.
Speaker:and so I, and it was so difficult that it was actually local here,
Speaker:uh, but it was like 45 minutes away.
Speaker:company got me a corporate apartment nearby.
Speaker:Um, so that I could get four hours
Speaker:I'm asleep.
Speaker:Um,
Speaker:So
Speaker:yeah.
Speaker:on this topic though, right, of the sort of the malicious insider.
Speaker:Right.
Speaker:Um, one, I don't know if you remember this case Curtis, but there was the
Speaker:scenario, actually there are two that I'm thinking of and I don't know
Speaker:if one of 'em kind of bleeds over.
Speaker:There's, remember there was a company called Unify, which
Speaker:I use their networking gear.
Speaker:Yeah.
Speaker:And they're a publicly listed networking company, and they had a whistleblower
Speaker:who came up and said, Hey, by the way, this company got attacked and
Speaker:all these credentials got leaked.
Speaker:And it turns out he was actually an employee who had stolen the
Speaker:credentials of the company and had faked the entire attack.
Speaker:Yes, I do remember that story.
Speaker:Yeah.
Speaker:right.
Speaker:And the only way they were able to prove it was him was because they went and they
Speaker:looked back at all the data and they were like, yeah, this is actually his data.
Speaker:And I think he had set up like VPNs to download the data and turns out that,
Speaker:And
Speaker:uh,
Speaker:yeah, they, they correlated like his VPN login to the attack
Speaker:yeah.
Speaker:of that.
Speaker:I do, I do remember
Speaker:Yeah.
Speaker:Yeah.
Speaker:And that is a true, like, number one insider threat.
Speaker:Yeah.
Speaker:I think of another.
Speaker:Probably the most, the most infamous one that I can think of, and I
Speaker:believe the name was Roger Durio.
Speaker:Uh, I I, I, I
Speaker:FBI Agent.
Speaker:wrong.
Speaker:No, no.
Speaker:He was, he was a guy that he didn't like his bonus or he got
Speaker:let go or something like that.
Speaker:And so he, to find the story, you Googled logic
Speaker:Agent.
Speaker:Oh.
Speaker:that they used.
Speaker:He, he basically set off a logic bomb is what they called it, which basically
Speaker:deleted everything, And, which included like, you know, some of the backups and
Speaker:Oh,
Speaker:And, uh.
Speaker:like, if like his access or his username didn't exist or something like that.
Speaker:Right.
Speaker:Yeah.
Speaker:Yeah.
Speaker:it just blew up the whole place.
Speaker:Yeah.
Speaker:was the first really big one that I remember.
Speaker:He was caught, he was prosecuted.
Speaker:Um, but I, I think a lot of these are not caught.
Speaker:They're not prosecuted.
Speaker:Yeah.
Speaker:And when we think about this type of insider threat, like some people
Speaker:might just throw their hands up and go, well, what am I supposed to do?
Speaker:They're inside.
Speaker:What, what can somebody do to, to stop this type of insider threat?
Speaker:And this is like a lot of what we talk about, right?
Speaker:It's like, okay, do you at least have the logging and monitoring in place
Speaker:to be able to capture some of these?
Speaker:And are you using, uh, proactive security tools to actually flag for anomalies?
Speaker:Like, Hey, this person is accessing resources, they normally don't, or this
Speaker:person is downloading 20 gig files.
Speaker:Is that normal?
Speaker:From a security perspective.
Speaker:Right.
Speaker:And then I think from a backup perspective, I'm sure you
Speaker:have some ideas around this
Speaker:Well, I was gonna add to the security perspective.
Speaker:This is why we talk about the concept of leased privilege, because the idea
Speaker:is just give the person, each person.
Speaker:The power that they need to do their job, but only their job.
Speaker:it, it's probably the hardest part about proactive cybersecurity, right?
Speaker:Because it's so much easier to just give like you and me all power.
Speaker:Right?
Speaker:Uh, you, you've got root everywhere.
Speaker:Um, and
Speaker:I, another, another good story, and this is another local
Speaker:company, happens to be a clothing.
Speaker:Uh, company and I remember being sent there to install.
Speaker:I'm pretty sure it was NetBackup.
Speaker:I was there to install NetBackup and the guy walks in and he goes, he's like
Speaker:the password for all of those servers.
Speaker:It's Elvis.
Speaker:And the password for all these servers is Apollo.
Speaker:See you later.
Speaker:And he just left.
Speaker:Right.
Speaker:It was the root password right.
Speaker:That he was giving me.
Speaker:And then I'm, and so, and, and he just handed me the keys to
Speaker:the kingdom with no monitoring.
Speaker:No.
Speaker:And I'm lugging in directly as root because I'm at the
Speaker:console, so I can do that.
Speaker:and then at some point some other guy walked in and was.
Speaker:Who are you?
Speaker:Like he sees me sitting there at the server with a root prompt.
Speaker:like, who are you?
Speaker:I'm like, I'm the guy doing the thing.
Speaker:He's like, is nobody watching you?
Speaker:Is nobody, what are you?
Speaker:he like, ran out and it was like a whole thing.
Speaker:But, um, yeah.
Speaker:So that, that's.
Speaker:That's, that's what not to
Speaker:Yeah.
Speaker:the way, that's another thing that's important to do with the, with the
Speaker:concept of least privilege, right?
Speaker:Is you, you never log in as root as administrator.
Speaker:You log in and you become that and that way, and you establish, you
Speaker:can establish that both through policy and through technology.
Speaker:You can say it's just sometimes it's difficult to, to completely
Speaker:eliminate it, but you can say it's, you can only log in as root or
Speaker:administrator on the console, for
Speaker:Yeah.
Speaker:Um.
Speaker:You should never be logging in as root or administrator, uh, you
Speaker:know, directly you should be, uh, you know, suing to it or pseudo.
Speaker:And even then, you should be like, especially in Lennox and
Speaker:Unix, you should be using pseudo whenever possible to do the thing.
Speaker:Yeah.
Speaker:run pseudo sh
Speaker:Yep, exactly.
Speaker:prompt and then you do the thing and then you get out.
Speaker:You should, the best practice would be to, again, you can establish this through.
Speaker:Policy, as you can say, when you're doing things that require root, do this.
Speaker:Yeah.
Speaker:Um, and, and, and you should try to limit the number of things that require root,
Speaker:Yeah,
Speaker:Um, yeah.
Speaker:so one thing to also mention, I know with this topic we're discussing mainly around
Speaker:like people accessing infrastructure, deleting infrastructure, but as part
Speaker:of insider threat, you also have to think about people exfiltrating data.
Speaker:Yes,
Speaker:And that's one thing.
Speaker:So I think just earlier this week, uh, I read an article where Apple was suing a
Speaker:former employee who had worked on Division Pro classes and had left and joined Snap
Speaker:mm.
Speaker:and basically before he had left.
Speaker:Sorry, I just, I just came to me.
Speaker:Either Snap or Metas glasses.
Speaker:I don't know, one of those similar sort of companies.
Speaker:And before he left, he basically didn't say where he's going.
Speaker:He gave two weeks notice and then he started downloading a bunch of documents
Speaker:onto USB drives and walking out with it.
Speaker:And so Apple sued to basically say, you stole our ip.
Speaker:Which is critical, right?
Speaker:When you're trying to be competitive,
Speaker:yeah,
Speaker:right?
Speaker:And so that's another thing to also think about from, uh, insider threat,
Speaker:is it's also the exfiltration.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And again, that's why you monitor things.
Speaker:That's why you, you know, and, and when you have something like
Speaker:that where you have an employee or contractor that leaves, uh, you
Speaker:should have an offboarding process.
Speaker:That includes looking at their accounts, looking at their hardware that they
Speaker:have, uh, and then doing forensic.
Speaker:Uh, especially anybody that you think that you in any way suspect, right?
Speaker:Yeah.
Speaker:pharyngeal, pharyngeal.
Speaker:We could do digital forensics against that laptop or any other device.
Speaker:And you, you, you would be amazed at the kinds of things that you
Speaker:can uncover by having a, you know, a, a, a digital forensics, uh,
Speaker:Yeah,
Speaker:process.
Speaker:and it, but it was interesting though because I was reading the article
Speaker:and they were saying whatever the guy did, and whatever Apple's policies
Speaker:are, they're like, we couldn't fully determine what he actually stole
Speaker:Yeah.
Speaker:because he had sort of covered his tracks.
Speaker:Yeah.
Speaker:from a backup perspective, really it's, the big thing is, is, is applying to,
Speaker:you know, two things come to mind.
Speaker:One is applying the concept of least privilege to the backups.
Speaker:And, and, and I think we, I think we talked about this in the past.
Speaker:We, we could have a whole other, we should have a whole other
Speaker:episode about how to do that.
Speaker:Um, and, and then the other thing that comes to mind is, again.
Speaker:Immutable, immutable, immutable, immutable that no matter how much power someone has,
Speaker:they shouldn't be able to prematurely.
Speaker:You're struggling with words today, Curtis?
Speaker:They shouldn't be able to prematurely.
Speaker:That's weird.
Speaker:I don't know why that's so, it's a struggle today.
Speaker:Delete backups prior to their, uh, expiration date um, um.
Speaker:And so that's what, that's where true immutability comes into play.
Speaker:Um, so let's talk about the,
Speaker:you, you forgot you, you forgot one, which I'm quite surprised.
Speaker:what the 3, 2, 1 rule.
Speaker:No.
Speaker:Oh,
Speaker:Four eyes.
Speaker:Oh yeah.
Speaker:The,
Speaker:Yeah.
Speaker:well, that falls under the, basically the whole lease privilege thing.
Speaker:But, but yeah.
Speaker:Another thing you could do with backups is the, the, this thing called four eyes
Speaker:or, uh, MPA multi person authentication.
Speaker:And that's where if you're doing these things, which are dangerous
Speaker:things like reducing the retention on backups, deleting policy configurations.
Speaker:maybe prematurely expiring backups.
Speaker:Right?
Speaker:Whatever it is.
Speaker:If you're doing any of these things, it requires a second person authentication,
Speaker:um, and often referred to as for eyes.
Speaker:Yep.
Speaker:Yeah.
Speaker:Good point.
Speaker:So let's talk about the, let's talk about the second person.
Speaker:And this, this is the,
Speaker:Second or,
Speaker:the second type of insider
Speaker:Thank you.
Speaker:which is this, this, um.
Speaker:Um, lackadaisical, lazy, a person who just doesn't care.
Speaker:Or maybe let's just face it, maybe they're just dumb.
Speaker:Maybe they just, they shouldn't be in it.
Speaker:Um, or that they shouldn't have privileges that can do damage.
Speaker:Right.
Speaker:And we've talked about, this is where the thing that comes to
Speaker:mind here is like, know before.
Speaker:Mm-hmm.
Speaker:The, this idea of, of a company that you use test the cyber
Speaker:intelligence of your team.
Speaker:Right.
Speaker:And, and I'm a big fan of that.
Speaker:I, I don't wanna necessarily endorse know before, I don't, I'm sure they
Speaker:have competitors, but they're, they're, they're, they're the ones that I,
Speaker:that, that I know of, the, the most, we used them, uh, at a previous employer.
Speaker:And, um, I do want to make the point.
Speaker:Though that if you identify someone who, um, is not doing the right things, it's
Speaker:not about publicly shaming that person.
Speaker:Right.
Speaker:It's about, um, identifying the weakness doing education.
Speaker:Now, if you identify the weakness, you do the education and then
Speaker:nothing sticks.
Speaker:Um, at some point you, I don't think you should be considering
Speaker:punitive things, right?
Speaker:Having said that, at some point, if a person repeatedly drinks acid.
Speaker:Perhaps they shouldn't be in the department that produces acid.
Speaker:Yeah,
Speaker:it's like the risk profile, right?
Speaker:Yeah.
Speaker:The risk profile.
Speaker:If, if they're, if they're, if they continue to show being a high risk person,
Speaker:which is what things like no before do, um, then perhaps it's, it's time to
Speaker:move them to a less secure, uh, role.
Speaker:Yeah, I agree with that and I think.
Speaker:That's something that's probably easy for many companies to
Speaker:onboard, like most companies have.
Speaker:Like, Hey, here's your standard cybersecurity policy training.
Speaker:You should be doing this like once a year and refresh based basically once a year.
Speaker:Right.
Speaker:That way everyone sort of has like a bare minimum,
Speaker:Yeah.
Speaker:right?
Speaker:Because
Speaker:do believe in, I believe in very frequent.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Rather than one giant training once a year, I believe in like monthly or
Speaker:quarterly, smaller amounts of training.
Speaker:Because what you're really trying to do is you're really trying to keep it forefront,
Speaker:Yeah.
Speaker:to keep that in mind of like, listen, you have power, you
Speaker:have abilities to do things.
Speaker:We're not concerned so much about you, but about someone who might become you.
Speaker:Yeah.
Speaker:Um, and do bad things,
Speaker:And also the testing, like I like with no before, right?
Speaker:It sends out fake emails.
Speaker:Yeah.
Speaker:That gets you to try to click and try to phish users and then they're
Speaker:like, Hey, you did something wrong.
Speaker:Let's go do some additional training to help you understand
Speaker:what you should be doing.
Speaker:Yeah.
Speaker:And I do believe in some type of reward to people who identify the
Speaker:fake emails and then, uh, report them.
Speaker:Yeah.
Speaker:Right.
Speaker:Um, I, I, I, I'm a much bigger fan of the carrot over the stick,
Speaker:Yeah.
Speaker:Um, and I think I do, I do remember this was somebody that
Speaker:came on the pod where they, um.
Speaker:They said that the company had sent out
Speaker:Flowers
Speaker:that it, the flowers, yeah.
Speaker:On's
Speaker:on Valentine's Day that the flowers were delivered or at the front desk
Speaker:Click
Speaker:the person?
Speaker:Yeah.
Speaker:And then I think they had said that.
Speaker:I think it was a woman who received flowers and she like blew it off
Speaker:because she's like, my husband won't send me flowers or something like that.
Speaker:Right?
Speaker:Yeah.
Speaker:Oh, it, it was the person was a cyber person
Speaker:yeah,
Speaker:the, the hus, the wife was somewhat knowledgeable
Speaker:yeah.
Speaker:cyber stuff, and she's like, my husband would never send me flowers.
Speaker:I remember this, I remember saying that a few minutes.
Speaker:Everybody thought that they were loved.
Speaker:Yep.
Speaker:That, that was a little cruel, I think.
Speaker:But, but I, but I like this idea of constantly testing it, you know, and
Speaker:stuff and using the carrot and, and, and, and not to stick, but, um, and so
Speaker:the, the, the third category is really.
Speaker:The first category, it's just that, and basically how to respond to
Speaker:it is, is kind of mostly the same.
Speaker:And that the third category being you now have an insider
Speaker:that is, that isn't an insider.
Speaker:have someone who has used some of the techniques like phishing, uh, social
Speaker:engineering, uh, by the way, social engineering, my favorite reference.
Speaker:And so again, go watch sneakers please, if you
Speaker:Yep.
Speaker:sneakers.
Speaker:I love that movie first off.
Speaker:It's just a good time and it's got so many stars in there.
Speaker:Yeah.
Speaker:And although there's some tech that's like, okay, come on.
Speaker:You know, like the magic box that can unencrypt everything.
Speaker:Sure, we'll let that go.
Speaker:But there's the, the scenes that they do there on social engineering.
Speaker:And I'm thinking about.
Speaker:Scene with, uh, Robert Redford, where he's got like a, it's supposed to be
Speaker:like a box of cake and like balloons, and he's supposed to be let in.
Speaker:Uh, he's like, oh,
Speaker:Oh, yeah,
Speaker:yeah, I can't do his thing.
Speaker:I can't reach my badge.
Speaker:Can you, can he buzz me in?
Speaker:And the guy buzzes him
Speaker:yeah,
Speaker:right.
Speaker:doesn't hurt that he looks like Robert Redford, but.
Speaker:yeah.
Speaker:But again, remember, I know a guy
Speaker:Yep.
Speaker:does physical penetration testing and he said he has never not gotten into a
Speaker:place, his job is to get into a place that he's not supposed to get into.
Speaker:Take a photo and then get the hell out before he gets shot, literally.
Speaker:Okay?
Speaker:And uh, and he said he is always, he's always gotten in.
Speaker:Yep.
Speaker:engineering is an incredibly powerful thing, right?
Speaker:Uh, people want to be nice, they wanna be helpful, you
Speaker:Yeah, so there's an article I recently read in the news about
Speaker:this third type of insider threat.
Speaker:So Coinbase, uh, I don't know if you know, they had a data breach recently
Speaker:Mm-hmm.
Speaker:and it turns, and I don't remember how many tens of thousands
Speaker:of account data got leaked.
Speaker:It turns out that what had happened is bad actors had bribed a contracting firm
Speaker:in India who Coinbase outsources to.
Speaker:And that Indian contracting firm basically handed over,
Speaker:Wow.
Speaker:account information from Coinbase to these bad actors?
Speaker:So I'm not allowed to make any Indian jokes.
Speaker:Right.
Speaker:No,
Speaker:it doesn't have to be Indian.
Speaker:It could be any, it could be a contractor anywhere.
Speaker:Right.
Speaker:But everyone's always open to a certain value, right.
Speaker:everyone.
Speaker:Yeah, everyone
Speaker:As a price.
Speaker:everyone has a price.
Speaker:Yeah.
Speaker:Um, and, um, the.
Speaker:I, I do, I do think that, again, not, not against India, but there
Speaker:are a number of countries, India, Philippines, um, not sure where else
Speaker:people do this kind of thing, but what's happening is there, there's an economic
Speaker:disparity between us and this other country, and that's why we're there.
Speaker:Right.
Speaker:And I just think you should take that into consideration when you're thinking.
Speaker:About, again, going back to lease privilege, give them the ability
Speaker:to do what they need to do, but realize that there is an economic
Speaker:disparity, which would, I think make them, when I say easier to
Speaker:bribe, it's not, it's not that they.
Speaker:they're personally easier
Speaker:Yeah.
Speaker:It's the amount of money, like if I offer them a million bucks, that's a lot more.
Speaker:Yeah.
Speaker:I, I, I don't even have to offer a million bucks.
Speaker:I can offer 'em a hundred thousand and it means so much more to
Speaker:Yeah,
Speaker:than, um, you know, whatever.
Speaker:try and do it.
Speaker:Yeah.
Speaker:it's something that you should take into account,
Speaker:Yeah, and this is where I think it's important to vet your contractors,
Speaker:your third parties, right, even on an ongoing basis to make sure,
Speaker:do they have policies in place?
Speaker:Are they also doing the same sort of monitoring and auditing that you do to
Speaker:be able to catch these sort of things because you are giving them access to your
Speaker:systems and your customer data, right?
Speaker:So.
Speaker:There's also, uh, there's the famous target story as well, um, where Target
Speaker:was, um, breached because of a device.
Speaker:That was connected to their air conditioning system.
Speaker:That's what, that's what I remember.
Speaker:And, and it basically, it was traced back to poor cybersecurity
Speaker:practices on the part of
Speaker:The um, air, the HVAC system.
Speaker:Yeah.
Speaker:Um, so you're, you're, you're always, you're only as strong as your weakest
Speaker:link and your links everywhere.
Speaker:You're, you're always, you're only as
Speaker:strong as your weakest link.
Speaker:One of your links includes
Speaker:every one of your suppliers.
Speaker:remember we talked to someone who was doing penetration testing.
Speaker:They needed to break into a company.
Speaker:They tried going through their networks, they couldn't get in, and then they
Speaker:ended up realizing in their lobby they had a TV of a certain brand, so they
Speaker:went and bought it from the local store, and then they found a vulnerability
Speaker:on it, and then they basically got into the company through their tv.
Speaker:yeah, that was Dwayne Lalo.
Speaker:And that was a great, I, I loved his story.
Speaker:I loved, uh, we should link to that whole episode here.
Speaker:That like if you haven't seen or listened to that episode, you really should.
Speaker:And one of my favorite parts that he go, that he goes into there is
Speaker:how much he loves the backup system from a red teaming perspective.
Speaker:Right?
Speaker:Again, red teaming is the, the sort of proactive.
Speaker:or proactively attacking a company for the purposes of looking
Speaker:for vulnerabilities, right.
Speaker:Yeah.
Speaker:opposed to the blue team, which is the defense team,
Speaker:Yep.
Speaker:uh, which is our, our friend Mike Saylor.
Speaker:Yep.
Speaker:So, um, yeah, we need to have Dwayne back on.
Speaker:I'm sure he is, got more stories,
Speaker:Oh yeah.
Speaker:yeah, so again.
Speaker:The, the, the second group of the, the, the, you know, the lame people
Speaker:creates the third group, which essentially becomes the first group,
Speaker:Yep.
Speaker:right?
Speaker:And so this is why, again, going back, this is why that yes,
Speaker:you need to do all the things.
Speaker:You need to do the monitoring, but you also need to do.
Speaker:concept of leach privilege and, uh, just limiting what an individual person can do.
Speaker:Right.
Speaker:And, um, you know, the HVAC controller be able to send controls reports of
Speaker:how cold it is, and that's it, it shouldn't be able to log to a server.
Speaker:Yeah.
Speaker:that's a, you know, that's exact exactly the kind of
Speaker:thing we're talking about here.
Speaker:Limiting.
Speaker:And, and you know, our former employer was really good at that with, with,
Speaker:you know, the cloud design, where it's like the, their S3 buckets could
Speaker:only be talked to by the systems that, you know, did the backups.
Speaker:Right?
Speaker:Yeah.
Speaker:even though it's S3, and technically you can get to that from anywhere, but
Speaker:they had configured it so that only their systems could write to it, right?
Speaker:Yeah.
Speaker:um, so even if.
Speaker:The, the, the, uh, what would you call it?
Speaker:The, the credentials to access that S3 account got compromised.
Speaker:You wouldn't actually be able to get to them, right.
Speaker:To get to it.
Speaker:the kind of thing that we're talking about is locking down as much as you can.
Speaker:Again, it's so hard,
Speaker:Yep.
Speaker:right?
Speaker:The, the responding to the insider threat is probably the biggest.
Speaker:Challenge that you have.
Speaker:Right.
Speaker:And uh, and I do just want to throw out a couple of stats here.
Speaker:Uh, there was this, uh, great report from gul I, I don't know how to pronounce that.
Speaker:G-U-R-U-C-U l.com.
Speaker:They had their 2024 insider threat, which by the way, it gave us the whole.
Speaker:Idea to do this episode, and they showed that in 2024, uh, so in 2023, only 40, I'm
Speaker:sorry, 40% of people companies responding, said that they had no insider uh, attacks.
Speaker:Right.
Speaker:Um,
Speaker:That they knew of.
Speaker:number that they knew of.
Speaker:Yeah.
Speaker:That number in 2024 went down to 17%.
Speaker:Yeah.
Speaker:so basically 83%.
Speaker:Felt that they had had some kind of insider attack.
Speaker:Yeah.
Speaker:Um, they also described, uh, that the insider attacks are more
Speaker:difficult to respond to, right?
Speaker:They're more costly, they're more, they take more time.
Speaker:Um, and, um, according to this, uh, another interesting, so basically they
Speaker:said 45% felt that it took a week or longer to recover from an insider attack.
Speaker:Uh, I thought that was, um,
Speaker:you,
Speaker:know.
Speaker:They said 55% within one day, and I'm like, really?
Speaker:so I know on the podcast we talk a lot about natural disasters and ransomware.
Speaker:And ransomware recovery, right.
Speaker:Would you say that insider threats are.
Speaker:Sort of like the next, not necessarily the next wave, but like the things that
Speaker:are kind of like important, but people aren't necessarily thinking about or
Speaker:don't have a full plan in place because it's much harder to, like you said, to
Speaker:protect against, than say like ransomware attacks or other things where there
Speaker:are like certain best practices that people have and just it hasn't matured
Speaker:in the insider threat side of things.
Speaker:Well, I think that there, there's like a Venn diagram between malware
Speaker:attacks and insider threats.
Speaker:Right?
Speaker:And, and, and it's, it's not a circle, but it, there's a, there's a huge, like 80% I
Speaker:Mm-hmm.
Speaker:um, what's, what's
Speaker:Overlap.
Speaker:and, um.
Speaker:And a lot of the things that we're doing to be able to detect and respond to
Speaker:ransomware attacks will also be able to detect and respond to an insider threat.
Speaker:But I do think that more people need to specifically be doing design,
Speaker:looking at design considerations that would help mitigate.
Speaker:Specifically a rant, uh, an insider attack.
Speaker:Right?
Speaker:So much of this, so much of everything in the cyber world, it's like,
Speaker:it's, well, it's just like backups.
Speaker:Backups are no good if you didn't make 'em before you need 'em, right?
Speaker:Cyber defense is no good unless you do it before you need it.
Speaker:Yeah.
Speaker:if you do this beforehand, it makes the attack much less likely, and it
Speaker:also makes the attack less damaging.
Speaker:You,
Speaker:Yeah.
Speaker:you minimize the.
Speaker:Um, uh, the,
Speaker:Last radius.
Speaker:Yeah,
Speaker:I was also thinking some of the conversations we'd had with Mike, right?
Speaker:It's like maybe you should be considering insider threat as part of
Speaker:your tabletop exercises and walking through that as, and not just focused
Speaker:on sort of like the ransomware side of things or other things like that.
Speaker:absolutely.
Speaker:Insider threat.
Speaker:The,
Speaker:I
Speaker:no, no.
Speaker:was gonna
Speaker:the silent killer.
Speaker:Silent but deadly.
Speaker:Wait,
Speaker:Yeah.
Speaker:else.
Speaker:Um, no, I, I definitely think more, given that a significant portion
Speaker:of, of cyber attacks are from an insider threat, I believe that that
Speaker:particular report gave 83% as a stat.
Speaker:It, it's, it's, I, I don't think enough attention is paid
Speaker:to the insider threat concern.
Speaker:Yep.
Speaker:And just going back to sort of that Apple example, right.
Speaker:There is intellectual property claims which might be worth billions of
Speaker:dollars at that are at stake, right?
Speaker:If you don't handle the insider threat,
Speaker:Yeah, by the way, another movie that really gets into the concept of an
Speaker:insider threat in social engineering is a somewhat maligned movie called Takedown
Speaker:From 2000, it started Skeet Ulrich.
Speaker:And it's the, it's the somewhat fictionalized story of Kevin Mitnick who
Speaker:is, uh, you know, he was a black hat.
Speaker:You know what we used to call a, you know, a black hat hacker that, um, that
Speaker:got was, he was num, FBI's most wanted
Speaker:Hmm.
Speaker:He got prosecuted and he turned, he turned good guy towards the end.
Speaker:Um, he, he, he's, I should mention not everybody in the
Speaker:cyber world was a fan of Kevin.
Speaker:He, he's no longer with us, but I, I, he had some issues with like, allegedly like
Speaker:taking credit for other people's work,
Speaker:Yeah.
Speaker:But.
Speaker:The, it's another movie that you can watch and get some stuff.
Speaker:And one of the things that I happen in there, by the way, the, the, um, the,
Speaker:the real thing happened against Deck,
Speaker:Hmm.
Speaker:Um, digital Equipment
Speaker:Yeah.
Speaker:And in the movie, I believe they refer to them as Binary Equipment Corporation
Speaker:is sort of like in, uh, what's the movie?
Speaker:What's the show?
Speaker:Best robot.
Speaker:Evil core.
Speaker:Robot, they talk about,
Speaker:Evil core.
Speaker:I.
Speaker:They call it Steel Mountain instead
Speaker:Oh yeah.
Speaker:Yep.
Speaker:Steel Mountain.
Speaker:Mountain.
Speaker:Yep.
Speaker:Um, yeah, so, so one of the things is, one of the things that he did was
Speaker:um.
Speaker:He called in to a person and said, Hey, uh, you do you guys
Speaker:have the, the patch of, has the guy been by to put on the patch?
Speaker:And they're like, no.
Speaker:And he goes, oh man, that it's really important.
Speaker:We gotta put in this patch.
Speaker:I'm gonna send my guy right away.
Speaker:And he sends this guy, his guy is there not to put in a patch,
Speaker:but to put in the malware, right?
Speaker:So it was like a, it was like a two-tiered social engineering attack.
Speaker:And, um, and then, you know, and then basically his right hand man gets in
Speaker:there and puts in the back door that they then use to attack the company.
Speaker:Uh, you know, this is the problem.
Speaker:You know, we gotta get rid of all the people, dude.
Speaker:It's ai.
Speaker:People are the problems.
Speaker:ai, uh, and,
Speaker:To our listeners, we are not trying to replace you and say
Speaker:you do not have a job anymore.
Speaker:Please continue to listen and support this podcast.
Speaker:If you like this, please go to your favorite podcast
Speaker:catcher and like subscribe.
Speaker:Leave us a comment.
Speaker:We love it.
Speaker:You can catch us, watch our videos, and see our lovely faces on YouTube
Speaker:under the backup wrap up channel.
Speaker:We got one comment that said we looked homeless.
Speaker:I'm like, really?
Speaker:And then he, and then he said like, you know, I was just joking, like, ah, okay.
Speaker:It's, it's a couple of bearded guys, back when, back when you had your longer
Speaker:Yeah,
Speaker:One of us looked a little homeless, I'm just saying.
Speaker:Anyway.
Speaker:All right.
Speaker:Well that's good.
Speaker:That's that Thus end of the lesson on the insider threat episode,
Speaker:that's another movie reference.
Speaker:So that's a reference to the Untouchables,
Speaker:Hmm
Speaker:is the movie with Elliot, with Kevin Costner playing Elliot
Speaker:Ness, taking down Al Capone,
Speaker:hmm.
Speaker:by Robert De Niro.
Speaker:Anyway, thus send it the lesson.
Speaker:Anyway, um, thanks as always.
Speaker:Any time, I guess.
Speaker:documents, get to my, get
Speaker:I'll get you questions.
Speaker:I'll add questions with more questions.
Speaker:How about that?
Speaker:Of course, of course, of
Speaker:Yes,
Speaker:course, of course, of course.
Speaker:And thank you to you listeners, if you're still with us.
Speaker:Thank you.
Speaker:And uh, that is a wrap.
Speaker:The backup wrap up is written, recorded, and produced by me w Curtis Preston.
Speaker:If you need backup or Dr. Consulting content generation or expert witness
Speaker:work, check out backup central.com.
Speaker:You can also find links from my O'Reilly Books on the same website.
Speaker:Remember, this is an independent podcast and any opinions that
Speaker:you hear are those of the speaker and not necessarily an employer.
Speaker:Thanks for listening.