Insider Threats and the Power of Least Privilege Access

Insider threats represent one of the most dangerous cybersecurity risks facing organizations today - and they're way more common than you think. In this episode of The Backup Wrap-up, we explore the three main types of insider threats: compromised employees who get extorted or have their credentials stolen, disgruntled workers who want revenge after getting fired, and outside attackers who infiltrate your company to become malicious insiders. We break down real-world scenarios and discuss how to protect against them using least privilege principles, monitoring systems, and immutable backups. You'll learn why 31% of insider threat incidents could have been prevented if someone had spoken up, and why immutable backups are your last line of defense when an insider goes rogue. This is a must-listen for anyone responsible for data protection and cybersecurity.
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we explore insider threats using the penultimate
Speaker:episode of Mr. Robot season one.
Speaker:Where you talk about Angela getting compromised through extortion.
Speaker:We talk about Tyrell getting fired and potentially going rogue, and also
Speaker:Elliot, who basically infiltrated say from day one, the insider threat
Speaker:is real and it's one of the biggest reasons that you need immutable backups.
Speaker:We break down the the three types of insider threats that
Speaker:you need to be worried about.
Speaker:And we talked about how to protect yourself from each type.
Speaker:I hope you enjoy the episode.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr. Backup,
Speaker:and I've been passionate about backup and recovery for over 30 years, ever since.
Speaker:I had to tell my boss that there were no backups of the production
Speaker:database that we had just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Okay.
Speaker:welcome to the show.
Speaker:Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy
Speaker:who I am 100% sure is not going to join me on my latest hobby persona.
Speaker:Molly, how's it going?
Speaker:Ana?
Speaker:I am doing well, Curtis, I, so let's explain to the listeners
Speaker:and viewers what your latest hobby is, if they are not aware of it.
Speaker:well, before I explain it, I'll just say that my daughter's reaction when
Speaker:she heard what I was up to was, that's totally an old man thing to do, and that
Speaker:is so, so the, it, it's a tack on hobby.
Speaker:So I've been, I've been.
Speaker:Diligently walking for two miles every morning.
Speaker:I've been doing that, you know, basically it's the first thing I do when I get up.
Speaker:And then what I, what happened was I started seeing that, um, there was
Speaker:just too much, uh, litter in my area.
Speaker:Uh, and, and, and you know what I have to say, after having driven
Speaker:around and seeing other parts of San Diego, this area is not bad.
Speaker:So if I was in other parts of San Diego, this, this whole thing would be pointless,
Speaker:but.
Speaker:I decided to, . At first I decided I'm gonna pick up a
Speaker:little litter here and there.
Speaker:And then of course, like, I'm like, oh, well I'm gonna need to bring along
Speaker:a little shopping bag and then I'm gonna bring, bring, bring along a bag,
Speaker:and then I'm gonna, next thing you know, I bought one of those bags that
Speaker:hangs over my shoulder and I got a picker and I'm like some kind of weirdo
Speaker:picking up litter on side the street.
Speaker:But, but you need to clarify.
Speaker:You actually have two bags,
Speaker:I, I do,
Speaker:and one for litter.
Speaker:I have one big bag, which is for litter, and then I have a smaller
Speaker:bag, which uh, is technically what they call a foraging bag.
Speaker:It's like for like doing mushrooms and I don't think I'm doing
Speaker:mushrooms, but, um, and yeah.
Speaker:And so that's the smaller bag is for the, like the cans and bottles and whatnot.
Speaker:But, um, because if I'm doing this, I might as well, you know, do that as well.
Speaker:Right.
Speaker:yeah.
Speaker:And it's good though that you're, it's sort of like motivation for continuing
Speaker:to go on these walks because you're like, Hey, look at these streets.
Speaker:They're clean.
Speaker:So I have one question.
Speaker:Why is San Diego so filthy?
Speaker:I dunno.
Speaker:I got why is it not, does it, is this not the problem where you live?
Speaker:So, yeah, my wife and I, we were just walking like, so we've started also
Speaker:going on walks or at least trying to go on walks, like whenever we can.
Speaker:And we walk in our neighborhoods and take a bunch of streets and we do
Speaker:the same thing, like walk a couple miles and we rarely ever see trash.
Speaker:Yeah.
Speaker:I don't see it in the neighborhood per se.
Speaker:It's when I go out onto the main
Speaker:Okay.
Speaker:Right.
Speaker:Um, college
Speaker:probably the difference.
Speaker:Yeah.
Speaker:'cause I, we don't walk in the main areas.
Speaker:We just go on the neighborhood residential streets and,
Speaker:And, and there's, and there's, there's little elements of, of areas where
Speaker:people clearly litter more, right?
Speaker:Areas where like, there's nobody looking, basically, like there's
Speaker:no houses that are looking, right.
Speaker:So that's where people tend to things like curbs and uh, bus stops, you know,
Speaker:even though there's a trash can by the bus stop, people seem to litter at the bus
Speaker:It, and that's because for people, right?
Speaker:This main thoroughfare you're referring to doesn't have any houses on it
Speaker:doesn't have any businesses on it.
Speaker:For the most part.
Speaker:It's just literally just a main thoroughfare that, yeah.
Speaker:Yeah.
Speaker:And so, and what and what and the, and the thing that I see that, that, that
Speaker:is a constant is it's all fast food.
Speaker:Like 90% of the litter is, it's stuff that people bought on the way home that they
Speaker:probably shouldn't have bought, that their wife doesn't know that they're buying.
Speaker:And, uh, I'm just assuming this is all men.
Speaker:This is all men with their candy bars and their burgers and their.
Speaker:French fries and their stuff based on the stuff.
Speaker:And a lot of cigarettes, a lot of cigarette butts.
Speaker:I'm not, I, I started at, when I started this, I started with the cigarette butts.
Speaker:Now I'm like, I'm getting the big stuff.
Speaker:I'm not, I'm not getting the little tiny stuff.
Speaker:'cause it's just, it's just too much.
Speaker:Well, and even cigarette butts.
Speaker:Here's what I wanna know.
Speaker:If you're smoking, it's not like you go home and you don't smell the smoke
Speaker:on you, or you don't enter the car and you don't smell the smoke on you.
Speaker:well I just think just in general, it, it, it's.
Speaker:It's easy to flick a cigarette butt out the window and not be seen.
Speaker:Right?
Speaker:N nevermind the fact that we live in Southern California and everything's
Speaker:fricking dry and, you know, you can start a, a fire, but, uh, but yeah, but there's
Speaker:only one thing, and I I, I know I've told you the one, the, the one piece of
Speaker:litter that makes me really, really angry.
Speaker:I do know which one you're referring to, and it has to do with something
Speaker:that I just did right now, but I did put it away, throw it.
Speaker:Yeah.
Speaker:Yeah.
Speaker:So, you know, for those of you that, you know, when, when you walk your
Speaker:dog, you're required to pick up the poo and put it in a little baggie.
Speaker:And so people do it because people are what they see the dog, they see the
Speaker:thing, and then you, you, you pick it up and then some of these people will then
Speaker:just toss that bag when nobody's looking.
Speaker:And that just makes me so angry.
Speaker:'cause it's like, you made it worse,
Speaker:yeah.
Speaker:Well, here's the question.
Speaker:Is that worse tossing a proper poop bag, or is it worse for the people who
Speaker:had sandwich bags that they were using
Speaker:Oh, the worst was the sandwich bag, the open sandwich, like the
Speaker:old school, like the kind that you just fold over, not the Ziploc.
Speaker:And they didn't even, they didn't even fold it over or tie it up or anything.
Speaker:They just tossed it over.
Speaker:And when I first saw that, because it was a sandwich bag, I literally was
Speaker:like, oh, somebody threw brownies away.
Speaker:On that note, how about we
Speaker:It was not brownies.
Speaker:It was not brownies.
Speaker:Anyway, yeah.
Speaker:So speaking of poop,
Speaker:oh, wait, wait, wait.
Speaker:Before we move on, one last thing about this.
Speaker:So I know that you have shared with me some videos of you
Speaker:walking and picking up trash.
Speaker:Is this something that you will be posting for our listeners who may wanna
Speaker:see kind of what you've been up to?
Speaker:So I am going to start a YouTube channel.
Speaker:I, I, I, because you know me, like if I, if there, if it's worth
Speaker:doing, it's worth overdoing, right?
Speaker:So I have a, I have a chest mounted camera looking down and so I have a POV of me
Speaker:picking up litter and I'm just hoping that I can create a YouTube channel,
Speaker:like those like pressure washer channels where people watch the pressure and
Speaker:Or the mowing ones.
Speaker:Yeah.
Speaker:Like people will get some sort of vicarious joy out of
Speaker:seeing someone pick up litter.
Speaker:Um, I, I have a name for this channel.
Speaker:I'm not gonna say it to 'cause I need to, I need to get it
Speaker:registered first, but, um,
Speaker:So stay tuned listeners.
Speaker:tuned.
Speaker:Yeah.
Speaker:Anyway, the things I get up to, I tell you, uh, speaking of stuff
Speaker:I get up to, let's talk about.
Speaker:Uh, let's see, what's, what is the, this is, we're up to episode nine, 1.8.
Speaker:Yeah, I think it's 1.8, episode nine.
Speaker:Yeah.
Speaker:It's, um, mirroring and I don't really know where that name came from.
Speaker:The mirroring.
Speaker:It's because of like, we will get to it in a bit, but it's like Mr. Robot and.
Speaker:Oh, okay.
Speaker:Okay.
Speaker:All right.
Speaker:All right.
Speaker:You wanna do the summary?
Speaker:Yeah, so this one was interesting, so just kind of a recap from the
Speaker:last ending of the last episode was Elliot realizes Darlene's his sister.
Speaker:He goes home, he's like freaking out.
Speaker:He realizes that, uh, goes back, he realizes that he had erased himself.
Speaker:He goes and discovers all this stuff on the thing, and then
Speaker:he realizes that, Hey, Mr.
Speaker:Robot is my father.
Speaker:And then you get this pound, pound, pound at the door, and it's Mr. Robot.
Speaker:Yeah.
Speaker:he's like, Hey, I need to take you somewhere and show you stuff.
Speaker:And Elliot follows him, goes back to his childhood home, he pushes Mr. Robot off.
Speaker:And then, uh, Darlene and Angela are looking for Elliot.
Speaker:And they search everywhere they can't find him, and they end up going
Speaker:back to his hometown, to his house.
Speaker:And then they find him randomly wandering around
Speaker:Right,
Speaker:and.
Speaker:They basically see him at a grave site and Mr. Robot's
Speaker:there with him this entire time,
Speaker:right.
Speaker:and he's like, Elliot, don't let them take me away.
Speaker:Don't let them take me away.
Speaker:He's like, what?
Speaker:And he hides.
Speaker:And then Darlene and Angela come up and they're like, Elliot, what do you
Speaker:think's been going on this entire time?
Speaker:He is like, I don't know.
Speaker:And then they zoomed down or they looked down.
Speaker:And then they panned down and that's where you see the gravestone
Speaker:that he, uh, that Mr. Robot was lying on was actually his dad.
Speaker:Yeah.
Speaker:And so his dad is not real.
Speaker:His dad's all in his, uh, his dad is a mirror of him.
Speaker:That's what, that's where, I guess that's where the episode came from.
Speaker:Yeah.
Speaker:that's kind of the Elliot story.
Speaker:yeah, that's the Elliot story.
Speaker:You've also got the, uh, the Tyrell story.
Speaker:Tyrell ultimately gets fired because he's been just like, everything's just
Speaker:too weird with all the stuff going on.
Speaker:So he gets fired, so he is not gonna be very happy.
Speaker:Um, meanwhile.
Speaker:hates him.
Speaker:And if wife, his wife says, I don't, yeah, go fix this or go away.
Speaker:Don't, you know, just basically like, yeah.
Speaker:Uh, she, she has the baby.
Speaker:She has her baby, and then she's like, yeah.
Speaker:Um, and then, um, uh, she's a very driven, she's a very driven person.
Speaker:Like she, I mean, driven to the point like when she like stabbed
Speaker:herself to break her water to.
Speaker:Yeah.
Speaker:Save Tyrell.
Speaker:Yeah.
Speaker:the last episode.
Speaker:Yeah.
Speaker:Um, she, she's like, what?
Speaker:You know what?
Speaker:Both of them, he, he clearly, as we've talked about, he
Speaker:will do whatever he has to do.
Speaker:Uh, and she will do that as well.
Speaker:They are two very driven little people.
Speaker:Um,
Speaker:So he gets fired.
Speaker:And then,
Speaker:fired.
Speaker:Yeah.
Speaker:and then do you wanna talk about Gideon at the same time?
Speaker:Yeah.
Speaker:So, so Gideon has the thing where he's, he, he finds out that the, that the
Speaker:honeypot had been deactivated, which we find out, you know, that, that had
Speaker:happened in the previous episode, uh, where they had done the, they had.
Speaker:Put in a message pretending to be him.
Speaker:And, uh, and then we find out he, he's, he's trying to figure this out.
Speaker:He is trying to sort this out and he goes over to, to, um, to see
Speaker:Tyrell, and that's when he find out that Tyrell is, uh, has been fired.
Speaker:Um, and there's also the side story of Angela and Terry Colby and Terry
Speaker:Kobe's, like trying to offer a job at evil court, which makes no
Speaker:sense, but I'm sure that will come.
Speaker:Uh, also there's the, there, the other Angela side story is that the lawsuit is.
Speaker:Kicking into full force.
Speaker:Um, and there's that weird story there.
Speaker:You wanna talk about that?
Speaker:The, the money.
Speaker:Yeah, so when Terry Kolbe's at Angela's house and he offers a job, he, she's
Speaker:like, but we're suing you for millions.
Speaker:It's gonna cost you an arm and a leg.
Speaker:And Terry Colby's like, no, we kind of figured that this
Speaker:would happen at some days.
Speaker:So we set aside money in a rainy day fund, and that's five times the
Speaker:amount of whatever the worst case penalty could be from this lawsuit.
Speaker:So he's like, we're basically gonna be making money either
Speaker:way, so it doesn't matter.
Speaker:And they're like, we liked what you did and how you like, brought me down.
Speaker:And so you've been noticed by people at Evil Corp. So they're like, yeah,
Speaker:we want Angela, we wanna hire you.
Speaker:Yeah.
Speaker:Be, because the entire reason she, they wanted to hire her.
Speaker:And I don't know if this happened in this episode or the last, but
Speaker:basically remember she quit allsafe,
Speaker:Right.
Speaker:Well, she got, didn't she get fired after the whole losing the Yeah, yeah,
Speaker:Yeah.
Speaker:Yeah.
Speaker:The DAT file thing.
Speaker:So she was let go from allsafe.
Speaker:She tried to get hired by the lawyers.
Speaker:Right.
Speaker:And they're like, you're too close to this.
Speaker:We can't let
Speaker:you in.
Speaker:Yep.
Speaker:And she's like, I don't know what I'm gonna do for money.
Speaker:Yeah.
Speaker:Uh, and so now she's being offered a job at Evil Corp. And uh, by the way,
Speaker:there was, uh, a post credit scene.
Speaker:Oh.
Speaker:I did not watch a post credit scene.
Speaker:Yeah, I'm just looking at the thing here.
Speaker:There's a post credit scene that shows white Rose meeting with the
Speaker:Evil Corp, CEO, uh, and they discuss a conspiracy, uh, about Evil Corp and also
Speaker:potentially the murder of Sharon Knowles.
Speaker:So that should be interesting.
Speaker:Oh, wait.
Speaker:And there's one important, important thing that we forgot to mention.
Speaker:what did we forget to mention?
Speaker:So Darlene and Elliot are on the way back to New York
Speaker:from their hometown from
Speaker:Mm-hmm.
Speaker:and, uh, Darlene looks at Elliot and is like, do you remember creating f Society?
Speaker:Do you remember the scene?
Speaker:They're on the train and,
Speaker:A little bit, yeah.
Speaker:yeah.
Speaker:And he's like, I don't remember Anthony.
Speaker:He's like, Elliot, we, you created F Society.
Speaker:You're the one who wanted to do all this.
Speaker:Uh,
Speaker:And he's like, I don't remember any of this.
Speaker:Because I guess probably, uh, foreshadowing into sort of like how
Speaker:things are like dissonant for him between like what happens with Mr.
Speaker:Robot versus what happens when he is
Speaker:right, right, right.
Speaker:Yeah.
Speaker:He's got issues, man.
Speaker:Um, so.
Speaker:When I looked at this episode, I, I, I, I, I, I came up with this idea.
Speaker:So when we look at Angela working at allsafe, when we look at Elliot working
Speaker:at allsafe, when we look at Tyrell working at, uh, E Corp, um, and what, what, what
Speaker:you have across all of these and now.
Speaker:Potentially white rose.
Speaker:I don't even know the, I don't even know what what's going on there.
Speaker:But what you, what you have at all of these places is you have insider threats.
Speaker:You have a person who is on the inside who can then easily
Speaker:become, um, a rogue admin, right.
Speaker:Or a rogue something.
Speaker:Right.
Speaker:We, we talk about this concept of a rogue admin and, and there are those who, who
Speaker:poo poo the idea that, that say that it, that it's not, you know, that it's not.
Speaker:Um, that it's like the boogeyman, right?
Speaker:That, that people like me, because we talk about like, 'cause the insider threat.
Speaker:Is like one of the things that you can stop with a really good backup
Speaker:when we talk about, like Microsoft 365, an insider threat with 365.
Speaker:If you've got all power, you can like not only delete the stuff, but
Speaker:delete the stuff and the stuff, right?
Speaker:So, so that's why you need to have like a copy that's immutable, that even the, even
Speaker:the admin and, uh, can't delete, right?
Speaker:So.
Speaker:Uh, I, I make that big point.
Speaker:And so I talk about the possibility of an insider threat quite a bit,
Speaker:and I just, I just thought that this would give us a chance to talk about
Speaker:that and, and the different types of insider threats that you might have.
Speaker:And you, 'cause you kind of have a, a collection of them
Speaker:here in this, in this episode.
Speaker:The thing is, it, it absolutely happens, right?
Speaker:Um,
Speaker:talked about episodes where there have been insider threats.
Speaker:yeah.
Speaker:Publicly acknowledged ones are relatively rare, but the idea of.
Speaker:An insider threat.
Speaker:It, you know, it, not only is it something that you, you need to protect against,
Speaker:uh, I, I think it's something that it's potentially very, um, what's the word,
Speaker:uh, damaging to the company as a whole.
Speaker:can, can you define what insider threat is for people
Speaker:Yeah.
Speaker:It's a threat from the inside.
Speaker:Um, yeah.
Speaker:Thank you.
Speaker:So the, um, you know, and in the, the insider threat, the insider threat
Speaker:is basically some sort of cyber risk, some sort of cybersecurity issue
Speaker:from a person on the inside, right?
Speaker:From an employee, from a contractor that has insider access, um, and,
Speaker:and vicariously, I don't know if that's the right word, but.
Speaker:You know, related to that, because an outsider can sometimes assume
Speaker:the identity of an insider.
Speaker:The insider threat becomes an outsider threat.
Speaker:Yeah.
Speaker:Or influence, coerce, blackmail, however you wanna look at it.
Speaker:yeah.
Speaker:So when we look at the, the different, um, these three, so Angela Elliot.
Speaker:Tyrell.
Speaker:Um, we have three very different insider threats here, right?
Speaker:So, uh, you know, so just real quick, we've got Angela that was compromised.
Speaker:We've got Elliot that has a vendetta, you know, against
Speaker:the company from the outside.
Speaker:And then we've got Tyrell who has a vendetta of the company from the inside.
Speaker:These are, these are three very different, and I think that gives
Speaker:us an opportunity to talk about these different types of ones.
Speaker:And, and let's talk about Angela first because I think that's a,
Speaker:I think it's a very common one.
Speaker:Um, it's the one, because the other two sort of are, if you, if you want to
Speaker:attack a company, you need to somehow.
Speaker:Compromise.
Speaker:Someone that's on the inside.
Speaker:Right?
Speaker:Or one of the ways that you can attack a company is to
Speaker:compromise somebody on the inside.
Speaker:You wanna talk about how Angela was compromised?
Speaker:Well, there are multiple ways Angela was compromised.
Speaker:So I guess the first right is she was compromised through Ollie when
Speaker:she was given the CD by Cisco, which then hijacked the webcam
Speaker:and.
Speaker:not Cisco, the company.
Speaker:Yes, Cisco, the person who works for the Dark Army, right?
Speaker:And he basically was threatening or blackmailing her by saying, Hey, I'm gonna
Speaker:wipe out your dad's financial records.
Speaker:I'm gonna post pictures of you online and videos, and therefore, unless
Speaker:you do what I want you to do, then everything's gonna go out there
Speaker:Yeah, it was a, it was a d multi-pronged extortion attack, right?
Speaker:So, you know, we have, we have compromising photos and videos of you, you
Speaker:know, basically naked Plus we've got all this financial information that if it gets
Speaker:out, you're, you're financially ruined.
Speaker:Didn't, didn't they bring their father into it as
Speaker:Well, it, it was because she had transferred money
Speaker:using her father's account,
Speaker:Right.
Speaker:they also had her father's information as well.
Speaker:So that was
Speaker:basically steal all their money, all her money, and all her father's money.
Speaker:Um, and, you know, let's just talk about that.
Speaker:W when you, when we talk about the second, the second type, the, there's
Speaker:a, there's a, well actually let's talk about the second type person that I'm
Speaker:gonna go back and talk about this thing.
Speaker:When we talk about this first type.
Speaker:Um.
Speaker:You know, this can happen from a variety of things.
Speaker:It can be a person who's compromised in the way that Angela was compromised.
Speaker:It can also be a person who's compromised because their identity was stolen, right?
Speaker:Uh, they're compromised in just a different way.
Speaker:And, um, if, if, as if an outsider has the access to an insider,
Speaker:right, uh, and can thwart.
Speaker:The, uh, MFA stuff that we've put up or, or other, uh, security
Speaker:mechanisms to, to prevent that they are then given the, um, the powers
Speaker:both good and bad of that insider,
Speaker:And so this is basically what is currently happening with, I
Speaker:don't know if you're familiar with, let's see if I get it right.
Speaker:Shiny hunters and scattered spider.
Speaker:right?
Speaker:Right.
Speaker:Th this is the current attacks that are going on against Salesforce instances
Speaker:of corporations where they pretend to call into the help desk and ask for a
Speaker:password reset and use social engineering to then gain access to an insider to
Speaker:then gain access to another insider and then take over an exfiltrate data.
Speaker:Yeah.
Speaker:So that's the, that's one type of insider threat.
Speaker:Go ahead.
Speaker:now I know you're gonna talk about the other insider threat, what.
Speaker:Like Angela had multiple insider threats, right?
Speaker:She was multiple threats as an insider, right?
Speaker:So the first is where she was unknowing, unwillingly compromised,
Speaker:Right.
Speaker:The second though is where she purposefully did something right that.
Speaker:She basically was like, screw it, I'm done.
Speaker:And yes.
Speaker:Even though she was sort of forced to do it.
Speaker:Right.
Speaker:And this is where she took the CD that Cisco gave to Ollie and told
Speaker:him to upload into Allsafe, right.
Speaker:That the Dark Army gave him.
Speaker:And she went in early in the morning, put the CD in the drive and said,
Speaker:yep, uh, I'm gonna load this.
Speaker:And that's where the Dark Army then gets a foot foothold into all safe.
Speaker:Yeah.
Speaker:So she basically becomes a true insider threat at that point.
Speaker:Right.
Speaker:Um, so the, the second one, and, and I think that, um, actually the
Speaker:second one I wanna talk about is Tyrell, and it's, it's another.
Speaker:Rather traditional insider threat.
Speaker:And we've had, we've had examples of this on here where we've, we've had,
Speaker:uh, incidents that, you know, famous or infamous incidents that we've, uh,
Speaker:covered where there is someone who basically gets pissed off at the company.
Speaker:Um, and they are like, they work for the company and they get, they get in
Speaker:their opinion, they get shorted their bonus, they get shorted their raise,
Speaker:they get shorted, their promotion.
Speaker:they, get fired.
Speaker:they get, they get fired.
Speaker:Right.
Speaker:And before they, and unfortunately, whoever, um, you know, does the firing,
Speaker:doesn't like pull their access first.
Speaker:Yeah.
Speaker:Or yes.
Speaker:And so I'll let you finish and then I'll talk about a case.
Speaker:Um, but that's pretty much it.
Speaker:It's basically you, you, you essentially have a disgruntled
Speaker:employee that, that's the sort of, the second one is you have an employee.
Speaker:For whatever reason, or, or a contractor, right.
Speaker:Uh, you have a dis, a disgruntled worker who has the access that they were
Speaker:granted and they still have that access and now they were upset with you and
Speaker:they could potentially then use this.
Speaker:They don't even necessarily want to make money.
Speaker:Some of them will.
Speaker:We, we talked about some of those stories.
Speaker:Some of them.
Speaker:We'll use this to try to make money.
Speaker:Others just want to hurt you on the way out.
Speaker:Yep.
Speaker:Exactly.
Speaker:Take down everything, burn it all down, I think is what they
Speaker:Yeah.
Speaker:Yeah, exactly
Speaker:And this is kind of what happened with Tyrell, right?
Speaker:He base, he was like, Hey, I'm being fired.
Speaker:I did.
Speaker:Or well, before he even gets fired, right?
Speaker:He didn't get the CTO gig.
Speaker:right.
Speaker:He was super pissed about that he was being investigated for
Speaker:the murder of Sharon Knowles.
Speaker:Go figure.
Speaker:Right.
Speaker:Um.
Speaker:He was investigating sort of this rogue server on the network he
Speaker:canceled Gideon's instructions to have the honeypot active again.
Speaker:Right.
Speaker:Right?
Speaker:And then he basically gets fired by the CEO
Speaker:Yeah.
Speaker:he's like, I did, I put my life into this company.
Speaker:How dare you fire me?
Speaker:And then what does he do?
Speaker:well, and, and his reaction, his reaction basically to CEO.
Speaker:It, it's funny, you know, I've seen situations where.
Speaker:I, I, I've been around, I've been around a minute.
Speaker:I've let some people go and, um, sometimes when you let 'em go, they burn
Speaker:things down on their way out, right?
Speaker:Um, if they have, if they're cyber type people, if they're IT type people and
Speaker:they have access and they're unstable, they could do some really damaging things.
Speaker:If they're not IT people, they tend to like go try to file lawsuits and stuff
Speaker:So.
Speaker:I, speaking of this, I just read in the paper, I think it was last week,
Speaker:the sentencing actually finished, but there was an IT worker who basically
Speaker:got fired from his company, but he had a, uh, logic bomb built in
Speaker:Yeah.
Speaker:that basically would look up his LDAP to, or his active directory name to
Speaker:make sure he was still in the system.
Speaker:And if it wasn't in the system, it would basically go and delete a bunch of things.
Speaker:Right.
Speaker:And they basically, it deleted a bunch of things.
Speaker:Caused a bunch of issues, but he was charged with cyber crimes, right?
Speaker:And destroying company property.
Speaker:And I think he was just sentenced last week, I think it was four years.
Speaker:And one of the reasons he was caught is on his work laptop.
Speaker:He was searching for like how to hide prompts or how to hide
Speaker:Damons from being detected and how to issue windows, PowerShell
Speaker:commands to do blah, blah, blah.
Speaker:So
Speaker:Yeah.
Speaker:Yeah.
Speaker:smartest cookie.
Speaker:Not the smartest cookie.
Speaker:Yeah.
Speaker:Just for the Tyrell thing though, right?
Speaker:You said he was super pissed at being fired.
Speaker:And so in the episode, right, he goes to Elliot's apartment and he's like, Hey, we,
Speaker:I told you we were gonna work together.
Speaker:We are.
Speaker:Show me what you're doing.
Speaker:And Elliot
Speaker:he's gonna become the third type of, of insider threat.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And do you wanna cover the third type?
Speaker:Yeah, so the technically Elliot, well, yeah, so Elliot.
Speaker:I think like we're still figuring Elliot out, right?
Speaker:But I think technically Elliot was the third type, and then he became the
Speaker:second type, be like he got a job because of the being, being the third type.
Speaker:That's, so the third type is a person actually outside of the organization
Speaker:who develops a vendetta against the organization, whether it's.
Speaker:Just purely financially motivated, or it's literally like in the case of,
Speaker:uh, Mr. Robot, they want to take down evil court because, well, they're evil.
Speaker:Right?
Speaker:And, uh, we don't yet have any backstory as to Well, no, we do have some backstory.
Speaker:Sorry.
Speaker:We do have some backstory about that he specifically could have some
Speaker:issues against, uh, evil court because of, um, you know, the, the stuff
Speaker:that we found out the, the death.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um, and so you need to have some kind of vetting process to look
Speaker:for a person who's actually an outsider trying to become an insider.
Speaker:Right?
Speaker:But it's hard though,
Speaker:right?
Speaker:Because how can
Speaker:show everything.
Speaker:and even especially during the pandemic, and now with a lot of remote
Speaker:offerings like workplaces, right?
Speaker:It's hard to actually go through because how do you know who you're
Speaker:hiring is actually who you're hiring?
Speaker:Yeah, especially with AI now, and yeah, I, I watched, I, I saw a thing and it
Speaker:was something about this guy used an AI video clone of himself to do an interview.
Speaker:I'm not surprised.
Speaker:Yeah.
Speaker:Yeah.
Speaker:That'll be more and more, it's sort of like back when, um, back during
Speaker:the pandemic and these smart students had figured out that they should
Speaker:put reconnecting on their phone.
Speaker:Ugh.
Speaker:Um, so, so let's talk about, you know, the ways that you, how, how
Speaker:can you respond to an insider threat?
Speaker:Right.
Speaker:So the, the most, the, the best way, I think is a proactive way, which
Speaker:is to, uh, the, the concept that we talk about a lot is that that
Speaker:is the concept of least privilege.
Speaker:You wanna talk about that?
Speaker:Yeah, so this is basically saying if you don't need access to
Speaker:something, don't give people access or to state it a different way.
Speaker:Only give access to what a person needs in order to do their job and nothing more.
Speaker:Yeah, exactly.
Speaker:It's a difficult cyber principle to enact.
Speaker:It's so much easier to do the opposite of that.
Speaker:Right.
Speaker:To go back, back in the day, basically there were, there
Speaker:were two people there were.
Speaker:People who didn't have root, and there were people who had root and
Speaker:people who had root were all powerful.
Speaker:There were, there was no rback, there was no role-based administration controls.
Speaker:Right.
Speaker:Uh, the, you, you just, you either had root or you didn't have root, and the
Speaker:root password was the same on everything.
Speaker:I mean, it was, it was just crazy back in the day.
Speaker:Right.
Speaker:But, um, that has definitely changed.
Speaker:Uh, you give people different parts of the job and, and, and, and I know
Speaker:I've, I've given this access or this.
Speaker:This example before, but the best example of how not to do this is
Speaker:that hospital, and I believe it was Portugal, and this was an eu, um, um,
Speaker:GDPR violation where they give every pers every employee in the hospital.
Speaker:The highest level of access in the hospital was doctor, right?
Speaker:They gave everyone doctor access because it was easier
Speaker:Yep.
Speaker:Include the maintenance people.
Speaker:Including the maintenance people.
Speaker:And so that was when the G-P-R-G-D-P-R fine them.
Speaker:'cause basically the GDPR had the, the, the council or whatever, I forgot
Speaker:the name of the, the governing body.
Speaker:They, they have the ability to be, you know, lenient or whatever the opposite of
Speaker:lenient, you know, throw the book at you and they decided to throw the book at you.
Speaker:'cause they're like, look.
Speaker:If you had showed us that you would at least tried, but then you failed.
Speaker:They're like, you gave everybody Doctor Ag, you didn't care at all.
Speaker:Right?
Speaker:That is the opposite of of, of lease privilege.
Speaker:That is all the privileges.
Speaker:Yeah.
Speaker:And
Speaker:why don't you just give 'em surgical privilege while you're at it, you know?
Speaker:Mm-hmm.
Speaker:I was reading an article this morning and I actually ran across it on LinkedIn
Speaker:as opposed to, not sure the truth or the validity behind it, but it basically said
Speaker:that someone was working at Xai, right?
Speaker:So Elon Musk, AI company, and they basically downloaded all the source
Speaker:code, uploaded it to chat GPT.
Speaker:Or to open AI and then quit The company, sold a bunch of stock and now
Speaker:worked for Open ai and they basically were like, it's a small company.
Speaker:The guy had access to everything in the company.
Speaker:He was just a normal coder.
Speaker:He downloaded all the things they weren't tracking, like what he was doing, if
Speaker:he downloaded it via USB, like they had no logs, nothing to be able to
Speaker:figure out like what he actually did.
Speaker:So that is sort of, and now I don't know the truth behind this story,
Speaker:but that is one thing I read.
Speaker:And I'm like, I don't think it's the only time that this sort of thing has happened.
Speaker:It always happens.
Speaker:Like there was another case with Apple where they were trying to charge
Speaker:two people with posh of downloading, uh, apple Proprietary Secrets and
Speaker:transferring it to another company.
Speaker:And it was surprising because they basically said Apple did not
Speaker:have the logs to be able to figure out what the person actually did.
Speaker:Interesting.
Speaker:Yeah, so the, the, the, you know, the, we talked about.
Speaker:Limiting the access to for each person to the thing that they need to do, just the
Speaker:access they need to do their job right.
Speaker:Um, the other thing is, you know, you do need some sort of detection.
Speaker:What
Speaker:Yeah.
Speaker:Yeah.
Speaker:I was just gonna say, yeah, the monitoring piece, right?
Speaker:That's the piece that you need
Speaker:You do need some sort of detection system, right?
Speaker:So this is where you're, you're, you're looking, this is where AI
Speaker:can help a lot, where you can look for user behavior, uh, typical user
Speaker:behavior, and then you look for things that are outside of that norm, right?
Speaker:Can Before monitoring though, I think there's two aspects.
Speaker:One, like you said, it's the being able to detect patterns, right?
Speaker:And look for anomalies like you said.
Speaker:But I think even more importantly, it's just having the logs itself,
Speaker:Yeah.
Speaker:the fact of like what people are doing.
Speaker:Because if something happens, you at least can go back and figure out like
Speaker:what happened versus if you don't even have those, you're screwed.
Speaker:Yeah, I was looking at, so cisa.gov.
Speaker:cisa.gov has a really nice, uh, uh, and I, I should link to this,
Speaker:a really nice, uh, white paper called Insider Threat Mitigation.
Speaker:And they had some interesting stats here and they were saying
Speaker:that, um, 58 percentage, sorry.
Speaker:58% of those who, uh, there were 42 computer system sabotage incidents,
Speaker:um, during the, the report period here that they're talking about.
Speaker:And they're saying that 58% of them communicated some sort of negative
Speaker:feelings, grievances or whatever.
Speaker:Um, you know, prior to that, 92% of those were verbal, by the way.
Speaker:Uh, which is interesting, right?
Speaker:Um, and 31% of them.
Speaker:Um, they had basically, this is the weirdest part, is 31% of the time someone
Speaker:had knowledge about potential plans that
Speaker:I did nothing.
Speaker:and did nothing.
Speaker:Yeah.
Speaker:Um, yeah, 64% was of coworkers, 21% of friends, family members,
Speaker:and then 14% someone that was involved with the incident.
Speaker:So, um, the, um.
Speaker:So, so one of the things that, that, uh, CISA, the point that
Speaker:CISA is making here is, is the see something, say something, right?
Speaker:I, I If, if you see someone who looks a little on edge, right?
Speaker:Tell somebody, right.
Speaker:I, I'm a little worried about Steve.
Speaker:Steve.
Speaker:That's my random, random name that I throw out.
Speaker:Um, and, um, the, um.
Speaker:And, uh, you know, pass that information on.
Speaker:You do need monitoring.
Speaker:You do need automated monitoring that looks for patterns and
Speaker:looks for things like that.
Speaker:But also the human is a significant part of the threat detection.
Speaker:Or if Steve's like, Hey, what are you doing on this, this, and this.
Speaker:Or if you're like, Hey, Steve, why are you in some system that you shouldn't be in?
Speaker:Right.
Speaker:Right.
Speaker:And by the way, thanks for bringing that up because one of the things that
Speaker:I, what, that I wanted to bring up is that it all starts with policy, right?
Speaker:Every, every, everything from a cybersecurity perspective
Speaker:starts with policy.
Speaker:We start with a policy of lease privilege.
Speaker:We enact that lease privilege, and then you have rules on, you're not allowed
Speaker:to, you know, thwart that, right?
Speaker:It, it may sound silly, but the point is.
Speaker:When you establish practices and you establish procedures and then you, and
Speaker:then you monitor for adherence to those procedures, when you see people going
Speaker:outside of those, that's when increased scrutiny, uh, can, can figure things out.
Speaker:Yeah.
Speaker:And also if you have the policy, then it can't be like, oh, Steve didn't know
Speaker:what the policy was and he didn't know.
Speaker:He just stumbled upon something.
Speaker:Right.
Speaker:Versus, yeah, Steve, you really shouldn't have been doing that.
Speaker:Yeah.
Speaker:You know, there, there's sometimes you, you think that, um, you think
Speaker:that, um, what do you call it?
Speaker:Um, you'd think that people would know certain things, right?
Speaker:But I'll give you an example of, of a, of a person that I worked with once
Speaker:who really should have known better and they were doing something for what
Speaker:they felt was a, uh, a good thing.
Speaker:Right, but, uh, not so much.
Speaker:So here's what was going on.
Speaker:So they, um, we were at, I was at a consulting company.
Speaker:We were at a household name financial organization, like, you know, wall Street
Speaker:Big.
Speaker:thing, big.
Speaker:And, um, the, they received a notification from a former employee of our company.
Speaker:And they said, Hey, I noticed some problems with the firewall at Empty Squad
Speaker:Bank, and so I logged in and fixed it.
Speaker:What?
Speaker:What?
Speaker:What?
Speaker:Yeah, so they had created a back door for themselves to be able to do
Speaker:maintenance and stuff, and they hadn't shut down the back door when they left.
Speaker:So this was like months later.
Speaker:They no longer worked for either organization and they logged, they were
Speaker:still receiving alerts and their, their response was to log in and fix it.
Speaker:Yeah.
Speaker:That's
Speaker:think that they should know that that should not be what they're
Speaker:doing, but you know, but they, but they, you know, sometimes
Speaker:Well, it's a good thing the person wasn't malicious.
Speaker:A good thing they, they weren't malicious, they were fired, but it's
Speaker:a good thing they were malicious.
Speaker:Yeah.
Speaker:Um, so.
Speaker:The, I mean that, and that's really all you could do.
Speaker:You, you, you have the least privilege.
Speaker:And I'll just wanna do three things.
Speaker:The, we talked about the least privilege, we talked about monitoring
Speaker:and things like that, and logs.
Speaker:And then also, again, I'm just gonna come back to backups because that's
Speaker:really what we talk about here.
Speaker:You wanna make sure that no matter how bad the person is,
Speaker:they can't delete the backups.
Speaker:Immutable, immutable, immutable, I don't know how many times I gotta say that.
Speaker:Yeah, so based on the CISA article that you're quoting out with the stats
Speaker:and everything we've talked about.
Speaker:It seems like detecting insider risk is really, really, really, really hard.
Speaker:Yeah.
Speaker:And I know we talked about like three things that you could possibly do to just
Speaker:sort of get you there, but I think it's one of those things that you shouldn't
Speaker:just ignore it and put your head in the sand and be like, yeah, this is too hard.
Speaker:I'm never going to worry about it.
Speaker:I think you sort of like.
Speaker:Cover the low hanging fruits, and as you mature as an organization,
Speaker:you sort of ratchet things up and start looking for additional things,
Speaker:but don't just ignore it, right?
Speaker:Don't just be like, oh, it's gonna always be there.
Speaker:I shouldn't even bother worrying about it.
Speaker:I, I would say it's definitely on that cybersecurity ma mature
Speaker:cybersecurity maturity model.
Speaker:Um, but I, I, I do wanna say, I think the first rung is
Speaker:100% immutable backups, right?
Speaker:You can't detect everything.
Speaker:And so that's why we've got to have.
Speaker:A backup of everything, everything that matters.
Speaker:We need to have a backup that is 100% immutable that even I, the, the
Speaker:owner of the company, the biggest admin of the company, whatever, the
Speaker:person with the most level of access cannot delete it even if I want to.
Speaker:And then if you have that, at least, even if we don't detect an insider
Speaker:threat and it deletes the per, the person goes to just the logic bomb,
Speaker:whatever, and they just blow up the whole company, we'll have a, we'll
Speaker:at least have a backup of the data.
Speaker:Yes, you'll have a backup, but it's also important to note
Speaker:that sometimes the insider isn't looking to just delete your data.
Speaker:They may also be looking to exfiltrate your data and use it for blackmail,
Speaker:extortion, or other things, which is a different set of problems.
Speaker:Right?
Speaker:That backup
Speaker:and if that's the case, then if that's the case, you're screwed.
Speaker:Right.
Speaker:If that's, if that's their
Speaker:Well, there are other, well, there are other tools, right?
Speaker:Like EDR and other
Speaker:there are other, yeah, there are other tools that would be able to help detect
Speaker:that, but if again, we go back to the earlier thing, it's really, really hard.
Speaker:So if they managed to get through.
Speaker:Um, again, we stop this as much as we can with process and procedure.
Speaker:We stop as much as we can with monitoring.
Speaker:Why in the world is there's this gigantic level of traffic going
Speaker:out to this open internet port.
Speaker:Right?
Speaker:Um, there was some really interesting, uh, conversations when we had Dwayne on here.
Speaker:When we, when you talked about, listen, why would I go through the,
Speaker:why would I go through Port 80 when there's this giant door over here?
Speaker:You know, like, why, why would I. Why, you know, you can lock down port 80.
Speaker:Great.
Speaker:The, the rest.
Speaker:He's like, he, I remember him, he had this analogy.
Speaker:He's like, so you put a locked door in the middle of a field
Speaker:and said, don't go through that.
Speaker:Yeah, it's like dummy.
Speaker:I'm just gonna walk around.
Speaker:yeah.
Speaker:I'm just gonna walk around.
Speaker:Um, it's like, I don't know.
Speaker:Did you see the unbearable weight of massive
Speaker:Yes, yes,
Speaker:Remember the, the, the wall that they climbed over?
Speaker:Yeah.
Speaker:It's like that.
Speaker:All right.
Speaker:Enough ta enough of talking.
Speaker:Talking about insider threats.
Speaker:It's depressing, but do your best.
Speaker:And again, please have an immutable backup.
Speaker:I know.
Speaker:To a hammer.
Speaker:Everything's a nail.
Speaker:Thanks for chatting, prana.
Speaker:No, I am excited.
Speaker:You know what next week is,
Speaker:What's next week?
Speaker:it's the season finale.
Speaker:Oh, Jesus.
Speaker:Or as my father always called it, the finally.
Speaker:And, and, and what he always liked to, to, if we were watching a final,
Speaker:a finally, he would want to eat.
Speaker:He wa he would want to eat spinach quickies.
Speaker:Oh
Speaker:my father.
Speaker:This is, this is the, the, you know, I am his child for sure.
Speaker:Yes, you are definitely his
Speaker:All right.
Speaker:Thank.
Speaker:for listening folks.
Speaker:You're why we do this?
Speaker:That is a wrap.
Speaker:The backup wrap up is written, recorded and produced by me w Curtis Preston.
Speaker:If you need backup or Dr. Consulting content generation or expert witness
Speaker:work, check out backup central.com.
Speaker:You can also find links from my O'Reilly Books on the same website.
Speaker:Remember, this is an independent podcast and any opinions that you
Speaker:hear are those of the speaker.
Speaker:And not necessarily an employer.
Speaker:Thanks for listening.
Speaker:I.