Emergency Episode: The PyPI Software Supply Chain Attack You Need to Know About

A PyPI software supply chain attack hit LiteLLM — a library pulled into developer environments 97 million times a month — and if you use it, you may already be compromised. This wasn't a fake package or a typo-squatting trick. Attackers stole real credentials, published malicious code as the real thing, and walked out with SSH keys, cloud credentials, Kubernetes tokens, API keys, and more — all encrypted and sent home before anyone knew what happened.
I'm doing something I've never done before: an emergency episode, recorded and published immediately because this is that serious. I brought in Dr. Mike Saylor, co-author of our book Learning Ransomware Response and Recovery, and my co-host Prasanna Malaiyandi to break down exactly what happened, how to find out if you were hit, and what you need to do to protect yourself going forward.
We open with a story from 1982 that perfectly captures what this attack really is — getting poisoned by something you trusted completely. That framing matters. This wasn't a failure of the library. It was a failure of the supply chain. And it can happen again.
Chapters:
00:00:00 - Intro: Why this is an emergency episode
00:01:35 - Meet the guests: Dr. Mike Saylor and Prasanna Malaiyandi
00:02:31 - The Tylenol poisoning analogy and what it means for software supply chains
00:05:51 - What LiteLLM is and what the malware actually did to your environment
00:09:04 - Dependencies explained: why you're affected even if you didn't install LiteLLM directly
00:12:24 - How to find out if you were hit: the first things to check right now
00:14:23 - IOCs and TTPs: what to look for in your logs and on your systems
00:19:07 - Network indicators: unusual traffic and what it tells you
00:22:12 - How security teams can find out if developers installed it without telling anyone
00:30:38 - Action items for the future: inventory, pinning, and hash verification
00:36:55 - Sandboxing new downloads before they touch your environment
00:37:59 - Immutable backups: why this attack makes the case for them
00:40:33 - Modern authentication: MFA, its limits, and why passkeys matter
00:46:53 - Where to get threat intel so you hear about attacks like this faster
00:53:23 - Wrap-up
If you installed or upgraded LiteLLM on or after March 24, 2026 without a pinned version, stop what you're doing and listen to this episode first.
The story:
https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/
https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/
https://snyk.io/articles/poisoned-security-scanner-backdooring-litellm/
https://www.wiz.io/blog/threes-a-crowd-teampcp-trojanizes-litellm-in-continuation-of-campaign
https://checkmarx.com/zero-post/python-pypi-supply-chain-attack-colorama/
https://www.upwind.io/feed/litellm-pypi-supply-chain-attack-malicious-release
https://docs.litellm.ai/blog/security-update-march-2026
https://www.helpnetsecurity.com/2026/03/25/teampcp-supply-chain-attacks/
https://www.darktrace.com/resources/the-cisos-guide-to-cyber-ai
https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/
Resources:
https://www.stopransomware.com
https://www.cisa.gov
https://www.cve.org/
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:This episode, we're doing something actually very different.
Speaker:We're calling this an emergency episode because what just
Speaker:happened is that serious.
Speaker:There's an attack on the PYPI repository targeting light LLM.
Speaker:A library that's pulled into developer environments three and
Speaker:a half million times every day.
Speaker:They took stolen credentials to publish malicious code as the real thing.
Speaker:This malware is grabbing SSH keys, cloud credentials,
Speaker:Kubernetes tokens, everything, and encrypting it and sending it home.
Speaker:We're breaking down exactly what happened, how they pulled it off,
Speaker:and what you need to do right now.
Speaker:To, uh, find out if you were hit.
Speaker:We also cover what to do to protect yourself from something
Speaker:like this in the future.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery and now
Speaker:cyber recovery for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss that we had no backups.
Speaker:Of the production database that we had just lost.
Speaker:I don't want that to happen to you and that's why I do this.
Speaker:On that podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the backup wrap up.
Speaker:I'm your host, w Curtis Preston, and I have with me a, I don't
Speaker:know, a, a, a cadre of joy.
Speaker:Uh, first we will start with Dr. Mike Sailor.
Speaker:How's it going, Mike?
Speaker:Doing well.
Speaker:Thanks for having me guys.
Speaker:We're glad to have you.
Speaker:I mean, it is gonna, it's a, it's a big, this is an important, I'm, I'm
Speaker:gonna call it like emergency episode.
Speaker:We're recording this.
Speaker:Unlike, normally recording this very before we, uh, publish
Speaker:District.
Speaker:course, my trustee.
Speaker:I, I was almost going, going my trustee
Speaker:stead.
Speaker:stead.
Speaker:You know, I don't think I've ever met a Prasanna or heard of a Prasanna
Speaker:racehorse, so that would be a first.
Speaker:That would be a first.
Speaker:Well, thanks for, thanks for being here early in the morning, um, for both of
Speaker:us, uh, because this is when we were available because we wanted to cover this.
Speaker:Uh, and I'm gonna start with a story, uh, a story that happened
Speaker:when Prasanna was four months old.
Speaker:It's September, 1982 in Chicago.
Speaker:got a headache.
Speaker:You walk over to your bathroom, you reach into what should be
Speaker:the safest place in your home.
Speaker:You open a bottle of extra strength Tylenol, take a capsule,
Speaker:and within hours you're dead.
Speaker:This happened to seven people, including 12-year-old Mary Kellerman.
Speaker:They weren't killed by a manufacturing error.
Speaker:They were killed because someone had tampered with the bottles
Speaker:on the store shelves lacing them with potassium cyanide.
Speaker:There was a nationwide panic.
Speaker:Johnson and Johnson did the, the best, I think a, a gold standard of response.
Speaker:They recalled 31 million bottles worth over a hundred million dollars.
Speaker:Uh, I remember this very much.
Speaker:You, you do too, Mike.
Speaker:Right?
Speaker:And this, I, I, I thought of this story because when, uh, when I was putting
Speaker:together the outline for this Mike, I came in, I came across your, uh, it was
Speaker:a term that you used in our book that we wrote together, learning ransomware
Speaker:response and recovery, uh, available.
Speaker:Uh, for everyone right now.
Speaker:Uh, and you use the term getting poisoned by your own medicine cabinet
Speaker:because you go to a trusted source.
Speaker:Uh, you know, in this case it was an actual medicine cabinet.
Speaker:In the case of the story that we're gonna talk about today, you use a
Speaker:library, uh, in this case called, uh, p pronounce it people, P-Y-P-Y-P-L.
Speaker:Uh, you ingested into your network and next thing you know.
Speaker:You have a catastrophe.
Speaker:So, um, what are we talking about, Mike?
Speaker:I don't know that I've heard anybody actually pronounce it, but I, if.
Speaker:If they did, I think it would be pipe
Speaker:Ple,
Speaker:since it's Python.
Speaker:Yeah.
Speaker:Oh, oh, that's right.
Speaker:It's pi, yeah, yeah.
Speaker:Ple, yeah.
Speaker:so, uh, in this case everybody relies, well, millions of, uh, organizations
Speaker:rely on what they felt was a trusted.
Speaker:Uh, resource, a trusted medicine, if you will, um, for their daily
Speaker:updates and, and grabs from a open source, uh, environments.
Speaker:and on the 24th, uh, they did what they always do and they,
Speaker:they go to this, uh, this library.
Speaker:They use this tool.
Speaker:They download what they thought was legitimate.
Speaker:Uh.
Speaker:Uh, data software, uh, or I, I guess a library in this case.
Speaker:And, uh, it, it, it didn't turn out to be, uh, uh, malware infected.
Speaker:So, you know, complacency and security are, are not congruent.
Speaker:Uh, you, you've, your security diminishes the, the more complacent you become.
Speaker:Uh, and in this case, you know, just going to the same place you always go
Speaker:to get the same stuff you always get.
Speaker:Uh, and this time they got a little extra.
Speaker:What, what did they get, by the way?
Speaker:I know, I know that it was very, I know it was bad and I, I, I, I read that, that,
Speaker:that this tool that was infected, uh, down is downloaded 97 million times a month.
Speaker:But what, What exactly happened to them if, if they put this
Speaker:tool in their environment?
Speaker:So what they downloaded was a, an infected version of the light, L-M-L-L-M, uh,
Speaker:which is a open source Python library.
Speaker:Um, in, in this case.
Speaker:There's a legitimate version of that, you know, with the, and we'll get into
Speaker:hash values and fingerprints of things.
Speaker:Uh, so, you know that it, it came from a trusted source versus a
Speaker:modified version of, of that,
Speaker:Which on the surface looks the same, you know, maybe even the same file size,
Speaker:uh, looks the same, smells the same, uh, did not taste, did not taste the same.
Speaker:so when they downloaded it, it came with malware.
Speaker:The malware was intended to, uh, well, primarily intended to
Speaker:harvest credentials and secrets.
Speaker:You know, API, keys and SSH, uh, tokens and, um.
Speaker:Uh, there were a couple of other things that it did.
Speaker:It did look for, um, you know, it did try to call home to see if there, if,
Speaker:if, if having identified a particular target host, if the, the threat actors
Speaker:wanted it to do something different.
Speaker:I think there were some, uh, geographic, um.
Speaker:Implications.
Speaker:So if, if the malware knew it was in Iran, for example, uh, it did something
Speaker:different than if it, if it infected something, uh, you know, a machine
Speaker:or a, an environment in, in Europe.
Speaker:Um, but yeah, it was, it was designed to, to harvest secrets in credentials.
Speaker:So.
Speaker:Thanks for that great summary.
Speaker:As you were talking, the first thing that popped into my head was in the very
Speaker:beginning was have you seen the picture or the meme where it's like, Hey, here's all
Speaker:these cool things built on top, and then at the very bottom it's like this very
Speaker:small stick holding up everything else.
Speaker:That's literally what I was thinking about the, as you were talking through
Speaker:this, how there's all this open source tooling out there, or libraries out
Speaker:there that people leverage heavily.
Speaker:Right.
Speaker:But it's like holding up everything right and.
Speaker:That's where, like you said, if you sort of attack the common source, then you
Speaker:now have access to this wide spread of people who are using that common library.
Speaker:And a lot of times like these open source developers, right, they aren't
Speaker:paid well, right, they or at all.
Speaker:And so it's sort of in their good terms and wills that they're doing this.
Speaker:Curtis, as Mike was walking through this and kind of this sort of attack,
Speaker:another one that came to mind that we talked about on the podcast before,
Speaker:do you remember the developer who.
Speaker:Was wondering why SSH was performing slightly slower and realized
Speaker:that someone had in, had sort of taken over the open SSH and had
Speaker:sort of infected it and just luckily he happened to notice because it was
Speaker:slightly different performance wise.
Speaker:Right.
Speaker:But this sort of seems like another one of those like supply chain attacks.
Speaker:Yeah.
Speaker:And, and again, I'm, I'm, you know, the, the summary I'm reading
Speaker:here, uh, there were two versions.
Speaker:It was like the initial version that sort of pushed out the second version
Speaker:and the second version, which is 1.8.
Speaker:2.8 is even worse than the first version.
Speaker:Uh, but yeah, the, it's that.
Speaker:You're, you're, you're, you're, you're, you're subject to this
Speaker:because of, you know, for those of you that aren't developers, the problem
Speaker:here is what we call dependencies Prasanna . Do you want to talk to that?
Speaker:So if every single person out there had to write every single line of
Speaker:code from scratch, right, there'd be no software really out there, right?
Speaker:And so what a lot of people do is they'll say, Hey, this, uh.
Speaker:Package, or this library does a whole bunch of things I need to do,
Speaker:instead of me writing it myself, let me leverage that library.
Speaker:And so you sort of import it into your code base, and that's what sort of
Speaker:gets built around, but you don't have access necessarily to everything in it.
Speaker:You're just sort of treating it like a black box almost and being like,
Speaker:yep, I trust whatever's in there.
Speaker:They've done their things and this is the functionality I get.
Speaker:Yeah.
Speaker:Any comments on that, Mike?
Speaker:No, I completely agree and, and.
Speaker:One of the things that, that these bad guys did, either intentionally
Speaker:or incidentally, is when they, when they pushed out the first version,
Speaker:that was kind of a test run to see how likely people were gonna
Speaker:download that illegitimate version.
Speaker:In other words, they didn't check, to see if it was legitimate, you
Speaker:know, hash values and other things.
Speaker:Uh, and then how much time would they have?
Speaker:to push a second update.
Speaker:And, and in this case it went pretty quick.
Speaker:Uh, but if you, if you don't identify the first one, uh, and it didn't get
Speaker:shut down, then pushing out a second one gives you, direct access, uh,
Speaker:through updates potentially, uh, to those that downloaded the first version.
Speaker:We saw this a lot in the, in the app stores on mobile phones.
Speaker:You know, bad guys would publish a, a seemingly legitimate and either
Speaker:entertaining or useful app, uh, to get people to download it and use it.
Speaker:And then the malware and the other nefarious things would come in
Speaker:the, in the update to the app.
Speaker:It's like a, it's like a tracer round.
Speaker:Yeah.
Speaker:Right.
Speaker:Uh, for those of you that don't know what a trace round is, it's a, it's
Speaker:a separate round that, that's not, it's not, doesn't have a payload.
Speaker:We're talking like weapons here.
Speaker:Right.
Speaker:Um, and it's a separate round that just you, you can see it, you can see
Speaker:what it does, uh, and you can use that for your, you know, the actual round.
Speaker:Uh, and in this case, the actual round was very, very, um, um.
Speaker:Dangerous.
Speaker:Um, so
Speaker:oh, one thing about the.
Speaker:Go ahead.
Speaker:Go ahead.
Speaker:One thing about the dependencies that my kid touched upon too, and I
Speaker:think is important is as someone who is leveraging this library, right in
Speaker:your code base, you have control about sort of how often you want to update.
Speaker:So say you are only developing once a month, right?
Speaker:You may not want to pull, constantly be pulling a new version of that
Speaker:library into your code base, right?
Speaker:Or if you're doing it once a year.
Speaker:you have the ability to control how often, and so like Mike was saying,
Speaker:right, the fact that they pushed out a version sort of implies that hey,
Speaker:people are sort of constantly updating to get the latest and greatest, because
Speaker:sometimes that's what people want, right?
Speaker:New functionality's always coming out.
Speaker:You want the latest and greatest.
Speaker:Mike, uh, if you could jump into how someone would know that, um.
Speaker:That they, that they had this, uh, specifically, or maybe in general,
Speaker:how would you know that you have some sort of malware in your environment?
Speaker:Do you wanna walk people through what we're talking about there?
Speaker:I.
Speaker:Sure.
Speaker:So.
Speaker:If, if you are, if you're concerned that, that, you know, you might be, uh,
Speaker:affected by this supply chain attack.
Speaker:In other words, you're, you're, uh, you often download
Speaker:these pipe Python libraries.
Speaker:Or actually, know, th this attack group, uh, team, um, it team CPC?
Speaker:Um,
Speaker:PCPI thought.
Speaker:PCP.
Speaker:Yeah.
Speaker:I was close.
Speaker:Uh, thi this attack group, uh, team, uh, PCP is, is really
Speaker:hitting every open source, uh, project, uh, repository out there.
Speaker:They, you know, they started with, uh, you know, the trivia
Speaker:scanner, check marks, GitHub.
Speaker:Uh, so, you know, the Python libraries were a, an a good
Speaker:next, uh, pivot for them.
Speaker:So if, if your organization often, uh, interacts, downloads, uploads, even, um.
Speaker:And definitely any that have, authenticated access to these
Speaker:repositories, uh, you might be concerned that you've, you've been
Speaker:affected by this, this attack.
Speaker:So common things to look for.
Speaker:And one of the reasons that this attack was identified so quickly is that there
Speaker:was a developer that went, Hey, why is my machine, uh, running so slow?
Speaker:We're doing this weird thing.
Speaker:And he dug into the services and the, the processes running.
Speaker:And that's when, um, that developer identified.
Speaker:Something nefarious is going on.
Speaker:and that's usually the, you know, the, the symptoms much like getting
Speaker:sick, the symptoms, you know, tell us that there's something off.
Speaker:so anything obvious, uh, would be a good indication that something's weird.
Speaker:You know, don't get paranoid right away.
Speaker:But definitely look into, uh, anything out of the ordinary
Speaker:running on, on your systems.
Speaker:the easiest thing to do.
Speaker:'cause you're paranoid doesn't mean nobody's out to get you.
Speaker:Mike, just, but anyway, but go ahead.
Speaker:Just because you're not paranoid.
Speaker:Uh, I don't, yeah.
Speaker:yeah, yeah.
Speaker:Okay.
Speaker:Go ahead.
Speaker:It, it goes either way.
Speaker:But yeah.
Speaker:So the easiest thing to do is go and look at, uh, in this case, if you downloaded
Speaker:the, the light LLM uh, uh, version, uh, go look at the hash value for that.
Speaker:Compare it to the.
Speaker:The light, LLLM, uh, trusted hash value.
Speaker:If they're the same, you're good.
Speaker:Uh, if they're not the same, then you know, either assume you've been
Speaker:compromised and just change everything.
Speaker:I mean, that's the least effort.
Speaker:Um, you know, fastest, fastest path to, um.
Speaker:To confidence.
Speaker:but if you wanna take the next, you know, few steps is, you know,
Speaker:start looking through your logs.
Speaker:Uh, if, if you're working in a cloud environment like AWS or
Speaker:Azure, uh, there are tools there.
Speaker:Um, so the AWS, uh, cloud uh, and log analysis tools, uh,
Speaker:one, they have to be turned on.
Speaker:Uh, and that's just good security, best practice.
Speaker:Anyway, turn your logging on, log as much as you can.
Speaker:Uh, and keep it as long as you, uh, as long as you're able to, because those logs
Speaker:help tell the story when we need to figure out if something weird has happened.
Speaker:go look at your AWS and Azure logs.
Speaker:Um, there are some specific IOCs like calls to, uh, third party libraries,
Speaker:uh, um, ex uh, data xFi, uh, volumes.
Speaker:So, you know, if, if your environment doesn't send data.
Speaker:To other places, you know, test dev environment is, uh, encapsulated and, and
Speaker:you're just working with it in that, and, and all of a sudden something has changed.
Speaker:You know, that deviation from normal behavior.
Speaker:Uh, those are other symptoms and, and things to consider.
Speaker:realize too that sometimes malware doesn't behave.
Speaker:uh, it sometimes lies dormant.
Speaker:and a lot of malware, and I think in this case too, uh, install some back doors.
Speaker:So if, you know, you simply delete the package downloaded, if you simply, you
Speaker:know, change credentials, uh, sometimes that back door can, uh, can open up
Speaker:and, and regardless of all those other things you did, uh, bad guys could
Speaker:still have access to your data and, and, uh, and create some havoc that way.
Speaker:Um,
Speaker:talked about network,
Speaker:Oh, oh.
Speaker:Go ahead, finish.
Speaker:I talked about network indicators.
Speaker:So, uh, unusual traffic to unusual destinations, IP addresses, VPN
Speaker:tunnels, uh, tour exit points.
Speaker:Um, you know, if, if you're a, a development shop in the, in Texas as
Speaker:an example and, uh, you know, you're, you're fairly isolated or, or, um.
Speaker:Domestic and you, and you're seeing all this international traffic,
Speaker:especially around the dates, uh, you know, the last couple of days.
Speaker:Uh, those are also things to be considerate of.
Speaker:Um, if you, if you're a Kubernetes shop, uh, there are some specific IOCs, uh,
Speaker:in this, in this attack for Kubernetes.
Speaker:Um,
Speaker:You wanna define IOC, although people should know, but what is an
Speaker:so.
Speaker:IOCs are indicators of compromise.
Speaker:So when we talk about attacks, there's, there's two primary acronyms we use
Speaker:IOCs indicator indicators of Compromise.
Speaker:So those are the things that we would go look for in our environment that
Speaker:are specifically or generically.
Speaker:Related to an attack.
Speaker:So known bad guy does things a certain way with certain tools.
Speaker:Those tools leave fingerprints, uh, in either logs or active behavior.
Speaker:And those are IOCs.
Speaker:so hash values, uh, certain file names, uh,
Speaker:I IP addresses, uh, URLs, things like that.
Speaker:And then we have TTPs, which are, uh, tactics, uh, techniques, and.
Speaker:Procedures.
Speaker:So what are the bad guys?
Speaker:How, what's their mo like, how do they, how do they conduct the attack?
Speaker:What they do this first and this second?
Speaker:And they use these things.
Speaker:Uh, so those are TTPs.
Speaker:Um, so reviewing those, uh, IOCs and, and they're, they've already been published.
Speaker:If you just Google.
Speaker:You know, the, the light LLM Supply Chain attack, IOCs and
Speaker:TTPs, you'll, you'll get those.
Speaker:But we're also happy to put a, a short one pager together and put, push that
Speaker:out to our stop ransomware website.
Speaker:Um, so hash value comparison of the, the known, trusted version
Speaker:or versions, um, of the light LLM.
Speaker:Um, review your logs.
Speaker:For any known deviations from expected behavior, review your network
Speaker:traffic, if you have that capability, looking for behavioral anomalies.
Speaker:Um, and if at all you suspect that you've been compromised.
Speaker:The best practice, I know it's a, it's a, it's a, it's a pain, but the best
Speaker:practice is restore from a trusted backup.
Speaker:Don't try to just onesie, twosie, you know, delete it from the
Speaker:registry, delete the image, delete the the app, turn off a service.
Speaker:Those are all I. One-offs, you know, kind of stomping out the fire
Speaker:with your, your leather moccasins.
Speaker:And I only say that 'cause it, it actually happened to me and
Speaker:that's a whole other story.
Speaker:Uh, but the fire will flame back up.
Speaker:Uh, if, if you don't take the right approach to, to truly,
Speaker:uh, starting from scratch.
Speaker:That's one of the only ways to get,
Speaker:You,
Speaker:what are you saying?
Speaker:you put out a fire wearing moccasins or you
Speaker:I did not.
Speaker:I did not.
Speaker:My former, my, my former mother-in-law started a fire on my porch by putting
Speaker:a cigarette out in a plastic, uh, pot.
Speaker:The wind kicked it up, caught the pot on fire, melted it to the house.
Speaker:She came out, saw it was on fire.
Speaker:She kicked it off the porch, out into the dead grass, caught the grass on fire.
Speaker:Uh, all the while.
Speaker:Passing fire extinguishers and a water hose and all these things.
Speaker:And she decides the best course of action is to jump out into the grass
Speaker:and try to stomp it out with her fake leather moccasins, which did not work.
Speaker:Uh, and she made several trips, uh, from the grass out into the
Speaker:back, into the kitchen with a a, a simple watering pae again.
Speaker:Bypassing fire extinguishers and watering hoses, uh, to try and put this water,
Speaker:this, this fire out with a watering can.
Speaker:Um, and she failed.
Speaker:The, the fire simply burned itself out.
Speaker:Um, but it did ruin her moccasins, uh, her, um, her Mickey Mouse t-shirt.
Speaker:Oo.
Speaker:Um, and a lot of my yard.
Speaker:No,
Speaker:Um, go.
Speaker:As you're talking through that, right?
Speaker:It's sort of helpful to know, okay, here's all the things you should be looking for
Speaker:to understand, okay, were you compromised?
Speaker:But given a lot of companies these days, right, you kind of have developers
Speaker:who go off and do things, is there a mechanism to actually figure out like,
Speaker:am I actually impacted by this breach?
Speaker:Right?
Speaker:Like, do I even, am I even using, uh, the light LLM.
Speaker:Library in my environment or across, say, all of these developers or whatever it is.
Speaker:Sure.
Speaker:Uh, so if, if you're a security team and, and the development team is
Speaker:not a, you know, they're not open and, or, or, or you're, you're,
Speaker:you're concerned about their.
Speaker:Transparency.
Speaker:Uh, you can absolutely, again, go review all of your logs, review the systems,
Speaker:uh, depending on your, your security capabilities, uh, whether it's endpoint
Speaker:like a, a good, uh, EDR in malware solution like huntress, uh, or uh.
Speaker:A complete environmental, you know, technology environment monitoring solution
Speaker:like we provide with stellar cyber, uh, where we can collect data points from
Speaker:tons of data sources and correlate that in one dashboard and go, you know, and
Speaker:we can input these IOCs and it'll look through all of that data and go, yes,
Speaker:no, if yes, it maps, you know, what endpoint, what firewall did it go through?
Speaker:When did it happen?
Speaker:What was the user involved?
Speaker:All these things.
Speaker:And then if it did trigger something, even if it, even if the system at the
Speaker:time thought it was, uh, you know, uh, uh, you know, safe, I can, I can
Speaker:tell it, I can tell the system, uh, if light element LLM was downloaded,
Speaker:uh, you know, that library and, and it did these things, map that out for me.
Speaker:Uh, and so even if it was.
Speaker:Perceived safe.
Speaker:I can now go, I can go through my, my dashboard and look at
Speaker:all of the potentially impacted systems and, uh, networks and
Speaker:users involved and all that stuff.
Speaker:Um, absent all of those things, start the firewall.
Speaker:well start with talking to your developers, uh, and
Speaker:then start at the firewall.
Speaker:'cause all your, all your traffic needs to go out through the firewall.
Speaker:Um.
Speaker:Hopefully you've restricted, you know, developer bringing his own hotspot to
Speaker:download stuff so that it doesn't get blocked by your security policies.
Speaker:But, you know, there's, there's so many different depend, it depends situations,
Speaker:but start your firewall if you're, if you feel like you're, you can't get a straight
Speaker:answer out of the, the people that might have been involved in downloading this.
Speaker:Uh, another thing that I saw in suggestions was immediately revoke
Speaker:and rotate every secret that was stored as an environment variable.
Speaker:Um, you wanna talk about that?
Speaker:So this was, this was actually a pretty, uh, uh, a, a potentially
Speaker:pretty, uh, impactful incident.
Speaker:Uh, so when, when, when the malware came down, uh, it, it
Speaker:immediately started stealing secrets.
Speaker:Uh, and so that could be a secret, within an application, uh, you know, trusted.
Speaker:Uh, uh, trust between applications, trust between servers, trust
Speaker:between network segments, keys, SSH, Kubernetes, uh, golden ticket theft.
Speaker:I mean, there's, there's so many things that this malware could have done because
Speaker:it doesn't know what it has access to.
Speaker:It was just gonna try and steal everything.
Speaker:Um, and so absolutely every machine.
Speaker:That was potentially compromised.
Speaker:You need to do an inventory of everything it had access to and everything it,
Speaker:all those secrets it could have stored.
Speaker:Absolutely.
Speaker:All those things should be changed.
Speaker:Revoke it, change it.
Speaker:And I say revoke it because open sessions are not impacted by changing secrets.
Speaker:So you've gotta revoke those open, se those open sessions first,
Speaker:and then change, uh, change all your credentials and reissue
Speaker:tickets and all that good stuff.
Speaker:It's a lot of work.
Speaker:It, or it sounds like a lot of work, you know.
Speaker:It is, it is a lot of work.
Speaker:is a huge breach.
Speaker:It's why, it's why I wanted to jump in on this and we're, I'm actually gonna.
Speaker:Publish this early.
Speaker:Uh, normally we wait till Monday to publish our episodes.
Speaker:I'm gonna publish this one early because this is, this is huge.
Speaker:I mean, when I heard that it was 97 million monthly downloads, and
Speaker:then I heard just how bad the, you know, their stealing secrets.
Speaker:Um, you know, I mean, I, I do go back to that Tylenol scare, right?
Speaker:Tylenol was such a trusted source.
Speaker:Um, and, uh, then, you know, it was literally killing people.
Speaker:Uh, and um.
Speaker:So it was, you know, everybody immediately went and got the Tylenol
Speaker:and ripped it outta their shelves.
Speaker:Right.
Speaker:Um, and, and again, the, vendor in this case did the right thing, right?
Speaker:They, they didn't hem and haw, they just said, give us back a hundred million
Speaker:dollars, um, um, you know, of, of Tylenol.
Speaker:Mike, we're gonna talk about like, action items for the future.
Speaker:Anything else that specifically regarding this attack for the moment?
Speaker:Well add, I'll add, uh, with, with regard to this attack, you know, it
Speaker:was, it was found or identified fairly quickly just, you know, within a few
Speaker:hours, uh, that that developer, you know, was, was concerned about his,
Speaker:his system not running, uh, And that's when he figured this, these things
Speaker:out, and it got communicated and they, they took, they took that, um.
Speaker:That infected version down.
Speaker:So what I'd be interested to hear is what, what is the, the true impact of this?
Speaker:You know, if it was only available for a couple hours, um.
Speaker:know, how many organizations were impacted.
Speaker:Uh, were, are there any follow on, uh, attacks based on this level
Speaker:of effort it's gonna take to fix?
Speaker:So if I was an infected or an impacted organization, much like Prasanna
Speaker:mentioned, all those things, like I talked about, is things you need to do.
Speaker:That's a lot of work, but that's not something you're gonna be able to achieve.
Speaker:In, in an hour or a couple hours, maybe not even a couple of days,
Speaker:because changing some of that stuff may impact operations, right?
Speaker:So things stop working when you change trusts and credentials, especially,
Speaker:uh, from a, an operations perspective.
Speaker:So, I'll be interested to see.
Speaker:Uh, we're here, uh, in the coming months.
Speaker:What the fallout from this, even if it was only a couple of hours.
Speaker:And if you take the 95 plus million downloads a month and you divide
Speaker:that into the hours, so I think there's 720 hours a month on average.
Speaker:I just did that.
Speaker:I, I did great Mind signal light, that's 134,722 downloads per hour.
Speaker:So.
Speaker:could be significant.
Speaker:Um, and usually, you know, it's not multiple de developers in an organization.
Speaker:It's usually like one person is in charge for updating libraries
Speaker:and do doing stuff like that.
Speaker:so that could be 130,000 environments.
Speaker:Um, so that could be huge.
Speaker:And again, the level of effort for.
Speaker:to this episode.
Speaker:I hope so, and I hope they take it seriously because once we steal those
Speaker:credentials, a lot of times those credentials now on a, on a production
Speaker:side, like with service accounts and things like that, those are
Speaker:often randomly generated some weird.
Speaker:You know, hodgepodge, you know, random, alphanumeric, upper,
Speaker:lower, all that good stuff.
Speaker:And they're usually pretty long.
Speaker:in some cases, especially from, uh, you know, developers and, and non-security
Speaker:focused people, those passwords are coincidental with other things.
Speaker:And so if bad guys stole credentials in this case, there's a good
Speaker:chance that developer uses that password or those credentials or
Speaker:those tokens for other things.
Speaker:When will we learn?
Speaker:So, um, especially if you're a, a, a man, you, you know, you're a, you're
Speaker:a development shop where you're doing development for multiple clients, very
Speaker:often, you know, your credentials are the same across multiple organizations,
Speaker:which is also bad practice.
Speaker:But, um, yeah, if, if they don't take this seriously and, and.
Speaker:You know, gonna kind of go scorched earth on rebuilding and remediating this.
Speaker:Uh, it could be, it could continuous, uh, continue to be bad
Speaker:for a lot of these organizations.
Speaker:And, and by the way, uh, even though the, this attack did attempt to, uh,
Speaker:appears to attempt to exfiltrate some data again, the fir, the primary focus
Speaker:of this was credential harvesting, which would be a type of attack that
Speaker:an initial access broker would take.
Speaker:I just want the credentials.
Speaker:I'm gonna sell those to other people that knew, uh, that know how to
Speaker:do or, or are interested in, in various other types of attacks.
Speaker:you don't know what an in initial access broker, uh, is, listen to our episode.
Speaker:What is an initial access?
Speaker:Initial access broker?
Speaker:I'll put a link to it in the, in the, uh, episode description.
Speaker:so let's talk about some action, some action items.
Speaker:And the first thing I'm gonna put on there.
Speaker:gonna say that, you know, for the future, you need an inventory of your environment.
Speaker:You need an inventory of what, what software you're using and
Speaker:what dependencies you have.
Speaker:Uh, you know, so I, I, I live in, I live in, you know, California and
Speaker:one of the things we have here, if you sell food, you have to keep a
Speaker:list of all of the suppliers, uh, of where you get the food so that when.
Speaker:Um, you know, there, there's a, you know, a what, what's that?
Speaker:What?
Speaker:An coli on spinach, uh, outbreak.
Speaker:And they say it was these suppliers you can immediately know, uh, you know.
Speaker:And so I'm gonna say that the first item that that should be
Speaker:on your list is, is an inventory.
Speaker:Um, and, um, and of course you're gonna audit the, your current versions.
Speaker:Um, for, for light, LLM, let's talk about,
Speaker:Wait,
Speaker:de.
Speaker:so, so you talked about an inventory.
Speaker:Could I also say an inventory with processes to make sure people don't do
Speaker:things outside of sort of like what's approved or like Mike had said, sort of
Speaker:like a security team who's kind of vetting the libraries before they sort of are
Speaker:allowed to be used within an organization.
Speaker:Yeah, absolutely.
Speaker:That makes a, that, that makes a, a, a or that makes a lot of sense.
Speaker:Um, and then we're gonna talk about, um.
Speaker:The dependency pending and, and hash, um, the use of hash values
Speaker:Prasanna , do you wanna talk about that?
Speaker:Yeah.
Speaker:So what happened in this attack, like Mike said, right?
Speaker:The attackers updated the version of light LLM.
Speaker:People started downloading it, and one of the reasons that happened is sometime.
Speaker:When people set up to do these pulls of these dependencies in libraries,
Speaker:they'll just say, give me the latest.
Speaker:Right.
Speaker:Rather than saying, okay, I want this particular version such that you
Speaker:know that, okay, that's the only one.
Speaker:So if they had done version pinning, which is to specify a particular version
Speaker:for my build, then they wouldn't have been able to download the latest version
Speaker:because it's only gonna pick one version.
Speaker:Right.
Speaker:And so that would've prevented that issue.
Speaker:Another thing I know, Mike, you alluded to this earlier, is
Speaker:also sort of the hashing, right?
Speaker:So when you are downloading a version, confirm that yes, this is the LA latest,
Speaker:or this is a version that I care about and here's the hash that goes with it.
Speaker:So I know that it is a valid, uh, version of that library.
Speaker:It's something that I expected.
Speaker:You wanna prevent sort of the supply chain.
Speaker:Attacks from immediately impacting you because if you can sort of delay when
Speaker:you take the latest version, it gives other people time to react and sort of
Speaker:uncover these issues before you get hit.
Speaker:It's kinda like when you download the latest, uh, software updates
Speaker:on your phone or your car, right?
Speaker:Some people are like, oh, I wanna be day one, like right as soon as it's available.
Speaker:Versus others are like, Hey, let's wait till it's baked out.
Speaker:And they sort of worked out all the bugs.
Speaker:And I'll take like the dot two or the dot three of that initial major version.
Speaker:You know, as a person who's who, you know.
Speaker:I, I am not a developer, right?
Speaker:Uh, never have been a developer.
Speaker:I have written some Pearl, I've written some pretty mean pearl in my day.
Speaker:But, uh, but I am not a developer with dependencies and such.
Speaker:That doesn't mean I don't know what app get, you know, and, uh, you know, and, uh,
Speaker:so I'm gonna be thinking about that every time I. You know, have, I'm downloading
Speaker:a tool and it says the first thing you need to do is update all your libraries.
Speaker:Right.
Speaker:Um, but the, I'm, I'm dependent on the people that wrote that tool to
Speaker:do the things you're talking about, because this is something that the
Speaker:person writing the tool has to do.
Speaker:Right?
Speaker:They have to, they have to.
Speaker:know, you said specifically call out particular versions and also, uh, uh, so
Speaker:again, because I'm not a developer, is that hash, is that going to be provided
Speaker:by that tool, or is this something you're going to create when you download the
Speaker:trusted version that you're familiar with?
Speaker:The vendor, the developer,
Speaker:Okay.
Speaker:the trusted source would provide the hash value.
Speaker:Okay.
Speaker:Okay.
Speaker:So, uh.
Speaker:speaking, speaking, as a non-developer, that sounds backwards to me.
Speaker:Like, so like some point we have to trust this, this vendor, right?
Speaker:So this is, this is, so we have a trusted version and they're going
Speaker:to, how do we get that trusted version in the first place?
Speaker:How do we determine which version is a trusted version?
Speaker:Yeah, and we, so we've gotta, we've gotta establish it as a trusted source.
Speaker:And so whether it's directly from the vendor and, you know, they go
Speaker:through any number of certifications as a trusted source, you know,
Speaker:their processes, their controls.
Speaker:So that could be an ISO certification or a, a SOC two, type two, uh,
Speaker:audit certification, or, you know.
Speaker:Something like that, that helps us as consumers, uh, feel confident
Speaker:that they're doing business in a secure and, um, you know, good way.
Speaker:But it's just a piece of paper, right?
Speaker:And it's, it's some third party that it happened at some point in time.
Speaker:You know, I could have gotten an ISO 27,001 security certification
Speaker:over everything I do yesterday.
Speaker:Well, today's a new day, and I could have changed things.
Speaker:And so there's always a level of diligence, regardless of how
Speaker:much trust you put in something.
Speaker:Um, and there are several organizations I'm I know of that whenever they
Speaker:download something new from a trusted source or not, they run it in a
Speaker:sandbox environment for a period of time, to determine operational impact.
Speaker:Is this gonna change?
Speaker:Or, you know, is it going to.
Speaker:Kill a process or is it even gonna work with our systems?
Speaker:we see this a lot with Microsoft patches.
Speaker:You know, those, those are all well known for creating issues.
Speaker:Uh, well this could, this could very well follow that same methodology.
Speaker:Whatever you download, you need to sandbox it, for a period of time
Speaker:before you implement it in your, even in your test dev environment.
Speaker:Um, but yes.
Speaker:a lot of, go ahead.
Speaker:Yes, you're the, the people that created something and they want to be, you know,
Speaker:they wanna maintain their reputation and the, the integrity around their product.
Speaker:Uh, they will often publish the hash value of that file or that object.
Speaker:and it's very difficult to, uh,
Speaker:it's very difficult to falsify a hash value.
Speaker:Right, right.
Speaker:I've done, I. a bit of work with, uh, you know, living where I live.
Speaker:I've done quite a bit of work with, uh, the um.
Speaker:Uh, biotech folks and they definitely have this concept of, you know, verified
Speaker:systems that have, uh, it's not the term verified, it's been a while.
Speaker:They have another term for the systems that have been verified, uh, and they
Speaker:very much, you change a single thing and the environment and they have
Speaker:to reverify the entire, uh, system.
Speaker:So.
Speaker:That's something, a lesson that we could take from them.
Speaker:I am of course, going to suggest that if you haven't hardened your backups,
Speaker:now's the time to harden your backups.
Speaker:We talk about this a lot in the book and the, the, and, and all of the usual things
Speaker:of, of MFA and password management, and hopefully pass keys moving forward to
Speaker:pass keys, uh, and separating, right?
Speaker:So, uh, you know, putting, uh, a different, um.
Speaker:and authorization system for your backups.
Speaker:I know it's a pain, but just like everything else in security, uh,
Speaker:you know, it secure, you know, good security and convenience are not
Speaker:necessarily in the same, uh, you know, in the same, uh, um, ballpark.
Speaker:And the number one thing here that I'm gonna, that I'm gonna be
Speaker:harping on is immutable storage.
Speaker:Right.
Speaker:So this entire time though, we talked about this library, which was supply chain
Speaker:attacked, which were stealing credentials.
Speaker:Could you help our listeners understand the link between having
Speaker:immutable backups and this attack?
Speaker:Yeah.
Speaker:Great.
Speaker:So the, the, the, the, one of the things you, if you go back earlier in the
Speaker:episode, one of the things Mike said was restore your, um, what, whatever
Speaker:this is from a trusted backup, right?
Speaker:From a backup that you trust the, the thing with the immutable backups
Speaker:is one of the things that, that just hurts my little heart when I see it
Speaker:out there is when a ransomware or a malware attack happens, and you see the
Speaker:little phrase at the end of the story.
Speaker:And the backups were also corrupted, right?
Speaker:So having immutable just means cannot be changed.
Speaker:And the standard by which I judge immutable backups is if you can delete
Speaker:them, If you as an admin can delete your old backups, then those aren't immutable.
Speaker:At least that's, that's the gold standard that I'm putting.
Speaker:So, um, configure your backups in such a way.
Speaker:Talk to your vendor.
Speaker:How do I do this?
Speaker:Configure your backups in such a way that even you, the super, super, know,
Speaker:God level access on your backups.
Speaker:If you cannot delete backups before they're supposed to expire, then
Speaker:you actually have immutable backups.
Speaker:If you're anything less than that, you're immutable ish.
Speaker:I'm not saying it's crap.
Speaker:I'm just saying the closer you can get to that level of immutability, um, you
Speaker:know, and, and Prasanna you always bring up, you know, when we start talking about
Speaker:actual immutable storage, there's like the compliance mode and the what are the two
Speaker:Governance.
Speaker:governance mode.
Speaker:Right?
Speaker:And the governance mode is the more stringent one, right?
Speaker:Yeah.
Speaker:And so, uh, basically that, that mode of, uh, and we're talking, in this
Speaker:case, we're talking about like, uh, object lock in S3, that if you enable
Speaker:the, the stricter mode, even you, the owner of the account cannot delete.
Speaker:Objects before they're supposed to expire.
Speaker:And if that's the way your backups work, then that's truly immutable.
Speaker:And if that's the case, then the bad guys can't delete or encrypt or corrupt
Speaker:your backups, which means that you can then use them to restore this library.
Speaker:Right.
Speaker:That's a, that's a great, thank you for, uh, for making me.
Speaker:Uh, get up on my soapbox and, uh, and explain that.
Speaker:and again, I, I, I, I mentioned it already, but,
Speaker:um, of course we're, you know.
Speaker:Basically in your whole environment.
Speaker:Look at MFA.
Speaker:And again, literally the last episode, Mike was a little bit
Speaker:rolling his eyes on, on MFA, but not, he doesn't think my MFA is bad.
Speaker:He just, it's not perfect, which is why we're trying to move to pass keys.
Speaker:But if you don't have MFA, if you have passwords in the wild.
Speaker:That are, that are securing things that are important.
Speaker:And you don't have MFA Mike, do you wanna explain what, what, why, again,
Speaker:why is MFA, what does it do, uh, in, in this situation when somebody does
Speaker:happen to harvest your credentials?
Speaker:What is the purpose of MFA?
Speaker:MFA is supposed to be a second, layer of security.
Speaker:And we, we consider it an out of, out of band.
Speaker:Of band means, you know, if I'm logging into my computer, the MFA doesn't
Speaker:pull up on this computer, it goes to my phone or a, or an authenticator
Speaker:app or any, another email address.
Speaker:Uh, and that's important because if, if bad guys also capture your MFA
Speaker:token and they're already at your computer, or they're already in your
Speaker:environment and they already have your credentials, then your MFA is is.
Speaker:Useless it.
Speaker:It's not providing that extra layer of security.
Speaker:MFA is also, uh, a, a good way of determining if your
Speaker:credentials have been stolen.
Speaker:Uh, so if you get a, uh, a text message or an email on your phone that says,
Speaker:here's your, here's your MFA key for Facebook or LinkedIn, you're like, well,
Speaker:I'm not logging into those right now.
Speaker:else is.
Speaker:Uh, and so that's a good indication.
Speaker:You need to go change your credentials and, and maybe even try
Speaker:to figure out how that happened.
Speaker:But the problems with MFA.
Speaker:Is if I'm on my computer and I log into something and it says, Hey,
Speaker:uh, you need to check your MFA.
Speaker:Device or your app put in that code.
Speaker:The next, very next thing that happens is usually why MFA's
Speaker:value diminishes significantly.
Speaker:And that is a popup, uh, window or a, a subsequent webpage that says,
Speaker:do you want to trust this device?
Speaker:Do you want me to remember you?
Speaker:And if you click yes, then you don't have to do MFA for that anymore.
Speaker:So at work for your bank, probably not your bank, but you know,
Speaker:LinkedIn, Gmail, whatever it is.
Speaker:If you click remember me or Trust this device, you have saved
Speaker:that MFA token in your browser.
Speaker:And so now bad guys just need to get you to go to a bad website or
Speaker:potentially even download some malware and they will harvest that MFA token.
Speaker:And if they can compromise your credentials by getting you to
Speaker:click a link, they can also.
Speaker:Create a new session as you, with that new MFA token whereby bypassing the
Speaker:value of having MFA to begin with.
Speaker:they only do that on the computer where the MFA token was, was generated?
Speaker:It's only valid there.
Speaker:Right.
Speaker:They, they cannot do it.
Speaker:They, they, they're not limited to the computer.
Speaker:It was generated on.
Speaker:They just need access to the browser or the, the computer to take the
Speaker:saved MFA token out of the browser.
Speaker:I can do that remotely.
Speaker:I can do that remotely from anywhere in the world.
Speaker:I can get you to go to a bad website, will then suck that
Speaker:MFA token outta your browser.
Speaker:Or get you to click on a phishing email or go to a website to
Speaker:download, you know, malware.
Speaker:And that malware similar to this light LLM, uh, will harvest,
Speaker:uh, those MFA tokens for me.
Speaker:And, and so just to make sure I understand, so if they get that, if
Speaker:they've got your credential, you know, your username and password and that saved
Speaker:MFA token, even though that token was created on this laptop, they can use those
Speaker:three things to log in as me anywhere.
Speaker:High Probability
Speaker:Curtis is freaked out.
Speaker:Why you always doing this to me, Mike?
Speaker:Trying to, I'm trying to get your hair to match my hair.
Speaker:There are things you can do, uh, from an organization security perspective
Speaker:to limit that in, in, in other words, uh, as a security admin for a company.
Speaker:Uh, I can go into Office 365 as an example and say, you
Speaker:know, no, no concurrent logins.
Speaker:You know, Mike can only log in one time.
Speaker:I can say, you know, uh, Mike can only log in from domestic ips.
Speaker:Or we block all, you know, bat known bad ips, you know, China,
Speaker:North Korea, um, et cetera.
Speaker:there's a list of those that's published every day of every, every week.
Speaker:there are things that we can alert on.
Speaker:Uh, and so if Mike's logged in and Mike logs in again from a
Speaker:different app IP address, and we would, uh, es especially one that's.
Speaker:Very far away.
Speaker:We call that impossible travel.
Speaker:Uh, so if you, if I've logged in from Texas and, and, you know, 10 minutes
Speaker:from now someone logs in from even, you know, Kansas, impossible travel.
Speaker:And so that should be alerted on and potentially even automatically blocked.
Speaker:And if, if we want to take a very strict approach to that.
Speaker:Uh, whenever we see that impossible travel without explanation,
Speaker:we suspend the account.
Speaker:Yeah, yeah, sure.
Speaker:Mike isn't gonna be able to work for a couple of minutes, but Mike's about to get
Speaker:a phone call and say, you know, where are you, Mike, and what are you working on?
Speaker:Um, so we can clear this up before things get bad, and that is the key
Speaker:to incident response these days.
Speaker:It is how fast can we respond to weird stuff before bad things happen?
Speaker:Speaking of alerting, Mike, uh, do you want to talk about how the kinds of things
Speaker:that people should be doing to make sure that they are aware, that they get these
Speaker:alerts when something like this happens?
Speaker:What, what should they be following?
Speaker:How and how should they be doing that?
Speaker:I'll tell you just about every tool that's out there has free training.
Speaker:We just we're too lazy to take it.
Speaker:You know, we're such a consumer driven culture.
Speaker:We just want the latest, greatest, use it now, share it with my
Speaker:friends, and move on with our day.
Speaker:very rarely set time aside to watch the video or read the manual.
Speaker:and I'm, I'm guilty of that too.
Speaker:Um.
Speaker:But it's, it's all out there.
Speaker:So if you wanna know how to secure your Gmail or your, don't be using Yahoo
Speaker:or Hotmail still, or definitely not a OL, but if you have a, whatever your
Speaker:account is, there is guidance out there from whoever that provider is to help
Speaker:you secure it and, and be more aware of when weird things happen, for example.
Speaker:In Gmail, there's a security tab where you can see all the last logins
Speaker:and IP addresses and time and date.
Speaker:And a lot of people don't know that you can do the same thing
Speaker:with iCloud, uh, for your bank.
Speaker:Very similarly, uh, there's a security tab, when were the last
Speaker:logins, what did I do, you know, uh, from an activity perspective.
Speaker:and those are just the authentication pieces.
Speaker:Well, what about the behavior?
Speaker:So what if someone was able to.
Speaker:Log in, uh, to one of these accounts.
Speaker:Uh, and like my bank, what if, what if they start to transfer money or
Speaker:they steal my credit card and they're, you know, they're buying tires.
Speaker:In Utah, there are ways of setting alerts.
Speaker:You just have to be willing to manage it.
Speaker:Uh, so for example, everything over a dollar on my credit card, my
Speaker:debit card, I get a text message.
Speaker:I do the same.
Speaker:Right.
Speaker:So, and I'm okay with that and in fact, it's kind of cool
Speaker:to see how fast that happens.
Speaker:I'm at the grocery store, I just said, please remove your car.
Speaker:And I got a text message.
Speaker:That's awesome.
Speaker:Um, and very similarly, I was
Speaker:I, I hate, I hate to cut you off, but Prasanna 's gonna turn into a pumpkin.
Speaker:The, those are great things.
Speaker:It wasn't the question I was asking.
Speaker:My
Speaker:sorry.
Speaker:is No, it's fine.
Speaker:Uh, what I'm talking about is what?
Speaker:kinds of things I, as a company should be looking for?
Speaker:Where I get these alerts that, that a security incident is,
Speaker:it's like this one is happening.
Speaker:That's what I'm talking about.
Speaker:So you gotta define the role first.
Speaker:You know, who's gonna be responsible for this?
Speaker:Nobody wants to look at logs and alerts all day.
Speaker:They've, it's usually someone's part-time job they do at lunch or at the end of
Speaker:the day, or first thing in the morning.
Speaker:And that's it.
Speaker:It's not real time all the time.
Speaker:you should have a dedicated person for this.
Speaker:you need a. Defined incident response plan.
Speaker:Uh, and so for every alert I get, I need to follow these procedures
Speaker:every alert, uh, even if it's false positive, you've gotta go through
Speaker:the process of determining it's false positive and documenting that.
Speaker:So in the future, someone goes, Hey, that thing happened.
Speaker:How come we didn't do something about it?
Speaker:Well, I looked at it and if I was false positive, you know, it wasn't,
Speaker:I think.
Speaker:do I, where do I get these alerts?
Speaker:This is my question.
Speaker:it wasn't a legit, uh, alert.
Speaker:So go into all of your systems.
Speaker:if, if you've got an environment where someone's managing your stuff,
Speaker:uh, you need to turn on event logging for as much as you can, consolidate
Speaker:all those logs into one place.
Speaker:And there's a variety of things you can do, like a SIS log server or, uh, uh,
Speaker:there's some free open source, uh, log consolidation and analysis tools like Sim,
Speaker:monster, uh, SIEM, monster, um, there are.
Speaker:Um, a variety of, uh, automated scripts like python's.
Speaker:One of them, powershells one where you can use those to, uh, to alert on specific
Speaker:event IDs and to know what those are.
Speaker:Google it, what if, what security and event ID should I be concerned about?
Speaker:And you'll get a list of those, or, uh, call, a call a managed service provider.
Speaker:If you don't have the, the skills and the staff to, to support that activity, they
Speaker:can consult with you about what you have.
Speaker:How to configure it, what to do with it internally, uh, and how
Speaker:they could help if you need, um, you know, additional skills and staff,
Speaker:especially if it's a 24 7 thing.
Speaker:Cybersecurity managed services today are so affordable.
Speaker:Everybody should have it.
Speaker:Uh, there's just no excuse and if you don't have it, it's gonna impact your
Speaker:ability to get insurance in the future.
Speaker:If you have a breach like this, your, your damages from lawsuits are gonna be a lot
Speaker:bigger 'cause you, you weren't diligent.
Speaker:Uh, but yeah, there's absolutely.
Speaker:number of ways of collecting this information, being able
Speaker:to automatically alert on it.
Speaker:You just have to have the people and the procedures available
Speaker:to, uh, to take action.
Speaker:and Mike, I guess, oh, as Curtis had asked that question, one thing I was thinking
Speaker:about is like, Hey, I work at a company.
Speaker:All these issues are constantly happening.
Speaker:Where as a person do I go to understand, Hey, where are the latest breach alerts
Speaker:or other things like that happening.
Speaker:That's kind of what I was thinking.
Speaker:I don't know, Curtis, if that was what you were intending to, but.
Speaker:is, that is the, that is the question I was asking Mike.
Speaker:Was just, I just wanted you to say like cbe.org or something.
Speaker:That's what I was looking for.
Speaker:I apologize.
Speaker:I'll start, I'll start clarifying my understanding of
Speaker:your questions in the future.
Speaker:Uh, so cisa.gov, cisa.gov, uh, is a good, uh, site.
Speaker:Um, there are, there are a ton of, uh, Twitter or X profiles.
Speaker:Uh, just search, you know, cybersecurity threat, intel and,
Speaker:and x and you'll find good accounts.
Speaker:So that's, that's people that, that's all they do, and it's very timely.
Speaker:In fact, a lot of stuff will show up there as a quote unquote proof of concept before
Speaker:ciso or some of the other agencies will actually, uh, publish it as a, a known
Speaker:vulner, uh, known exploit or an attack.
Speaker:It'll be a proof of concept that someone has, uh, observed out in the wild.
Speaker:There are vendors out there that provide free threat intelligence.
Speaker:If you're part of critical infrastructure, uh, get with your state.
Speaker:Uh, there are state information sharing and analysis centers that you can
Speaker:subscribe to for free, and you'll get daily, sometimes hourly updates on
Speaker:threats, and if you're part of the critical infrastructure working with
Speaker:the, the state ISACs, uh, they'll even help, uh, with your response.
Speaker:So, um, there, there's just too much to get into from a, from a resource
Speaker:perspective, but cisa.gov is a good one.
Speaker:I know we covered a lot of these in the book, um, you know, buy our book.
Speaker:Uh, but, uh, let, we will, I'll, if you could give me a list of those and
Speaker:we'll put 'em in the show description.
Speaker:'cause this, I think this is a big deal.
Speaker:This is an op, it's, once again, it's an opportunity for people to get scared
Speaker:to, to then go, you know, evaluate.
Speaker:Evaluate their life.
Speaker:Uh, all right.
Speaker:Well, thanks Mike.
Speaker:I This is great.
Speaker:Thanks for, thanks for getting up.
Speaker:Uh, well, it's for you, it's not, not as early, but, uh, Prasanna
Speaker:, definitely you're your early bird.
Speaker:Like you're not an early bird, but, uh,
Speaker:I am an early bird.
Speaker:Yeah.
Speaker:Okay.
Speaker:Well.
Speaker:Yeah.
Speaker:I'll just say thank you, Curtis, for, for get, for getting on the
Speaker:camera at seven 30 in the morning.
Speaker:'cause this is not, this is
Speaker:Have you had your coffee yet?
Speaker:I I've had two cups, actually, by the way, I had a cup of Java in a Java mug,
Speaker:uh, very old Java mug that you can see if you watch the YouTube version of this.
Speaker:All right, well, thanks, uh, thanks you two.
Speaker:And, uh, that is a wrap







