What Is an Initial Access Broker — and Why Should You Care?

What is an initial access broker — and why does it matter to your organization? In this episode, W. Curtis Preston and Prasanna Malaiyandi are joined by Dr. Mike Saylor of Black Swan Cybersecurity to break down the role of the initial access broker in today's ransomware attacks.
Most people picture ransomware as a single bad guy with a keyboard. The reality is way scarier. There's an entire criminal supply chain out there, and the initial access broker is the specialist at the front of it. These are the people who do nothing but break in — stealing credentials, exploiting vulnerabilities, hijacking sessions — and then sell that access to other criminals who do the dirty work. Dr. Mike Saylor walks us through a real case study from 2024 where an employee's personal Gmail account — with a Google Docs folder literally named "passwords" — became the entry point for a corporate ransomware attack months later. This stuff is real, it's happening constantly, and most organizations have no idea how exposed they are.
We cover what IABs target, how they package and sell access, what "coincidental passwords" are and why they're so dangerous, and what practical steps you can take today to make your organization a harder target.
Chapters:
00:00 - Intro: What Is an Initial Access Broker?
02:12 - Welcome, Introductions, and a Little Judging
03:33 - Defining the Initial Access Broker
04:31 - Real Case Study: How Bob's Gmail Became a Corporate Breach
07:16 - How IABs Package and Sell Access
10:32 - How Stolen Credentials Get Bundled and Priced
29:48 - RDP, VPN Vulnerabilities, and What IABs Are Hunting
32:54 - Web Shells Explained
35:08 - Session Hijacking and Man-in-the-Middle Attacks
36:16 - Would Eliminating IABs Stop Ransomware?
36:49 - How the Cybercriminal Ecosystem Evolved to Create IABs
39:51 - Practical Takeaways: What You Can Do Right Now
40:45 - The Numbers: 37 Billion Records and the ShinyHunters Breach
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we look at something most people I don't think have even heard
Speaker:of, but definitely need to know about, and that's the initial access broker.
Speaker:These are the bad folks that wanna break into your network,
Speaker:but then just sell that access to whoever's willing to pay the most.
Speaker:They pick your lock and then hand the keys to somebody else.
Speaker:We have Dr. Mike Sailor from Black Swan Cybersecurity, my co-author and of
Speaker:course, persona to help break down how these guys operate, how they get your
Speaker:credentials, who buys them, and most importantly, what you can do to stop them.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery for over
Speaker:30 years, ever since I had to tell my boss there were no backups of the
Speaker:production database that we just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the backup wrap up.
Speaker:I'm your host w Curtis Preston, AKA, Mr. Backup.
Speaker:And I have with me Judge mc judger face Prasanna.
Speaker:Molly Yondi.
Speaker:How's it going?
Speaker:Prasanna feeling a little judgy today.
Speaker:Someone needs to judge you and make sure that you are doing the right things and
Speaker:being most effective with your resources.
Speaker:I, I, I really appre, I didn't realize that I had appointed
Speaker:you CFO of my, you know.
Speaker:uh, do you not know all the other things?
Speaker:You're non-ad advisor, financial advisor, your non-medical health person.
Speaker:Shall I continue going down the list?
Speaker:Curtis?
Speaker:I, I just, I'm just saying for those that care Okay.
Speaker:Is that I just had like a five minute phone call with Prasanna
Speaker:during which I felt very judged for starting a new cloud service.
Speaker:The, a new AI based cloud service that I'm very excited
Speaker:about, called Fixer, F-Y-X-E-R.
Speaker:Um, anyway.
Speaker:I'm just saying I felt very judged.
Speaker:Anyway, I'm moving on.
Speaker:Uh, we also have with us, uh, my, my co-author from the book,
Speaker:right, right over my left shoulder.
Speaker:And a blue team expert at Black Swan Cybersecurity.
Speaker:We have Dr. Mike Sailor.
Speaker:How's it going, Mike?
Speaker:It is going well guys.
Speaker:Thanks for having me
Speaker:Oh.
Speaker:Can you judge Curtis now too?
Speaker:Just, just just start a conversation and I think Curtis needs
Speaker:that sort of love all around.
Speaker:sure.
Speaker:I'll, I'll work that into the conversation.
Speaker:I feel, I feel so judged.
Speaker:Um, so today, um, we're gonna talk about, we talked about this a little bit, I
Speaker:think in a previous episode, but, uh, it looks that like this topic comes up
Speaker:enough that people just don't understand.
Speaker:This, this entity or this type of, can we call it a business?
Speaker:Mike?
Speaker:Would you call it a business?
Speaker:It's a business, right?
Speaker:business.
Speaker:Yeah.
Speaker:And that is an initial access broker.
Speaker:Um, so why don't you start with this story that you had, that you used in the book as
Speaker:a case study about something that happened with one of your clients back in 2024?
Speaker:Sure.
Speaker:We had a client call and say, you know, someone broke into our stuff and we're
Speaker:not sure how, because, uh, you know, we we're not seeing any failed login attempts
Speaker:or weird logins from, from other places.
Speaker:We'd call those risky logins.
Speaker:Uh, so how did this happen?
Speaker:And so it takes quite a while to analyze.
Speaker:Even legitimate logins.
Speaker:to figure out where the anomalies are.
Speaker:so you narrow that down.
Speaker:You find out, you know, who, who patient Zero might've been, and then you go,
Speaker:you have to go talk to them because you don't have you don't have visibility
Speaker:or access into their, their whole life, uh, and things they have access to.
Speaker:But in that conversation, this employee, uh, it turned out and,
Speaker:and they were very open, uh, and, and almost somewhat, uh, naive about
Speaker:what they were telling us, which.
Speaker:That's a whole other problem.
Speaker:Uh, so this, this user, uh, we'll call them Bob.
Speaker:Uh, Bob's like, I, I don't, I don't know how my account
Speaker:could have been compromised.
Speaker:I don't, I don't think I'm the one that caused this problem here at work.
Speaker:Uh, but in discussion with him about just weird things that may have happened
Speaker:over the last several months or year, uh, he says, now, now granted, this,
Speaker:this event was happening, you know, October, November of a given year.
Speaker:And talking to this employee, he says, oh yeah, back in like April, you know,
Speaker:around Easter, my personal email account was compromised and I've just been
Speaker:fighting with, with Google to, to maintain access to my account and control over it.
Speaker:You know, I keep changing the password.
Speaker:It keeps, keeps changing back.
Speaker:They keep, you know, uh, my, my recovery email keeps changing.
Speaker:And we thought, okay, well, well, tell us about how you.
Speaker:How you use that personal account, is it really just like, you know,
Speaker:uh, you use it when you sign up for stuff like a newsletter or you, you,
Speaker:you go to Amazon, you buy something?
Speaker:He said, yeah, I do all that.
Speaker:Okay.
Speaker:And, and by the way, this is normal interrogation techniques.
Speaker:You, you ask the simple questions first.
Speaker:you
Speaker:build report, you get up to the the sticky questions.
Speaker:And eventually I just said, so, you know, what others, what other type
Speaker:of information do you do you store in your, in your personal account?
Speaker:He goes, oh, well, everything.
Speaker:And I said, yeah, like, like what?
Speaker:Well, you know, I, uh, my, my work email and, and password, my bank information.
Speaker:I said, okay, well, you know,
Speaker:that's, that's probably
Speaker:not good.
Speaker:And, I said, okay, well, well talk to me about how you do that.
Speaker:Did you have a question?
Speaker:So I was like, alright, so how do you, how do you store that stuff in there?
Speaker:Is it like in a spreadsheet?
Speaker:Uh, is it a, is it a note to yourself?
Speaker:Like a draft email?
Speaker:He says, oh no, I created a Google Docs folder called passwords okay.
Speaker:Uh, so, so that's what happened.
Speaker:Uh, bad guys at some point compromised his account likely through phishing
Speaker:or the compromise of some third party.
Speaker:Uh, application or website.
Speaker:'cause you know, it all trickles down and bad guys go for the, they want fish
Speaker:in a big pond, then when they, when they catch fish out of the big pond, you
Speaker:know, they cultivate that and see what they have access to and, and et cetera.
Speaker:So it's all, it's all kind of interconnected.
Speaker:But long story short, these bad guys are just, you know, going
Speaker:through the neighborhood, looking for un unlocked doors or doors that
Speaker:are easy to pick and, and open.
Speaker:And once they identify those vulnerable and accessible.
Speaker:Uh, organizations or, or houses in this analogy, that's what they sell.
Speaker:They're like, Hey, I picked this lock.
Speaker:I guessed that code.
Speaker:I've opened this door.
Speaker:I've established this, this access.
Speaker:And that's what they're selling.
Speaker:So they never go in the house.
Speaker:They never steal anything.
Speaker:They never use that, that access to, you know, for, for, um, extortion or,
Speaker:Uh, solicitation or, or even fraud.
Speaker:They're just gaining the access and selling it.
Speaker:And
Speaker:So they're hoping for large volume, I'm guessing at that point, right Where
Speaker:for, yeah.
Speaker:Or, or some, you know, exceptionally valuable access,
Speaker:Gotcha.
Speaker:like
Speaker:Like a celebrity or a
Speaker:right?
Speaker:or a specific organization type of thing.
Speaker:or, or a, um, a high value target.
Speaker:Or like a, like an like an administrative account, for example, at a right.
Speaker:Like if you
Speaker:or
Speaker:Yeah.
Speaker:Critical infrastructure or something like that.
Speaker:Yep.
Speaker:Or a research institution.
Speaker:We've, we've seen that over the last
Speaker:Hmm.
Speaker:Uh,
Speaker:so this initial access broker found this credential folder sold
Speaker:it and bad guys bought it and used the credentials to this, uh, this.
Speaker:Subsequently this, this victim organization that,
Speaker:that called us for help.
Speaker:Um, and those bad guys use that access to commit their attack.
Speaker:Now I'm guessing that these initial access brokers, probably gather up
Speaker:thousands, tens of thousands, whatever large number of credentials or initial
Speaker:sort of compromise points at these organizations or with these people.
Speaker:But it's not like they're just selling it to a single individual, right?
Speaker:they like take that same package and be like, Hey, I'm gonna sell it to you.
Speaker:I'm gonna sell it to this other person.
Speaker:I'm gonna sell it to this third person, where all these sort of buyers might have
Speaker:access to the same sets of credentials.
Speaker:so there is a bit of reputation here, believe it or not.
Speaker:So if, if I had a hundred valid and, and backing up a little bit too.
Speaker:So, so let's say, let's say bad guys found a, uh, a vulnerable organization, and
Speaker:maybe that organization is a mobile app.
Speaker:know, we all, we all downloaded it, you know, a million people downloaded this
Speaker:mobile app we've created an account a lot of us being human
Speaker:will use information that we coincidentally use in other places.
Speaker:So, same password on this app that we use for our bank.
Speaker:You know, horrible situation, but it happens.
Speaker:Alright, so bad guys.
Speaker:Compromise this mobile app.
Speaker:They collect or harvest all of these, you know, million credentials.
Speaker:If they want the true value out of those credentials, they
Speaker:will go and validate them.
Speaker:So out of a million, 90% still work.
Speaker:So they can sell 90% of those.
Speaker:They can either sell it as one big chunk, which is less likely.
Speaker:What they'll probably do is analyze that data set and look for commonalities.
Speaker:Like I've got out of, out of 900,000, I've got, um, a hundred thousand, uh.
Speaker:Edu or, or military or public, public, uh, organization emails.
Speaker:And they'll, they'll bundle that.
Speaker:So there's some, you know, uh, relationship with that.
Speaker:'cause that's sometimes how threat actors work.
Speaker:They want to target something specific.
Speaker:All right.
Speaker:So they, they will bundle to some degree.
Speaker:but then to your, to your question too, if I, if I sold, if I sold
Speaker:900,000 to Curtis, would I also sell that same 900,000 to Prasanna?
Speaker:Well, maybe.
Speaker:Yeah, not likely because if you found out, because maybe Curtis used that
Speaker:password, that account first, and something happened and it got locked
Speaker:out, and that happened over a period of time, and then you go try to do it.
Speaker:And now that now it's not, they're not valid accounts, right?
Speaker:and so you can often find out that been sold more than once.
Speaker:Well, then you're not gonna buy from that person again.
Speaker:Right.
Speaker:It's a reputation.
Speaker:Yeah, and I think you had mentioned in a previous podcast episode, sort of if
Speaker:it's like invalidated email addresses or whatever else, it might sell at
Speaker:a lower cost sort of things that you know, have been validated and verified.
Speaker:Interesting.
Speaker:So very often, um.
Speaker:Yeah, there's probably only a couple of, of different categories of initial access.
Speaker:Like there's just normal like email addresses.
Speaker:Um, there's remote access, and I think I might be getting ahead of, uh,
Speaker:Curtis's, uh, uh, talking points here.
Speaker:domain admin level credentials, and then, um, that would give us a, a
Speaker:broad foothold within an organization.
Speaker:Hmm.
Speaker:So those range from $10.
Speaker:account for just email all the way up to a hundred thousand
Speaker:plus for an entire organization.
Speaker:Well, it, it would be, it would be like email and a password.
Speaker:Right.
Speaker:Or email in a way to authenticate right.
Speaker:And, and that's right.
Speaker:So sometimes these happen in combination because of
Speaker:multifactor authentication, right.
Speaker:So maybe I've got, um, a company credential.
Speaker:And then the multifactor goes to a personal email.
Speaker:So if I can, if I can, as an initial access broker, put
Speaker:those two pieces of valuable
Speaker:Hmm.
Speaker:together, I can sell that for more money.
Speaker:Which again, why you don't use email as a method, as
Speaker:multifactor authentication factor.
Speaker:Um, so yeah, that's interesting.
Speaker:I hadn't thought about that.
Speaker:The, the people could be able to, again, you, this is their job, right?
Speaker:This, their, their entire, their, uh, I'm gonna mispronounce
Speaker:this, but the ra, uh, right.
Speaker:Um.
Speaker:better.
Speaker:Um, yeah, the reason for being right.
Speaker:Um, and so they figured out ways to increase the value of the
Speaker:different, um, user IDs that they're trying to access, right?
Speaker:So if they can say, here's Curtis and here's, and we know that Curtis uses
Speaker:his email address as, um, you know, as is multifactor, then, um, you know,
Speaker:these two go together and that makes that that package worth even more.
Speaker:Uh, that's very interesting.
Speaker:Okay.
Speaker:So we've talked about so far, primarily username and password,
Speaker:uh, and perhaps a, you know, a pairing of of of email addresses.
Speaker:What other access methods might, uh, an IAB sell?
Speaker:I.
Speaker:Uh, so it could be information like how to access something.
Speaker:So that could be, uh, IP address plus port number plus.
Speaker:Service plus, you know, protocol, uh, plus, the necessary like VPN client.
Speaker:Hmm,
Speaker:so information is also, uh, considered access if that's what's
Speaker:necessary to conduct the access.
Speaker:So for that one, Mike, would it also be, as an example, say a threat actor
Speaker:is like, okay, I discovered something new in VMware, or take a software stack.
Speaker:And so would IAPs be responsible then, or potentially be like, Hey, let me scour
Speaker:the internet, find all of the public facing VMware servers that are running
Speaker:X version and give you back a list.
Speaker:Is that something an IAB would potentially.
Speaker:so that, that, that's a little higher level.
Speaker:Okay.
Speaker:what, what they would do in that case.
Speaker:So I, as an example, um, let's just say the Fortinet, you know, zero
Speaker:days that came out that allowed us to, attack a firewall and gain a
Speaker:foothold and, and all that good stuff.
Speaker:It would be very easy to run a,
Speaker:an internet script to find all those vulnerable Fortinet firewalls.
Speaker:What an internet access broker would do is start to go one by one and
Speaker:actually exploit that vulnerability.
Speaker:To gain the access, and then they would sell that persistent access.
Speaker:So that's not a credential, that's access, it's, it's, it's a live thread.
Speaker:Maybe it's running on a, running from a, you know, a,
Speaker:um, a leased server or botnet.
Speaker:That's what they would then sell.
Speaker:So instead of credentials, it's a live, it's a live, uh, a
Speaker:Remote access.
Speaker:Yep.
Speaker:So that's a, a vulnerability that was exploited.
Speaker:Right.
Speaker:Um, and there's a, there's a whole group of people that they discover
Speaker:these vulnerabilities, right?
Speaker:And then these guys watch.
Speaker:For the announcement of these vulnerabilities and they're like, okay,
Speaker:we're gonna go scan for open, whatever.
Speaker:Right.
Speaker:Um, and so, so we talk about again, email, password, and now
Speaker:vulnerabilities of particular services.
Speaker:Um, any, anything else that there might be selling.
Speaker:So it could be a compromised machine.
Speaker:So, you know, let's say someone that, that writes
Speaker:they get paid for malware.
Speaker:Someone that wants to, um, gain access to a computer might buy the malware
Speaker:and hire or conduct phishing exercises.
Speaker:Right.
Speaker:So
Speaker:now someone clicked on the email that got the, that,
Speaker:Um.
Speaker:had the malware in it, and now I've got access to a computer
Speaker:within an organization.
Speaker:Um, so instead of access at the perimeter, I've got access the internal
Speaker:network and now I can sell that.
Speaker:So the IB itself writes malware in that case deploys it, if you will,
Speaker:and then sells to other people, Hey, I have access to this particular
Speaker:computer within the organization.
Speaker:So very similar to like an ev uh, uh, a traditional burglar, right?
Speaker:They're gonna break into a building.
Speaker:They've got all these different tools.
Speaker:They've got, you know, something that can fuzz a camera.
Speaker:They've got something that can pick a lock or disable alarm systems or social
Speaker:engineer somebody into letting them in the building pretending to be a vendor,
Speaker:uh, that now has access to the building to deliver a package that, you know.
Speaker:So if you, if you kind of think of it in real world terms.
Speaker:Uh, it is that, um, that burglar, that, that can into a building and, and
Speaker:facilitate, uh, access to something.
Speaker:And that's what they're selling.
Speaker:So they never, they never leave with anything of value.
Speaker:Uh, they don't, they don't, they don't steal anything.
Speaker:corrupt anything.
Speaker:They don't manipulate anything.
Speaker:They just create the access, or sell the access.
Speaker:And, you know, another on the, on the delivery part.
Speaker:'cause we've, we've done, when, when companies hire us to do red teaming,
Speaker:we've done some creative things too.
Speaker:One of the creative things that we did was we, we custom configured an iPhone.
Speaker:This was a long time ago.
Speaker:Uh, we custom configured an iPhone.
Speaker:'cause we couldn't, we couldn't gain access through the, the
Speaker:perimeter of the company.
Speaker:And it was, it was fairly well guarded as far as a campus goes.
Speaker:we did is we configured an iPhone and we shipped it to them.
Speaker:it sat in their mail room turned on, and we hacked their wireless network
Speaker:from an iPhone gained access to their network over the, the cell cellular
Speaker:data network through the iPhone.
Speaker:And so you think of a, um, uh, kind of an out of band, um, access attack,
Speaker:uh, things like that are, are.
Speaker:You know, few and far between, but you know, bad guys are creative.
Speaker:another thing that you could do is, um, as far as the supply chain goes,
Speaker:is if you know they're ordering a bunch of computers, configure a computer,
Speaker:brand new, you know, go buy a brand new Dell and put your malware on it.
Speaker:They did this with picture frames a long time ago.
Speaker:I don't know if y'all remember that, those
Speaker:L-E-L-C-D picture frames, they came custom, custom built with malware.
Speaker:Um.
Speaker:that they could spy on you and do other weird stuff, but,
Speaker:I would think I, I would think that with these, these, I, you
Speaker:know, you talked about that.
Speaker:They're business, they're going after the stuff.
Speaker:I, I'm wondering the, the type, the type of stuff you're talking about right there.
Speaker:It, it seems a a lot more targeted,
Speaker:mm-hmm.
Speaker:and where you say, I want to attack this company.
Speaker:Right.
Speaker:Um, and so I'm gonna do whatever it is I need to do.
Speaker:Right.
Speaker:Um, I'm gonna, you know, like you said, send in and we, we did a whole episode
Speaker:on this, by the way of, uh, do you remember what the title of that was?
Speaker:Prasanna?
Speaker:That there was a whole episode about like creating devices that you put in
Speaker:there, you know, um, it was a while ago.
Speaker:Um, but the.
Speaker:The, the seems very targeted and, and almost personal.
Speaker:Is that something an IAB would do is, or is that like a
Speaker:different type of organization?
Speaker:Uh, it is.
Speaker:And to your point though, um, or, or maybe to touch on that a little more
Speaker:is that I, I Bs or, or access brokers operate in a, a few different ways.
Speaker:Uh, or anything.
Speaker:I guess it also depends on the threat actor, but so we can.
Speaker:As an IAB, we can search the internet, right?
Speaker:For, for weaknesses and, and what's out there.
Speaker:Sometimes an IAB just buys credentials from someone else that hasn't validated
Speaker:them, so then I'm gonna go validate them
Speaker:and resell them as valid credentials.
Speaker:They do the same thing with credit cards and, PI, I like social security numbers
Speaker:and so on, but the other part of that is I can asano as a, as a. Uh, a more
Speaker:involved threat actor, maybe I'm gonna go hire an access broker to find the
Speaker:access I need to a particular target.
Speaker:So that
Speaker:would be more targeted.
Speaker:So I wanna, I want to break into this defense contractor.
Speaker:I'm gonna hire an IAB to figure out the best way to do that, and
Speaker:then sell me the access they get.
Speaker:So we had talked on a previous podcast episode about.
Speaker:ransomware as a service.
Speaker:Mm-hmm.
Speaker:And so do these ransom as a service organizations also have their own IAB
Speaker:as an offering within that package, or do they typically sort of contract
Speaker:with other IABs that exist to gain that initial foothold and then,
Speaker:or foothold and then they start?
Speaker:Yeah, it depends.
Speaker:Uh, some, some threat actors have a, a whole enterprise
Speaker:that, that does everything.
Speaker:You know, you're just, you're in the IAB department.
Speaker:Uh, but then
Speaker:So bonkers.
Speaker:others, others will go out and source information based on the,
Speaker:the, the, requirements or the need.
Speaker:So you could hire me as a ransom, as a service, um, threat actor.
Speaker:Part of that onboarding or, or that discussion will be determining if, if you
Speaker:have a target or a particular objective.
Speaker:If so, then I can go source that, you know, I, I've got my Rolodex of
Speaker:bad guys and I'll, I'll go find a. Access broker that can help me with
Speaker:whatever your particular needs are.
Speaker:If not, then I'll just go buy a, a blind list off the dark web for,
Speaker:you know, whatever, because you've already paid me my money as a, as a
Speaker:service.
Speaker:Um, I'm not, I'm not too concerned if all that information's been validated or not.
Speaker:Gotcha.
Speaker:So let's talk about some of the ways that this happens, right?
Speaker:So with the stolen credentials, uh, is this primarily phishing?
Speaker:Um, and, and similar activities?
Speaker:It's not.
Speaker:Um, so when to collect, um,
Speaker:I,
Speaker:to be most effective at collecting credentials, you're gonna go after a
Speaker:source that has a lot of credentials.
Speaker:okay.
Speaker:and so like shiny hunters is a threat actor group that's active right now,
Speaker:and they've been active for a while.
Speaker:And their claim to fame, um, is I believe one of the largest data
Speaker:compromises in history, part of it.
Speaker:Uh, it may have been them in another group working together, but what
Speaker:they, what they've done is, again, realizing that we're all human and
Speaker:we reuse information all the time.
Speaker:Instead of attacking your phone or your bank or your email
Speaker:for the one at, you know, one at a time type of value,
Speaker:they've gone to, uh, mobile apps and third party apps that are
Speaker:really just for entertainment.
Speaker:Realizing that an entertainment app's not gonna have as much
Speaker:security as a banking app.
Speaker:And so if I can go and compromise that.
Speaker:A company that built that game, like talking Tom as an example.
Speaker:if I can compromise that and get access to the millions of people that have
Speaker:signed up for that app over time, very likely, high percentage wise.
Speaker:Uh, and, and I've actually got a chart for this that I did several years ago, so it's
Speaker:dated, but I think it's representative, the vast majority of credentials used
Speaker:in third party apps, mirror identically.
Speaker:to the credentials people use at work, not just, not just the
Speaker:password, but also the email.
Speaker:So they didn't sign up for talking Tom with their personal email.
Speaker:They signed up for it with their military email or their edu or whatever, and
Speaker:Why.
Speaker:password because you know what?
Speaker:We're lazy and it's just easy.
Speaker:Well, and, and also, I mean, doesn't that also mean that there's some
Speaker:vulnerability And I, you know, you started by saying that, that, that that
Speaker:app possibly is not as security focused, but this means that if they're getting
Speaker:the username and password, that means that there's also vulnerability in how
Speaker:they're storing the passwords, right?
Speaker:Because you normally, you're gonna get salted and hashed passwords, right?
Speaker:This wouldn't be within the app.
Speaker:This would be the.
Speaker:Uh, an attack on the data store in the backend at the company.
Speaker:So they're not attacking the app, they're attacking the company.
Speaker:that makes sense.
Speaker:But again, the same concept applies, right?
Speaker:That, that perhaps they didn't use the best cybersecurity when
Speaker:storing the, when creating the, the backend infrastructure, right?
Speaker:Right.
Speaker:Well, and, and I know a little bit about the mobile app.
Speaker:Ecosystem and you know, it's all, you know, how much, how much can I make with,
Speaker:you know, doing as little as possible.
Speaker:And with AI these days, I mean it's, it's crazy, but a lot of those
Speaker:apps aren't focused on security because there's really no security.
Speaker:And, and the only reason they're asking for credentials is so they can track
Speaker:you as a user to push advertising to you, which is how they make their money.
Speaker:Uh, so they're, they're not security focused at all.
Speaker:Um.
Speaker:So, yeah, it's, it's usually pretty, pretty easy, or, or it has been, uh,
Speaker:to compromise those, those software companies to get access to the data.
Speaker:All right, so you've got this, this, you're going after these third party apps
Speaker:and sites and whatnot to get credentials.
Speaker:Uh, and that, I get that because that's gonna be like a large
Speaker:source of a, of a large number of, you know, names and passwords.
Speaker:Uh, and then after that, is this now where we're talking about things like phishing.
Speaker:Nope.
Speaker:Oh, you're killing me.
Speaker:on the
Speaker:Really?
Speaker:Okay.
Speaker:harvesting
Speaker:I, it's just, we talk about it so much.
Speaker:Well, so phishing is, is, uh, it's usually for delivery, um, or, or affiliate, um,
Speaker:Oh, I see what you're saying.
Speaker:Getting you, getting you to download the, the, the, um, the payload.
Speaker:Right.
Speaker:Yep, yep.
Speaker:Okay.
Speaker:All right.
Speaker:Or, or to, to redirect you to a website.
Speaker:So an affiliate gets paid,
Speaker:Yeah.
Speaker:site or something
Speaker:Okay.
Speaker:All right.
Speaker:That's why we talk about it so much.
Speaker:All right.
Speaker:Um.
Speaker:so when you think about phishing, um, and, and I mentioned this uh, in a prior
Speaker:episode too, and, and the numbers have changed, but it's, it's relatively,
Speaker:and so I'm just gonna say around, but give or take, you know, maybe 5%.
Speaker:The success rate at phishing is, is around 22%.
Speaker:The success rate at, you know, collecting a million.
Speaker:by attacking a low security third party app developer is pretty high.
Speaker:Hmm.
Speaker:Yeah.
Speaker:that's disheartening.
Speaker:Okay.
Speaker:If so, if, if phishing isn't next, what is next?
Speaker:After the, going after the giant database of username and
Speaker:password, what's next after that?
Speaker:those would be the onesie, twosie large organizations.
Speaker:Um, but it, it, it's all the same strategy.
Speaker:It's how many, you know, the, the one to many.
Speaker:Strategy, how many, how many of these one, you know, singular attacks will result
Speaker:in this, know, volume of credentials?
Speaker:you know, I'm not gonna attack a small company with 10 employees.
Speaker:I'm gonna attack a large company with a thousand employees or 200,000 employees.
Speaker:Um, and so the access broker then is going to strategize on the best
Speaker:way to do that is that, maybe I get hired there, so now I'm an insider.
Speaker:Um, and I just, you know, steal all the, you know, the, the password
Speaker:database, the SAM database, or I go to work for a, uh, IT support company.
Speaker:And now, so that's one to many, right?
Speaker:So I'm an, I'm an MSP that supports multiple clients, and so I have access
Speaker:into all these different environments,
Speaker:Yeah, there, there was a few years ago, there was that, uh, service
Speaker:provider for dentists, right?
Speaker:That, um, that they got hacked and then basically you had access
Speaker:to all these dentists, right?
Speaker:Yep.
Speaker:And so, um, you know, that, that remote access, you know, the, um, remote desktop
Speaker:access, uh, into those environments in.
Speaker:Yeah, there is a problem with that too, because a lot of
Speaker:times it's the same password.
Speaker:So as a support company, you know, maybe I'm supporting Curtis's
Speaker:Company and Prasannas company.
Speaker:My, my credentials to log into your environments are the same.
Speaker:Ugh.
Speaker:We see that a
Speaker:That's just wrong.
Speaker:Uh, you brought up, you brought up my ears.
Speaker:P picked up or picked up there, I heard remote desktop.
Speaker:RDP is like my favorite, uh, tool to pick on from a, from a, you know, please
Speaker:stop using this the way you're using it.
Speaker:You want to talk about that a little bit.
Speaker:So RDP and, and there's
Speaker:Wait, and by the way, that's the, that's the, I call it the
Speaker:ransomware deployment protocol, but it's the Remote Desktop Protocol.
Speaker:So.
Speaker:Copyright pending.
Speaker:has some inherent issues that they've gotten better over time.
Speaker:I mean, back in the day, uh, when an admin RD would use RDP to a server,
Speaker:you could capture those keystrokes live across the network, and just replay it.
Speaker:Uh, but.
Speaker:in general is, is a pretty insecure protocol, uh, on its own.
Speaker:Well, what we've seen a lot and, and bad guys understand this too, is, is cis
Speaker:admins are using RDP across the internet, uh, when connecting in to, to do remote
Speaker:support after hours or on the weekends.
Speaker:You know, I don't wanna drive to the office and do this.
Speaker:I can just RDP.
Speaker:And so, I mean, it's, it's, it's not a good solution, um, for remote
Speaker:support, but we still use it.
Speaker:Or in, actually, even in environments where we don't use it, that service
Speaker:is still turned on and available.
Speaker:And so
Speaker:And, and of, and accessible via the internet, which is just wrong.
Speaker:All kinds of wrong, right?
Speaker:yep.
Speaker:So if, if you haven't, if you haven't customized your firewall to prevent
Speaker:certain protocols like RDP or FTP or Telnet through your firewall,
Speaker:um, yeah, that's, that's something bad guys will find pretty quick.
Speaker:There's a search engine, and I don't think we've, we've talked about it, but
Speaker:there is a search engine called Show Dan.
Speaker:Hmm.
Speaker:and you know, there's free accounts and then there's, you know, the
Speaker:premium accounts, but you can search for any vulnerability,
Speaker:anything you're looking for.
Speaker:Shodan has already mapped, the internet, the entire world internet.
Speaker:Uh, so when a new vulnerability comes out, you can go shodan and go, Hey, show
Speaker:me, show me all these Fortinet firewalls,
Speaker:and it will show you all of them what ports are open and
Speaker:what services are running.
Speaker:And yeah,
Speaker:It is scary.
Speaker:if you're.
Speaker:If you're not maintaining good hygiene, someone's gonna, someone's
Speaker:gonna suggest you buy some deodorant.
Speaker:Um, so I, I like, you know, basically stolen credentials from various,
Speaker:the, the, the one, it, it just kills me the, the statement you made, and
Speaker:I, and I know that, and I guess I shouldn't be surprised the idea that.
Speaker:People use the same username and password, you know, everywhere, right?
Speaker:Um, and especially across personal and, um, you know, um, corporate, right?
Speaker:Um, and you know, we all know that we, you should not be having
Speaker:RDP publicly accessible, uh, you know, via the internet, right?
Speaker:Um, there are other ways to do that.
Speaker:Um.
Speaker:What, c Can you think of other ways that they're grabbing?
Speaker:Uh, and, and by the way, that's just in general, I'd say any remote access
Speaker:thing like that, that isn't designed to be publicly accessible shouldn't be.
Speaker:So I, I, I'm looking at a list of of concerns and I see web shells.
Speaker:You wanna talk about that a little bit?
Speaker:So a web shell is, you know, well first of all, a shell is, is like a command prompt.
Speaker:So if you can, we call it pop in a shell.
Speaker:So you can get root, you know, shell level access to a computer, uh, a command line,
Speaker:uh, which is usually more effective than, than the normal interface that we're,
Speaker:we're accustomed to clicking around and opening folders and that kind of thing.
Speaker:So shell access, is that c prompter or admin prompt.
Speaker:Uh, the web shell is, is just access to a web-based environment.
Speaker:So whether that's, like a cloud infrastructure like Azure
Speaker:or AWS, or it could be that, that cloud-based system, uh, so maybe
Speaker:your, your financial system or your, your ERP is cloud hosted or, uh.
Speaker:Your, your bank account or, or whatever it is, your bank system, inventory systems.
Speaker:And so the web shell or web session would be a compromise of how that, that system,
Speaker:that, that website, that web portal, that web infrastructure, uh, uh, authenticates.
Speaker:So it's you, you stole someone's session cookies, and you can replay those or,
Speaker:or, or copy them or re uh, or sell them.
Speaker:Or it's, um, uh, persistent access.
Speaker:So for example, if I sit at Starbucks with my, my rogue wireless access point
Speaker:that says, Starbucks, this, this, you know, 5G plus, so you're gonna use that
Speaker:one 'cause it's faster than regular 5G.
Speaker:Or I knock everybody off of the Starbucks one and they rejoined my fake one.
Speaker:Uh, and now all of that traffic is flowing through my fake.
Speaker:A access point.
Speaker:And I can capture, especially if I am, I'm watching you.
Speaker:'cause I'm sitting next to you at Starbucks and you're logging
Speaker:into your bank or, that website.
Speaker:Uh, I know traffic as it's flowing and I can capture that stuff and
Speaker:potentially replay it, uh, or hijack it.
Speaker:And so now I'm, I'm in your session and I kick you off.
Speaker:And now it's just me.
Speaker:Uh, so there's a lot you can do.
Speaker:Over the internet, uh, whether you're, we, we've call some of those man in
Speaker:the middle attacks where you started it, and I can see where you're going.
Speaker:I inject myself in the middle and, and manipulate traffic or, or replay traffic.
Speaker:Uh, so those are types of things you can do, but at the end of the
Speaker:day, it's what, what can I do to get me access to something that's
Speaker:valuable enough for me to resell
Speaker:and.
Speaker:The other question you mentioned about other things that, that they sell, um,
Speaker:and some of 'em based on vulnerabilities.
Speaker:So vulnerabilities in, you know, Cisco VPN or Fortinet, VPN or Citrix, or,
Speaker:uh, some of these insecure protocols.
Speaker:Uh, again, it's just spending the time to do the research to figure out who's,
Speaker:who's vulnerable to these things.
Speaker:Validating it by actually compromising the security through
Speaker:a vulnerability or, or known.
Speaker:Um, known method, establishing some persistent access there and selling it.
Speaker:Yeah, so philosophical question, or maybe theoretical.
Speaker:If so, ransomware is prevalent, right?
Speaker:The number of attacks right, have gone through the roof.
Speaker:If we focused all the efforts on eliminating IABs, would
Speaker:that make a difference?
Speaker:Nope.
Speaker:It'll just make the other threat actors have to work harder.
Speaker:'cause right now they're just outsourcing it.
Speaker:You know, it's like being a general contractor.
Speaker:You don't do all the work.
Speaker:You find the subcontractors to, to make your life easier and you just put money.
Speaker:You just, you know, you mark it up.
Speaker:Yeah,
Speaker:Yep.
Speaker:Yeah, it's like the, yeah.
Speaker:the IABs go away, then you just bring everything in-house.
Speaker:Well, and that's the way it used to be.
Speaker:Um, everybody was kind of siloed in their, in their profession.
Speaker:Uh, they, they were less capable because they were more focused
Speaker:on their skillset and their.
Speaker:Um, their, their preferred attack methods and that kind of thing.
Speaker:And so then, uh, you know, as, as the, the criminal, cyber, criminal organ,
Speaker:uh, ecosystem grew, uh, you, you started having these kind of like cyber
Speaker:criminal conferences and we got to know each other and, uh, what can you do
Speaker:and how can we work better together?
Speaker:And so there was a little bit of, uh, you know, entrepreneurial, you know, uh,
Speaker:demarcation, uh, uh, activities going on.
Speaker:So now you've got this.
Speaker:Uh, almost, uh, diversification.
Speaker:So, and, and, and there was at the same time a, a bit of, integration, uh, uh,
Speaker:physical security and cybersecurity.
Speaker:People that were really good at breaking into buildings and social engineering
Speaker:people and extorting them in real life.
Speaker:Uh, can now work with cyber, uh, and, and to the benefit of one or the other.
Speaker:so now you've got, you know, a, a more dynamic, multi-layer threat.
Speaker:Um, but yeah, uh, once, once the bad guys started to recognize other bad guys and
Speaker:their skillsets, they started to go, well,
Speaker:I know, I know Bob, Bob, the bad guy knows how to do that better than me, and I'm.
Speaker:Yeah, I can imagine that once you, you know, you get really good, if you're
Speaker:really good at like getting credentials and gaining access and stuff, you know,
Speaker:you're like, Hey, I'm just gonna do this.
Speaker:Um, I actually know one of those, uh, entry guys by the way.
Speaker:Um, that does physical, uh, penetration testing.
Speaker:Um, basically his job is to get into a room where he's not supposed
Speaker:to be and then, uh, take a, take a selfie and then get the hell out.
Speaker:Um.
Speaker:Yep.
Speaker:But, um, so we're, we're, we're kind of getting a little longer
Speaker:than I, than I had intended.
Speaker:Let's talk about like, the things that we can do.
Speaker:I think we've, we've, if you've been listening, if you've been paying
Speaker:attention, obviously please don't, for the love of God, don't use the
Speaker:same password everywhere, right?
Speaker:Um, and, and the more sensitive the thing is, the more that thing
Speaker:needs to have its own password.
Speaker:I mean, everything should have its own password, needs to be using
Speaker:password managers, but whatever, you know, let's, please don't use.
Speaker:The same password, you know, sensitive stuff.
Speaker:Right.
Speaker:Um, and then also don't put RDP accessible via the internet.
Speaker:Uh, what was that?
Speaker:Prasanna
Speaker:Patching
Speaker:and patching.
Speaker:Yeah.
Speaker:And, and you know, vulnerabilities as they are, they're going
Speaker:to continue to, to happen.
Speaker:Monitor the CBSS, like for the full, for the, uh, the CVEs, for the
Speaker:vulnerabilities for your environment.
Speaker:Um, and, you know, I can think of a, there was, the big story that
Speaker:we covered with Rackspace a few years ago where they were attacked.
Speaker:Simply because they didn't on a timely basis, patch a, uh,
Speaker:an advertise vulnerability.
Speaker:And with, you know, within a matter of days, uh, the, you know, the bad guys
Speaker:were in their environment and it destroyed their entire hosted exchange environment.
Speaker:Um, that was a bad, bad story.
Speaker:You have any other, um, takeaways, Mike, in terms of,
Speaker:you know, dealing with these iab.
Speaker:So change your credentials as soon as you think they're compromised.
Speaker:Don't wait until your employer calls and asks about your personal life.
Speaker:Uh, don't store your credentials in plain text anywhere.
Speaker:use a, use a scheme for, you know, hints, you know, to help
Speaker:you remember what the password is.
Speaker:Don't write your password down.
Speaker:Use a password manager if you can.
Speaker:Uh, and don't use coincidental passwords.
Speaker:I did find the data I
Speaker:What's a, what's a coincidental password, by the way?
Speaker:so a coincidental password is, or even credentials, is something that
Speaker:you use in more than one place.
Speaker:So.
Speaker:If I use, I love my dog at work.
Speaker:I don't use, I love my dog anywhere else.
Speaker:Alright.
Speaker:Uh, I did find the, I was talking about where the, the data was, uh, compromised.
Speaker:So in 20, 20, 30 7 billion records were compromised, which is more
Speaker:than the prior six years combined.
Speaker:And it was primarily one, uh, and at the, at the time, it was
Speaker:the largest data breach ever.
Speaker:Over 80 million emails and PII records.
Speaker:And it was conducted by shiny hunters, uh, who then sold 564 million record
Speaker:bundle, uh, which was compromised across 49 different databases.
Speaker:and they sold for roughly 10 they broke it into three buckets
Speaker:and sold it for $10,000 each.
Speaker:But out of, out of 564 million records, 1.12 million.
Speaker:Were unique email addresses related to where that person worked.
Speaker:So
Speaker:That's not good.
Speaker:s and p, one hundred.gov, dot edu, et cetera.
Speaker:Um, all right.
Speaker:Any final thoughts on ibs?
Speaker:Turn it off when you're not using it.
Speaker:Turn what off?
Speaker:When you're not using it?
Speaker:Everything.
Speaker:anything?
Speaker:Yep.
Speaker:All right.
Speaker:All right.
Speaker:All right.
Speaker:Well, thanks a lot.
Speaker:Thanks for being on Mike.
Speaker:Anytime.
Speaker:Thanks for being on Prasanna,
Speaker:I
Speaker:Judgey.
Speaker:All right.
Speaker:That is a wrap.







