
Don’t minimise your Teams Meeting video call too hastily, you might reveal your dirty secrets! Would you be prepared to pay for Facebook and Instagram? And who is being faked to promote cryptocurrency scams?
All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by technology journalist Jane Wakefield.
Plus – don’t miss our featured interview with Push Security founder and CEO Adam Bateman.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
No, it's a podcast, you daft ballbag. It's when the techie podcast go on about computer security and that, the toot caboot, cybercrime and all that scary shit.
Makes you want to barricade yourself in your house. Anyway, go on, it's playing.
My name is Graham Cluley.
Hello, Jane.
You're doing podcasts for other people and sometimes I see you popping up on the BBC News site as well, still talking about tech things.
I'm podcasting for UKTN and I'm doing some conference hosting and corporate writing, lots and lots of different things really.
So coming up on today's show, Graham, what do you got?
Plus, we have a featured interview with Adam Bateman, co-founder and CEO of Push Security, and we talk shadow identities and why organizations need to get them under control.
All this and much more coming up on this episode of Smashing Security.
I'm going to start talking today the story of a chap called Mohammed Monirazaman, and he was a software engineer at a company called Valeo. Have you heard of Valeo? V-A-L-E-O?
Probably not, I'm guessing. Well, from my research, they do some pretty cool things regarding automobiles, regarding cars.
In 1991, Valeo were the chaps who came up with, you know how when you're reversing into a wall it goes beep beep, beep, beep, beep, beep, beep beep. It sort of really goes over.
But I do find with those beeps these days that people just ignore them anyway, don't they?
They did all the research and they worked it. Now, of course, it's built into so many modern cars, isn't it?
A few years ago, they came up with this other really cool thing, which I found out about online, called the XtraVue trailer.
Now, my first concern was that Xtra was spelt without an E and Vue was V-U-E. But other than that, XtraVue trailer.
What it does is— I don't know if either of you have ever driven a car with a trailer or a caravan. I haven't done that.
But one of the challenges with driving along with a trailer or a caravan is you can't see what's going on behind you.
And what Valeo came up with was this special trailer, which somehow allowed you to see through the trailer or caravan that you were towing from the driver's seat.
I've got some pictures and things I'll link to a video in the show notes as well. So you can see this actually in operation. It's quite remarkable what they've done.
So I thought that was very clever.
Anyway, they apparently have invested billions, they claim, of dollars doing very cool work in all these areas of parking assistance and blind spot detection and lane departure warning systems.
And you can imagine that can be a huge money earner, because if you can sell that tech, if you can get car companies to build it into their cars, you've got the potential to make a huge amount of money.
And the other companies in the automotive space, they want to partner up with Valeo, right?
They want to get a handle on some of that technology and, you know, maybe work together, collaborate on some things in order for everyone to fill their pockets.
You know, people will set up these great big crypto mining rigs. So they've been making loads of money, but they've been looking in recent years to branch out into other fields.
I guess they've got so much money, they don't know what to do with it.
It's like, what can we do with our money now? Let's get into advanced automotive technology.
And NVIDIA, they won this big contract to work with a major firm in the automotive space, developing advanced parking and driving technology.
So they actually bid for a contract and they managed to get it. And the previous company who had this contract was Valeo.
And their nose must have been put out of joint a bit, you know, because they had this big contract, they'd lost it to these gaming dudes who are going to take over now.
They still had a— Valeo still had a piece of the action, but not as large a slice as before.
They were asked, just work on the ultrasonic sensors, all the other cool stuff we're going to go to NVIDIA for. Now, Mohammad Monirazaman, he's the Valeo engineer.
He realized that his skill set would be very desirable to NVIDIA.
The quality of the loo paper in the toilets, that sort of thing.
So what people didn't know, however, when this chap, Mohammad Monirazaman, left Valeo to go to NVIDIA, that he hadn't just upped and left.
He'd also taken tens of thousands of files and over 6 gigabytes of source code with him because it had been in a Google Drive which belonged to Valeo that he had personal access to as well.
So he snaffled it all up. Scores of Word documents, PowerPoint presentations, PDF files, technical documentation, Excel spreadsheets, as well as the source code.
And maybe he thought it would be kind of useful in his new job at NVIDIA, working on the same project he had previously been working on for Valeo.
But honestly, the employees being naughty, like, this is—
So companies listening, pay attention, go clean up now.
Well, about 6 months after Moniruzzaman started working at NVIDIA, he was on a Microsoft Teams call, poor fella, with, who would have guessed it, his old colleagues at Valeo, right?
Because part of the contract for the project they were both working on meant that Valeo and NVIDIA had to have online meetings so that NVIDIA could ask Valeo questions about the hardware, and so forth.
He obviously knew these guys could work with them, but this is where everything went terribly wrong because he was on this video conference call with his old teammates and he was sharing his screen and he made the mistake of minimising his PowerPoint presentation.
And when he did that, what does everyone else on the call see? Source code from Valeo open on his screen.
You know, and these files, apparently, you could even see the folder that it was in and it was called Valeo Docs.
And they found files on his computer, on his NVIDIA laptop. And they even found Valeo documentation pinned up on the walls of his office.
So while he was working from home, there were all these documents around him pinned up.
He's been fined €14,400, about $16,000, which, you know, in the grand scheme of things isn't a huge amount of money for how much that software must have been worth.
Well, or future lawsuits will tell.
They say they've saved millions of dollars, maybe hundreds of millions of dollars in development costs.
They generate profits which they didn't properly earn, is their argument, and which they weren't entitled to. NVIDIA says, we didn't know anything about this.
We didn't condone the theft of the source code. We've got no interest in the source code.
Moniruzzaman says that the code was only stored on his laptop, wasn't shared with other people at NVIDIA.
But regardless, if he was sharing his expertise, if he was able to refer to the previous source code when building NVIDIA's code, it possibly—
Da da da da da. Is that stealing?
Apparently during the conversation they'd been talking about some variables in the API or something, and they actually found that when his source code came up behind him, the Valeo source code, he'd actually done a search during the call and it had highlighted something.
So he was referring to it during the call, their source code. At least that's what Valeo are saying.
Palmer Luckey, do you remember this case?
Yeah, I think Facebook were fined $500 million for that, and then there was an appeal and a settlement that followed it. But yeah, this stuff is dangerous, right?
You know, it's not a lot that— in a world in which we can all access information at our fingertips, there's not a lot that companies can do.
You have to have access to information to do your job, right? And then if you can find a way to squirrel it away and take it to your next job, then what can a company do?
But if you get caught having done that, then I think—
And I think this is a lesson to everybody: be careful when you do that because it's breaking the law.
They want to employ you for your expertise and your knowledge that you had in that previous company.
But again, the business really owns it, doesn't it?
You know, if you've got any tabs, I mean, there've been cases in the past where people have had tabs open to porn sites or other embarrassing things.
So close your windows, clean up your desktops, and don't steal code.
During lockdown when everybody was checking everybody's— because the thing is, people are naturally curious, aren't they?
You know, whenever you're on a Zoom call, you're actually— oh yeah, the paintings that someone has on their wall or the books that are on their bookshelves.
And this is the same thing. What's on your desktop?
Now I'm on it quite a lot, and I've had loads and loads of messages recently asking me if a story that they've come across on Twitter— X, as it's now known— which is basically an interview with a celebrity called Emma Willis, who's a presenter on the TV, seemingly conducted by me, in a BBC template, and basically the upshot of the interview with her is to recommend some crypto investment.
And people are asking me, did you write this? Did you write this? Is this yours? And I have to respond to them all going, no, I absolutely did not write this.
I mean, anybody who knows anybody that writes for the BBC would be able to see within seconds that, you know, it's not real.
But that hasn't stopped people, quite respectable business people, asking me if it is. So it's obviously good enough to fool people.
So it's a bit disconcerting on a personal level because obviously I don't want my name associated with scam crypto investments.
I certainly don't want people thinking I'm recommending a particular product.
But it's also quite problematic because I'm not entirely sure what I do about it. I no longer work at the BBC. I have contacted somebody that I knew at the BBC to tell them about it.
And in anticipation of coming and talking about it on your show, I did a bit of research and found out that actually scam ads— and you might remember that Martin Lewis was— took up the issue with exactly the same thing, that he was being used to endorse crypto ads.
And this was popping up on places like Facebook, and he wasn't really not very happy about this at all.
And he has written that this issue is being dealt with in the Online Safety Act, at least the Online Safety Act, which has just gone into become an Act of Parliament, does now say that online platforms have a legal duty to take down scam ads.
I'm not sure that's going to solve the problem because, as we all know, just telling somebody they have to do something, especially in the world of big tech, doesn't necessarily mean that they are going to do it, but it's great that that's in there.
But how does that apply to scam articles, which aren't ads as such? Would that still apply for what's going on with me?
They're linking to websites that seems— I mean, if you looked at the URL, it's clearly not the BBC, and I think that it might be kind of a malware-laden website that it's taking you to.
So I wouldn't want to share any of the links, but yeah, it looks in terms of the article itself as if it's quite convincing in terms— it's got all the BBC logos on it and it's written as a BBC article will be written, with pictures, etc.
So yeah, it's really bizarre.
Do they still exist? I'm not sure. Are there any?
Because Elon Musk doesn't believe in PR.
Not in the States, I don't think, because you've got Section 230, but in the EU.
So, because someone who's going to be quite the celeb is going to be used and abused in this way, in a way that will be frustrating and it won't be taken down.
You can sort of try and stop it, but enough of it will have got through to convince a few people to do what the whole point of the scam is, which is to invest in this dodgy cryptocurrency that they're basically advertising.
So trying to put the stopper on that is much harder.
One of the things that I did read when I was looking at how this is now gone into law by the Online Safety Act is that your first port of call I suppose, with this sort of stuff should be Action Fraud.
So I may well send them an email pointing out that lots of people are getting in touch with me and saying they've seen this and see what their—
There have been some revelations over the years that maybe they're not doing such a great job.
But I mean, clearly, the NCSC, I think, also could play a part in this as well because they have been successful at shutting down scam websites when these sort of things are being seen.
It's pretty annoying though that it's your image and your reputation because even if I don't fall for the scam, I might think, oh, for goodness' sake, Jane, why didn't you ask them some more difficult questions?
Why are you believing all this bullshit.
And the post started with this paragraph. It said, to comply with evolving European regulations, we are introducing a new subscription option in the EU, EEA, and Switzerland.
So to rephrase, right, we don't really want to do this, but you know, the bloody EU with its ever-changing rules have forced our hand.
They continue in the blog post, so in November we will be offering people who use Facebook or Instagram and reside in these regions, the EU, EEA, and Switzerland, the choice to continue using these personalized services for free with ads or subscribe to stop seeing ads.
So that's basically €155 per year for mobile users. And in the EU, I did a little recon, that's equivalent to roughly 27 Big Macs using the Big Mac Index.
So in short, this is kind of like, look, I know this looks a little bit expensive, but pinky swear, it's a deal. Facebook are saying, "We're doing this. We're forced to do this.
And this is a good choice. If you want to give us your information, you can carry on for free. If you want to pay, you won't see any ads." So thoughts on this?
What are your immediate reactions?
And as a consequence, they want you to pay if you're not going to let them share it and do things with it.
But that idea that we've sort of lived with for a long time, which is that your data is very valuable to you, you know, the data is the new oil, that still exists.
And I don't think anybody has sort of come up with a convincing way of making money out of it that sort of really empowers users.
And I've interviewed lots of people over the years when I was a journalist who had kind of ideas in that sphere, but nothing seems to have quite taken off.
I look at my children who kind of know where each other are on Snapchat and share very personal data about their location and completely happy for me to track them, you know, on my iPhone, which is quite handy for me because it means I know where they are and I don't have to worry.
It feels like a real cultural shift in how we care about information, which I think is really interesting.
Paying for no ads is definitely something that would appeal to a lot of people, I guess, wouldn't it?
So if we fast forward to today, the day of recording, Tuesday, 28th, many articles were reporting that an Austrian privacy group, NOYB, is filing a complaint against Meta for this new pay or okay.
That's their strapline, not mine.
NOYB contends that the cost of the subscription is out of proportion to the value that Meta derives from tracking users in the region.
So they cited that the average revenue per user in Europe during the last 12 months was $16.79, which is much less than what they're suggesting, right?
So he says that figure would equate to €63 a year rather than the €120 to €160 that they're suggesting.
And they're doing this on behalf of an individual that is experiencing financial distress, receives unemployment assistance, and indicates he cannot afford to splash out so much money to protect his privacy.
Thoughts?
It's like, can I afford Disney+ and Netflix and Apple+ and whatever other ones there are, Amazon Prime and all these other things?
You know, there are lots of subscriptions out there which people spend a lot of money on every month.
And surely this is just another thing to add to the equation of whether you want to do that or not.
And it's not as though they aren't giving you a service which is — and I'm going to put this in quotes — "free." So you have a method of paying if you want to, if you really have to have access to it and you cannot afford it, then there is a way still to access Facebook and Instagram under these rules.
And then when people cottoned on to the fact that they were, you know, Facebook and Meta and all the fat cats, they were getting disgustingly rich and powerful by selling their users' private info.
And then when they start crying when they're told they can't do it anymore, so they say they're going to charge money for it.
And you know what, we're going to use the freemium model where we're not going to take your information at all.
You can use it for free and a few people will get extra features, Twizzlers and whatever, and they can pay for that.
It's a digisphere, don't you think?
I haven't quite brought myself to delete it because my natural curiosity about everybody else's lives keeps me flicking through it.
But in terms of my own life, I'm not really interested in posting anything on Facebook anymore.
It's something like, while you're paying for the subscription, your info will not be used for ad purposes.
Which got me thinking that they're probably still collecting it whilst you're paying for the subscription, but maybe not collating it and sharing it.
And as soon as you miss a month or decide, you know, eating is more important, they just dump it all into the ad profiling pot.
Obviously, this is just complete conjecture on my part, but—
I applaud the EU for trying to be at the forefront of demanding online privacy. Really, it's a hurrah moment. But I think maybe there was a little bit of a slalom dance, maybe.
Anyway, I don't know, to pay or not to pay, I don't have the answer. Good luck, everyone.
If you're working like crazy to get everything behind SSO and make sure everyone's using strong passwords and MFA, then Push Security is for you.
Push Security helps you to monitor and secure your entire identity attack surface, including non-SSO identities.
Get notified in real time to vulnerabilities across all your internet-facing identities.
What's more, Push Security then guides your employees to fix simple issues so your team can carry on fixing everything else. Want to check it out?
Well, head over to pushsecurity.com/smashing. That's pushsecurity.com/smashing, and thanks to them for supporting the show.
Expand the scope of your security program with Vanta's market-leading compliance automation.
Vanta's 5,000+ global customers report saving over 300 hours in manual work and up to 85% of cost for SOC 2, ISO 27001, HIPAA, GDPR, custom frameworks, and more.
And with Vanta's 200+ integrations, you can easily monitor and secure the tools your business relies on.
From the most in-demand frameworks to third-party risk management and security questionnaires, Vanta gives SaaS businesses of all sizes one place to manage risk and improve security in real time.
As a special bonus, Smashing Security listeners get a whopping 20% off Vanta. Just go to vanta.com/smashing. That's vanta.com/smashing.
If you work in security or IT and your company has Okta, this message is for you.
For the past few years, the majority of data breaches and hacks you read about have something in common. It's employees.
Hackers absolutely love exploiting vulnerable employee devices and credentials. But imagine a world where only secure devices can access your cloud apps.
Here, credentials are useless to hackers, and you can manage every OS, even Linux, from a single dashboard.
Best of all, you can get employees to fix their own device security issues without creating more work for IT. The good news is you don't have to imagine this world.
You can just start using Kolide.
Kolide is a device trust solution for companies with Okta, and it makes sure that if a device is not trusted or secure, it can't log into your cloud apps.
Visit kolide.com/smashing to watch a demo and see how it works. That's k-o-l-i-d-e.com/smashing.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they like.
It doesn't have to be security related necessarily.
Everyone gave it a go and thought, oh my giddy aunt, this is extraordinary. Obviously terrifying as well, but what an incredible thing this appears to be.
But it's not been, you know, that wasn't the final step of evolution because I can announce to you that there is now the world's first Scottish artificial intelligence chatbot.
It's called GlasgowGPT. And in its write-up, it says, unlike almost most all other AI chatbots, GlasgowGPT has strong opinions about the world and isn't afraid to share them.
And it will tell you exactly what it thinks. So I've been playing. All you have to do is go to glasgowgpt.com. Oh, it's so much fun.
I did, for instance, ask it, well, what is Smashing Security? And it's written in the Scottish dialect. So I will try, I'll do my best to do Scottish.
So it goes, oh, here we fucking go. What a fucking daft question. Smashing Security. Let me tell you, it's not the best trendy club in the city, if that's what you're thinking.
No, it's a podcast, you daft ballbag. It's when the techie podcasts go on about computer security and that, they talk about cybercrime and all that scary shite.
Makes you want to barricade yourself in your house. Anyway, guys, on it.
It's a bonnie hoots McGonagall, in fact, is GlasgowGPT, and that is why it is my Pick of the Week.
It's a story that was reported in The Register and some other places about a conference, a tech conference that has collapsed. It was due to happen online in December.
It's not taking place at all now because it's emerged that the organisers had put some fake presenters in the lineup.
And of course, these fake presenters were women because they didn't feel that it was diverse enough. Unsurprisingly, they've kind of been caught out doing this.
So the conference has now sort of been canceled, although they're saying it's for other reasons that it's been canceled. So yeah, it's a really interesting one, isn't it?
I know that you and I go to a lot of these tech conferences.
So they've got the same number of men as women speaking, and, you know, not having a panel without a woman on.
But to put fake people in a lineup makes me question, you know, what were they going to do when it actually came to their turn to speak?
Were they going to try and get away with it as a speaker as well?
I guess AI has reached the stage now where it's so convincing that perhaps we might have fallen for it, but I don't know. It's just a very weird story.
And this chap who's sort of unearthed all this subterfuge contacted these companies and they said, "Doesn't work here.
Nothing to do with us." They have no footprint on, you know, whether they've used AI pictures or—
I quite like the quote from a guy who was due to speak at it, somebody from Microsoft who was due to speak at it and was obviously withdrawn, and now it's not happening anyway.
And he said, you know, look, I can give you a list of hundreds of people that could speak at this conference encompassing, you know, all kinds of genders and races.
And, you know, I think that probably was the best answer to the problem. But yeah, don't make people up, it's a really bad idea.
I've heard anecdotally as well of companies who've got kind of lists of people on their websites, putting a few fake, deepfake people on there to sort of make it look a bit more diverse.
It just seems such a crazy idea, you know. What are people thinking when they do that?
Because it only takes a kind of journalist or somebody else to start digging into it to reveal it, and then it's all very embarrassing.
I saw a LinkedIn post, I think it's by Eliza Austin the other day, where she said she keeps on being invited to conferences and she's got all these conferences booked up for next year, but all they want her to talk about is diversity or being a female CEO.
And she's saying, you know, that's not actually what this is, you know, that isn't why you should be asking me to speak. You should be asking me to speak.
It's not like you get guys who are asked, oh, come and speak about being a man in the tech industry.
Maybe you could just ask me about something technical instead, which I can give a talk about.
I think that would be fascinating, getting a load of deepfake AI-generated speakers, maybe using ChatGPT, maybe even using Glaswegian ChatGPT to come up with the plan of what they say and just letting AI take over.
I think that would be fascinating.
That would have been a better use of their time than taking lots of pictures of politicians nodding wisely about a topic they don't understand at all.
She stars alongside Patterson Joseph in the show, Boat Story. It's a 6-part series.
Now, cocaine, that would be a difficult one for me because how do you go change that into cash if you desperately need cash?
But maybe for some characters, the world is throwing you a bone there. So, what do you do now? So the story carries on from that. They get involved, it gets crazy.
It's wonderful though. It's so fresh. I've not seen anything before. It explores things class differences and moral obligations and infatuation with a middle-aged pasty maker.
Some people have talked about, there's reminiscent of Wes Anderson. So there's a lot of love and attention to the shots. Gaggle of really wonderful characters.
One of them has no fingers at all. Just a stump, and fascinating, you know. Yeah, anyway, crazy.
And boats, boats feature at the beginning, at the end, so they top and tail the story so beautifully. So that is my pick of the week, Boat Story. Find it on BBC iPlayer.
It's probably available other places, probably.
We are speaking with Adam Bateman, co-founder and CEO of Push Security. Now, Push Security has a straightforward business goal.
It's to help you monitor and secure your identity attack surface. So today we're going to explore why this might be key to improving your security posture.
Adam Bateman, welcome to Smashing Security.
So they could be on your SSO provider, so in your IDP, or they could be directly in different SaaS or cloud applications that employees are signing up to on their own outside of your SSO.
But all those user accounts together is the attack surface, a kind of a front door into that cloud infrastructure.
I really see it as a new era or chapter that we're entering in the industry.
And the reason I see it that way is when I got into the industry initially as a pen tester in the 2000s, the whole job was to do with perimeter-based testing.
So you would scan someone's public IP address range, look for open ports, and then find vulnerable services and exploit those to gain access to the company.
As an industry, we've done a pretty good job, I'd say, of preventing those sorts of attacks and making it much more difficult. It's still possible, but it's a lot harder.
So as the friction came up, what we started to do, and we saw adversaries do, is shift their focus to targeting endpoints. So spear phishing attacks against employees directly.
And you might remember at the time there was a really prevalent phrase that marked that chapter change. It was, the perimeter is dead.
It drew a line in the sand, really, saying that not that the first chapter was over, but we're certainly entering a new one.
And at that time, it was literally like shooting fish in a barrel, but it has got a lot harder. The friction has got a lot more.
Even though it's possible to compromise via an endpoint, you at least think about it now. You have to actually prepare and, you know, actually intentionally go to bypass an EDR.
And you're starting to see much more novel ways of attackers exfiltrating data from networks and those sorts of things.
And so now this third era, you hear people say, you know, identities are the new perimeter.
I've heard identities are the new endpoint, 2-factor authentication point, all these kinds of things, whatever you call it, it's really marking a shift in the fact that the friction has increased on identity-based attacks.
And so now people are starting to target this kind of identity perimeter.
Really what we're talking about is organizations are shifting their infrastructure into the cloud, and so attackers are too.
And the new attack surface is user accounts spread across the cloud.
In some sense, it doesn't feel like it is, but it is really nascent to us all.
Do you feel that we're not doing a good enough job of protecting it, or do you feel it's just too messy, or what's your thoughts on that?
And it's that because people don't understand the attacks quite as well against this side, and attackers now can— they don't need to touch your network at all.
So a lot of the detection capability is on-prem, on our physical networks.
But obviously these sorts of attacks go directly from wherever the attacker is located directly into a third party, and the detection capability there is much, much more limited.
So people often say that, you know, okay, identities or internet-facing identities have been an attack surface for a long time.
But the difference really is I would say a couple of things.
Firstly, that an identity being compromised on your infrastructure you had control of, so you could actually do some kind of detection. You could enforce password policies.
It might be domain joined.
But when we've actually outsourced that to the cloud, you're now really beholden to the third party about what logs they can give you and what visibility you can get there.
The other thing is, is that what we've noticed happen, particularly over the last decade, is the SaaS applications that can be accessed are far more powerful.
So a lot of the attacks that you're seeing happen now are where people will compromise and log into the SSO provider and then access all the downstream applications.
If you think about the things that are in there, you've got things Slack and things Teams where you can phish people directly where people aren't expecting it.
You've also seen attackers doing things actually leveraging people's EDR solutions and MDM solutions to deploy ransomware and execute code on endpoints.
So when I think about an identity attack surface, I think about it in two groups.
There's SSO identities, ones that are sitting in your identity provider, and there's ones that are sitting outside of the identity provider.
And regardless of how— if you think of that as the whole attack surface, all of them, what they have in common is you're not exploiting, generally speaking, a bug that can be patched.
It's really all the attacks are something that result in the attacker logging into the system.
But breaches MGM Resorts, they would target, you know, the actual SSO provider themselves.
Really what you're seeing there is the attacks are password-based attacks of either trying to guess a password or trying to use stolen credentials or using phishing to actually take control of that account.
Once you're actually in Okta, you're using that then to access all the downstream applications that are connected at that point.
And so some of the attacks against the SSO itself, you see some attacks which are quite basic, straightforward phishing attacks, but then you see much more kind of novel techniques.
So for example, everyone knows by now, hopefully, that you've, with your SSO, it's important to enable multifactor authentication.
And once you do that, if you then phish an employee and you get their credentials, you need also access to that second factor.
But one of the more novel attacks that we started to see happen, what attackers were doing is they do something what you call a browser-in-browser attack.
And so what happens there is you, it allows you to effectively intercept the MFA token as well.
So the way they do that is as an attacker, what I would do is I would set up my own server on the internet somewhere that I control.
I then open up a web browser on that server and browse to the target's SSO provider, whether it's JumpCloud, Okta, Google Workspace, whatever it might be.
And put it in kiosk mode so it's full screen. Once that's available and it's full screen, I can from my local laptop remote desktop into that.
So I have a window into that remote desktop and I can see that open browser.
And so what you can then do is I can set that up and then send that as a phishing link to an employee inside the organization.
Now, when they open up my web page, what they see is their SSO login page that they're familiar with.
But what's actually happening is when they enter their credentials into it, because it's actually happening on my server, but they don't realize it, I can do whatever I like.
So I can steal the session token. You can actually intercept the MFA and the password or whatever you like to do.
So you're starting to see this cat and mouse game where these techniques build up over time.
And I think it's just knowing about those sorts of attacks can happen and what they look like in this era.
And you can solve it with awareness and it helps. But I think really it's more controls that need to go on, on the technical side.
So this is why people are driving for more hardware-based authentication or phishing-resistant MFA methods that can't be stolen that way.
So things like YubiKeys and those sorts of things.
And that's what you saw with things like MGM Resorts, for example, where the attacker would go after the SSO provider and then access all the downstream critical systems and use that to steal sensitive data or do ransomware attacks or whatever it might be.
But the other category that I see are, you know, what we refer to as shadow identities, which is an apt name for them because they're all the things that exist outside of SSO.
So I think it really clarifies what we mean about this being an era because it's not just the attackers shifting focus, but it's also the way that people want to work in security.
We've always been very used to this centralized security enforcement model.
So for example, you have an SSO provider that gives you access to all your applications and you enforce all your strong security controls on that SSO so that you can prevent these sorts of attacks from happening.
But the world is becoming increasingly self-service.
And, you know, you're getting now very powerful SaaS applications that don't have a book a demo button at the top, but they have a try it free button.
And so employees are very used to just wanting to get their job done.
So they'll go directly to these online applications and they'll sign up to them and then they'll start putting company data in.
You can start doing integrations back to your Google Workspace or Office 365 and everything else.
And so what you end up from these employees signing up is an identity sprawl issue and you end up with lots of other identities online which don't have the same security controls enforced on them.
Now, those sorts of things are very easy for an attacker to discover.
And one such example, as we saw with 23andMe, is a credential stuffing attack where employee signs up with a password that they used previously that has now been a result of a prior breach, and the attacker can actually automatically take that and just spray it across every available SaaS application and then just pick off any accounts that employees own and use that to pivot back into the infrastructure.
So you can use that and have unique passwords per website is gonna make a big difference.
And then all the normal things that you would expect, like just enabling MFA on those various accounts.
But from an organization perspective, it's really just about having visibility of what identities are out there.
Because the thing to think about when it comes to shadow identities is the apps are a lot more powerful than people think.
And people will say, okay, I've got this SaaS application behind SSO, but what if there are other tenants?
You know, other teams have gone off and set up other instances of those SaaS applications which have sensitive data in as well.
And so yeah, just understanding what people are signing up to and actually getting visibility of which identity is being created is really where it starts.
I think most people know how, you know, it's not rocket science to secure an identity. It's all the normal stuff that we've spoken about for decades in the industry.
It's strong passwords, it's MFA, phishing-resistant MFA. The challenge is less about what to do, it's getting it there and keeping it there, right?
You can't add a SaaS application onto SSO if you don't know it exists. So you have to have that visibility.
And then once you've got everything on SSO and you have these strong authentication mechanisms set up, just life happens, you know, so normal business operation, someone makes an exception to a team for the weekend, they forget to turn it back on, or somebody enforces a strong MFA method, but they add a less secure backup alternative and the attacker can just effectively downgrade to the weaker MFA method and use those instead.
Right.
So I think it all starts with just monitoring and making sure that you understand what the estate is and what identities are out there, and are they in the secure state that you think they are?
Most of the people that we work with get a surprise about just how many identities are out there and where security controls aren't actually enforced where they thought they were.
I mean, from a technical perspective with our products, we use a browser extension, which we deploy into every employee browser, which then allows you to monitor any identity use.
So whether one's being created through a signup form, or it's being logged in to, and we can actually flag those accounts back to a central dashboard.
So you can see whether or not they have the appropriate security controls enabled.
But the other thing that we're doing is, because of the fact that the understanding of these types of attacks is not as high as it needs to be.
And because of the fact that the detection capability and logging capability across these applications isn't where it needs to be, we're actually also maintaining what we call the SaaS attacks matrix.
And this is basically a bit of research, whether it links to our product or not, we are continually and actively researching this area to stay out in front of attackers and understand what methods are available.
And so we were doing this internally to really guide our own thinking and to guide our own product.
But we've now, as of a few months ago, actually put that online in a GitHub repository and we're working out in public and making that — we made that a community resource.
So we've got contributions to it and it's basically a MITRE ATT&CK framework style grid which people can just use to understand the different attacks and track them as we add some over the time.
So that's a freely available resource that we welcome for anyone to follow and/or contribute to.
If you want to learn more about attack techniques and the risks that organizations are facing right now, you can check it out for free at Push Security by visiting pushsecurity.com/smashing.
That's pushsecurity.com/smashing. And thank you, Adam Bateman, co-founder and CEO of Push Security. Thank you so, so much for your time.
Jane, I'm sure lots of our listeners would love to follow you online and what's the best way for folks to do that?
And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Overcast.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 349 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Episode links:
- XtraVue Trailer demo – YouTube.
- Nvidia sued after video call mistake showed ‘stolen’ data – BBC News.
- Valeo v. Nvidia complaint – DocumentCloud.
- Fake BBC news article using Jane Wakefield’s name – Twitter.
- Report a fraudulent webpage to Google Safe Browsing – Google.
- Meta’s EU ad-free subscription faces early privacy challenge – Yahoo!
- Meta to offer ad-free subscription in Europe in bid to keep tracking other users – TechCrunch.
- Meta’s EU ad-free subscription faces early privacy challenge – TechCrunch.
- Facebook and Instagram to Offer Subscription for No Ads in Europe – Facebook.
- noyb files GDPR complaint against Meta over “Pay or Okay” – NOYB.
- Big Mac index 2023 – Statista.
- Euro aea wages 2023 – Take-profit.org.
- Boat Story review – The Guardian.
- GlasgowGPT – the world’s first Scottish artificial intelligence chatbot.
- Gergely Orosz uncovers fake female speakers at a tech conference – Twitter.
- Eliza-May Austin shares her experiences of being invited to speak at tech conferences – LinkedIn.
- Boat Story – BBC iPlayer.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Push Security – Monitor and secure your entire identity attack surface, including non-SSO identities. Get notified in real-time to vulnerabilities across all your internet-facing identities, and have your staff guided to fix simple issues.
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Device Trust for Okta. Watch the demo today!
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get 10% off!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
