Defensive Security Podcast Episode 276

Defensive Security Podcast Episode 276

Update: 2024-08-16
Share

Description

Check out the latest Defensive Security Podcast Ep. 276! From cow milking robots held ransom to why IT folks dread patching, Jerry Bell and Andrew Kalat cover it all. Tune in and stay informed on the latest in cybersecurity!


Summary:


In episode 276 of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat delve into a variety of security topics including a ransomware attack on a Swedish farm’s milking machine leading to the tragic death of a cow, issues with patch management in IT industries, and an alarming new wormable IPv6 vulnerability patch from Microsoft. The episode also covers a fascinating study on the exposure and exploitation of AWS credentials left in public places, highlighting the urgency of automating patching and establishing robust credential management systems. The hosts engage listeners with a mix of humor and in-depth technical discussions aimed at shedding light on critical cybersecurity challenges.


00:00 Introduction and Casual Banter

01:14 Milking Robot Ransomware Incident

04:47 Patch Management Challenges

05:41 CrowdStrike Outage and Patching Strategies

08:24 The Importance of Regular Maintenance and Automation

15:01 Technical Debt and Ownership Issues

18:57 Vulnerability Management and Exploitation

25:55 Prioritizing Vulnerability Patching

26:14 AWS Credentials Left in Public: A Case Study

29:06 The Speed of Credential Exploitation

31:05 Container Image Vulnerabilities

37:07 Teaching Secure Development Practices

40:02 Microsoft’s IPv6 Security Bug

43:29 Podcast Wrap-Up and Social Media Plugs-tokens-in-popular-projects/


Links:



  •  https://securityaffairs.com/166839/cyber-crime/cow-milking-robot-hacked.html

  • https://www.theregister.com/2024/07/25/patch_management_study/

  • https://www.cybersecuritydive.com/news/misguided-lessons-crowdstrike-outage/723991/

  • https://cybenari.com/2024/08/whats-the-worst-place-to-leave-your-secrets/

  • https://www.theregister.com/2024/08/14/august_patch_tuesday_ipv6/


 


Transcript:


Jerry: Today is Thursday, August 15th, 2024. And this is episode 276 of the defensive security podcast. My name is Jerry Bell and joining me tonight as always is Mr. Andrew Kalat.


Andrew: Good evening, Jerry. Once again, from your southern compound, I see.


Jerry: Once again, in the final time for a two whole weeks, and then I’ll be back.


Andrew: Alright hopefully next time you come back, you’ll have yet another hurricane to dodge.


Jerry: God, I hope not.


Andrew: How are you, sir?


Jerry: I’m doing great. It’s a, it’s been a great couple of weeks and I’m looking forward to going home for a little bit and then then coming back. How are you?


Andrew: I’m good, man. It’s getting towards the end of summer. forward to a fall trip coming up pretty soon, and just cruising along. Livin the dream.


Jerry: We will make up for last week’s banter about storms and just get into some stories. But first a reminder that the thoughts and opinions we express are those of us and not our employers.


Andrew: Indeed. Which is important because they would probably fire me. You’ve tried.


Jerry: I would yeah. So the the first story we have tonight is very Moving.


Andrew: I got some beef with these people.


Jerry: Great. Very moving. This one comes from security affairs and the title is crooks took control of a cow milking robot, causing the death of a cow. Now, I will tell you that the headline is much more salacious than the actual story that the. When I saw the headline, I thought, oh my God, somebody hacked a robot and it somehow kill the cow, but no, that’s not actually what happened,


Andrew: Now, also, let’s just say up front, the death of a cow is terrible, and we are not making light of that. But we are gonna milk this story for a little while.


Jerry: that’s very true.


Andrew: I’m almost out of cow puns.


Jerry: Thank God for that. So, what happened here is this farm in Sweden had their milking machine, I guess is a milking machine ransomware and the farmer noticed that he was no longer able to manage the system, contacted the support for that system. And they said, no, you’ve been ransomware.


Actually, the milking machine itself apparently was pretty trivial to get back up and running, but apparently what was lost in the attack was important health information about the cows, including when some of the cows were inseminated. And because of that, they didn’t know that one of the pregnant cows was supposed to have given birth, but actually hadn’t.


And so it. What had turned out to be the case is that the cow’s fetus, unfortunately passed away inside the cow and the farmer didn’t know it until they found the cow laying lethargic in it stall, and they called a vet. And unfortunately, at that point it was too late to save the cow.


This is an unfortunate situation where a ransomware attack did cause a fatality.


Andrew: Yeah, and I think in the interest of accuracy, I think it was in Switzerland,


Jerry: Is it switzerland? Okay. I knew it started with a S W.


Andrew: That’s fair. You’re close. It’s Europe.


Jerry: It’s all up there.


Andrew: But yeah, I guess in this theory that if they had a better tracking date when the cow had been inseminated, they would have known that the cow was in distress with labor and could have done something more proactively to save cow and potentially the calf. And unfortunately, because I didn’t have that data, because it was in this ransomwared milking robot machine we ended up with a dead cow and a dead calf.


Jerry: So not without grilling the farmer too much. I was I was thinking, that,


Andrew: Wow!


Jerry: I’m sorry. I was thinking that, they clearly had an ability to recover. And what they thought was the important aspect of that machine’s operation, which was milking, they were able to get that back up and running pretty quickly.


But it seemed to me like they were unaware that this other information was in kind tied to that same system. I don’t fully understand. Seems like it’s a little more complicated than I’m, than I’ve got it envisioned in my mind. But very clearly they hadn’t thought through all the the potential harm.


A good lesson, I think for us all.


Andrew: I feel like we’ve butchered this story.


Jerry: The the next story we have for today comes from register. com and the title is patch management still seemingly abysmal because no one wants the job can’t stop laughing. All right.


Andrew: A cow died! That’s tragic!


Jerry: I’m laughing at your terrible attempts at humor.


Andrew: I couldn’t work leather in there. I tried. I kept trying to come up with a leather pun.


Jerry: We appreciate your efforts.


So anyhow. This next story talks about the challenge that we as an IT industry have with patching. And basically that it is a very boring task that not a lot of people who are in IT actually want to do. And so it, it highlights the importance again of automation and.


This in the complimentary story which is titled misguided lessons from CrowdStrike outage could be disastrous from cybersecurity dive. I put these two together for a reason because one of the, one of the. I think takeaways from the recent CrowdStrike disaster is we need to go slower with patching and updates and perhaps not rely on automatic updates.


And these 2 articles really point out the folly in that. Number 1, this. Article from the register is pointing out that relying on manual patching is a losing proposition because really nobody wants to do it and it doesn’t scale. It’s, it’s already, it’s IT operations is already a crap job in many instances, and then trying to expect people to to do things manually is a problem.


The second a

Comments 
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Defensive Security Podcast Episode 276

Defensive Security Podcast Episode 276

Jerry Bell and Andrew Kalat