Risky Business #804 -- Phrack's DPRK hacker is probably a Chinese APT guy
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
Australia expels Iranian ambassador
Hackers sabotage Iranian shipping satcoms
APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK?
Trail of Bits uses image-downscaling to sneak prompts into Google Gemini
The Com’s King Bob gets ten years in the slammer
It’s a day that ends in -y, so of course there’s a new Citrix Netscaler RCE being used in the wild.
This week’s episode is brought to you by Corelight. Chief Strategy Officer Greg Bell talks through how they’ve been implementing AI for sifting through your network data. A model-context-protocol server that can rummage in all those packet logs for you while you keep investigating? Yes please.
This episode is also available on Youtube.
Show notes
Embassy staff flee Canberra in dead of night | news.com.au — Australia’s leading news site for latest headlines
Swedish security service says Iran uses criminal networks in Sweden | Reuters
Risky Bulletin: Hackers sabotage Iranian ships at sea, again - Risky Business Media
Microsoft scales back Chinese access to cyber early warning system | Reuters
Microsoft Didn’t Disclose Key Details to U.S. Officials of China-Based Engineers, Record Shows — ProPublica
.:: Phrack Magazine ::.
Uncovering the Chinese Proxy Service Used in APT Campaigns
Weaponizing image scaling against production AI systems -The Trail of Bits Blog
FBI, Cisco warn of Russia-linked hackers targeting critical infrastructure organizations | Cybersecurity Dive
CrowdStrike warns of uptick in Silk Typhoon attacks this summer | CyberScoop
Kevin Beaumont: "There’s a bunch of new Netscal…" - Cyberplace
US charges Oregon man in vast botnet-for-hire operation | Cybersecurity Dive
South Korea arrests suspected Chinese hacker accused of targeting BTS singer and other celebrities | The Record from Recorded Future News
SIM-Swapper, Scattered Spider Hacker Gets 10 Years – Krebs on Security
Chinese national who sabotaged Ohio company’s systems handed four-year jail stint | The Record from Recorded Future News
Nevada state offices close after wide-ranging 'network security incident' | Reuters
DSLRoot, Proxies, and the Threat of ‘Legal Botnets’ – Krebs on Security
Russia weighs Google Meet ban as part of foreign tech crackdown | The Record from Recorded Future News
Kremlin-Mandated Messaging App Max Is Designed To Spy On Users
Иеромонах РПЦ Макарий призвал помолиться за мессенджер MAX
--------
53:32
--------
53:32
Wide World of Cyber: Microsoft's China Entanglement
The Wide World of Cyber podcast is back! In this episode host Patrick Gray chats with Alex Stamos and Chris Krebs about Microsoft’s entanglement in China.
Redmond has been using Chinese engineers to do everything from remotely support US DoD private cloud systems to maintain the on premise version of the SharePoint code base. It’s all blown up in the press over the last month, but how did we get here? Did Microsoft make these decisions to save money? Or was it more about getting access to the Chinese market? And how can we all make the world’s most important software company stop doing things like this? Tune in to the Wide World of Cyber podcast to find out!
This episode is also available on Youtube.
Show notes
--------
45:43
--------
45:43
Risky Business #803 -- Oracle's CSO Mary Ann Davidson quietly departs
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
Oracle’s long term CSO departs, and we’re not that sad about it
Canada’s House of Commons gets popped through a Microsoft bug
Russia degrades voice calls via Whatsapp and Telegram to push people towards Max
South-East Asian scam compounds are also behind child sextortion
Reports that the UK has backed down on Apple crypto are… strange
Oh and of course there’s a Fortinet bug! There’s always a Fortinet bug!
This week’s episode is sponsored by open source identity provider Authentik. CEO Fletcher Heisler joins the show this week, and explains the journey of implementing SSO backed login on Windows, Mac and Linux. You’ll never guess which one was a few lines of PAM config, and which was a multi-month engineering project!
This episode is also available on Youtube.
Show notes
Is Oracle facing headwinds? After layoffs, its 4-decade veteran Chief Security Officer Mary Ann Davidson departs
Oracle CSO blasted over anti-security research rant - iTnews
New York lawsuit against Zelle creator alleges features allowed $1 billion in thefts | The Record from Recorded Future News
Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme – Krebs on Security
How we found TeaOnHer spilling users' driver's licenses in less than 10 minutes | TechCrunch
UK has backed down on demand to access US Apple user data, spy chief says
DNI Tulsi Gabbard on X: "As a result, the UK has agreed to drop its mandate for"
Hackers target Workday in social engineering attack
Russia curbs WhatsApp, Telegram calls to counter cybercrime | The Record from Recorded Future News
Hackers reportedly compromise Canadian House of Commons through Microsoft vulnerability | The Record from Recorded Future News
Norway police believe pro-Russian hackers were behind April dam sabotage | The Record from Recorded Future News
US agencies, international allies issue guidance on OT asset inventorying | Cybersecurity Dive
FortMajeure: Authentication Bypass in FortiWeb (CVE-2025-52970)
U.S. State Dept - Near Eastern Affairs on X: "He did not claim diplomatic immunity and was released by a state judge"
493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds | WIRED
.:: Phrack Magazine ::.
Accenture to buy Australian cyber security firm CyberCX - iTnews
--------
58:28
--------
58:28
Risky Biz Soap Box: How to measure vulnerability reachability
In this Soap Box edition of the Risky Business podcast Patrick Gray chats with Socket founder Feross Aboukhadijeh about how to measure the reachability of vulnerabilities in applications.
It’s great to know there’s a CVE in a library you’re using, but it’s even better if you can say whether or not that vulnerability actually impacts your application.
They also talk about how Socket started out as a way to discover malicious packages in software projects, but these days it’s playing the CVE game as well.
This episode is also available on Youtube.
Show notes
--------
35:48
--------
35:48
Risky Business #802 -- Accessing internal Microsoft apps with your Hotmail creds
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
CISA warns about the path from on-prem Exchange to the cloud
Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are
Everyone and their dog seems to have a shell in US Federal Court information systems
Google pays $250k for a Chrome sandbox escape
Attackers use javascript in adult SVG files to … farm facebook likes?!
SonicWall says users aren’t getting hacked with an 0day… this time.
This week’s episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together.
This episode is also available on Youtube.
Show notes
CISA, Microsoft issue alerts on ‘high-severity’ Exchange vulnerability | The Record from Recorded Future News
Advanced Active Directory to Entra ID lateral movement techniques
Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
Cartels may be able to target witnesses after major court hack
Federal judiciary tightens digital security as it deals with ‘escalated cyberattacks’ | The Record from Recorded Future News
Citrix NetScaler flaws lead to critical infrastructure breaches | Cybersecurity Dive
DARPA touts value of AI-powered vulnerability detection as it announces competition winners | Cybersecurity Dive
Buttercup is now open-source!
HTTP/1.1 must die: the desync endgame
US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms | The Record from Recorded Future News
North Korean cyber-espionage group ScarCruft adds ransomware in recent attack | The Record from Recorded Future News
Adult sites are stashing exploit code inside racy .svg files - Ars Technica
Google pays 250k for Chromium sandbox escape
SonicWall says recent attack wave involved previously disclosed flaw, not zero-day | Cybersecurity Dive
Two groups exploit WinRAR flaws in separate cyber-espionage campaigns | The Record from Recorded Future News
Tornado Cash cofounder dodges money laundering conviction, found guilty of lesser charge | The Record from Recorded Future News
Hackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home | WIRED
Malware in Open VSX: These Vibes Are Off
How attackers are using Active Directory Federation Services to phish with legit office.com links
Introducing our guide to phishing detection evasion techniques
The State of Attack Path Management
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.