Transcript
A (0:00)
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them@meter.com CST.
B (0:22)
I think in many cases they are victims of convenience. In many cases we're all rushing to get something done. Or perhaps something has been part of our workflow for so long, or perhaps this is the way it's always been done. In my organization we use these tools, we paste our things here and in many cases, I suspect the people accidentally leaking these secrets in is not intentional. They're doing so just to share it with a colleague. They're just doing it innocently to get their wealth format of kids. They can move on, deal with their other tasks.
A (0:50)
Welcome to Cybersecurity Today on the weekend, I do a lot of stories on supply chain about vulnerabilities in code repositories and all that, and so I'm always interested in vulnerabilities associated with supply chain repositories and the like. And what drives this interest. Well, we all know the damage that can be done if someone breaks into a code repository, which is why we spend a lot of time discussing the need to protect access credentials, be they usernames and passwords, or other secrets like API keys and other means of access, or the information about our configuration that's so important, that would be so useful to a hacker. I have to tell you, I've been doing this for a while and I thought after all these years I'd lost my capacity for being shocked, given the amount of attention paid to repositories and supply chains. I was absolutely gobsmacked when I got an email from a researcher who claimed to have uncovered 80,000 plus downloaded submissions, five gigabytes of enriched, annotated JSON data containing thousands of secrets. What kind of secrets? You might ask? B2. In addition to usernames and passwords, there were SSL certificates, private key passwords, service principal name key tab credentials, assorted internal passwords, external and internal host names, and IP addresses, paths to keys, certificates and configuration files. And that's just a start for a major financial institution. And I mean a major financial institution. They won't disclose who it is, neither will I. But they found know your client data, including full names, emails, addresses, usernames, phone numbers, IP addresses, and a lot more. In another case, they found a powershell script, a treasure trove for hackers from a large consulting company. They uncovered GitHub tokens. In another case, they found some great documentation. Internal endpoints used for fetching builds, installers credentials and more. Default administration, usernames, IIS configuration values and properties. Is anybody still using iis? I guess they are hardening configurations, including registry keys and configurations being set. Thousands and thousands and thousands of lines. I'll share the blog post with you in our show notes so you can see it yourself. But there was so much data that they finally stopped. There was just too much to analyze. And I want to stress, these weren't hidden. They were out in the open. In fact, in one case, there's even a readily available search tool to help you find them. Anyone with any level of expertise could find these, and apparently they do. In fact, one of the questions you would have is, okay, you found this repository or this data, Is anybody actually checking it out? So the researchers posted what they called canary credentials. Those of you in security probably know what these are, but basically they're credentials that'll ping you back if someone tries to use them. And within 48 hours, someone tried to use their credentials. How can this happen? Thousands and thousands of records with all kinds of credentials and data that could be invaluable to hackers, easily found. And once again, the answer is so bloody simple it just makes you cry. It turns out that the tools that developers use, and we're not blaming AI on this one, this is the regular tools that many developers use, even just for things like neatening up their code. And in the end, because they had so much data, they focused on two tools. And not to pick on these two. There are lots more, but they focused on two. JSON Formatter and code Beautify. Now, in these tools, developers, for convenience, are storing all kinds of information, not realizing that when they save them, these are exposed and can be accessed by others. In fact, JSON Formatter even has a search facility like a community bulletin board that lets you see all the sessions that have been saved and shares it with everyone. And again, these are not the only tools. I don't, I'm not faulting these tools, but there was just so much information that the researchers finally had to narrow it down and they settled on these. And they had gigabytes of information from these sources alone. Now, if you're feeling like I did when I read this, I don't blame you. I was seeing it, I was reading it. And I don't want to amplify some crazed, overhyped guy trying to sell his service by making a problem sound bigger than it is. Like it's the end of the world. So I tracked down the researcher and asked for an interview. His name, it turns out, is Jake Knott. And he's a researcher with Watchtower. And I invited him on the show. Listen to him. He's kind of a soft spoken guy. I tried to make sure you can hear as much of his voice as possible. And I tried to fix the lighting in his apartment where I reached him. But he's not a marketing guy, he's a researcher. And if he looks a little bit like he's in witness protection, sorry. But listen to him. And you be the judge. Because if I heard this when I was still running big development Monday morning, I'd be having an all hands meeting to find out where this problem was affecting us. But again, my job isn't to hype things or freak you out. And some of you may agree or disagree, some of you may think I've blown this out of proportion. Good for you. But here's my interview with Jake Knott. You make up your own mind. Welcome, Jake.
