Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K. Security works best in layers and when those layers actually work together, that's when things get interesting. NORD layer is a network security platform designed for modern teams. It secures connections, controls access and helps stop threats, all without hardware or long deployment cycles. Now Nord Nordlayer has partnered with CrowdStrike to bring Falcon endpoint protection into the mix, giving small and mid sized businesses a multi layered security approach that's practical to deploy and easy to manage. Nordlayer handles secure access and zero trust networking. CrowdStrike Falcon adds endpoint visibility and protection. Together they cover more ground than either could alone without requiring a large IT staff. For business leaders, that means clearer control and easier compliance. For IT teams, IT means granular access policies, faster onboarding and protection that scales. If you're looking for enterprise grade security without enterprise grade complexity, take a look at Nordlayer. Get up to 22% off yearly plans plus an additional 10% with code CYBERWIRE10. There's even a 14 day money back guarantee. Check out nordlayer.com cyberwire daily to learn more. Hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Bittner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
B (2:08)
I think that in general what we're seeing is a broader shift in the greater threat landscape where we're seeing adoption of web technologies as the way that threat actors are choosing to deliver both lures and payloads as opposed to traditional means of perhaps delivering static payloads through traditional avenues such as email.
A (2:33)
That's Andrew Northern, principal security researcher at Census. The research we're discussing today is titled From Evasion to Exploiting the Funneling Behavior of Injects.
B (2:52)
And because of that, it affords a lot of great opportunities to really get in and explore what it is that threat actors are doing differently and how things are changing.
A (3:05)
Well, help us understand in simple terms what exactly injects are.
B (3:11)
Certainly so what we have is we have a series of websites, and by series I mean a great volume of websites. These are going to be anything from commercial websites to mom and pop brand personal blogs or any type of web website at all. And those particular web properties or websites are going to have vulnerable pieces of software on them that allow threat actors to take control or at a bare minimum, modify them. And in other cases what we're seeing is that from password stealing attacks from stealers in previous incidents, large numbers of usernames and passwords, and otherwise known as credentials are used in what are known as a password stuffing attack against some of these portals that are used for managing these sites, at which time then the threat actors are able to insert or inject, hence the name, a piece of malicious code onto those sites. So when I'm speaking of injects, I'm speaking of injected malicious code that was not intended to be there by the rightful owner of the website.
![Caught in the funnel. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F6afc0d6a-f872-11f0-b67c-5fd64c8ef79d%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)