Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K. Most environments trust far more than they should, and attackers know it. ThreatLocker solves that by enforcing default deny at the point of execution. With ThreatLocker allow listing, you stop unknown executables cold. With ring fencing, you control how trusted applications behave. And with ThreatLocker DAC defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards. ThreatLocker is the simplest way to enforce zero trust principles without the operational pain. It's powerful protection that gives CISOs real visibility, real control, and real peace of mind. ThreatLocker makes zero trust attainable even for small security teams. See why thousands of organizations choose ThreatLocker to minimize alert fatigue, stop ransomware at the source and regain control over their environments. Schedule your demo@threatlocker.com N2K today. Hello everyone and welcome to the Cyberwires Research Research Saturday I'm Dave Buettner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
B (1:49)
Basically, a data leak happened in September of this year, so a few months ago, which was an unprecedented amount of very specific details on how the Great Firewall actually works. And of course, when such a data leak is exposed to the public, it's always worth having a look. And my research team was kind of chomping at the bit. They're like, can we look at this? And we said yeah, of course. With the requisite precautions. Sometimes these dumps might be booby trapped or otherwise, but this appear to be genuine and a treasure trove of information about something that's generally been kept very secret.
A (2:30)
That's Daniel Schwabe, head of investigations and CISO at Domain Tools. The research we're discussing today is titled Inside the Great Firewall.
B (2:47)
There's not a whole lot of public information about the Great Firewall and how it does its things. A lot of research has been done just trying to imper figuring it out, but in this particular situation, the over 500 gigabytes of internal data about the infrastructure and how it's organized, et cetera, was relieved and we dug into the data in order to write about it.
A (3:11)
Well, can you give us some insights how you start digging into a data set that is that large? How do you go about it?
B (3:19)
Yeah, that can certainly be overwhelming. We first took a high level look at like okay, what files Are they were like diagrams and text specifications. So you cluster those into kind of one category and then whenever there are particular outlines of human interaction, like this is who controls it, et cetera, you put them in a different bucket and then you start going through them. You will have to do a little bit of keyword searching. We intentionally didn't use any like LLM tools because we didn't want to further proliferate information. But we have some of our own tools we can feed information to and do a quick analysis to kind of hone in on what are the sort of large chunks, the human part of it, the technical design and then potential what that could actually mean in terms of the real world.
![Root access to the great firewall. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F8fa1036c-d790-11f0-8076-a71635cd192a%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)