Loading summary
Host 1
You're listening to the Cyberwire Network powered by N2K. Did you know Active Directory is targeted in 9 out of 10 cyber attacks? Once attackers get in, they can take control of your entire network. That's why Semperis created Purple Night, the free security assessment tool that scans your Active Directory for hundreds of vulnerabilities and shows you how to fix them. Join thousands of IT pros using Purple Night to stay ahead of threats. Download it now at sempris.com purple-night that's sempris.com purple knight.
Host 2
The word is O WASP Vulnerable and outdated components spelled O for open W for Web A for application S for security P for project Vulnerable as in defenseless against attack and outdated components as in parts that are obsolete Definition software libraries, frameworks, packages and other components and their dependencies Third party code that each component uses that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version example sentence. Most likely you have vulnerable and outdated components on your hands if your OS or Web application server or database management system is is unsupported or not up to date. Origin and Context Dave Wickers and Jeff Williams, working for Aspect Security, a software consultant company, published an education piece in 2003 on the top software security coding issues of the day that eventually turned into the OWASP top 10, a reference document describing the most critical security concerns for Web applications. Today, OWASP is an international team of security professionals led by the foundation executive director and top 10 project leader Andrew van der Stock, and dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. Today, there are tens of thousands of members and hundreds of chapters worldwide. In the OWASP 2021 Top 10 vulnerabilities list, the committee moved vulnerable and outdated components up three positions to number six. This is essentially vulnerability management. According to Rapid7, it's the process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them. This is hard enough to do on the systems that network defenders are directly responsible for, like laptops, servers and mobile devices. But in 2021, with a series of high profile third party attacks against the digital supply chain, SolarWinds, Accelian, and log4j, vulnerability management has become exponentially harder to do. According to Synopsys, in an audit of their customer base in April 2021, 75% of all code bases were composed of open source, and 85% contained open source dependencies that were more than four years out of date. Having the ability to know that you have open source components nested within your operational code is key and essential to minimize the risk. The industry's best practice is to deploy some kind of scanning system that continuously crawls your digital environments, discovers running software, checks for known vulnerabilities, and facilitates the patch process when discovered to reduce the risk even further. The same zero trust strategy that we use for reducing the attack surface of employees and devices should be used for software components. This means that creating and maintaining an inventory of all your organization's software is essential. If you have a robust software inventory, you then can deploy policy to limit software component access to only the internal resources it absolutely needs to function and nothing else. Nerd Reference the Panamanian law firm Mossack Fonseca closed its doors in March 2018 due to the leak of 2.6 terabytes of data comprising 11.5 million documents on client attorney information. According to the folks at emuniweb, the breach resulted because of the exploitation of unpatched versions of WordPress and Drupal. Mossack Fonseca had failed to apply the appropriate security updates in April 2016. On the Late Night with Seth Meyers talk show, Mr. Meyers explains the tax haven that Mossack Fonseca facilitated and some of the government officials and celebrities who had their data leaked.
Host 3
A massive leak of confidential documents known as the Panama Papers has implicated as many as 12 current or former heads of states and some of the world's wealthiest people, and a huge international tax avoidance and corruption scandal. For more on this, it's time for a closer look. The leaked documents come from a law firm named Mossack Fonseca, based in Panama, a country best known for hats favored by business casual hipsters, old rich guys in sports cars and Sean Connery, the world's hippest old rich guy. The law firm is known for helping foreigners set up shell companies in Panama to hold their financial assets in secret. Now, this story is massively important because it reveals the degree to which wealthy and powerful people have been allowed to hide their wealth and avoid taxes. And in this case, that includes some high profile names you may recognize.
Host 1
Vladimir Putin, investigators say, at the center of a star studded list of 12 current and former heads of state, like the King of Saudi Arabia, even celebrities like Jackie Chan.
Host 3
First of all, what a shame that Jackie Chan and Vladimir Putin are showing up together in anything other than Rush Hour. Four Russian Hour.
Host 2
Wordnotes is written by Nyla Genoe, executive produced by Peter Kilpe and edited by John Petrick and me, Rick Howard. The mix, sound, design and original music have all been crafted by the ridiculously talented Elliot Peltzman. Thanks for listening.
Host 1
And now a word from our sponsor, ThreatLocker. Keeping your system secure shouldn't mean constantly reacting to threats. ThreatLocker helps you take a different approach by giving you full control over what software can run in your environment. If it's not approved, it doesn't run. Simple as that. It's a way to stop ransomware and other attacks before they start without adding extra complexity to your day. See how ThreatLocker can help you lock down your environment at www.threatlocker.com.
Podcast Information:
The episode begins with Host 2 delving into the concept of OWASP Vulnerable and Outdated Components. OWASP stands for Open Web Application Security Project, a globally recognized organization dedicated to improving software security. Host 2 explains:
"Vulnerable and outdated components as in parts that are obsolete. Definition: software libraries, frameworks, packages, and other components and their dependencies. Third-party code that each component uses that have inherent security weaknesses..." ([00:52])
This segment sets the foundation by defining what constitutes vulnerable and outdated components, emphasizing the risks posed by obsolete software elements in modern applications.
Host 2 provides a historical perspective on the OWASP Top 10, tracing its origins to an educational piece published in 2003 by Dave Wickers and Jeff Williams of Aspect Security. This foundational work evolved into what is now the OWASP Top 10, a critical reference for web application security. Host 2 notes:
"Today, OWASP is an international team of security professionals led by the foundation executive director and top 10 project leader Andrew van der Stock..." ([00:52])
The discussion highlights OWASP's mission to enable organizations worldwide to develop, purchase, and maintain secure applications and APIs, underscoring its global impact with tens of thousands of members and hundreds of chapters.
In the 2021 OWASP Top 10 vulnerabilities list, Host 2 mentions a significant shift:
"In the OWASP 2021 Top 10 vulnerabilities list, the committee moved vulnerable and outdated components up three positions to number six. This is essentially vulnerability management." ([00:52])
This elevation underscores the growing importance of managing software vulnerabilities, particularly those arising from third-party and open-source components.
Host 2 elaborates on the complexities of vulnerability management, especially in the wake of high-profile third-party attacks like SolarWinds, Accelian, and Log4j. Citing Rapid7, Host 2 states:
"It's hard enough to do on the systems that network defenders are directly responsible for... But in 2021, with a series of high profile third party attacks, vulnerability management has become exponentially harder to do." ([00:52])
Further statistics from Synopsys reveal the extent of the issue:
"In an audit of their customer base in April 2021, 75% of all code bases were composed of open source, and 85% contained open source dependencies that were more than four years out of date." ([00:52])
These insights highlight the pervasive reliance on outdated open-source components and the associated security risks.
Host 2 outlines industry best practices to mitigate these risks:
Continuous Scanning: Deploy scanning systems that continuously crawl digital environments, discover running software, check for known vulnerabilities, and facilitate the patching process.
"The industry's best practice is to deploy some kind of scanning system that continuously crawls your digital environments..." ([00:52])
Zero Trust Strategy for Software Components: Apply zero trust principles to software components by maintaining a robust software inventory and enforcing strict access policies.
"The same zero trust strategy that we use for reducing the attack surface of employees and devices should be used for software components." ([00:52])
This approach ensures that only essential software components have access to necessary resources, thereby minimizing potential attack vectors.
Host 3 transitions to a real-world example illustrating the consequences of neglecting vulnerability management:
"A massive leak of confidential documents known as the Panama Papers has implicated as many as 12 current or former heads of states and some of the world's wealthiest people..." ([05:21])
The breach at Mossack Fonseca, a Panamanian law firm, resulted from the exploitation of unpatched versions of WordPress and Drupal, as highlighted by Host 2:
"Mossack Fonseca had failed to apply the appropriate security updates in April 2016." ([00:52])
Host 3 adds color to the narrative by describing the firm’s role in facilitating shell companies, which enabled wealthy and powerful individuals to hide assets and avoid taxes. The leak exposed sensitive information about high-profile figures, including:
Host 1 elaborates on the scandal's global impact:
"Vladimir Putin, investigators say, at the center of a star-studded list..." ([06:13])
This case study underscores the critical importance of timely vulnerability management to prevent catastrophic data breaches.
Host 2 wraps up the discussion by acknowledging the contributors and the production team, emphasizing the collaborative effort behind the episode:
"Wordnotes is written by Nyla Genoe, executive produced by Peter Kilpe and edited by John Petrick and me, Rick Howard. The mix, sound, design, and original music have all been crafted by the ridiculously talented Elliot Peltzman." ([06:38])
This episode effectively highlights the critical importance of managing vulnerable and outdated components within software systems. By combining expert analysis with real-world examples, Hacking Humans provides listeners with actionable insights to bolster their cybersecurity defenses.