Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:17)
Welcome to Only Malware in the Building. I'm your host, Dave, and today we're playing everybody's favorite game, Cyber Feud. On my left, Selena. On my right, Keith. Contestants, get ready. We asked 100 cybersecurity professionals questions as they were yelling at their computers this week. Hands on your buzzers, top answers on the board. Name something your computer does that makes you say, yep, that's malware, Selena.
A (0:50)
It suddenly gets really slow, like it's thinking about every bad decision it's ever made.
B (0:55)
Survey says number one answer, slow performance is on the board. Keith. Chance to steal Names something else that screams malware.
C (1:06)
Pop ups. It's gotta be popups. So many popups. Pop ups asking me to update software I've never heard of.
B (1:14)
Survey says, that's a big one. Pop ups everywhere. We've also got your browser homepage changes, your antivirus starts panicking. And my personal favorite, why is my webcam light on? All right, next question. Name something malware steals.
C (1:37)
Passwords.
B (1:38)
Survey says top three answer.
A (1:43)
Money.
B (1:44)
Survey says, number one answer. Malware loves money, folks, almost as much as it loves bad security practices. Stick around, because whether it's ransomware, spyware, or something you definitely didn't download on purpose, there's only malware in the building. And we're about to find out who invited it in.
A (2:23)
Hello, everyone. And I will take only malware in the building for 500. Dave. Oh, wait, was that not what we were doing earlier?
B (2:32)
Wrong, wrong game. But we'll take it. And we also do not have to form our answers in the form of a question. We can just. Just go talk like normal human beings.
A (2:45)
Well, in this episode of Only Malware in the Building, we are going to be talking about some interesting things. So we've talked on this podcast before about social engineering and how it seems like threat actors are getting more clever when it comes to craf. Interesting lures, getting people to make risky decisions based off of things that they see on their computers. One of my favorites is, of course, click fix. And we talked about that a few times. But today we're going to talk about social engineering plus the abuse of legitimate services. So two topics today. Device code authorization for account takeover, which is really interesting. Leveraging the legitimate Microsoft attack flow for compromising Microsoft accounts. And then we also have abusing direct send. So this is something that we see a lot with threat actors. And essentially what it looks like is that someone in your organization, or even you, is emailing you and it looks real and can be very believable. So pairing these two types of techniques with really great social engineering can be a very, very effective thing for threat actors. So, yeah, I don't know, Dave, if you want to kick us off, I don't know if you have any thoughts about either one these techniques.
![When legit is the trick: Phishing’s sneaky new moves. [OMITB] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fd0aef40a-0066-11f1-9552-53f3f6498fa7%2Fimage%2F14002263e169460f16ca12e04624eb3a.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)