Transcript
A (0:00)
Foreign. And welcome to Risky Business. My name's Patrick Gray. Fantastic show for you this week. An excellent selection of news to get through with Adam Byrlo and James Wilson. And we'll be doing that in just a moment and then we'll be hearing from this week's sponsor, Prowler. So Prowler is an open source project that does cloud security checks and remediations and its founder, Tony De La Fuente will be joining me later on in this week's sponsor interview. So of course there is the open source Prowler, but they're kind of at that point where they're starting to add some enterprise features into the commercial version. It's much as you would sort of expect, pointy, clicky, SSO integration and, you know, compliance features and stuff that really doesn't belong in a community slash open source version of software like that. So Tony will be joining us to have a bit of a chat about that later on in this week's episode. But first up, let's get into the news and we've got to start this week by kind of correcting some stuff that I said last week. So last week I said it was my very firmly held belief that Trench and L3 Harris Trenchant was the vendor behind what became known as the triangulation campaign, right, which was targeting Russia. It was disclosed by Kaspersky in late 2023. So last week I said a few things. I said I thought that the newly unveiled Karuna exploit toolkit was linked to triangulation. And I said this for a few reasons, basically because it was sort of, it seemed to be implied a little bit in Google's write up of it. I verify came out and sort of made that link and I'd already sort of long suspected that triangulation was an L3 Harris trenchant thing. Turns out it's not right. So it turns out it's actually not. But interestingly enough, the bit that I did get right last week is that the Karuna stuff is the Trenchant stuff presumably leaked by Peter Williams. Now we don't know that that's the stuff that he leaked, but we do know that these were a series of exploit chains that were being used at L3Harris or developed by L3Harris around about that time. So you would think, logically speaking, that these are the exploits that were leaked. There's some dead giveaways there. I think the fact that they've got like bits of this are named like Cassowary, which is a dangerous, flightless Australian bird, would tend to indicate that maybe this is a trenchant product. I should also mention too that I do have some sourcing on this. I'm not just. This isn't just vibes at this point. Last week was a little bit too much vibes, maybe, but this week, not so much vibes. So, you know, TLDR triangulation and Karuna, not from the same vendor, did use one of the same bugs though. And I'm really unclear on whether or not that was parallel discovery or someone licensed the bug to someone else to use. Or, you know, maybe someone used to work at place A and move to place B and sort of took the bug with them or I don't even know how that happened, but we can say they were using some of the same exploits. Could have been parallel discovery. Not sure. Triangulation was not trenchant. Karuna was. That's about as cleared up as it's going to get. Adam, let's bring you in on this one for starters. The other thing that's happened here, of course, is that we actually have the karuna samples on GitHub, thanks to the team at Iverify. Thanks for that. Which meant we've all got to look at them.
