Transcript
A (0:00)
Foreign. And welcome to Risky Business. My name's Patrick Gray. A great show for you this week. We're going to be taking a look at the Iranian cyber attack against Stryker, the medical device manufacturer. We're also going to look at a bunch of AI security research and some old school security research. There's a lot going on. So we'll be getting through all of that in this week's news segment with Adam Boileau and James Wilson in just a moment. This week's show is brought to you by Push Security. And joining us this week in the sponsor interview are security researcher Dan Green and field CTO Mark Orlando. And they're going to be chatting about, look, some more activity they're seeing which is just dumb, but works as in these sort of pseudo phishing style pages which just instruct users to, you know, enter commands that give, that give people remote access to their systems. So that one is coming up later in this week's spot sponsor interview. But yes, before we get into that, it is time for a check of the week security news. And let's start off with this huge wiper attack against Stryker, which makes medical devices and I think prosthetics as well. They're a huge company. They do have a presence in Australia as well. It looks like an Iranian quote unquote hacktivist group which looked like it was actually being run by a ministry in Iran. They managed to, I mean, it really does look like what they did here was they fished a user that happened to have intune, like admin permissions and then just vaped every single device in the environment, which according to Reddit rumor at least involved employees, personal devices that were enrolled into the corporate intune. Adam, is that about the long and the short of it?
B (1:48)
That seems to be what we've got from the story so far. I mean, and this is, you know, this is a big organization, something like 50,000 staff globally. But yeah, it seems to be they got on the intune and then use that to kick off a remote wipe command against everything. And I think anyone who's worked in a big organization can see how it would go that way. They've got that capability. It's very rare that anyone really uses the remote wipe on a broad scale, but it provides so much functionality and intune is so featureful, being able to just vape everybody and then collateral damage on personal devices where sometimes you have to enroll in Corb mdm, you know, to have access to, you know, remote access via Citrix or whatever else. Like it's not that unusual. So, yeah, I felt bad reading that story, man.
A (2:38)
Yeah. And I mean, I had a chat with a CISO I know in the sort of medical field here in Australia, and they're like, this is a big deal. Like, this is an important supplier. This is going to cause some real. Some real drama. James, you know, you've had a look at this as well. I mean, any thoughts beyond what we've just discussed?
