Transcript
A (0:03)
Hi, everyone, and welcome to Risky Business. My name's Patrick Gray. We've got a fantastic show for you this week. We've got some really interesting news to get through this week. A lot of AI stuff in this week's show, but it's all very interesting. We'll be getting into that with James Wilson and Adam Boileau in just a moment. And then we'll hear from this week's sponsor. And this week's show is brought to you by corelight, which of course is the company that maintains Zeek. And if you would like a 200 gigabit per second full line rate, you know, network security sensor, your options are fairly limited, but corelight can do that for you. Obviously this hardware software, you know, unified hardware software sort of thing is one of the reasons why corelight is not really at risk from AI like some software companies, even in, even in security. But Brian Dye, the chief executive of Corelight, joins us this week to have a chat about AI, AI in the SoC and about how we've gone from that being a radical kind of risky idea a year ago to it now just being the way things are done pretty much everywhere. Very interesting conversation. And coming up after this week's news and yeah, as I, as I said, like, this is kind of an AI security, security AI edition of the show. The first thing we're going to talk about today is some work out of the AWS security team about a whole bunch of fortinets getting owned by a threat actor who is using like heavily using AI, which is what I found. There's a few things I found interesting about this. First of all, I think the reaction from a bunch of people in offsec on social media really misses the point because they're like, they just used existing tools. They didn't do anything that cool. Again, we've talked about that on the show before. Not really the point. The point is it helps people who are not very capable become more capable and organized. And that's the second thing that struck me about this, is reading through it. It really seemed like the threat actor in this instance did not really know what they were doing and yet were able to pivot from a Fortinet device compromise to full domain compromise through mimikats and whatnot, where if any part of their automated chain broke down, they didn't really have the skills to work around it. But it didn't matter because they just would move on to the next target where their chain did work. Adam, what were your impressions here? Is your take here broadly similar to Mine.
B (2:23)
Yeah, it is. I mean none of the tradecraft here is particularly sophisticated. And as someone who you know, grew up doing offsec, you know, my gut reaction is like, well no, you don't know what you're doing. But on the other hand, managing 600 endpoints that you've shelled and doing that, you know, as a not particularly skilled operator, as a small team, whatever it is that, that this group is like, that's actually hard work. Like you know, keeping track of 600 endpoints on a spreadsheet when you're, you know, a super skilled elite hacker, you know, that's real work. So you know, the hacking itself, low rent, but the reality is at scale, you can do this with, you know, these kinds of tools. And you know, I remember the first time that, you know, I had to pivot through a network, you know, in a Windows environment and you know, do the like DC sync thing that Mimikatz does these days, before Mimikatz even existed. Right? And having to do Kerberos attacks and these kinds of syncing stuff, you know, way, way, way back before there was tooling, it was legitimately hard. Right? So having tools that, you know, empower you to move quickly, you know, when I was doing this stuff, Mimikatz came along, made everything a lot easier. Hey, now you can just ask, you know, ask a bot to do it for you and yeah, I mean it gets the job done. It's not done if it works well
