C (2:35)
Yeah. So what I'm seeing is a number of supply chain attacks that, you know, I have, you know, I have three on my desk at the moment which we, which we can see the future and the past. The consequences of supply chain attacks could be absolutely gruesome. Because in many ways it's a one compromise hits many type issue. So particularly on credential theft, particularly on PII, personally identifiable information cards, etc. But it's not only that, it's about IP theft, particularly when that platform compromise is using token replay, cryptographic tokens, sometimes replayed, also certificate manipulation and also cookie grabbing. And what we see is some serious problems that are widespread and may have, in one case that I worked on last year, around 1600 global casualties for one supply chain attack. And that supply chain attack was an attack on tokenization and encryption keys. Yep. So basically what happened there was the use case for that was. Very important information transfer, let's say. So the platform was meant to be secure. People were transferring highly secure, highly confidential nation state and law enforcement information, particular potentially over the system. And it was compromised because the system itself was old, it wasn't patched, the vendor hadn't done anything for eight years, but the platform was running, it was fine. So nobody ever looked at it until such time as that event caused basically global chaos. And it was right down to those kinds of supply chains to have a very wide reach globally. And I've still got three of those on my desk. Right. But that's one I think we have to look at the approach we've taken to cyber security for supply chain attacks, particularly when the supply chain element that's attacked is something that has multiple global organizations connected to it, where the identities can be grabbed, where the credentials can be grabbed, they can be reused and rolled out. I'm sitting here looking at over two megabits of stolen credentials from an organization. And these come from the same compromise. Yeah, but they're being replayed many, many times because they're giving a good initial access to a cyber adversary. So basically if I've got your root credentials and certificates for your dev environment and your production environment, and that's in that two megabit list, which I can see, and it's not the first time I've seen this and we've grabbed the list. You know, obviously we're an intelligence company, so we have the list. So we can look down it and say, okay, well it's going to be this company, this company, this company, this company. And basically the only thing that's limiting the blast ring for that is how much resources that the negotiators got to commit the crime of extortion or ransom. Because there's this double whammy effect when you've got, when you're doing, you know, secure file transfer because not only are you getting the credentials and you can go after the systems, you're actually getting the secure information as well. So then you can go on extortion and blackmail. So, for example, if you're transmitting your information between yourself and your auditor, your financial auditor, then basically that's information you don't want going anywhere. That's very, very private. But if you're using the same system due to the exchange and it becomes transparent to the adversary, you got a problem, you got a big problem. And basically if your auditor doesn't pay the ransom. Yep. Then your information goes out to everybody who wants to buy it. These are the practical supply chain attacks that have really been the hallmark of the last two or three years, particularly coming up now where there's more of those. So for instance, you may have a small company, and I think we were talking about it earlier, that has a role to supply services to a bigger company, a mega company, you know, the biggest company in the UK actually. Right. You may find that, but you will then see that you can steal credentials, you can, you can pivot, you can worm, you can bot, you can launch that, you could, you could, you can then snowball that attack to take out the bigger company from the smaller one. And that is, that is what we're seeing quite a lot of. So if a small company is providing a unique service but has to have access to, let's say, millions of citizens, millions of customers, millions of businesses, hundreds of businesses, in fact, thousands of businesses, you'll find that list of, you'll find a 2 megabit list in there and here you go, and that goes from, that'll be reused. So a lot of times what I see, and this is an example going back to that 2 megabit file full of credentials, you get. That's a big file, right? That's a big, big file. And basically what you see in that one is the, the passing on of that list between actors. So you might get, you might see some attack information. What we're also seeing is very smart actors aligned to state, Klopp or Blackbaster or these guys will actually, will actually share information. Yeah, they might make a communication, they might not. And this is the silent compromise that leads to the mass compromise. It's very, very quiet. So they're using all these tools, very sophisticated tools to create, to tee up a bigger operation. Yep, that might be an operation against the state, that might be an operation against big business that they don't like. That might be a disablement attack. Yeah, that may be it. It. You see this, and the hallmark that I've seen recently is there probably isn't any. There's an attack, but there's no ransom note. Yeah. So. So, well, what do you do if there's an attack and there's no ransom, though? You know, nobody's contacted you saying, I've attacked you. Right. So, okay, so. So that's where our technology comes in to say, okay, you've been attacked. You don't know it, but you have. Right. So we can see that. And this is what's. These are the actions that are going on. Right. And it's really important these days to understand that the adversary is not going to, doesn't want to advertise what they're doing. So we see types of, if you like, cyber violence, so you'll see things like instrumental violence. I'm going to shut you down, take your information, take money off you. Yeah. Then you get expressive violence. Right. Which is, which is I'm gonna, I'm gonna hurt you a lot and I'm gonna keep hurting you and then I'm gonna, then I might just come after your money. But what we have is obviously laws against paying on ransom and so forth, which is, which is damaging some businesses that simply can't afford it. Right. So they simply can't afford it. So, you know, unfortunately, I've been in the room with lots of people. Growing men do cry. Yep. And do scream and they do get completely lose their head. Their hair goes on fire. I've been in that room several times on Massive Corporations. You know, I've been in the room with 170. Well, in the virtual room with 173 people on the first instant meeting, 173 executives. Because. Because the damage that can be done is so significant that people don't know what to do. They've stopped, their business has gone and they're going, how did that happen? And because, because basically it's something that we've developed in our company called AIM Ready Fire. We watch to see the adversary aiming. We watch to see what they're making. Ready to do that. Yeah. And then we actually see and observe and predict fire. Yep. So we feel, and I feel that's the only way that we can actually protect ourselves by using intelligence as the frontline, first strike, counter strike measure. And that would be dealing with it from an intelligent perspective. So one of the things I was saying to Rachel before we joined was that, you know, I strongly believe that you get your business gets the future or chooses the future they have when they select the intelligence that they're going to use. Yeah. So I think the world's dynamics is changing so we have to be more cognizant of what the adversaries are doing because they move fast, they dominate the battlefield, they have superiority and it's proven every day when I see the flashing victims up. And also they've now moved on to a supply chain attack process that enables you to, that enables them to disable whole legs if you like of the, of the global banking system. It happened in New York, didn't it with the. Yeah, so, so you can see that. How did that happen? Well again it's a supply chain issue. Yeah. The other thing I would just say just to, not to put any more into this but what I would say is lot of the systems we use today in industry are what I would call brittle, right. So they've been in place for maybe 30, 40, 50 years literally as the foundations of which whole industries stand on. What they've done is organically maybe tweaked at the edge like so for example open banking services and mobile banking. So what you just did and I war games, open banking for the uk. So before actually came out and said look, how much damage can we do? How much self harm can we do by bringing out all of this stuff and everybody's banking information, pension information, all that input investment information and bring it on your phone. How much damage can you do there? So how many instructions can be given on a mobile phone that doesn't know I'm me, you know and I can, I can, I can spoon two factoring multi factor authentication, no problem. You know there's, there's the kit you can buy to do that online and there's actually services you can buy to do it, right. So you know, and I see it advertised in front of me and I see it used and I'm thinking well there's a problem here, isn't there? Because basically what you just did is connected something which is inherently insecure to something that's been secure for many, many decades. And also a gentleman that I kind of, I know very well, Vince Cerf, who invented the Internet, right. So he, he says, right that you've got bit rot in these organizations which means that the systems that you have, you have to preserve because no one can fix them anymore, they can't hatched, right. So you have to surround them and protect them. And that's, that's where my pattern come in which is doing that three legs to make sure you're never exposing the entire end to end cookie replay piece or tokenized replay. You'll see more from Black Wired on that pretty soon because there's some stuff that we have developed and nobody else can do, but those are the things, things that are going to be our future. Because if we don't deal with it, I'm afraid we're going to lose the cyber world. If we've not lost it already in some places. It's really, really tough. It's really, really tough because we have to build on what we've got. I know there's no option, but when, now, what we're doing, you know, if I see people destroyed in a cyber attack, the first thing they do is rebuild what they have in the cloud. Right. So my advice is there is that, come talk to us because I don't want you to rebuild the same attack process, the same sleeping malware, the same living off the land stuff in your new system. Because all that's going to happen in your new system is the adversary is going to say, great, now I can really hurt you. The Chinese call that looting a burning house. Yeah. Because imagine the pressure once you've actually one actually spent a fortune. Right. On, you know, moving house. Yeah. And moving all your stuff to a cloud. Basically, there isn't any much more money to spend. Your insurance is not going to pay for it. You know, you probably lost a whole bunch of share price. You probably lost a whole bunch of, you know, face in, in the world. Everybody else is all your competition is sitting there going, oh, thank God it was them, not me. And then basically, you know, and then basically what actually happens is you think, oh, I've just about done this. I've paid an awful lot of money to do this. And now all I've done is I've replicated the same situation just in a different platform. Yeah. And, and this is, this is. Yeah. Where are we? We. Yeah. These are the things that are in our future and they're in our now.