Episode 5 General Full Transcript

Security Can Be Fun

April 9, 2023  ·  42:54

Back to Episode
◆ ◆ ◆
SpeakersJoe Patti — HostAdam Roth — HostUNKNOWN — Guest
Joe Patti00:04

It's five o'clock somewhere, time for the Security Cocktail Hour. I'm Joe Patti. For over 20 years, I've been working in information security and knocking back martinis all over New York.

Adam Roth00:15

I am Adam Rohr from Staten Island, locksmith, EMT, love to box, and on rare occasions, I've been known to engage in cybersecurity. Let's go! Look, before we start, I just want to say, you and I have had some off podcast conversations about information, how it's redacted. So I feel like I don't want to let people know where I am and who I am. As a matter of fact, we're going to talk about this after, and maybe I'm going to use a pseudonym. I want to keep anonymous. Go ahead.

Joe Patti00:48

Yeah, it's a little late for that, but I got news. As far as where you are, everyone figures you're either from Staten Island or Brooklyn. It doesn't matter what, you know, what you do. Unless you're going to put on some fake accent or something.

Adam Roth01:03

Yeah, he's not, though.

UNKNOWN01:05

He's not, though.

Joe Patti01:06

All right. So, yes, a little lighter tone today. We've been dealing with some heavy stuff lately. in recent episodes. However, there is a little bit of a lighter side to security. You know, Adam, you and I have both been in security for a long time, a time counted in decades, not even between the two of us, each of us. It's been quite a while. And, you know, I kind of feel like Han Solo, as he said. I've been from one end of the security galaxy to the other, seen a lot of strange things. you do see some very interesting stuff. It's not all bits and bytes and hackers and everything. A lot of it actually has to do with the people you're dealing with. And so we're going to talk a little bit about some of these stories that we've managed to accumulate over the years. And this is just a small smattering of them, just to give people a little idea of what it's like to work in security day to day as things pop up.

Adam Roth02:13

You know, it's kind of funny also, I was reading this whole thing on LinkedIn, probably the only real social media I have, and not that it was cybersecurity, but it was an attorney speaking of some of the things that she's interacted with, and how she doesn't want to really talk the specifics. due to, you know, client attorney privilege. And as people in security, right, we don't want to give real specifics, but oh my god, the things that we could talk about if we could really say specifics.

Joe Patti02:45

Oh yeah, no specifics there, just general kind of things, little nuggets of stuff that happens. And you know, especially if you want to go into security, like I said, you got to realize it's not all bits and bytes. There is actually Sometimes you feel more like a psychologist than anything else. There's the psychological aspect of it when it comes to things like phishing and social engineering, but then there's just dealing with people. People have a lot of feelings about security. They love it. They hate it. They love it until you ask them to actually do something. Then they hate it. They freak out over it. You get a lot of different reactions.

Adam Roth03:30

It's one of those things like when people talk about building something, not in my neighborhood. So what I mean by that is, is that people will confess to you or profess to you and tell you, no, I don't wanna do this. No, I don't want this type, I don't want the security on me. It's okay for everybody else, but not for me. I don't want you limiting my emails or my contacts or my exfiltration of data, meaning removing data from the organization. I don't want you locking down my USB drive. I need to copy my files. But when it comes to the stories, there's a lot of them. And there's a lot of them because people just do things that they don't think about. I mean, I can start off one if you want me to.

Joe Patti04:12

Go right ahead. No names.

Adam Roth04:17

No, no, no names. So this actually relates directly to me, but then back to an organization. You know, we, I think at one point were involved in speaking to a team about something. And then I personally, out of nowhere, got an email that was probably about two pages long. And in that email, it was basically telling me how they compromised my machine, my personal machine. They had access to my cameras. And they were watching me do certain things. And the first thing that I said was... Certain things. Oh, certain things, you know. Maybe I was a little bit busy.

Joe Patti05:13

Maybe you had some time on your hands.

Adam Roth05:16

Or maybe my hands were busy. I don't know. And what bothered me about the whole thing was... For a person who's been in security for a long time and seen a lot of the tactics and techniques people use to socially engineer people, I was like, wow, is this a joke? Is this a game? Because I've never seen this type of email before.

Joe Patti05:42

And I went to- And this is going back a little ways though. Now these are more common. These are more common.

Adam Roth05:49

I was the first person that not only did did the team I work on see this email. I was the first person that that incident response team, that third party team, has ever seen that email. So I was a pioneer in the sexploitation email recipient deals.

Joe Patti06:13

That's right, because the attackers obviously had plotted you out as a good first victim, someone likely to be.

Adam Roth06:20

So I'm sitting there, I'm sitting there.

Joe Patti06:23

And actually, we should explain just to be clear. It's one of those emails, it's called sexploitation, where you get a random We get a random email and it says, I've hacked your computer. I'm in control of it. I've been using your camera and I've been recording you while you watch pornographic sites.

Adam Roth06:45

Pleasure yourself.

Joe Patti06:47

Yes. Pleasure yourself and pay me a ransom or whatever. And I'm going to, you know, send it to all your friends, your family, that, that, that kind of thing. So yeah. So that's what we're talking about here. And it was new at one point a few years ago.

Adam Roth07:00

So I went back to that third party team. I'm like, guys, did you do this? They're like, well, we have done stuff like that. Not exactly sexportation. in other countries where it's legal for us to do that, but we did that to you.

Joe Patti07:16

Is that legal?

Adam Roth07:17

When I say legal, they have social engineer people's personal email accounts. They said it, not me. I'm not saying they gave my sexploitation email. I'm scared the living crap out of them. So I'm having a conversation with them. I go, What do you think? They go, were you doing something? I go, that's not even the point. I go, my cameras are all covered anyway. I'm saying why? I've never seen.

Joe Patti07:40

Did you ever forget?

Adam Roth07:42

What?

Joe Patti07:42

Did you ever forget to cover it?

Adam Roth07:44

Only when I want to. So, so they were like, they're like, nah, we didn't worry about it. I'm like, I'm not worried about it. That's not the point I'm making. The point I'm making is. where's this coming from? Because it's never been out in the wild. I Googled it. No one ever saw it. So I was one of the first people. And the reason why I think I got this besides the fact that I think I'm so good looking. Okay. I'm not, but, but I think is because I've been compromised so many times due to all the accounts that I have. So if you are on a list, that's it. You are on a list. What I mean by a list, I mean is that, If your LinkedIn account, your LastPass account, and any other accounts you've ever been compromised on, and I mean compromised with LastPass, I don't want to go too far into that whole conversation, but the more times that you've been compromised, the more times that you're going to appear on lists that people use these lists for other nefarious reasons. I might see everything. It's a sales list.

Joe Patti08:58

Sales list. Yeah. And, and, and we're going to tell everyone this, this stuff is fake. I mean, someone just, you know, gets your email address. Well, it's safe for most people.

Adam Roth09:07

Some celebrities have actually gotten real stuff. Some celebrities have had their pictures, take a picture, take it out of their private Files and saying if you don't turn around and give us money We're gonna release the pictures of you topless and these in these in these celebrities about least them Well, that's a little different because yes, you know actual, you know blackmail someone's targeted.

Joe Patti09:30

They're going in and you know the typical What we call sexploitation stuff is yeah where they claim. Oh, I got control of your camera and you were watching porn or doing something and whatever. And those, I mean, it's fake, but it's amazing how, you know, we would get calls when I was a security manager and, you know, people, it really freaks people out. It totally freaks people out. They're just like, what's this? How can that be? It's not true. You know, when they start going, and you can kind of play with people a little bit too sometimes. And you're like, well, Yeah, but what are you worried about? Don't you know it's fake? This would never happen. They go like, yeah, but you know, what if it's what if they have something that's AI generated or something?

Adam Roth10:13

So, so, so, so, look, I, I knew was fake after the first 20 days. So that was good. I mean, I, I realized right away, no, but in all seriousness, we were involved in a purple team with that organization. And we do have some serious back and forth banter. So I thought they were playing with me. And I guess they weren't. I mean, I guess I shouldn't have paid them, the bitcoins. And they was actually whole bitcoins.

Joe Patti10:48

Did you pay them bitcoins?

Adam Roth10:49

Two bitcoins. No, I didn't pay them.

Joe Patti10:52

Sorry. Anyway, to avoid this stuff, of course, don't do bad things. But, you know, otherwise, seriously, do cover your cameras. Cameras come with little slots, even if you just put a post-it up. I mean, you know, you never know when someone's looking in at your house or your office or whatever. So you should kind of... You know, just, just practice good stuff. But generally these things are lies. They're just to scare you and get some money.

Adam Roth11:16

Everybody just does it on their computer. And I'm, I'm included. They don't do it on their cell phones. They don't do it on their TVs. They don't do it anywhere else. But the point I'm making is they know how to work your feelings. And, and, and before you go crazy, first of all, never answer them.

Joe Patti11:39

Never, ever, ever. These tricks are actually not even technical tricks at all. They're not hacks. It's social engineering. It is playing on your fear. you know, something where it's something potentially extremely embarrassing that, and it's so effective, people are so afraid that, you know, they start to wonder, it's like, you know, did I really do something wrong? I don't think I did, even if they're innocent, they make you feel guilty over it, you know?

Adam Roth12:09

So mine was not only was it, was it that we saw you, it's that we injected a one-by-one hidden pixel in your email and we know when you opened it and you have 24 hours to respond And I'm like, wow, I go, that really, that really made me think that's so much about this exploitation. How can I start using one by one pixels and, you know, like for marketing, but send it to people and then start scaring my friends with their IP address, which I stopped after three days.

Joe Patti12:40

Well, you know, Adam, yeah, you know, when you get these kinds of attacks, whatever, you know, it's not supposed to inspire you to try it on your friends.

Adam Roth12:47

I did, but not exploitation. I didn't send them an email. I'm like, I'm like, I'm like, I was sending an email. I'm like, shit, this stuff really works. I got your IP address. And it's not even super technical either, but I never thought about sending hidden one by one pixels. And what that really does is when you open the pixel, when you open the email, assuming that you have, HTML turn on, meaning that you get pictures and images, that HTML goes out to a server and reports the IP address, because basically what you're doing is viewing a website within the email. It's really a cool technique and tactic.

Joe Patti13:21

Yeah, yeah. And there are ways where with a lot of clients and even a lot of web-based email, it'll disable that, like it won't render the, you know, draw the HTML or it won't load remote images and stuff. That's a good thing to use. But yeah, so this stuff is psychology. The other psychology that's really funny is the whole gift card scam, which has been going on for years. We keep seeing it. And that's where, I mean, it's amazing because how people who can be extremely intelligent will fall for it. And again, this is not a technical thing at all. It's just someone sends an email to someone and You know, it's often like will come from your boss or like from, from like an executive, like someone important. And they'll create a Gmail address that, you know, kind of looks like the person's Gmail address has their name in it somehow, or, you know, whatever, Gmail and office.com, whatever. And it says, you know, I'm, I'm in the airport or I'm in another country. I'm traveling. I don't have my work laptop or something's broken. I'm about to do this big presentation. I'm in a spot and you got to help me out. Right away, I need this and you know, we got a big client and of course what he needs is you need to go out and like, you know, send me, buy a bunch of like, you know, iTunes gift cards or something and give me the numbers from them that somehow this will be, this will be able to help someone's, you know, business problem or solve a client need. It sounds ridiculous when you step back, but this is, this is playing on, you know, psychology, even for really smart people, for really smart, you know, even aggressive, you know, high achievers, people looking to, you know, move up in their, in their company or whatever, this hits them right where they live. They don't, even if they think it might be fake, they don't, they don't want to say no. And that would be the end of their career. You know, it's amazing.

Adam Roth15:32

I realized it was fake.

Joe Patti15:36

Well, when you think about it, it's ridiculous. I mean, think about it. Someone calls you up and it's not like, I need cash, call my wife, call the police or something. It's like, no, send me gift cards. Like what the hell is anyone going to do? Like iTunes is going to save your life or something? You know, it's preposterous.

Adam Roth15:52

Well, let's touch on a couple more things. First, guess what? There are other people out there that will also ask for gift cards. Like, this is the IRS, you owe money. And if you don't give us money right away, the easiest way to give us money is to buy two $500 worth of gift cards. I've seen that.

Joe Patti16:13

Yeah, that's right.

Adam Roth16:15

And then another thing that people also do is it will come from a real email address.

Joe Patti16:22

Yeah, well, sometimes it is compromised like that. That's true. That's true. That is a hack and that's a little more sophisticated, but we've seen people fall for this so hard. I mean, I remember one case where a guy like, I think he went to, you know, he went to like a CVS or Walmart or something. And they would only sell him like a certain amount, like a hundred bucks worth. And they go, you know, we have to, and he gets all pissed off. And they say, well, you know, we do it because it's fraud. And he goes, this isn't fraud. So it goes to another one down the street. I mean, it was like, it's so effective that it gets people even to circumvent the protections that are put on it. It's just amazing how much this works.

Adam Roth17:09

The cashier and the manager know me. They know exactly how it is. I'll tell you this. This is not a war story from security, but a war story in my own house.

Joe Patti17:23

My wife, about a week ago- There is a constant war at your house from what you tell us.

Adam Roth17:26

Well, that's true too. But my wife got a contact from what appeared to be her cousin's husband, and actually in Israel, of all places, And he said, I need you to do me a favor. I need you to wire me money. I'm like, stop it right there. That is a scam. She goes, yeah, I think so too. I go reach out to your cousin, your actual cousin, not the cousin's husband. So she reaches out to her cousin's husband and she goes, yeah, honey, this is real. We actually need you to do us a favor. We can't wire money from Israel to Venezuela. So apparently you can't send money. from Israel to Venezuela using Western Union. They don't allow it to happen. So what she said was, so I said to my wife, I said to my wife, tell your cousin's husband to go on camera just to visualize and make sure it's really him. He goes, yeah, it's me, I'm not dressed well, I had to put on a shirt. He goes, it's like four in the morning, but my son needs money, and the only way we can get him money is that you don't have a bank account in Venezuela, and Western Union's the only place, and since my cousin has you as a person in the US that can do it, we're gonna give you the money via PayPal, and you're gonna send the money via Western Union. True story, but it looked exactly like a scam. Exactly like a scam.

Joe Patti18:51

Yeah, well sometimes things are. Actually we had a case where my boss was like on vacation or overseas or someone and we knew she was out of touch and she had really limited connectivity. Like we were trying to get in touch but like the Know the cell coverage is bad. She was out and God knows God knows where I don't know. So so we get this email From like a personal account, you know, not the regular work account and it says like, you know Joe I need you to do this for me. Send me send me this or something and whatever so as soon as I get it I'm like, this is dodgy, you know And so I'm like, you know, what do I do? But like, but it could be her. And it was actually something kind of, kind of important and seems legit. But the more legit it seems like, you know, then the more, uh, what's the divergency. Yeah. Anything with a sense of urgency, you gotta, you gotta worry about. So we're sitting there, we're trying to figure out what to do. I got the whole team, whole security team together. And I said, wait a minute. I go, hang on. She says, she's got no, cell coverage, but that she's in this resort that has Wi-Fi, or some Wi-Fi, and I knew she had an iPad. So I said, you know what, let's try FaceTiming her. So I FaceTime her, and the FaceTime comes up, and she comes up, and I could see it was her, but it was like, you know, really scratchy, bad video. But as soon as it pops up, she goes, it's me, it's me, it's me, send the thing. So you always got to check. So it helps if you can check.

Adam Roth20:31

Yeah.

Joe Patti20:32

She knew that to us, it looked totally dodgy, you know?

Adam Roth20:35

And that's the thing that we always, we always talk about when people call the call centers, you know, you really want to ask the person who's calling in something only they would know or something or some way prove to them. That's usually a video or a video verification. You know, we've seen...

Joe Patti21:02

But that's tough too. And that's why the identity theft and things are so, you know, so bad. Because you might think, you know, some of these random facts or whatever aren't important. But, you know, the truth is things like, you know, mother's middle name, a lot of these things, you can get that, that information often without great difficulty and some of them then they become so obscure. You know, some of these questions like, what was your, what was your, like your first pet's name? I'm like, I don't know. Was that, that was five years old. Was it the, was it the fish or the hamster or what the hell was it?

Adam Roth21:37

You know, I mean, I like the ones that do the, do the validation based on your credit union stuff. In 1920, what was the car that you were driving? What was the model? Who do you have an account with or a loan? You know, what, you know, like things that only you would know.

Joe Patti21:58

Yeah, those are good, but I don't like the credit bureaus have that. You see, not everyone has access to that stuff.

Adam Roth22:04

Well, that's why, that's why I say like, I love the, the, the push to validate. Cause if you have your phone with you. Yeah, if you lose your phone, you can get screwed too. But you know what? What about those scams where people say, hey, can I borrow your phone for a second? And as they're on their phone, they're sending money from Zelle to you or one of those things. You got to be careful who you give your phone to.

Joe Patti22:27

Yeah. These days, don't let anyone borrow your cell phone. I mean, it sounds kind of rude, but you're like, say like, look, can I call you? Yeah. I'll call for you or I'll put it on speaker with you. Yeah. Something like that. Or I'll send someone a text for you. Yeah. Giving someone your phone that's unlocked. I mean, even if it's for, you'd be surprised how quickly people can swipe through that and get stuff. It's really, it's, it's frightening. And especially if it's a corporate phone, don't, please don't get into, you know, that can cost you your job, unfortunately. Um, but yeah, so, you know, some of the social engineering stuff can be can be kind of funny. Some of the other funny things are the calls that you get when like someone got a phishing email and they click something and they call and they say, I think I might've clicked something. And we go, really? You think you might've clicked something?

Adam Roth23:25

I mean, you clicked it and you think something happened. I wanna tell you this story about this, right? It's kind of security, kind of not, right? Every once in a while, working in an organization, somebody will report to you, they got an email and they're concerned about it. So we used to get those conspiracy emails, um, that says, hi, my name is blah, blah, blah. And I think I'm being, and I'm not even making this up. I think I'm being chased by aliens or I think, or I think, I think, um, the government is after me. And they put something in my food. And I want you to help me. And we have to sit there and tear that PDF apart before we even look at the PDF. we have to see whether or not the PDF has been weaponized, the Adobe Acrobat. So once you find out whether or not the old Adobe Acrobat's been weaponized, then you gotta take it to the next level and work with the physical security people, because now you're worried about whoever got that, that they're a target physically. What comes as a simple PDF or any email or a Word document becomes very complicated now, because now you're looking at it in different aspects.

Joe Patti24:47

Yeah, and those can be really uncomfortable too, at least for InfoSec guys like us. We don't really do physical security. Some people in information security do both. But what happens with a lot of those is you get something, sometimes you get a threatening email. It's like, okay, you get a threatening email. If something's clearly threatening, it's like, if you call your physical security person, you just call the police. And hopefully, and if you're in a company where you have people at risk, you will have a physical security. Detail protection detail service that that could that kind of thing and you know, you let them you let them deal with that You know, but it's the in-between things that it that can be messed up and you know, sometimes you have people you know, sending things like they'll say, oh, I'll send to the, you know, to the CEO or something. You know, I have seen some in some cases where you can tell the person is, you feel bad. The person is, you know, disturbed sometimes as people who are just, you know, probably need more sympathy than anything else and get some help. That's kind of, that's kind of screwed up. These are the things that come your way. You think you're signing up to fight off hackers and instead you gotta deal with stuff like this. That's the biz.

Adam Roth26:01

So one of the fun things that we engage in, that really creates a lot of enjoyment, but can be dangerous, is when we do our purple team exercises. And for those who don't know what a purple team is, it's when you have the red team, or the adversary, and the blue team, the protectors, Red and blue make purple. So yeah, both teams form a purple team. And we do things sometimes that can kind of get a little bit out of control. What do you think?

Joe Patti26:35

Well, yeah, you got to be careful because, you know, you got to remember the way these things happen. Whenever you're doing a, you know, like a penetration test, you know, a regular test where you test the network, you're trying to attack it. You know, you got to make sure that you're not disrupting things for real, which, you know, very often you'll do those kinds of things on a test site, not the actual production site, not the real one, but a copy of it. But there are some things that you have to do. on the real site. So you have to be really careful. And purple teams especially, you know, very often you have to do them on the real network, on the real systems, just because, you know, you need the defenders really defending their real turf or it's not very realistic at all.

Adam Roth27:22

Plus it's very hard.

Joe Patti27:24

Yeah, it's very hard. It's very expensive to get a simulated environment that's going to be worth anything. So you're working on on the real, you know, on the real network. So they have to be plenty when you when you hire. Whether you hire someone, which you really should to do this as the adversary, whether you hire someone or whether you do it yourself, you need to really know what you're doing and plan very, very carefully and have very clear, you know, what we call rules of engagement or like, you know, don't, don't touch this. Don't touch that. You know, something that's a little too business critical. You just say, look, we're not even going to pretend that we're going after that. Do not mess with that because mistakes can be costly and even in an exercise like this, you know, you have a lot of back and forth, it's fun, you know, it's competitive. And things can get a little out of hand sometimes. Right.

Adam Roth28:20

So I'm, I'm the wise guy who decided to go after these really accomplished incident response pen testing people. Yeah.

Joe Patti28:30

In fact, I, in fact, when I was sponsoring these, I used to say like, you know, Anyone who manages to hack back and get into the attackers, gets a convertible for the weekend or something.

Adam Roth28:42

Well, I mean, and that's the point I'm making. I did it, but I'm not going to claim to be that accomplished where I did something crazy. But what I decided to do was I didn't like the fact that the red team started a little bit early. And unbeknownst to a certain person, which I won't say his name on a certain podcast, I did something a little bit earlier that I shouldn't have done. And I used a service account to get on the Threat Actors computer and whatever hashes they gathered, I changed.

Joe Patti29:21

A service account is like a maintenance account that we use to investigate machines or like do maintenance, install software, whatever. So Adam was kind of cheating a little bit that he had access to it.

Adam Roth29:31

But they were cheating too, so I cheated.

Joe Patti29:36

Then again, there's no such thing as cheating in this kind of exercise. There's that aspect of it all.

Adam Roth29:40

So a certain person told on me, and then a certain person made me put the hashes back the correct way. And after that, when the red team found out, they decided to go after me. And they thought they knew my ID on the network. But they were wrong.

Joe Patti29:59

And this is why you got to be careful with these kinds of exercises. Yeah.

Adam Roth30:04

So what happened, Joe, after they went after the wrong ID?

Joe Patti30:08

If I remember how this played out, basically, they left a little Easter egg for Adam to find, just to show they could. These guys were pros, so nothing harmful. But they put it in the wrong place, where someone other than Adam might have noticed it. Again, it wasn't anything harmful or disruptive, but it would have been embarrassing. It especially would have been embarrassing to the sponsor of the exercise, which was me, who told everyone we wouldn't have any disruption over this. So it got fixed. Nobody noticed it, no harm done. But I did have a minor freak out over it. After that, we get together and the team, we have a little talk about, let's tone it down a bit. The things that we do, Yeah, but nothing, nothing very bad. Just, you know, like I say, you got to be careful and you also design it so you can't cause any real trouble. Like, you know, you wouldn't, you don't do these things if you're a bank on your, on your payment systems or on your, you know, e-commerce websites and stuff. You know what's funny?

Adam Roth31:12

Netflix does chaos engineering purposely. They do. They purposely have, you know, bots that go out there and shut down their production stuff to ensure things fail over. And if it doesn't, then the team has to respond. So they actually purposely cause chaos.

Joe Patti31:30

Well, they purposely cause chaos, but they're also testing mechanisms that are, you know, supposedly working, that are supposed to be resilient to that. you know, a purple team is a little different, I suppose, because, you know, you're going and really deliberately exploiting unknown gaps and discovering them.

Adam Roth31:51

Yeah.

Joe Patti31:52

So gotta be careful. You need to hire people, people you trust to implant carefully. Um, so yeah, some crazy things can, can happen.

Adam Roth32:04

Well, I mean, we've had things where

Joe Patti32:07

Well, yeah, I mean, you always find stuff. I mean, it's, it's funny, it can be frustrating, especially when you're a, when you're a security manager, because very often, you know, you have policies and a policy is a piece of paper that people supposed to follow. People don't always follow it. And you even put in, you know, and you educate them on the rules, and you make them sign up. You know sign off on the rules and everything but people still then manage to You know, it's it's it's amazing the creativity that people can have in choosing horrible passwords that somehow managed to like you know, satisfy your policy. So you can be constantly, you know, over time. If you ever wonder why, like you're at work or someplace and the password policy seems to change, you're like, wasn't it good before? You know, it seems okay and tight and crazy now. It's probably because somebody figured out how to use the world's worst password that is still somehow within the bounds of that. It sounds ridiculous and it is ridiculous and it's just infuriating when it happens. Sometimes the lengths that people will go to to get around stuff like a password policy. or to write down a password, and not only write it down, but write it in the worst possible place that they can put it. It just makes you bang your head against the table that you've got to spend time on this again. Things like that are just nuts.

Adam Roth33:42

Yeah, or when we talk to the other teams and they say, come on we're not stupid we know what we're doing and they put down we put a complicated password capital p a s s w o r d one two three exclamation exclamation it's got uppercase it's got lowercase it's got numbers it's over eight characters and it has special characters it's all good don't worry yeah or you know it's sorry no no go ahead and you know it gets this stuff um if when you if you're like doing consulting or if you're doing something internally and you do assessments

Joe Patti34:15

And there are very often, depending on how you do it, there can be like two stages. The one stage of the interviews where you're like, you talk to the IT people and you talk to people and they say like, like, Oh, so how is this? So using like, you know, two factors? Oh, yeah, we're using this. Oh, do you have the machine set up like this? Like, oh, yeah, we do that all the time. Yeah, that's in our, that's in our runbook. You know, that's in our manual or operation. Oh, yeah, we do all this. And then you get access to the network and to their stuff. And there are different, now there's a lot of automated systems that do this too. So it's gotten a bit better in a lot of places, but then you like, you know, check up on them and oh boy, you can find some interesting stuff. Then you have the, you know, the post, the post-test interview. You're like, can we have a little talk? That stuff can get a little crazy. Although that, again, that is getting better because more places have automated systems now that continually check the configurations and when they work right, they eliminate a lot of that. But again, you'd be surprised. It almost seems like people will go to incredible lengths to get around things that you put in place to protect them.

Adam Roth35:21

Or when they tell you, don't worry, we are exercising best practices and security. And they open up 3389, which is remote desktop to the internet. Don't worry, we have a password and username in place. It's complicated.

Joe Patti35:34

That's right. But I put a password on it. It's like, that doesn't quite work. You know, or, or, or some of the other funny things are when someone says, yes, I've been doing this for, for 20 years. And I, and I know it's tight. It's like, did it ever occur to you that the stuff you're doing 20 years ago, maybe doesn't work as good as it used to be? Cause there's a lot of stuff like that.

Adam Roth35:55

Well, I also like the people that, um, attach documents to your Outlook email and say, don't worry, you know, It's in a document, and I password protected the document, and then they send the password in the email itself. Well, you should be really encrypting the email, not just putting a PDF with a password and then putting the password in the email in the same place.

Joe Patti36:27

Yes, so everyone knows if you password protect a document, which generally encrypts it, If you put the password in the same email as you're sending in the document, that's not very helpful. But the other thing is people that think they're being clever and they go, yeah, but I sent it in a separate email. They go, oh, so you sent two emails, one right after the other. Yeah, I'm like, yeah, that's really gonna trick the hackers. That's good. You have to send the passwords and the text or call or by another means. I mean, yeah. Or better yet, don't use those mechanisms. There are better ways to send things.

Adam Roth37:05

Or how about when we go and we check, we already know it's bad enough that people put their passwords on notepads, on their desktops. But when the people actually put the passwords for their computer, literally on a post-it note on the machine itself.

Joe Patti37:22

Oh, God.

Adam Roth37:22

Yeah, that's...

Joe Patti37:24

And that still happens. And that's yet another reason. We didn't get into it on that podcast, but that's another reason why passwords suck. If you get rid of passwords, you can't even do that. That's the best way to stop people from writing down passwords, is to not have passwords. To have biometrics or keys or something else. That's my rant for the day. That would eliminate so much stress. It would eliminate a lot of funny stories too. I'd rather give up the stories and have things be tighter.

Adam Roth37:57

I know this is not necessarily a funny story, but it makes me laugh. Right. I went into a doctor's office and they are still creating, uh, DVDs of, uh, or wanting to look at DVDs for looking at imaging. And I said to them, you know, I I'm one of your patients and I'm a little bit concerned. you're using a machine that not only has the password posted on the monitor to access the machine, you're using Windows 11. I mean, sorry, Windows XP.

Joe Patti38:34

Wait, you mean you, you were like in the office, like, like a patient and you can see on the machine, the password stuck there.

Adam Roth38:41

Yeah. The password to access the machine. Not only that, they also have Windows. And I said, you're using Windows XP. They go, yeah, we, All the other machines are Windows 11, but we need the DVD player in order to get images.

Joe Patti38:56

Yeah, because it's probably an ancient machine. When you said DVD player, I'm like, where did they even get a DVD player? And yeah, it's an ancient machine.

Adam Roth39:03

I said, that machine has not been patched in like six years, I think. And I said, why don't you just get rid of the machine? Well, we need a DVD player. I go, go on Amazon. Let's buy a USB DVD player. And they said, oh, you know, I don't know about that. I go, oh, so you're going to leave my data able to be compromised. Not only is the password there, but there's null shares on the machine. Anybody can get into them.

Joe Patti39:28

Yeah, well, that gets to something that's a whole subject that we got to do at some point, that's patching and the legacy systems problem. But you do see that in a lot of small offices, especially like doctor's offices, where they have a machine, it's got some special equipment, or it's got some special software that's old, that'll only run on something old, and it's got a lot of security issues. It basically can't be patched, it can't be updated. That's not good. That's not good at all.

Adam Roth39:54

I mean, for things like you and I, I know we're going to probably hit final thoughts here. But for things that you and I have been involved in, we understand that, unfortunately, there is a time when proprietary software must remain on a system that's out of date. But you use compensating controls in order to protect that machine, whether it's doing something called microsegmentation, which literally means that you're making sure that only a certain machine can talk to another machine based on its source address, based on its destination address, and ports. In real life terms, that means that only one person can walk into your house based on, you know, who they are. and nobody else can walk in to your house other than that certain person with that certain ID. So you can use compensating controls and mitigate risk, but I know they weren't. They just had to sit in on their network.

Joe Patti40:47

They weren't. Well, you see in the doctor's office or something like that, it's even scary, you know, small, and we're going to be talking about this soon, you know, small businesses, tough, you know, they don't have, you know, they could sell these legacy things. They don't have access to a lot of, you know, resources and expertise and, Hell, that, you know, that thing could be accessible from their guest wifi in the waiting room or from, you know, the street or something. And that, and that's for real, you know, that's not. That's not as being paranoid. That stuff really is for real.

Adam Roth41:16

You know how many hotels I went to where I was able to see their security cameras on the network because I scanned the network. I might say they had, I didn't even try to do right access. I literally just pull up the browser. Cause that's not illegal. And you're looking at their IP address. Are you looking at their cameras in their office, in their hotel?

Joe Patti41:38

Adam, this was supposed to be the light episode. Now you're freaking me out.

Adam Roth41:43

Well, I'll just tell you this. As long as there's no camera in your room and you're the entertainment for all the other hotel rooms, it's okay.

Joe Patti41:52

Yeah, that's right. You don't want that. Well, then that's not a very good hotel if you stay in there. It's like that. All right. I think that brings us to last call. This one's been fun. Everyone, if you like this, we got plenty of tales we can get into.

Adam Roth42:08

Or tell us your tales.

Joe Patti42:10

Tell us yours, yes. Yeah, emails. Even tell us tales about the crazy security people who drive you crazy. And you know what? We can tell you either there is a good reason for this, and here's what, or they're completely nuts, tell them off.

Adam Roth42:26

But please don't give us anything proprietary that can identify.

Joe Patti42:29

Oh yeah, nothing, yes. Don't tell us any secrets or anything. We don't want to know that stuff.

Adam Roth42:34

Or names, or companies.

Joe Patti42:36

That's right, no names, no companies, no dates.

Adam Roth42:39

And if you want, you can redact your name and call yourself by a different name like I do.

Joe Patti42:44

Which is a whole other story. All right.

Adam Roth42:45

This has been great. This has been great.

Joe Patti42:47

Adam, this has been a fun one. All right. Thank you. Thank you. We'll see you, everyone. Take care. Bye.