<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[IntrusionsInDepth ]]></title><description><![CDATA[A podcast that analyzes cyber attacks and the threat actors that conduct them.  Hosted by Josh Stepp ]]></description><link>https://www.intrusionsindepth.com</link><image><url>https://substackcdn.com/image/fetch/$s_!Ax7d!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c2123cd-fb36-4edc-bbdf-299e4a5c68a8_1280x1280.png</url><title>IntrusionsInDepth </title><link>https://www.intrusionsindepth.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 03 May 2026 11:57:23 GMT</lastBuildDate><atom:link href="https://www.intrusionsindepth.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Josh Stepp]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[intrusionindepth@proton.me]]></webMaster><itunes:owner><itunes:email><![CDATA[intrusionindepth@proton.me]]></itunes:email><itunes:name><![CDATA[Josh Stepp]]></itunes:name></itunes:owner><itunes:author><![CDATA[Josh Stepp]]></itunes:author><googleplay:owner><![CDATA[intrusionindepth@proton.me]]></googleplay:owner><googleplay:email><![CDATA[intrusionindepth@proton.me]]></googleplay:email><googleplay:author><![CDATA[Josh Stepp]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[012.1: WANNACRY]]></title><description><![CDATA[The Meta Questions of a Weapon With No Loyalty]]></description><link>https://www.intrusionsindepth.com/p/0121-wannacry</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0121-wannacry</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Wed, 25 Mar 2026 12:11:09 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/192081478/14f295e7f549d8ea65fa2def3f892bce.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>On May 12, 2017, a piece of code quietly executed somewhere in Asia and within hours had locked computers across 150 countries. WannaCry wasn't just a ransomware attack &#8212; it was the collision of an NSA cyber weapon, a mysterious group of leakers, a sanctioned rogue nation, and a 22-year-old malware analyst working from his bedroom. In this episode, explore  the full WannaCry story &#8212; the technical execution, the geopolitical chain of custody, the chaos it caused, and the harder questions nobody fully answered: Should the NSA have disclosed the vulnerability? Was this North Korea's best effort or a mistake that escaped? And what does it mean when the most dangerous cyber weapon in history gets stopped by a $10 domain registration?<br><br></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.intrusionsindepth.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.intrusionsindepth.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p><a href="https://techspective.net/2017/09/26/wannacry-ransomware-detailed-analysis-attack/">https://techspective.net/2017/09/26/wannacry-ransomware-detailed-analysis-attack/</a></p></li><li><p><a href="https://www.nksc.lt/doc/ENISA-WannaCry-v1.0.pdf">https://www.nksc.lt/doc/ENISA-WannaCry-v1.0.pdf</a></p></li><li><p><a href="https://www.elastic.co/blog/wcrywanacry-ransomware-technical-analysis">https://www.elastic.co/blog/wcrywanacry-ransomware-technical-analysis</a></p></li><li><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3681065/national-security-agency-announces-retirement-of-cybersecurity-director/">https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3681065/national-security-agency-announces-retirement-of-cybersecurity-director/</a></p></li><li><p><a href="https://en.wikipedia.org/wiki/WannaCry_ransomware_attack">https://en.wikipedia.org/wiki/WannaCry_ransomware_attack</a></p></li><li><p><a href="https://en.wikipedia.org/wiki/Tailored_Access_Operations">https://en.wikipedia.org/wiki/Tailored_Access_Operations</a></p></li><li><p><a href="https://en.wikipedia.org/wiki/Michael_Hayden_(general)">https://en.wikipedia.org/wiki/Michael_Hayden_(general)</a></p></li><li><p><a href="https://upload.wikimedia.org/wikipedia/commons/7/7d/ARN30043-ATP_7-100.2-000-WEB-2_-_North_Korean_Tactics_%28July_2020%29.pdf">https://upload.wikimedia.org/wikipedia/commons/7/7d/ARN30043-ATP_7-100.2-000-WEB-2_-_North_Korean_Tactics_%28July_2020%29.pdf</a></p></li><li><p><a href="https://commons.wikimedia.org/wiki/File:ARN30043-ATP_7-100.2-000-WEB-2_-_North_Korean_Tactics_(July_2020).pdf">https://commons.wikimedia.org/wiki/File:ARN30043-ATP_7-100.2-000-WEB-2_-_North_Korean_Tactics_(July_2020).pdf</a></p></li><li><p><a href="https://www.securityweek.com/us-army-report-describes-north-koreas-cyber-warfare-capabilities/">https://www.securityweek.com/us-army-report-describes-north-koreas-cyber-warfare-capabilities/</a></p></li><li><p><a href="https://www.cs2ai.org/post/u-s-army-report-describes-north-korea-s-cyber-warfare-capabilities">https://www.cs2ai.org/post/u-s-army-report-describes-north-korea-s-cyber-warfare-capabilities</a></p></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/mapping-dprk-groups-to-government">https://cloud.google.com/blog/topics/threat-intelligence/mapping-dprk-groups-to-government</a></p></li><li><p><a href="https://www.cloudflare.com/learning/security/ransomware/wannacry-ransomware/">https://www.cloudflare.com/learning/security/ransomware/wannacry-ransomware/</a></p></li><li><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/three-years-after-wannacry-ransomware-accelerating-while-patching-still-problematic">https://www.darkreading.com/cyberattacks-data-breaches/three-years-after-wannacry-ransomware-accelerating-while-patching-still-problematic</a></p></li><li><p><a href="https://www.bankinfosecurity.com/blogs/wannacrys-ransom-note-great-in-chinese-poor-in-korean-p-2481">https://www.bankinfosecurity.com/blogs/wannacrys-ransom-note-great-in-chinese-poor-in-korean-p-2481</a></p></li><li><p><a href="https://trumpwhitehouse.archives.gov/briefings-statements/press-briefing-on-the-attribution-of-the-wannacry-malware-attack-to-north-korea-121917/">https://trumpwhitehouse.archives.gov/briefings-statements/press-briefing-on-the-attribution-of-the-wannacry-malware-attack-to-north-korea-121917/</a></p></li><li><p><a href="https://securelist.com/wannacry-and-lazarus-group-the-missing-link/78431/">https://securelist.com/wannacry-and-lazarus-group-the-missing-link/78431/</a></p></li><li><p><a href="https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/">https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/</a></p></li><li><p><a href="https://en.wikipedia.org/wiki/WannaCry_ransomware_attack">https://en.wikipedia.org/wiki/WannaCry_ransomware_attack</a></p></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/mapping-dprk-groups-to-government">https://cloud.google.com/blog/topics/threat-intelligence/mapping-dprk-groups-to-government</a></p></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-cyber-structure-alignment-2023/">https://cloud.google.com/blog/topics/threat-intelligence/north-korea-cyber-structure-alignment-2023/</a></p></li><li><p><a href="https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/">https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/</a></p></li><li><p><a href="https://darknetdiaries.com/transcript/158/">https://darknetdiaries.com/transcript/158/</a></p></li><li><p>https://www.britannica.com/biography/Kim-Yo-Jong</p></li><li><p>https://thediplomat.com/2026/02/why-kim-ju-aes-path-to-power-is-structurally-blocked/</p></li><li><p>https://www.tripwire.com/state-of-security/malwaretech-wannacry-kronos-understanding-connections</p><p></p></li></ul><div><hr></div><p><strong>Books:</strong></p><ul><li><p><strong><a href="https://amzn.to/4rQjHLx">The Psychology of Totalitarianism</a></strong>&nbsp;by Mattias Desmet</p></li><li><p><strong><a href="https://amzn.to/3Nf0AeX">The Lazarus Heist</a></strong> by Geoff White </p></li><li><p><strong><a href="https://amzn.to/42N4q2y">Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks</a>  </strong><em>by Scott J. Shapiro</em></p><p></p></li></ul><div><hr></div><p></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[011.2: Cognitive Maps for AI ADOPTION, GEOPOLITICS & BAD SCIENCE]]></title><description><![CDATA[Random Thoughts on Game Theory, Bad Science, AI dangers]]></description><link>https://www.intrusionsindepth.com/p/0112-cognitive-maps-for-ai-adoption</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0112-cognitive-maps-for-ai-adoption</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Mon, 09 Feb 2026 10:45:25 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182961544/17a219f70b8e0bb2e6dee34d52a528ad.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p></p><p><strong>Key Topics:</strong></p><ul><li><p><strong>Early-stage AI hype vs. real economic impact</strong> </p></li><li><p><strong>Cultural backlash in creative communities</strong> </p></li><li><p><strong>Geopolitical and energy constraints on AI scaling</strong> </p></li><li><p><strong>Job disruption, education failure, and potential social unrest</strong> </p></li><li><p><strong>Critique of Anthropic&#8217;s safety approach and effective altruism ties</strong><br><br></p><div><hr></div></li></ul><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Books:</strong></p><ul><li><p><a href="https://amzn.to/3ZoABV0">Game Theory: A Very Short Introduction</a> by Ken Binmore</p></li><li><p><a href="https://amzn.to/4klXS3z">Theory of Games and Economic Behavior</a> by  John Von Neumann , Oskar Morgenstern</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p><strong>https://retractionwatch.com/2025/12/03/authors-retract-nature-paper-projecting-high-costs-of-climate-change/</strong></p></li><li><p><strong>https://www.nytimes.com/2025/12/03/business/economy/study-climate-damage-retracted.html</strong></p></li><li><p><strong>https://www.euronews.com/green/2025/12/04/major-study-on-catastrophic-cost-of-climate-change-retracted-but-revised-figures-remain-al</strong></p></li><li><p><strong>https://www.techbuzz.ai/articles/anthropic-s-daniela-amodei-safe-ai-will-win-the-market-war</strong></p></li><li><p><strong>https://nypost.com/2025/11/09/business/ai-giant-anthropics-ties-to-cult-like-effective-altruism-democrat-megadonors-on-trump-admins-radar/</strong></p></li><li><p>https://www.cnbc.com/2025/10/21/anthropic-ceo-trump-sacks-woke.html</p></li><li><p><strong>https://en.wikipedia.org/wiki/Effective_altruism</strong></p></li><li><p><strong>https://thehackernews.com/2025/11/chinese-hackers-use-anthropics-ai-to.html</strong></p></li><li><p><strong>https://en.wikipedia.org/wiki/Longtermism</strong></p></li><li><p><strong>https://aeon.co/essays/why-longtermism-is-the-worlds-most-dangerous-secular-credo</strong></p></li><li><p>https://en.wikipedia.org/wiki/Intelligentsia</p></li><li><p><strong>https://geopoliticalfutures.com/intellectuals-thugs-russian-revolution/</strong></p></li><li><p><strong>https://lexfridman.com/dario-amodei</strong></p></li><li><p><strong>https://cepr.org/voxeu/columns/ai-and-paperclip-problem<br></strong></p></li></ul><div><hr></div><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth. Stay informed, stay safe, and see you in the next episode!</p>]]></content:encoded></item><item><title><![CDATA[011.1: Anthropic's AI Attack Report ]]></title><description><![CDATA[An analysis of the threat report from Anthropic on actor GTG-1002]]></description><link>https://www.intrusionsindepth.com/p/0111-anthropics-ai-attack-report</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0111-anthropics-ai-attack-report</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Tue, 13 Jan 2026 04:55:58 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182961311/7936be6dba22f1081e45941964034818.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p></p><p><strong>Key Topics:</strong></p><ul><li><p>State of the frontier AI landscape and competitive dynamics (2026 perspective)</p></li><li><p>Description and breakdown of the Anthropic-reported AI-orchestrated cyber espionage campaign (GTG-1002)</p></li><li><p>Technical limitations, hallucinations, and operational skepticism<br></p><div><hr></div></li></ul><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p><strong>https://www.anthropic.com/news/disrupting-AI-espionage</strong></p></li><li><p><strong>https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf</strong></p></li><li><p><strong>https://openai.com/index/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors/</strong></p></li><li><p><strong>https://cyberscoop.com/anthropic-ai-orchestrated-attack-required-many-human-hands/</strong></p></li><li><p><strong>https://arstechnica.com/security/2025/11/researchers-question-anthropic-claim-that-ai-assisted-attack-was-90-autonomous/</strong></p></li><li><p><strong>https://arxiv.org/pdf/2412.19437<br></strong></p><p></p><p><strong><br></strong></p></li></ul><div><hr></div><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth. Stay informed, stay safe, and see you in the next episode!</p>]]></content:encoded></item><item><title><![CDATA[010.1: LAB DOOKHTEGAN | The Role of Hacktivism in the Modern World]]></title><description><![CDATA[A meta-discussion on hacktivism and state-backed proxies]]></description><link>https://www.intrusionsindepth.com/p/0101-lab-dookhtegan</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0101-lab-dookhtegan</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Mon, 24 Nov 2025 15:48:02 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/178663645/42467748b616908d94508d965ed1b22b.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><em>AUDIO NOTE: There are some portions of audio with slight static. I&#8217;m blaming solar flares. On a serious note, I&#8217;m troubleshooting this, but the episode is still listenable. </em></p><p><strong>Key Topics:</strong></p><ul><li><p>Lab Dookhtegan&#8217;s emergence as an Iranian hacktivist group targeting the regime through hack-and-leak operations, data leaks, and sabotage since 2019.</p></li><li><p>Key attacks, including the 2019 leak of APT34 tools, multiple doxings of IRGC officials from 2020 to 2024, and election interference exposures.</p></li><li><p>Destructive maritime cyber attacks in March and August of 2025 disrupted 116 and 64 Iranian sanction-evading ships via supply chain compromise.</p></li><li><p>Speculations on Lab Dookhtegan&#8217;s potential ties to nation-states like the US or Israel for plausible deniability in proxy operations.</p></li><li><p>Comparisons to other hacktivist groups like KillNet (Russian-backed) and Blackjack (Ukrainian-aligned), highlighting overlaps between hacktivism and state-sponsored cyber activities.<br><br></p><div><hr></div></li></ul><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Books:</strong></p><ul><li><p><a href="https://amzn.to/43pWgOY">Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin&#8217;s Most Dangerous Hackers</a> by Andy Greenberg</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p><strong><a href="https://cybershafarat.com/2023/10/09/lab-dookhtegan-supports-us-against-hamas-hezbollah/">https://cybershafarat.com/2023/10/09/lab-dookhtegan-supports-us-against-hamas-hezbollah/</a></strong></p><p><strong><a href="https://www.rferl.org/a/farda-briefing-iran-water-crisis-israel-help/33503264.html">https://www.rferl.org/a/farda-briefing-iran-water-crisis-israel-help/33503264.html</a></strong></p><p><strong><a href="https://www.wired.com/story/iran-hackers-oilrig-read-my-lips/">https://www.wired.com/story/iran-hackers-oilrig-read-my-lips/</a></strong></p><p><strong><a href="https://securityaffairs.com/117506/apt/iran-state-sponsored-ransomware.html">https://securityaffairs.com/117506/apt/iran-state-sponsored-ransomware.html</a></strong></p><p><strong><a href="https://flashpoint.io/blog/second-iranian-ransomware-operation-project-signal-emerges/">https://flashpoint.io/blog/second-iranian-ransomware-operation-project-signal-emerges/</a></strong></p><p><strong><a href="https://assets.recordedfuture.com/insikt-report-pdfs/2020/cta-2020-0409.pdf">https://assets.recordedfuture.com/insikt-report-pdfs/2020/cta-2020-0409.pdf</a></strong></p><p><strong><a href="https://assets.recordedfuture.com/insikt-report-pdfs/2020/cta-2020-0409.pdf">https://assets.recordedfuture.com/insikt-report-pdfs/2020/cta-2020-0409.pdf</a></strong></p><p><strong><a href="https://blog.sekoia.io/iran-cyber-threat-overview/">https://blog.sekoia.io/iran-cyber-threat-overview/</a></strong></p><p><strong><a href="https://x.com/LabDookhtegan2/status/1754860930599403851">https://x.com/LabDookhtegan2/status/1754860930599403851</a></strong></p><p><strong><a href="https://x.com/LabDookhtegan2/status/1737531151424565421">https://x.com/LabDookhtegan2/status/1737531151424565421</a></strong></p><p><strong><a href="https://x.com/LabDookhtegan2/status/1734144401687842971">https://x.com/LabDookhtegan2/status/1734144401687842971</a></strong></p><p><strong>https://x.com/LabDookhtegan2/status/1757333667242770769</strong></p><p><strong><a href="https://home.treasury.gov/news/press-releases/jy2072">https://home.treasury.gov/news/press-releases/jy2072</a></strong></p><p><strong><a href="https://x.com/LabDookhtegan2/status/1767939764966047877">https://x.com/LabDookhtegan2/status/1767939764966047877</a></strong></p><p><strong><a href="https://blogs.microsoft.com/on-the-issues/2024/08/08/iran-targeting-2024-us-election/">https://blogs.microsoft.com/on-the-issues/2024/08/08/iran-targeting-2024-us-election/</a></strong></p><p><strong><a href="https://x.com/LabDookhtegan2/status/1824131756884365386">https://x.com/LabDookhtegan2/status/1824131756884365386</a></strong></p><p><strong><a href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf">https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf</a></strong></p><p><strong><a href="https://cybershafarat.com/2021/11/26/lab-dookhtegan-the-regime-and-me-we-aint-mates-huge-data-reveal/">https://cybershafarat.com/2021/11/26/lab-dookhtegan-the-regime-and-me-we-aint-mates-huge-data-reveal/</a></strong></p><p><strong><a href="https://cydome.io/lab-dookhtegan-cyberattack-second-wave-findings-aug-2025/">https://cydome.io/lab-dookhtegan-cyberattack-second-wave-findings-aug-2025/</a></strong></p><p><strong><a href="https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm">https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm</a></strong></p><p><strong><a href="https://cloud.google.com/blog/topics/threat-intelligence/gru-rise-telegram-minions">https://cloud.google.com/blog/topics/threat-intelligence/gru-rise-telegram-minions</a></strong></p><p><strong><a href="https://en.wikipedia.org/wiki/Killnet">https://en.wikipedia.org/wiki/Killnet</a></strong></p><p><strong><a href="https://therecord.media/russian-hacker-group-killnet-returns-with-new-identity">https://therecord.media/russian-hacker-group-killnet-returns-with-new-identity</a></strong></p><p><strong><a href="https://cydome.io/lab-dookhtegan-cyber-attack-on-iranian-oil-tankers-disrupts-operations/">https://cydome.io/lab-dookhtegan-cyber-attack-on-iranian-oil-tankers-disrupts-operations/</a></strong></p><p><strong><a href="https://blog.narimangharib.com/posts/2025%2F08%2F1755854831605?lang=en">https://blog.narimangharib.com/posts/2025%2F08%2F1755854831605?lang=en</a></strong></p><p><strong><a href="https://en.wikipedia.org/wiki/LulzSec">https://en.wikipedia.org/wiki/LulzSec</a><br>https://citizenlab.ca/2023/01/uncovering-irans-mobile-legal-intercept-system/<br>https://go.recordedfuture.com/hubfs/reports/cta-2024-0125.pdf<br>https://blogs.microsoft.com/on-the-issues/2024/08/08/iran-targeting-2024-us-election/<br>https://assets.recordedfuture.com/insikt-report-pdfs/2020/cta-2020-0409.pdf<br>https://home.treasury.gov/news/press-releases/jy2072<br>https://en.wikipedia.org/wiki/March%E2%80%93May_2025_United_States_attacks_in_Yemen<br>https://cybershafarat.com/2024/11/01/the-attempt-of-shahid-shushtri-also-known-as-emennet-pasargad-a-cyber-group-affiliated-with-the-islamic-revolutionary-guard-corps-to-interfere-in-the-upcoming-american-elections-iran-internatio/<br></strong></p><p></p><p><strong><br></strong></p></li></ul><div><hr></div><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth. Stay informed, stay safe, and see you in the next episode!</p>]]></content:encoded></item><item><title><![CDATA[009.1: CRASH COURSE: IRAN | Geopolitics, Cyber Threat Groups and Operations]]></title><description><![CDATA[An Introduction to Iran's threat landscape, the actors involved and motivations]]></description><link>https://www.intrusionsindepth.com/p/0091-crash-course-iran-geopolitics</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0091-crash-course-iran-geopolitics</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Sun, 05 Oct 2025 11:02:21 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/167914858/1755b6899aa808e9b4e7fd953cfe985d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p></p><p><strong>Key Topics:</strong></p><ul><li><p>US-Iran Historical Tensions</p></li><li><p>Iran&#8217;s Demographics &amp; Strategy</p></li><li><p>Nuclear Program &amp; 2025 Strikes</p></li><li><p>Proxy Networks (Axis of Resistance)</p></li><li><p>Iranian Cyber Threat Actors<br><br></p><div><hr></div></li></ul><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Books:</strong></p><ul><li><p><a href="https://amzn.to/4o77zU8">Stuxnet and the Launch of the World&#8217;s First Digital Weapon Countdown to Zero Day</a> - Kim Zetter</p></li><li><p><a href="https://amzn.to/4nAwwHu">Iran&#8217;s Perilous Pursuit of Nuclear Weapons</a> &#8212;  David Albright &amp; Sarah Burkhard </p></li><li><p><a href="https://amzn.to/3VLf5YG">From Intel to Iran: The Defection of Monica Witt</a> &#8212; Borna Ahadi</p></li></ul><p></p><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p><strong><a href="https://en.wikipedia.org/wiki/Judicial_system_of_the_Islamic_Republic_of_Iran">https://en.wikipedia.org/wiki/Judicial_system_of_the_Islamic_Republic_of_Iran</a></strong></p></li><li><p><strong>https://attack.mitre.org/groups/G0069/</strong></p></li><li><p><strong><a href="https://learn.microsoft.com/en-us/unified-secops-platform/microsoft-threat-actor-naming">https://learn.microsoft.com/en-us/unified-secops-platform/microsoft-threat-actor-naming</a></strong></p></li><li><p><strong>https://cloud.google.com/security/resources/insights/apt-groups#global-threats-iran</strong></p></li><li><p><strong><a href="https://en.wikipedia.org/wiki/Shamoon">https://en.wikipedia.org/wiki/Shamoon</a></strong></p></li><li><p><strong>https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-055a</strong></p></li><li><p><strong><a href="https://cyberscoop.com/hack-and-leak-group-black-shadow-keeps-targeting-israeli-victims/">https://cyberscoop.com/hack-and-leak-group-black-shadow-keeps-targeting-israeli-victims/</a></strong></p></li><li><p><strong>https://iapp.org/news/b/black-shadow-hackers-re-emerge-with-second-israeli-breach</strong></p></li><li><p><strong><a href="https://www.securiwiser.com/news/black-shadow-hits-cyberserve-and-lgbtq-dating-app-client/">https://www.securiwiser.com/news/black-shadow-hits-cyberserve-and-lgbtq-dating-app-client/</a></strong></p></li><li><p><strong><a href="https://www.cybereason.com/blog/research/strifewater-rat-iranian-apt-moses-staff-adds-new-trojan-to-ransomware-operations">https://www.cybereason.com/blog/research/strifewater-rat-iranian-apt-moses-staff-adds-new-trojan-to-ransomware-operations</a></strong></p></li><li><p><strong><a href="https://cloud.google.com/blog/topics/threat-intelligence/uncovering-iranian-counterintelligence-operation">https://cloud.google.com/blog/topics/threat-intelligence/uncovering-iranian-counterintelligence-operation</a></strong></p></li><li><p><strong><a href="https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks">https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks</a></strong></p></li><li><p><strong><a href="https://www.mei.edu/publications/iranian-apts-overview">https://www.mei.edu/publications/iranian-apts-overview</a></strong></p></li><li><p><strong><a href="https://cloud.google.com/blog/topics/threat-intelligence/apt42-charms-cons-compromises">https://cloud.google.com/blog/topics/threat-intelligence/apt42-charms-cons-compromises</a></strong></p></li><li><p><strong>https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents</strong></p></li><li><p><strong>https://darknetdiaries.com/transcript/30/</strong></p></li><li><p><strong>https://risky.biz/why-iran-is-a-scaredy-cat-cyber-chicken/</strong></p></li><li><p><strong><a href="https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-releases-cybersecurity-advisory-on-previously-undisclosed-iranian-malware-used-to-monitor-dissidents-and-travel-and-telecommunications-companies">https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-releases-cybersecurity-advisory-on-previously-undisclosed-iranian-malware-used-to-monitor-dissidents-and-travel-and-telecommunications-companies</a></strong></p></li><li><p><strong><a href="https://home.treasury.gov/news/press-releases/sm1127">https://home.treasury.gov/news/press-releases/sm1127</a></strong></p></li><li><p><strong><a href="https://mjolnirsecurity.com/the-asymmetric-battlefield-an-anthropological-and-geopolitical-analysis-of-iranian-cyber-threats-to-north-american-critical-infrastructure/">https://mjolnirsecurity.com/the-asymmetric-battlefield-an-anthropological-and-geopolitical-analysis-of-iranian-cyber-threats-to-north-american-critical-infrastructure/</a></strong></p></li><li><p><strong><a href="https://cloud.google.com/blog/topics/threat-intelligence/apt33-insights-into-iranian-cyber-espionage">https://cloud.google.com/blog/topics/threat-intelligence/apt33-insights-into-iranian-cyber-espionage</a></strong></p></li><li><p><strong><a href="https://www.picussecurity.com/resource/blog/understanding-active-iranian-apt-groups">https://www.picussecurity.com/resource/blog/understanding-active-iranian-apt-groups</a></strong></p></li><li><p><strong><a href="https://therecord.media/iran-state-backed-hackers-industrial-attacks-spring-2025">https://therecord.media/iran-state-backed-hackers-industrial-attacks-spring-2025</a></strong></p></li><li><p><strong><a href="https://www.mei.edu/publications/iranian-apts-overview">https://www.mei.edu/publications/iranian-apts-overview</a></strong></p></li><li><p><strong><a href="https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks">https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks</a></strong></p></li><li><p><strong>https://cloud.google.com/blog/topics/threat-intelligence/uncovering-iranian-counterintelligence-operation</strong></p></li><li><p><strong>https://www.darkreading.com/vulnerabilities-threats/anatomy-of-the-new-iranian-apt</strong></p></li><li><p><strong>https://www.infopoint-security.de/medien/fireeye-operation-saffron-rose.pdf</strong></p></li><li><p><strong>https://narimangharib.com/</strong></p></li><li><p><strong>https://darknetdiaries.com/transcript/30/</strong></p></li><li><p><strong>https://www.youtube.com/playlist?list=PLjiTz6DAEpuINUjE8zp5bAFAKtyGJvnew</strong></p></li><li><p><strong>https://www.zdnet.com/article/source-code-of-iranian-cyber-espionage-tools-leaked-on-telegram/</strong></p></li><li><p><strong>https://cloud.google.com/blog/topics/threat-intelligence/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware</strong></p><p><strong><br></strong></p></li></ul><div><hr></div><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth. Stay informed, stay safe, and see you in the next episode!</p>]]></content:encoded></item><item><title><![CDATA[AMA002 : COINBASE | IRAN | CAREER]]></title><description><![CDATA[Special Guest David "Ponch" Sanchez]]></description><link>https://www.intrusionsindepth.com/p/ama2</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/ama2</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Tue, 12 Aug 2025 12:15:08 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/169136359/fb9c88b22b3cb3160249a9a52672bdfc.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this  AMA episode of "Intrusions in Depth," host Josh Stepp chats with friend and cybersecurity mentor David "Ponch" Sanchez about pressing topics from the audience. They break down the Coinbase breach, discussing how a bribed contractor exposed user data and balances, which could potentially create targets for phishing and physical attacks. Next, they analyze the risk of Iranian cyber retaliation against U.S. infrastructure during the ongoing Israel-Iran skirmishes, weighing destructive potential against political divisions. Lastly, for those entering cybersecurity, especially threat intelligence, they advise building home labs, reading industry articles, and seeking hands-on experiences at events like DEF CON to stand out in a competitive job market.</p><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>https://github.com/demining/Physical-Bitcoin-Attacks</p></li><li><p>https://www.raicescyber.org/</p></li><li><p>https://www.wsj.com/us-news/second-suspect-surrenders-in-alleged-new-york-crypto-kidnapping-case-103e06c6</p></li><li><p>https://www.wsj.com/video/botched-kidnapping-attempt-in-paris-as-criminals-target-crypto-wealth/9E10C74A-5158-49AF-B625-4ABA5EDC5B6E</p></li><li><p>https://www.abc.net.au/news/2024-01-23/australian-government-sanctions-russian-over-medibank-data-leak/103377976</p></li><li><p>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a</p></li><li><p>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36</p></li><li><p>https://academy.intel-ops.io/courses/hunting-adversary-infra</p></li><li><p>https://web.archive.org/web/20201206081245/https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf</p></li><li><p>https://irp.fas.org/doddir/army/</p></li><li><p>https://irp.fas.org/doddir/army/gta33_01_006.pdf</p><p></p></li></ul><div><hr></div><ul><li><p>Host: Josh Stepp </p></li><li><p>Produced by: Josh Stepp</p></li><li><p>Guest: David Sanchez</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth. Stay informed, stay safe, and see you in the next episode!</p>]]></content:encoded></item><item><title><![CDATA[Using LLMs to Abuse Sharepoint and Threaten Nuclear Actions]]></title><description><![CDATA[A preview of what's to come in the world of LLMs]]></description><link>https://www.intrusionsindepth.com/p/using-llms-to-abuse-sharepoint</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/using-llms-to-abuse-sharepoint</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Thu, 17 Jul 2025 15:57:35 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/165407918/402f1c320ba3f3a3250fd779ec2b1d31.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Description</strong></p><p>In this informal mini-episode, Josh Stepp delves into two  AI-related topics. First, he explores the "Vending Bench" research paper, which tests the long-term coherence of LLM-based agents running a vending machine business, revealing high variance in performance, with top models like Claude 3.5 Sonnet and OpenAI's O3 Mini outperforming humans but occasionally spiraling into chaotic behaviors like spamming the FBI over minor issues. Then, Josh reacts to a Pentest Partners blog post about exploiting SharePoint via Microsoft's CoPilot, highlighting how attackers can bypass access controls and forensic tracking to mine sensitive data</p><div><hr></div><p></p><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>https://arxiv.org/pdf/2502.15840</p></li><li><p>https://andonlabs.com/</p></li><li><p>https://www.pentestpartners.com/security-blog/exploiting-copilot-ai-for-sharepoint/</p><p></p></li></ul><div><hr></div><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth. Stay informed, stay safe, and see you in the next episode!</p>]]></content:encoded></item><item><title><![CDATA[008.1: POLYFILL ]]></title><description><![CDATA[A Case Study in Software Supply Chain Risk]]></description><link>https://www.intrusionsindepth.com/p/008-1-polyfill</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/008-1-polyfill</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Tue, 27 May 2025 11:04:54 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/163916707/372fec65c1a5331649064e184fedb8fb.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of the Intrusions InDepth Podcast, host Josh Stepp dives into the 2024 Polyfill.io incident, a wake-up call for the web development community that exposed the vulnerabilities of the internet&#8217;s sprawling infrastructure. What began as a trusted open-source service, used by over 100,000 websites to ensure cross-browser compatibility, turned into a vehicle for widespread malware distribution after its domain and GitHub repository were sold to a Chinese company, Funnull. Josh explores the timeline of the attack, the mechanics of the malicious JavaScript payloads, and the broader implications for open-source software and internet trust. With a mix of technical analysis, commentary on open-source economics, and a touch of conspiracy-adjacent speculation, this episode unpacks how a seemingly innocuous service became a vector for a global cyberattack and what it means for the future of the web.<br><br></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.intrusionsindepth.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.intrusionsindepth.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h4><strong>Main Topics Discussed</strong></h4><ul><li><p>Polyfill.io Attack Overview</p></li><li><p>Timeline of Events</p></li><li><p>Malware Mechanics</p></li><li><p>Open-Source Vulnerabilities</p></li><li><p>Implications and Solutions</p></li></ul><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p><a href="https://blog.qualys.com/vulnerabilities-threat-research/2024/06/28/polyfill-io-supply-chain-attack">https://blog.qualys.com/vulnerabilities-threat-research/2024/06/28/polyfill-io-supply-chain-attack</a></p></li><li><p>https://cside.dev/blog/the-polyfill-attack-explained</p></li><li><p>https://therecord.media/polyfill-cloudflare-trade-barbs-supply-chain-attack</p></li><li><p>https://news.ycombinator.com/item?id=40792136</p></li><li><p>https://news.ycombinator.com/item?id=40804254</p></li><li><p>https://risky.biz/RB755/</p></li><li><p>https://web.archive.org/web/20230505112634/https://polyfill.io/v3/ownership-transfer</p></li><li><p>https://web.archive.org/web/20230601214142/https://jakechampion.name/</p></li><li><p>https://web.archive.org/web/20231011015804/https://polyfill.io/</p></li><li><p>https://web.archive.org/web/20231101040617/https://polyfill.io/</p></li><li><p>https://github.com/polyfillpolyfill/polyfill-service/commit/5f4fc040e09436371f70ffcebe47ca0e3cdccac0</p></li><li><p>https://github.com/polyfillpolyfill/polyfill-service/commit/aa261a834b36131e8dbd20d725c6b5d773f736d9</p></li><li><p>https://github.com/polyfillpolyfill/polyfill-service/issues/2892</p></li><li><p>https://sansec.io/research/polyfill-supply-chain-attack</p></li><li><p>https://www.theregister.com/2025/05/06/from_russia_with_doubt_go/</p></li><li><p>https://huntedlabs.com/the-russian-open-source-project-that-we-cant-live-without/</p></li><li><p>https://x.com/weirddalle/status/1922396432977346973</p></li><li><p>https://www.berkshirehathaway.com/</p></li><li><p>https://blog.cloudflare.com/polyfill-io-now-available-on-cdnjs-reduce-your-supply-chain-risk/</p></li><li><p>https://blog.cloudflare.com/automatically-replacing-polyfill-io-links-with-cloudflares-mirror-for-a-safer-internet/</p><div><hr></div><p></p></li></ul><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[007.1: The VIRUS FACTORY]]></title><description><![CDATA[The tale of Dark Avenger, Vesselin Bontchev and how Bulgaria became known as the VIRUS FACTORY]]></description><link>https://www.intrusionsindepth.com/p/0071-the-virus-factory</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0071-the-virus-factory</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Mon, 05 May 2025 09:48:29 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/161377170/dbdd09d56eaed216e8247ac7b1a26e45.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h4></h4><p>Step back into the late 1980s and early 1990s in Sofia, Bulgaria, a nation transitioning from communism and becoming an unexpected epicenter for early computer virus creation. This episode delves into the story of Vesselin Bontchev, a young researcher studying the nascent threat of computer viruses, and the emergence of the notorious virus writer known only as "Dark Avenger". Explore the destructive nature of early viruses like "Eddie" and the escalating rivalry between Bontchev, who sought to counter the viral threat, and Dark Avenger, who released increasingly malicious code and even targeted Bontchev directly. Discover how American Sarah Gordon stumbled into this world, her interactions with Dark Avenger, and the creation of the revolutionary, dangerous Mutation Engine (MtE). We'll also examine the unique socio-economic conditions in Bulgaria that fostered this "Virus Factory," including a surplus of skilled tech enthusiasts with limited opportunities and widespread software piracy.<br><br></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.intrusionsindepth.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.intrusionsindepth.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h4><strong>Main Topics Discussed</strong></h4><ul><li><p><strong>The Bulgarian Virus Scene:</strong> The episode explores how Bulgaria, particularly Sofia, became a surprising hub for computer virus creation in the late 80s and early 90s, coinciding with the country's political and economic transition.</p></li><li><p><strong>Vesselin Bontchev vs. Dark Avenger:</strong> A central theme is the rivalry between Vesselin Bontchev, an anti-virus researcher, and the prolific, malicious virus writer known as Dark Avenger. This includes Dark Avenger's increasingly sophisticated viruses (like Eddie and Nomenklatura), his targeting of Bontchev and others, and Bontchev's efforts to analyze and combat the viruses.</p></li><li><p><strong>Sarah Gordon and the Mutation Engine (MtE):</strong> The story of Sarah Gordon, an American who became fascinated with the Bulgarian virus scene and interacted with Dark Avenger. This interaction led to Dark Avenger creating the groundbreaking and dangerous Mutation Engine (MtE), a tool allowing viruses to constantly change their code to evade detection.</p></li><li><p><strong>Psychology and Sociology of Virus Writing:</strong> The episode touches upon the motivations behind virus creation, including seeking fame, rebellion against authority, socio-economic factors like lack of opportunity and widespread software piracy in Bulgaria, and Sarah Gordon's research into the mindset of virus writers.</p></li><li><p><strong>Early Computer Viruses and Anti-Virus Efforts:</strong> The discussion covers the nature and mechanics of early computer viruses (e.g., infecting .com/.exe files, corrupting disk sectors, targeting the FAT) and the nascent anti-virus techniques and communities forming to combat them (like CARO and FidoNet).</p><p></p></li></ul><div><hr></div><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>https://bontchev.nlcv.bas.bg/papers/factory.html#The%20Dark%20Avenger</p></li><li><p>https://www.f-secure.com/v-descs/eddie.shtml</p></li><li><p>https://www.theguardian.com/news/2023/may/09/on-the-trail-of-the-dark-avenger-the-most-dangerous-virus-writer-in-the-world</p></li><li><p>https://en.wikipedia.org/wiki/Sarah_Gordon_(computer_scientist)</p></li><li><p><strong><a href="https://amzn.to/42N4q2y">Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks</a>  </strong><em>by Scott J. Shapiro</em></p></li><li><p>https://(.)youtu.be/1iq9w5Tn_DQ</p></li><li><p>https://(.)www.youtube.com/watch?v=NtJ0CQ7K6_4&amp;ab_channel=DEFCONConference</p><p></p><div><hr></div><p></p></li></ul><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[006.2: CHINA'S STRATEGIC CHESSBOARD: Where Salt Typhoon Fits]]></title><description><![CDATA[Additional Thoughts on Salt Typhoon and Chinese APT Aggression]]></description><link>https://www.intrusionsindepth.com/p/0062-chinas-strategic-chessboard</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0062-chinas-strategic-chessboard</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Fri, 11 Apr 2025 20:34:55 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/153856636/c1da948ab0faa1923b884cb1bb23dd0d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h4><strong>Episode Description</strong>: </h4><p>Dive into the complex world of cybersecurity and geopolitics with this addendum episode of Intrusions in Depth, hosted by Josh Stapp. Expanding on the Salt Typhoon episode, this  podcast explores China's strategic cyber operations, global ambitions, and the evolving nature of modern warfare. From hacking tactics to pursuing economic and military dominance.  Learn how groups like Salt Typhoon fit into China's broader geopolitical goals.</p><p></p><div><hr></div><h4><strong>Main Topics Discussed:</strong></h4><ol><li><p>China&#8217;s Strategic Goals and the "China Dream": Examines Xi Jinping&#8217;s vision for China&#8217;s rejuvenation, aiming for economic prosperity, technological leadership, and military strength by 2049, with initiatives like Made in China 2025 and the Belt and Road Initiative.</p></li><li><p>Evolution of Warfare and Unrestricted Warfare Doctrine: Analyzes how China&#8217;s approach to warfare, inspired by the 1999 book Unrestricted Warfare, blends cyber, economic, and psychological tactics to exploit vulnerabilities, contrasting with Western military strategies.</p></li><li><p>The AI Race and Technological Competition: Explores the U.S.-China race for AI dominance, highlighting differences in innovation styles, data privacy approaches, and the role of AI as a force multiplier in modern conflicts.</p></li><li><p>Soft Power and Global Influence: Discusses China&#8217;s soft power strategies, including cultural exports like Confucius Institutes, economic diplomacy via the Belt and Road Initiative, and narrative control to shape global perceptions.</p></li><li><p>Deterrence and Defense Against Cyber Threats: Proposes solutions to counter groups like Salt Typhoon, weighing the challenges of bolstering cyber defenses and imposing economic or diplomatic costs on adversaries without escalating conflicts.</p></li></ol><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:156989771,&quot;url&quot;:&quot;https://thesequence.substack.com/p/the-sequence-opinion-489-crazy-how&quot;,&quot;publication_id&quot;:54309,&quot;publication_name&quot;:&quot;TheSequence&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c763928-9762-43a0-a55f-9ee9040fa6e1_210x210.png&quot;,&quot;title&quot;:&quot;The Sequence Opinion #489: CRAZY: How DeepSeek R1 Bypassed CUDA with Lower-Level GPU Optimization Techniques&quot;,&quot;truncated_body_text&quot;:&quot;A lot has been written about DeepSeek R1 and its clever innvoations over the last few weeks. However, one of the aspects that hasn&#8217;t received a lot of attention has been their work on GPU level optimizations. It makes sense that DeepSeek has to do some work in that are considering some of the reported GPU constraints they were dealing with but when I read about this in the technical report I thought it was a mistake. The level of optimization is insane to the point of bypassing NVIDIA&#8217;s CUDA altogether and leverage PTX programming, utilize NCCL for communication efficiency, and adopt other advanced techniques.&quot;,&quot;date&quot;:&quot;2025-02-13T12:03:21.066Z&quot;,&quot;like_count&quot;:19,&quot;comment_count&quot;:1,&quot;bylines&quot;:[{&quot;id&quot;:4117232,&quot;name&quot;:&quot;Jesus Rodriguez&quot;,&quot;handle&quot;:&quot;thesequence&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/436c4cc3-3ac3-426b-84d3-1489b98b456e_2448x2447.jpeg&quot;,&quot;bio&quot;:&quot;CEO at IntoTheBlock.\nCo-Founder, President at NeuralFabric\nCo-Founder, President at Faktory.\nGuest Lecturer at Columbia University and Wharton Business School\nActive angel investor in AI, crypto \nMicrosoft Alumni. Wall Street Quant &quot;,&quot;profile_set_up_at&quot;:&quot;2023-04-12T13:27:10.537Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:1404275,&quot;user_id&quot;:4117232,&quot;publication_id&quot;:54309,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:54309,&quot;name&quot;:&quot;TheSequence&quot;,&quot;subdomain&quot;:&quot;thesequence&quot;,&quot;custom_domain&quot;:&quot;thesequence.ai&quot;,&quot;custom_domain_optional&quot;:true,&quot;hero_text&quot;:&quot;The best source to stay up-to-date with the developments in the machine learning, artificial intelligence, and data science world. Trusted by 165,000 professionals from the main AI labs, universities, and enterprises &quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/7c763928-9762-43a0-a55f-9ee9040fa6e1_210x210.png&quot;,&quot;author_id&quot;:4117232,&quot;theme_var_background_pop&quot;:&quot;#C5168C&quot;,&quot;created_at&quot;:&quot;2020-06-08T16:14:39.623Z&quot;,&quot;email_from_name&quot;:&quot;TheSequence&quot;,&quot;copyright&quot;:&quot;Jesus Rodriguez&quot;,&quot;founding_plan_name&quot;:&quot;Generous supporter&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false}}],&quot;twitter_screen_name&quot;:&quot;jrdothoughts&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:1000}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://thesequence.substack.com/p/the-sequence-opinion-489-crazy-how?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!t4FH!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c763928-9762-43a0-a55f-9ee9040fa6e1_210x210.png" loading="lazy"><span class="embedded-post-publication-name">TheSequence</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">The Sequence Opinion #489: CRAZY: How DeepSeek R1 Bypassed CUDA with Lower-Level GPU Optimization Techniques</div></div><div class="embedded-post-body">A lot has been written about DeepSeek R1 and its clever innvoations over the last few weeks. However, one of the aspects that hasn&#8217;t received a lot of attention has been their work on GPU level optimizations. It makes sense that DeepSeek has to do some work in that are considering some of the reported GPU constraints they were dealing with but when I read about this in the technical report I thought it was a mistake. The level of optimization is insane to the point of bypassing NVIDIA&#8217;s CUDA altogether and leverage PTX programming, utilize NCCL for communication efficiency, and adopt other advanced techniques&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">a year ago &#183; 19 likes &#183; 1 comment &#183; Jesus Rodriguez</div></a></div><ul><li><p>https://fs.blog/bias-conjunction-fallacy/</p></li><li><p>https://en.wikipedia.org/wiki/Torrijos%E2%80%93Carter_Treaties</p></li><li><p>https://en.wikipedia.org/wiki/Operation_Fox_Hunt</p></li><li><p>https://en.wikipedia.org/wiki/Chinese_intelligence_activity_abroad</p></li><li><p>https://www.sentinelone.com/labs/cyber-soft-power-chinas-continental-takeover/</p></li><li><p>https://www.propublica.org/article/operation-fox-hunt-how-china-exports-repression-using-a-network-of-spies-hidden-in-plain-sight</p></li><li><p>https://foreignpolicy.com/2018/10/11/if-the-u-s-doesnt-control-corporate-power-china-will/</p></li><li><p>https://www.fbi.gov/news/speeches/the-threat-posed-by-the-chinese-government-and-the-chinese-communist-party-to-the-economic-and-national-security-of-the-united-states</p></li><li><p>https://en.wikipedia.org/wiki/Alberto_Fujimori</p></li><li><p>https://en.wikipedia.org/wiki/Ferdinand_Marcos</p></li><li><p>https://foreignpolicy.com/2025/01/07/china-salt-typhoon-hack-threat-panic-washington/</p></li><li><p>https://scholarworks.uvm.edu/cgi/viewcontent.cgi?article=1440&amp;context=hcoltheses</p></li><li><p>https://luluyan.medium.com/deepseeks-prompt-engineering-secret-there-is-no-secret-8107b14e1e56</p></li><li><p>https://www.vellum.ai/blog/the-training-of-deepseek-r1-and-ways-to-use-it</p></li><li><p>https://www.techtarget.com/whatis/feature/DeepSeek-explained-Everything-you-need-to-know</p></li><li><p>https://www.theguardian.com/world/2019/mar/11/china-database-lists-breedready-status-of-18-million-women</p></li><li><p>https://www.cfr.org/backgrounder/made-china-2025-threat-global-trade</p></li><li><p>https://apt.etda.or.th/cgi-bin/showcard.cgi?g=APT%2031%2C%20Judgment%20Panda%2C%20Zirconium&amp;n=1</p></li><li><p>https://www.sentinelone.com/labs/cyber-soft-power-chinas-continental-takeover/</p></li><li><p>https://breakingdefense.com/2021/09/chinas-new-data-security-law-will-provide-it-early-notice-of-exploitable-zero-days/</p></li><li><p>https://en.wikipedia.org/wiki/Made_in_China_2025</p></li><li><p>https://en.wikipedia.org/wiki/Century_of_humiliation</p></li></ul><div><hr></div><p><strong>Books:</strong></p><ul><li><p><a href="https://amzn.to/3G5VTQQ">Mindf*ck: Cambridge Analytica and the Plot to Break America</a></p><p>by Christopher Wylie </p></li><li><p><a href="https://amzn.to/42EvBh8">Targeted: My Inside Story of Cambridge Analytica and How Trump and Facebook Broke Democracy</a> by Brittany Kaiser </p></li><li><p><a href="https://amzn.to/3RIlzVZ">Unrestricted Warfare: China's Master Plan to Destroy America</a></p><p>by Qiao Liang, Wang Xiangsui </p></li><li><p><a href="https://amzn.to/3RM4hY4">Principles for Dealing with the Changing World Order: Why Nations Succeed and Fail</a> by Ray Dalio<br></p></li></ul><div><hr></div><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions in Depth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[006.1: SALT TYPHOON ]]></title><description><![CDATA[Listen now | An Analysis of the Salt Typhoon Threat Actor -- March 2025]]></description><link>https://www.intrusionsindepth.com/p/006-1-salt-typhoon</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/006-1-salt-typhoon</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Sat, 15 Mar 2025 17:26:02 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/153856506/63531fd20d0025d43884a4e966d5abe5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h4><strong>Episode Description</strong>:</h4><p>This episode of The <strong>IntrusionsinDepth</strong> Podcast released on March 15, 2025, explores the Chinese hacking group Salt Typhoon, a sophisticated cyber-espionage outfit linked to the Ministry of State Security that infiltrated nine U.S. telecom companies and the Treasury by exploiting vulnerabilities in Cisco and BeyondTrust systems. The host traces the group&#8217;s evolution from its broad 2019 attacks on Southeast Asia to its refined 2023-2025 campaigns, wielding custom malware like Ghost Spider to steal sensitive data from telecoms, governments, and tech sectors worldwide. With aliases like Ghost Emperor and UNC2286, Salt Typhoon&#8217;s history builds on decades of Chinese cyber operations&#8212;shifting from the PLA&#8217;s early economic theft to the MSS&#8217;s strategic espionage&#8212;culminating in recent breaches exposing D.C.-area VIP calls and unclassified Treasury documents. The U.S. response of symbolic sanctions on a Chinese firm and an MSS-affiliated hacker underscores the ongoing challenges with groups like this. </p><div><hr></div><h4><strong>Main Topics Discussed:</strong></h4><p><strong>1. Who is Salt Typhoon?</strong></p><ul><li><p>Known by aliases like Ghost Emperor and UNC2286, they&#8217;ve been active since 2019, tied to China&#8217;s MSS.</p></li><li><p>Targets include telecoms, governments, and tech globally, with a focus on espionage.</p></li></ul><p><strong>2. History of Chinese Cyber Attacks </strong></p><ul><li><p>Early attacks (2003-2010s) by the PLA stole tech secrets, like Operation Aurora against Google.</p></li><li><p>Modern APTs like Salt Typhoon showing more refined, widespread operations.</p></li></ul><p><strong>3. Salt Typhoon&#8217;s Campaigns</strong></p><ul><li><p>Early hits (2019-2022) targeted Southeast Asia; later ones (2023-2025) hit U.S. telecoms and Treasury.</p></li><li><p>Malware like Ghost Spider evolved, using clever tricks to stay hidden and adaptable.</p></li></ul><p><strong>4. U.S. Attacks &amp; Response</strong></p><ul><li><p>Recent breaches exposed D.C.-area VIP calls and Treasury data via Cisco and BeyondTrust flaws.</p></li><li><p>U.S. countered with symbolic sanctions on a Chinese firm and hacker, Yin Jinping, but the threat persists.</p></li></ul><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>https://blog.polyswarm.io/salt-typhoon-targets-telecoms-with-ghostspider?</p></li><li><p>https://www.npr.org/2024/12/17/nx-s1-5223490/text-messaging-security-fbi-chinese-hackers-security-encryption</p></li><li><p>https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf</p></li><li><p>https://techcrunch.com/2024/10/13/meet-the-chinese-typhoon-hackers-preparing-for-war/</p></li><li><p>https://mashable.com/article/salt-typhoon-breach-att-verizon-clear</p></li><li><p>https://techcrunch.com/2024/12/04/fbi-recommends-encrypted-messaging-apps-combat-chinese-hackers/</p></li><li><p>https://techcrunch.com/2024/10/07/the-30-year-old-internet-backdoor-law-that-came-back-to-bite/</p></li><li><p>https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b</p></li><li><p>https://www.reuters.com/technology/cybersecurity/us-adds-9th-telcom-list-companies-hacked-by-chinese-backed-salt-typhoon-2024-12-27/</p></li><li><p>https://therecord.media/nine-us-companies-hacked-salt-typhoon-china-espionage</p></li><li><p>https://en.wikipedia.org/wiki/Ministry_of_State_Security_(China)</p></li><li><p>https://en.wikipedia.org/wiki/2010%E2%80%932012_killing_of_CIA_sources_in_China?</p></li><li><p>https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-typhoon-using-legitimate-software-to-quietly-access-taiwanese-organizations/</p></li><li><p>https://www.justice.gov/opa/pr/member-sophisticated-china-based-hacking-group-indicted-series-computer-intrusions-including</p></li><li><p>https://cloud.google.com/blog/topics/threat-intelligence/chinese-espionage-tactics/</p></li><li><p>https://www.fbi.gov/news/stories/chinese-hackers-charged-in-equifax-breach-021020</p></li><li><p>https://en.wikipedia.org/wiki/Operation_Fox_Hunt</p></li><li><p>https://en.wikipedia.org/wiki/Salt_Typhoon</p></li><li><p>https://www.theguardian.com/us-news/2021/oct/27/us-bans-china-telecom-from-operating-over-national-security-concerns</p></li><li><p>https://www.theguardian.com/technology/2020/jan/21/amazon-boss-jeff-bezoss-phone-hacked-by-saudi-crown-prince</p></li><li><p>https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/analyzing-salt-typhoon-telecom-attacker/</p></li><li><p>https://www.crowdstrike.com/en-us/blog/an-analysis-of-lightbasin-telecommunications-attacks/</p></li><li><p>https://www.reuters.com/technology/china-linked-hacking-group-accessing-calling-records-worldwide-crowdstrike-says-2021-10-19/</p></li><li><p>https://www.darkreading.com/data-privacy/chinese-apt-backdoor-found-in-ccleaner-supply-chain-attack</p></li><li><p>https://news.sky.com/story/obama-tells-china-president-hacking-must-stop-10345126</p></li><li><p>https://en.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach</p></li><li><p>https://www.mandiant.com/sites/default/files/2021-09/mandiant-apt1-report.pdf</p></li><li><p>https://en.wikipedia.org/wiki/PLA_Unit_61398</p></li><li><p>https://en.wikipedia.org/wiki/Titan_Rain</p></li><li><p>https://www.csis.org/programs/strategic-technologies-program/survey-chinese-espionage-united-states-2000</p></li><li><p>https://www.nytimes.com/2024/12/16/us/politics/biden-administration-retaliation-china-hack.html</p></li><li><p>https://github.com/shadow1ng/fscan/blob/main/README_EN.md</p></li><li><p>https://github.com/sensepost/reGeorg</p></li><li><p>https://www.cisa.gov/sites/default/files/2024-05/MAR-10448362.c1.v2.CLEAR_.pdf</p></li><li><p>https://proxylogon.com/</p></li><li><p>https://www.picussecurity.com/resource/blog/salt-typhoon-removing-chinese-telecom-equipment</p></li><li><p>https://threatpost.com/famoussparrow-spy-hotels-governments/174948/</p></li><li><p>https://www.ncsc.gov.uk/files/NCSC-MAR-SparrowDoor.pdf</p></li><li><p>https://www.trendmicro.com/en_us/research/24/k/earth-estries.html</p></li><li><p>https://cyberscoop.com/suspected-chinese-hackers-took-advantage-of-microsoft-exchange-vulnerability-to-steal-call-records/</p></li><li><p>https://portswigger.net/daily-swig/a-whole-new-attack-surface-researcher-orange-tsai-documents-proxylogon-exploits-against-microsoft-exchange-server</p></li><li><p>https://www.welivesecurity.com/2021/09/23/famoussparrow-suspicious-hotel-guest/</p></li><li><p>https://cyberscoop.com/famoussparrow-eset-microsoft-exchange-proxylogon/</p></li><li><p>https://www.c4isrnet.com/cyber/2024/04/10/secretive-us-cyber-force-deployed-22-times-to-aid-foreign-governments/</p></li><li><p>https://www.meritalk.com/articles/report-salt-typhoon-using-backdoor-malware-tactics/</p></li><li><p>https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951</p></li><li><p>https://securelist.com/ghostemperor-from-proxylogon-to-kernel-mode/104407/</p></li><li><p>https://www.trendmicro.com/en_us/research/23/g/supply-chain-attack-targeting-pakistani-government-delivers-shad.html</p></li><li><p>https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html</p></li><li><p>https://cloud.google.com/blog/topics/threat-intelligence/unc4841-post-barracuda-zero-day-remediation</p></li><li><p>https://www.trendmicro.com/en_us/research/24/k/earth-estries.html</p></li><li><p>https://www.bleepingcomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/</p></li><li><p>https://cyberscoop.com/chinese-hack-nsa-tool-check-point/</p></li><li><p>https://teamwin.in/index.php/2025/02/15/redmike-hackers-exploited-1000-cisco-devices-to-gain-admin-access/</p></li><li><p>https://cloud.google.com/blog/topics/threat-intelligence/barracuda-esg-exploited-globally</p></li><li><p>https://cyberscoop.com/treasury-sanctions-chinese-cybersecurity-company-salt-typhoon-hacks/</p></li><li><p>https://www.techtarget.com/searchsecurity/news/366617509/Treasury-Department-breached-through-BeyondTrust-service</p></li><li><p>https://www.bleepingcomputer.com/news/security/us-treasury-department-breached-through-remote-support-platform/</p></li><li><p>https://cyberscoop.com/salt-typhoon-us-telecom-hack-earth-estries-trend-micro-report/</p></li><li><p>https://www.reuters.com/technology/cybersecurity/us-treasury-dept-issues-sanctions-related-salt-typhoon-hack-2025-01-17/</p></li><li><p>https://www.wired.com/story/us-names-one-of-the-hackers-allegedly-behind-massive-salt-typhoon-breaches/</p></li><li><p>https://www.recordedfuture.com/research/redmike-salt-typhoon-exploits-vulnerable-devices</p></li><li><p>https://risky.biz/BTN106/</p></li><li><p>https://en.wikipedia.org/wiki/Salt_Typhoon</p></li><li><p>https://jsac.jpcert.or.jp/archive/2025/pdf/JSAC2025_1_5_leon-chang_theo-chen_en.pdf</p></li><li><p>https://learn.microsoft.com/en-us/defender-xdr/microsoft-threat-actor-naming</p></li><li><p>https://nvd.nist.gov/vuln/detail/cve-2023-2868</p></li><li><p>https://www.washingtonpost.com/national-security/2024/11/21/salt-typhoon-china-hack-telecom/</p></li><li><p>https://malpedia.caad.fkie.fraunhofer.de/actor/ghostemperor</p></li><li><p>https://www.sentinelone.com/labs/cyber-soft-power-chinas-continental-takeover/</p></li><li><p>https://www.welivesecurity.com/2021/08/24/sidewalk-may-be-as-dangerous-as-crosswalk/</p></li><li><p>https://blog.talosintelligence.com/salt-typhoon-analysis/</p><p></p><p></p></li></ul><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to IntrusionsinDepth Podcast. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[AMA 001 | TIKTOK BAN]]></title><description><![CDATA[Thoughts on the US TikTok ban]]></description><link>https://www.intrusionsindepth.com/p/ama-001-tiktok-ban</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/ama-001-tiktok-ban</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Mon, 24 Feb 2025 11:01:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/157746213/3edff05130bc13756f242e36f65044e6.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h4><strong>Episode Description</strong>:</h4><p>Welcome to the first Ask Me Anything (AMA) episode of&nbsp;<em>The Intrusions in Depth Podcast</em>! Host Josh Stepp takes a break from scripting his next deep-dive episode to answer listener questions in an unscripted, off-the-cuff format. To kick off this new series, Josh tackles a listener's question about the TikTok ban, its national security implications, and President Trump&#8217;s decision to delay enforcement for 75 days.&nbsp;</p><p>What starts as a straightforward discussion spirals into a multi-faceted analysis&#8212;covering creators, consumers, legal ambiguities, historical precedents, and even a bit of conspiracy theorizing. From Romanian election recalls to the potential for government ownership of social media, Josh explores the messy intersection of technology, democracy, and geopolitics. Whether you&#8217;re a TikTok skeptic or a free-speech advocate, this episode offers plenty to chew on.<br><br>Joining the mailing list to participate: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;386126f7-9792-4b41-9877-643fa4490868&quot;,&quot;caption&quot;:&quot;Ask Me Anything is back! These episodes are all about you and your burning questions. Whether you&#8217;re curious about my hottest takes, my weirdest opinions, or the juicy behind-the-scenes chaos of the podcast, now&#8217;s your chance to dig in (respectfully, of course).&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;AMA&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:51312055,&quot;name&quot;:&quot;Josh Stepp&quot;,&quot;bio&quot;:&quot;information security consultant specializing in detection engineering, threat hunting, and CTI. USAF Vet. Dad. BJJ Brown Belt &amp;\n\nhost of the Intrusions In-Depth Podcast&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/983f2c58-d5ae-4fc3-9708-eaab020c1018_2048x2732.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-12-29T15:33:58.743Z&quot;,&quot;cover_image&quot;:null,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.intrusionsindepth.com/p/ama&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:153760510,&quot;type&quot;:&quot;page&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;IntrusionsInDepth &quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c2123cd-fb36-4edc-bbdf-299e4a5c68a8_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h4><strong>Main Topics Discussed</strong></h4><ol><li><p><strong>The TikTok Ban Overview</strong></p><ul><li><p>Listener question: Thoughts on the TikTok ban, national security allegations, and Trump&#8217;s 75-day enforcement delay.</p></li><li><p>Josh&#8217;s approach: Analyzing the issue through multiple lenses&#8212;creators, consumers, the platform itself, legal precedent, and conspiracy angles.</p></li></ul></li><li><p><strong>Creators and Consumers</strong></p><ul><li><p>Sympathy for creators who rely on TikTok for livelihoods, especially those with limited job prospects (e.g., ex-felons, mental health challenges).</p></li><li><p>Counterpoint: National security may outweigh individual needs; alternative platforms (YouTube Shorts, Instagram Reels, etc.) exist for diversification.</p></li><li><p>Audience perspective: Claims of First Amendment violations are weak&#8212;governments already limit speech for security (e.g., classification).</p></li></ul></li><li><p><strong>National Security and Precedents</strong></p><ul><li><p>Historical examples: FDR&#8217;s Office of Censorship post-Pearl Harbor, Trump&#8217;s WeChat ban, and Russia&#8217;s Sputnik/RT restrictions.</p></li><li><p>TikTok concerns: Data harvesting by China, potential influence ops, and speculative backdoor risks (e.g., Pegasus-style exploits).</p></li><li><p>Comparison: U.S. tech giants (Meta, Google, X) could pose similar risks&#8212;why single out TikTok?</p></li></ul></li><li><p><strong>The Law Itself</strong></p><ul><li><p>Critique of the TikTok ban legislation: Vague terms (&#8220;foreign adversary,&#8221; &#8220;significant threat&#8221;) invite abuse.</p></li><li><p>Hypothetical misuse: Could target platforms like X if tied to foreign influence (e.g., Musk&#8217;s China ties).</p></li><li><p>Suggestion: Write clearer laws (e.g., ban data transmission to China) rather than broad, ambiguous bans.</p></li></ul></li><li><p><strong>Romanian Election Recall (2024)</strong></p><ul><li><p>Context: Far-right candidate&#8217;s lead annulled due to alleged TikTok interference (possibly Russian-linked).</p></li><li><p>Pro-recall: Evidence of coordinated campaigns; protects electoral integrity.</p></li><li><p>Anti-recall: Evidence is circumstantial; risks censorship and voter agency.</p></li><li><p>Broader issue: Balancing tech, democracy, and free speech in the digital age.</p></li></ul></li><li><p><strong>Conspiracy Time</strong></p><ul><li><p>Theories debunked: TikTok moving servers to Meta during a blackout&#8212;impractical for modern apps.</p></li><li><p>Speculation: Congress&#8217;s shift possibly due to classified briefings (e.g., NSA findings).</p></li><li><p>Trump&#8217;s reversal: Political strategy, donor influence (Jeff Yass), or a deal-making play for U.S. ownership.</p></li></ul></li><li><p><strong>Trump&#8217;s 75-Day Delay and Future Outlook</strong></p><ul><li><p>Possible motives: Appealing to young voters, donor pressure, or negotiating U.S. stakes in TikTok.</p></li><li><p>Innovative idea: Government ownership of tech stakes (e.g., Alaska&#8217;s oil fund model) to benefit taxpayers.</p></li><li><p>Prediction: Ban likely upheld, but TikTok persists under U.S. ownership (e.g., Oracle, Musk).</p><p></p></li></ul></li></ol><div><hr></div><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>http(s)://www.youtube.com/watch?v=e1pTCSFrkbk&amp;ab_channel=All-InPodcast</p></li><li><p>https://en.wikipedia.org/wiki/Office_of_Censorship</p></li><li><p>https://newsroom.tiktok.com/en-eu/continuing-to-protect-the-integrity-of-tiktok-during-romanian-elections</p></li><li><p>https://www.bbc.com/news/articles/cm2v13nz202o</p></li><li><p>https://x.com/mtaibbi/status/1865269938597879902</p></li><li><p>https://x.com/mtracey/status/1865097680805839008</p></li></ul><p></p><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions inDepth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[005.2: Lapsus$ PART DEUX | John Prieto Share Insights from the FRONT LINES ]]></title><description><![CDATA[Listen now | Lapsus$, Ransomware Crews and Cybersecurity&#8217;s Evolving Arms Race]]></description><link>https://www.intrusionsindepth.com/p/0052-lapsus-part-deux</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0052-lapsus-part-deux</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Fri, 07 Feb 2025 14:02:37 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/156669783/8c091bbf9d45111204b192facd9e01da.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h4><strong>Episode Description</strong>:</h4><p><br> <em>Intrusions and Depth</em> welcomes  its first-ever guest, John Prieto, a  cybersecurity professional with experience at CrowdStrike, Mandiant, USAA, and the U.S. Air Force. Together, they dissect the chaotic rise and fall of the Lapsus$ hacking group&#8212;a crew of teenagers who turned the cybersecurity world upside down with brazen attacks on tech giants like Microsoft, Nvidia, and Rockstar Games.</p><p>Josh and John explore how Lapsus$ used social engineering, MFA fatigue, and even taunted their victims on social media, all while making rookie mistakes that led to their downfall. They also dive into the murky world of ransomware crews, the evolution of financially motivated cybercrime, and the blurred lines between threat actor clustering and sanctions.</p><div><hr></div><h4><strong>Main Topics Discussed:</strong></h4><ol><li><p><strong>Lapsus$: The Chaotic Rise &amp; Brazen Attacks</strong></p><ul><li><p>How a group of teenagers breached top corporations using unsophisticated yet highly effective tactics.</p></li><li><p>Their public Telegram channel, taunts, and lack of operational security (OPSEC).</p></li></ul></li><li><p><strong>Incident Response &amp; Attribution Challenges</strong></p><ul><li><p>John shares behind-the-scenes insights from responding to Lapsus$ intrusions.</p></li><li><p>How security firms track threat actors despite constantly changing tactics and naming conventions.</p></li></ul></li><li><p><strong>The Immature Yet Dangerous Nature of APT Teens</strong></p><ul><li><p>Comparing Lapsus$ to professional ransomware gangs&#8212;why their unpredictability made them so dangerous.</p></li><li><p>The business dynamics of Ransomware as a Service.</p></li></ul></li><li><p><strong>The Future of Cybercrime &amp; Security Lessons</strong></p><ul><li><p>The rising threat of <em>hacktivist-style</em> APT teens and their potential impact on infrastructure.</p><p></p></li></ul></li></ol><div><hr></div><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>htt(p)s://www.youtube.com/watch?ab_channel=NextGenHacker101</p></li><li><p>https://www.cisa.gov/sites/default/files/2023-08/CSRB_Lapsus%24_508c.pdf</p></li><li><p>https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/</p><div><hr></div><p></p></li></ul><p><strong>Support the Podcast! USE MY LINKS!!</strong></p><ul><li><p><a href="https://joindeleteme.com/refer?coupon=RFR-391243-JVWH6W">deleteme.com promotional link</a></p></li></ul><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions in Depth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[*BONUS CROSS-POST* PSYOPS.001 Mossad's Pager Operation]]></title><description><![CDATA[Listen now (29 mins) | An Analysis of the PsyOps angle of Mossad's Pager Operation against Hezbollah]]></description><link>https://www.intrusionsindepth.com/p/psyops001-mossad-pager</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/psyops001-mossad-pager</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Sun, 19 Jan 2025 14:48:14 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/153757007/fa832d679013f1fd6d74df4ba3869500.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><em>PsyOps, short for psychological operations, involves the use of tactics to influence emotions, perceptions, and behavior. This series explores the diverse applications of psychological influence, from media strategies to social interactions. There&#8217;s no specific order or structured episodes&#8212;each piece stands on its own, offering unique insights into the power of persuasion. To explore the entire series, click here</em></p><div><hr></div><h4><strong><br>Episode Description</strong>: </h4><p>In this episode of Intrusions InDepth, Josh Stepp explores the fascinating world of psychological operations (PSYOPs) and information warfare. Using a recent 60 Minutes interview about alleged Mossad operations against Hezbollah as a case study, Josh delves into the tactics, ethics, and impact of these covert influence campaigns while analyzing the interview itself as a PsyOp, highlighting the power of narrative control and perception manipulation in modern conflicts.</p><p></p><h4><strong>Topics Discussed:</strong></h4><ul><li><p><strong>PsyOp Fundamentals:</strong> An overview of PsyOp, their purpose, and applications in various contexts.</p></li><li><p><strong>The Pager and Walkie Talkie Attacks:</strong> A detailed account of the alleged Mossad operation, including the meticulous planning, device modification, and execution of the attacks on Hezbollah.</p></li><li><p><strong>The 60 Minutes Interview as a PsyOp:</strong> An analysis of the interview itself as a strategic tool for information warfare, shaping perceptions, and influencing adversaries.</p></li><li><p><strong>Open Source Intelligence (OSINT) Analysis:</strong> A demonstration of OSINT analysis techniques using the 60 Minutes interview as an example, evaluating source credibility and identifying potential motives behind the information.</p></li><li><p><strong>The Ethics and Effectiveness of PSYOPs:</strong> A discussion on the ethical considerations surrounding PSYOPs and their effectiveness in achieving long-term strategic goals.</p></li></ul><div><hr></div><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>https://www.cbsnews.com/news/israeli-mossad-pager-walkie-talkie-hezbollah-plot-60-minutes/</p></li><li><p>https://irp.fas.org/doddir/army/atp2-22-9.pdf</p></li><li><p>https://www.bunniestudios.com/blog/2024/turning-everyday-gadgets-into-bombs-is-a-bad-idea/</p></li><li><p>https://www.reuters.com/world/middle-east/irans-ambassador-lebanon-injured-by-pager-explosion-2024-09-17/</p></li><li><p><em><a href="https://amzn.to/3ZPOlYy">By Way of Deception </a></em><a href="https://amzn.to/3ZPOlYy">by Victor Ostrovsky &amp; Claire Hoy</a></p></li><li><p>https://en.wikipedia.org/wiki/Calls_for_the_destruction_of_Israel</p></li><li><p>https://www(.)youtube(.)com/watch?v=FLUUUZWjfGk&amp;t=1s&amp;pp=ygURNjAgbWludXRlcyBtb3NzYWQ%3D</p><p></p><p></p></li></ul><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions in Depth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[005.1: Lapsus$ | The APTeens and INTERNET JOYRIDING]]></title><description><![CDATA[Listen now | An Analysis of the Lapsus$ Hacking Group]]></description><link>https://www.intrusionsindepth.com/p/0051-lapsus</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0051-lapsus</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Mon, 23 Dec 2024 06:24:50 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/152889790/716a8e241d7e840b8839458a18024ba8.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h4><strong>Episode Description</strong>:</h4><p>In this episode of <em>Intrusions and Depth</em>, Josh Stepp unpacks the audacious rise and chaotic downfall of the Lapsus$ hacking collective. Known for targeting some of the biggest names in technology, including Microsoft, Nvidia, and Rockstar Games, this group rewrote the playbook on cybercrime with tactics as unconventional as their teenage leadership. From SIM-swapping and MFA fatigue attacks to social engineering and public Telegram boasts, Josh examines how Lapsus$ exposed glaring vulnerabilities in global cybersecurity defenses while raising ethical questions about balancing punishment and rehabilitation for young offenders.</p><div><hr></div><h4><strong>Main Topics Discussed:</strong></h4><ol><li><p><strong>The Rise of Lapsus$</strong></p><ul><li><p>Lapsus$ emerged in 2021 as a flamboyant hacking group known for bold, public-facing tactics, including defacing websites and leaking sensitive corporate data.</p></li><li><p>Their attacks included high-profile breaches at companies like Microsoft, Nvidia, Uber, and Rockstar Games.</p></li></ul></li><li><p><strong>Methods and Tactics</strong></p><ul><li><p>Lapsus$ favored social engineering over sophisticated exploits, using techniques like SIM-swapping, MFA fatigue, and exploiting support team access to gain entry.</p></li><li><p>A notable hallmark was their public taunting of victims and recruitment via Telegram.</p></li></ul></li><li><p><strong>High-Profile Breaches</strong></p><ul><li><p><strong>Nvidia</strong>: Demanded removal of the cryptocurrency mining limiter from GPUs, escalating into a public back-and-forth.</p></li><li><p><strong>Microsoft</strong>: Compromised 37GB of source code for Bing and other internal projects.</p></li><li><p><strong>Rockstar Games</strong>: Leaked early footage of Grand Theft Auto VI, sparking fan outrage and security debates.</p></li></ul></li><li><p><strong>The Downfall</strong></p><ul><li><p>Arrests in 2022 and 2023 revealed the group&#8217;s youthful composition, with some members as young as 16.</p></li><li><p>The sentencing of leader Arion Kurtaj to indefinite detention highlighted the intersection of cybercrime and mental health issues.</p></li></ul></li><li><p><strong>Lessons for Cybersecurity</strong></p><ul><li><p>Reflections on how Lapsus$ forced global organizations to rethink their reliance on MFA and social engineering defenses.</p><p></p></li></ul></li></ol><div><hr></div><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>https://www.bbc.com/news/technology-66549159</p></li><li><p>https://www.cisa.gov/sites/default/files/2023-08/CSRB_Lapsus%24_508c.pdf</p></li><li><p>https://www.reuters.com/world/americas/bolsonaro-dismisses-vaccination-requirement-entry-into-brazil-2021-12-07/</p></li><li><p>https://www.reuters.com/technology/brazils-health-ministry-website-hit-by-hacker-attack-systems-down-2021-12-10/</p></li><li><p>https://www.zdnet.com/article/brazilian-ministry-of-health-suffers-cyberattack-and-covid-19-vaccination-data-vanishes/</p></li><li><p>https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/</p></li><li><p>https://blog.checkpoint.com/security/lapsus-ransomware-gang-uses-stolen-source-code-to-disguise-malware-files-as-trustworthy-check-point-customers-remain-protected/</p></li><li><p>https://malpedia.caad.fkie.fraunhofer.de/actor/lapsus</p></li><li><p>https://www.aha.org/system/files/media/file/2022/04/hc3-tlp-white-threat-briefing-lapsus%24-okta-and-the-health-sector-4-7-22.pdf</p></li><li><p>https://techcommunity.microsoft.com/discussions/securityandcompliance/new-blog-post--dev-0537-criminal-actor-targeting-organizations-for-data-exfiltra/3264957</p></li><li><p>https://en.wikipedia.org/wiki/Samy_Kamkar</p></li><li><p>https://krebsonsecurity.com/2022/04/the-original-apt-advanced-persistent-teenagers/</p></li><li><p>https://unit42.paloaltonetworks.com/lapsus-group/</p></li><li><p>https://x.com/vxunderground/status/1506114493067186183/photo/4</p></li><li><p>https://www.darkreading.com/cyberattacks-data-breaches/ransomware-group-s-claim-that-it-hacked-okta-prompts-concerns-of-another-solarwinds</p></li><li><p>https://www.law.cornell.edu/wex/chevron_deference</p></li><li><p>https://www.zscaler.com/blogs/product-insights/what-you-need-know-about-lapsus-supply-chain-attacks</p></li><li><p>https://www.uber.com/newsroom/security-update</p></li><li><p>https://blog.avast.com/nvidia-allegedly-hacks-back-avast</p></li><li><p>https://www.crn.com/news/security/nvidia-hacks-ransomware-gang-back-to-block-data-leaks-group-claims?</p></li><li><p>https://www.spiceworks.com/it-security/data-security/news/nvidia-data-breach-lapsus/</p></li><li><p>https://www.threatdown.com/blog/nvidia-the-ransomware-breach-with-some-plot-twists/</p></li><li><p>https://www.wired.com/story/lapsus-hacking-group-extortion-nvidia-samsung/</p></li><li><p>https://www.optimumsr.co.uk/anniversary-of-the-lapsus-hack-on-rockstar-what-have-we-learned/</p></li><li><p>https://www.bleepingcomputer.com/news/security/e-commerce-giant-mercado-libre-confirms-source-code-data-breach/</p></li><li><p>https://www.bleepingcomputer.com/news/security/samsung-confirms-hackers-stole-galaxy-devices-source-code/</p></li><li><p>https://www.bleepingcomputer.com/news/security/nvidia-data-breach-exposed-credentials-of-over-71-000-employees/</p></li><li><p>https://www.bleepingcomputer.com/news/security/lapsus-hacker-behind-gta-6-leak-gets-indefinite-hospital-sentence/</p></li><li><p>https://therecord.media/rockstar-confirms-cyberattack-leak-of-confidential-data-including-gta-6-footage</p></li><li><p>https://therecord.media/british-prosecutors-accuse-teen-lapsus-member-of-uber-revolut-rockstar-hacks</p></li><li><p>https://flashpoint.io/blog/lapsus/</p></li><li><p>https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-they-were-hacked-by-lapsus-extortion-group/</p></li><li><p>https://www.aha.org/system/files/media/file/2022/04/hc3-tlp-white-threat-briefing-lapsus%24-okta-and-the-health-sector-4-7-22.pdf</p></li><li><p>https://x.com/davidmarcus/status/1862867849988944361</p></li><li><p>https://www.businessinsider.com/meta-libra-crypto-project-regulators-david-marcus-2024-12</p></li><li><p>https://archive.is/xGIdu</p></li><li><p>https://www.sophos.com/en-us/content/pacific-rim</p></li><li><p>https://www.brennancenter.org/our-work/analysis-opinion/house-passes-section-702-reauthorization-bill-without-protections-against</p><div id="youtube2-v_z2HkVfcEA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;v_z2HkVfcEA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/v_z2HkVfcEA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p></li></ul><p></p><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions in Depth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[*BONUS CROSS-POST* Nation-State HACKING, Cybercrime, and GEN AI]]></title><description><![CDATA[Listen now (50 mins) | An Analysis of 2024 Trends in Information Security]]></description><link>https://www.intrusionsindepth.com/p/bonus-cross-post-nation-state-hacking</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/bonus-cross-post-nation-state-hacking</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Tue, 19 Nov 2024 05:19:03 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/151646871/55310661357b439c2b52a855b923369a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Episode Description</strong>: This episode breaks down insights from the 2024 Global Threat Report by Elastic and  the 2024 Digital Defense Report from Microsoft. It explores the blurring lines between state-sponsored hackers and cybercriminals, the rising role of generative AI in cyber-attacks and propaganda, and the use of commodity malware by sophisticated threat actors. </p><p>Josh shares both the report highlights and his reflections on how these trends reshape the cybersecurity landscape, especially in light of ongoing geopolitical tensions.<strong> </strong></p><h4><strong>Topics Discussed:</strong></h4><ol><li><p><strong>Blurred Lines Between Nation-State and Cybercriminal Activities</strong></p><p>How state-sponsored actors, including those from North Korea and Iran, increasingly adopt criminal tactics for financial gain, with North Korea using cybercrime to fund its nuclear and missile programs.</p><p></p></li><li><p><strong>Generative AI and Its Role in Cyber Threats</strong></p><p>A deep dive into the uses of generative AI by both defenders and attackers, including the development of sophisticated phishing scams, influence operations, and automated malware production.</p><p></p></li><li><p><strong>Commodity Malware and Open-Source Tools</strong></p><p>The use of off-the-shelf hacking tools like Cobalt Strike and Sliver, which simplify cyber operations for threat actors. Josh explores how these tools blur the line between advanced and lower-skill attacks.</p><p></p></li><li><p><strong>Social Engineering and AI-Powered Phishing</strong></p><p>Insights from the reports show how generative AI enables more tailored and realistic phishing campaigns, amplifying the effectiveness of social engineering at scale.</p><p></p></li><li><p><strong>State-Backed Influence Operations via AI</strong></p><p>Case studies of AI-driven influence campaigns, including Russia&#8217;s deepfake audio tactics in Slovakia and China&#8217;s misinformation campaigns, demonstrate AI&#8217;s role in sowing discord and manipulating public perception globally.</p></li></ol><div><hr></div><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>https://www.elastic.co/resources/security/report/global-threat-report</p></li><li><p>https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/microsoft-digital-defense-report-2024</p></li><li><p>https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse</p></li><li><p>https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine</p></li><li><p>https://malpedia.caad.fkie.fraunhofer.de/details/win.sliver</p></li><li><p>https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/</p></li><li><p>https://attack.mitre.org/groups/G0138/</p></li><li><p>https://learn.microsoft.com/en-us/defender-xdr/microsoft-threat-actor-naming</p></li><li><p>https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/</p></li><li><p>https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-048a</p></li><li><p>https://cloud.google.com/blog/topics/threat-intelligence/apt42-charms-cons-compromises</p></li><li><p>https://www.reuters.com/world/us/accused-iranian-hackers-successfully-peddle-stolen-trump-emails-2024-10-25/</p></li><li><p>https://www.reuters.com/world/us-issues-iran-related-sanctions-over-election-interference-2024-09-27/</p></li><li><p>https://www.npr.org/2023/09/28/1202110410/how-rumors-and-conspiracy-theories-got-in-the-way-of-mauis-fire-recovery</p></li><li><p>https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html</p></li><li><p>https://securityintelligence.com/articles/malicious-ai-worm-targeting-generative-ai/</p></li><li><p>https://cert.gov.ua/article/6278521</p></li><li><p>https://cloud.google.com/blog/topics/threat-intelligence/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor</p><p></p><p></p></li></ul><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions in Depth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[004.1: Behind Enemy CODE]]></title><description><![CDATA[Listen now | Fancy Bear's Infiltration of Ukrainian Military Apps]]></description><link>https://www.intrusionsindepth.com/p/0041-behind-enemy-code</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0041-behind-enemy-code</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Mon, 04 Nov 2024 07:20:21 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/150173027/7fc6cc4b244da9833875ecbe5a90dfaf.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Episode Description</strong>: In this episode of <em>IntrusionsInDepth</em>, host Josh Stepp uncovers the story of how a Ukrainian-developed artillery targeting app, designed to assist soldiers on the battlefield, was compromised by the Russian cyber espionage group Fancy Bear. The episode explores the technical breakdown of the malware used, its devastating impact on Ukrainian forces, and the broader implications of integrating technology into warfare. Josh takes listeners through the timeline of events from 2014-2016 and discusses the challenges of attribution, malware analysis, and the future of cyber warfare as an integrated component of military operations.</p><div><hr></div><h4><strong>Main Topics Discussed:</strong></h4><ol><li><p><strong>The Compromise of the D-30 Howitzer App</strong></p><ul><li><p>The episode kicks off with a discussion on the Ukrainian artillery officer Yaroslav Sherstuk&#8217;s development of the <em>Correction-D30</em> app, which sped up artillery targeting. Fancy Bear, a Russian cyber espionage group, inserted X-Agent malware into a trojanized version of the app, leading to devastating consequences for Ukrainian artillery.</p></li></ul></li><li><p><strong>Understanding the D-30 Howitzer</strong></p><ul><li><p>Josh explains the technical aspects of the D-30 Howitzer, a Soviet-designed 122mm artillery piece, and how the <em>Correction-D30</em> app was designed to speed up targeting calculations, increasing efficiency and accuracy in battle.</p></li></ul></li><li><p><strong>Fancy Bear and the X-Agent Malware</strong></p><ul><li><p>The episode provides an in-depth analysis of Fancy Bear&#8217;s use of the X-Agent malware in compromising the app. This includes a technical breakdown of how the malware worked, including its reconnaissance capabilities, use of Android&#8217;s built-in APIs, and its ability to collect sensitive data from infected devices.</p></li></ul></li><li><p><strong>Impact of the Malware on Ukrainian Forces</strong></p><ul><li><p>Josh examines how the malware allowed Russian forces to track Ukrainian artillery movements, leading to the loss of up to 20% of Ukraine&#8217;s D-30 Howitzers in combat. The discussion touches on the implications of this kind of cyber warfare for real-world military tactics.</p></li></ul></li><li><p><strong>Attribution Challenges</strong></p><ul><li><p>The episode delves into the complexities of attributing the attack to Fancy Bear, touching on the challenges of tracking malware use across different threat actors. Josh discusses how Crowdstrike and other security firms identified Fancy Bear&#8217;s involvement and the challenges of confirming attribution with certainty.</p></li></ul></li></ol><div><hr></div><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf</p></li><li><p>https://web-assets.esetstatic.com/wls/2016/10/eset-sednit-part-2.pdf</p></li><li><p>https://en.interfax.com.ua/news/general/395186.html</p></li><li><p>https://blog.focal-point.com/focal-point-releases-malware-analysis-of-android-x-agent-implant</p></li><li><p>https://www.scribd.com/document/468214030/X-Agent-Malware-Technical-Analysis-Focal-Point</p></li><li><p>https://www.realclearinvestigations.com/articles/2020/05/13/hidden_over_2_years_dem_cyber-firms_sworn_testimony_it_had_no_proof_of_russian_hack_of_dnc_123596.html</p></li><li><p>https://www.crowdstrike.com/en-us/blog/bears-midst-intrusion-democratic-national-committee/</p></li><li><p>Change Agents - Dmitri Alperovitch</p><div id="youtube2-23f971HpNcY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;23f971HpNcY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/23f971HpNcY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p><p></p><p></p></li></ul><p><strong>Books:</strong></p><ul><li><p><a href="https://amzn.to/4dIMp99">Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks</a> by Scott J. Shapiro </p><p></p></li></ul><p></p><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions in Depth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[ 003.1: North Korea HACKS Hollywood]]></title><description><![CDATA[Listen now (95 mins) | A Look at the 2014 Sony Hack]]></description><link>https://www.intrusionsindepth.com/p/0031-north-korea-hacks-hollywood</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0031-north-korea-hacks-hollywood</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Wed, 09 Oct 2024 19:39:30 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/149096260/c2a57e318cd513105d927fbac17f7a40.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>Intrusions In-Depth</em>, host Josh Stepp dives into the infamous 2014 Sony hack, where North Korea allegedly targeted Sony Pictures over the controversial film <em>The Interview</em>. The episode explores the timeline of the hack, technical analysis of the malware used, and the political implications, including the response from President Obama. </p><p>Josh also examines various conspiracy theories surrounding the hack, including speculation about Russian involvement and insider threats.</p><div><hr></div><p><strong>Main Topics:</strong></p><p><strong>1. The Sony Hack: Overview and Timeline</strong></p><ul><li><p>Sony Pictures' preparation for <em>The Interview</em>, a comedy about the assassination of North Korea&#8217;s leader Kim Jong-un.</p></li><li><p>Initial breach in September 2014 via phishing emails, followed by months of network snooping.</p></li><li><p>November 2014: The attack escalates, wiping Sony&#8217;s systems and leaking sensitive data, including unreleased films and employee information.</p></li></ul><p><strong>2. North Korea&#8217;s Motives and Threats</strong></p><ul><li><p>North Korea's public condemnation of <em>The Interview</em> as an act of war and terrorism through UN complaints.</p></li><li><p>Connection to North Korean propaganda and the Kim regime&#8217;s intolerance for mockery in media.</p></li><li><p>Analysis of North Korea's use of cinema for internal propaganda and their extreme reaction to the film.</p></li></ul><p><strong>3. Technical Breakdown of the Attack</strong></p><ul><li><p>Discussion of the malware used: Destover, a wiper designed to erase Sony's files.</p></li><li><p>FBI&#8217;s findings on how the malware operated, wiping systems and exfiltrating large amounts of data.</p></li><li><p>Comparison to previous North Korean cyberattacks like the Dark Seoul and Shamoon campaigns.</p></li></ul><p><strong>4. Political Fallout and Obama&#8217;s Response</strong></p><ul><li><p>President Obama's statement condemning the censorship attempt and Sony&#8217;s initial decision to pull the film.</p></li><li><p>The FBI's conclusion that North Korea was responsible for the attack, despite some skepticism from the cybersecurity community.</p></li><li><p>Analysis of Sony's defense and Obama&#8217;s commitment to respond to the attack.</p></li></ul><p><strong>5. Theories and Conspiracies: Was It Really North Korea?</strong></p><ul><li><p>Speculation on Russian involvement and alternative theories involving disgruntled Sony employees.</p></li><li><p>FBI's indictment of North Korean hacker Park Jin Hyok in 2018, tying him to the Sony hack and other cybercrimes.</p></li><li><p>Discussion of whether the attack was a multi-party effort or framed to implicate North Korea.</p></li></ul><div><hr></div><div><hr></div><p><strong>Call to Action:</strong></p><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><p><strong>Links and Resources:</strong></p><ul><li><p>https://www.vox.com/2015/1/20/18089084/sony-hack-north-korea</p></li><li><p>https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and</p></li><li><p>https://coverlink.com/case-study/sony-pictures-entertainment-hack/</p></li><li><p>https://en.wikipedia.org/wiki/2014_Sony_Pictures_hack</p></li><li><p>https://apps.dtic.mil/sti/pdfs/AD1046744.pdf</p></li><li><p>https://www.fbi.gov/news/press-releases/update-on-sony-investigation</p></li><li><p>https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/the-hack-of-sony-pictures-what-you-need-to-know</p></li><li><p>https://www.nccgroup.com/us/the-lazarus-group-north-korean-scourge-for-plus10-years/</p></li><li><p>https://foreignpolicy.com/2018/04/11/north-korean-destructive-malware-is-back-says-dhs-report/</p></li><li><p>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/bkdr_wipall.e</p></li><li><p>https://www.securityweek.com/researchers-analyze-data-wiping-malware-used-sony-attack/</p></li><li><p>https://www.scmagazine.com/news/analysis-of-wiper-malware-implicated-in-sony-breach-exposes-shamoon-style-attacks</p></li><li><p>https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32/NukeSped</p></li><li><p>https://lamag.com/film/sony-hack</p></li><li><p>https://www.hollywoodreporter.com/movies/movie-features/five-years-who-hacked-sony-1257591/</p></li><li><p>https://www.darkreading.com/cyberattacks-data-breaches/report-russian-hacker-broke-into-sony-is-still-there</p></li><li><p>https://www.kaspersky.com/blog/operation-blockbuster/11407/</p></li><li><p>https://threatpost.com/details-emerge-on-sony-wiper-malware-destover/109727/</p></li><li><p>https://www.bankinfosecurity.com/destover-taps-stolen-sony-certificate-a-7660</p></li><li><p>https://securelist.com/destover/67985/</p></li><li><p>https://securelist.com/shamoon-the-wiper-in-details/34369/</p></li><li><p>https://www.bankinfosecurity.com/sony-hack-destover-malware-identified-a-7638</p></li><li><p>https://www.darkreading.com/cyberattacks-data-breaches/sony-hackers-knew-details-of-sony-s-entire-it-infrastructure</p></li><li><p>https://securityaffairs.com/42194/malware/destover-malware-analysis.html</p></li><li><p>https://info.publicintelligence.net/FBI-KoreanMalware.pdf</p></li><li><p>https://en.wikipedia.org/wiki/Park_Jin_Hyok</p></li><li><p>https://www.nknews.org/2023/02/south-korea-issues-first-ever-cyber-sanctions-against-north-korea/</p></li><li><p>https://mynorthkorea.blogspot.com/</p></li><li><p>https://www.kaspersky.com/blog/operation-blockbuster/11407/</p></li><li><p>https://threatpost.com/details-emerge-on-sony-wiper-malware-destover/109727/</p></li><li><p>https://www.bankinfosecurity.com/destover-taps-stolen-sony-certificate-a-7660</p></li><li><p>https://securelist.com/destover/67985/</p></li><li><p>https://securelist.com/shamoon-the-wiper-in-details/34369/</p></li><li><p>https://www.bankinfosecurity.com/sony-hack-destover-malware-identified-a-7638</p></li><li><p>https://www.darkreading.com/cyberattacks-data-breaches/sony-hackers-knew-details-of-sony-s-entire-it-infrastructure</p></li><li><p>https://securityaffairs.com/42194/malware/destover-malware-analysis.html</p></li><li><p>https://info.publicintelligence.net/FBI-KoreanMalware.pdf</p></li><li><p>https://www.lexology.com/library/detail.aspx?g=79955aa7-ed24-417a-8492-34a7af42daf7#:~:text=The%20Court%20rejected%20Capital%20One's,protected%20by%20attorney%2Dclient%20privilege.</p></li><li><p>https://darknetdiaries.com/episode/147/</p></li><li><p>https://www.kaspersky.com/blog/operation-blockbuster/11407/</p><p></p><p></p></li></ul><p><strong>Books:</strong></p><ul><li><p><a href="https://amzn.to/3XzfT3a">The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War</a> by Geoff White</p></li><li><p><a href="https://amzn.to/3MOs1Zl">In Order to Live: A North Korean Girl's Journey to Freedom</a> by Yeomi Park</p></li><li><p><a href="https://amzn.to/3ZyL2GD">The Girl with Seven Names: A North Korean Defector&#8217;s Story</a> by Hyeonseo Lee</p></li><li><p><a href="https://amzn.to/3TBBYwP">Dear Reader: The Unauthorized Autobiography of Kim Jong Il </a>by Michael Malice</p></li></ul><p></p><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions in Depth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[001.3: CYBERWAR is MEMEWAR]]></title><description><![CDATA[Listen now | More Thoughts on Cyberwar - post Crowdstrike 2024]]></description><link>https://www.intrusionsindepth.com/p/001-3-cyberwar-is-memewar</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/001-3-cyberwar-is-memewar</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Sun, 29 Sep 2024 12:34:15 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/147481976/cd67dbcdaa176dd07e57ebed44f5b097.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>Intrusions InDepth</em>, Josh Stepp delves into the complexities of information warfare and its intersection with cyber warfare. Drawing on historical examples and modern tactics, Josh explores how disinformation, psychological operations, and propaganda shape modern conflicts.</p><div><hr></div><h3><strong>Key Topics Discussed:</strong></h3><ol><li><p><strong>Defining Information Warfare</strong></p><ul><li><p>What is information warfare? Josh explains the definition, focusing on data collection, propaganda, and psychological warfare as non-physical tactics.</p></li><li><p>Reference to Wikipedia&#8217;s definition of information warfare, dissecting how it involves everything but direct, physical attacks.</p></li></ul></li><li><p><strong>Historical Comparisons</strong></p><ul><li><p>Josh compares ancient and historical military strategies, such as the Roman sieges, World War II bombings, and propaganda campaigns, to today's cyber tactics.</p></li><li><p>Examples from WWII, including British radio propaganda efforts against Nazi Germany, and the lessons learned from those operations.</p></li></ul></li><li><p><strong>Cyber Warfare Today</strong></p><ul><li><p>How cyber operations (like the CrowdStrike incident) are used in modern warfare, particularly in Ukraine and Russia, and the limitations of these efforts.</p></li><li><p>Real-world examples of Russian cyber operations and their effectiveness in current conflicts, emphasizing return on investment (ROI) and tactical advantages.</p></li></ul></li><li><p><strong>Propaganda and Psychological Operations</strong></p><ul><li><p>A discussion on the role of propaganda in undermining enemy morale, from ancient leaflets to modern social media disinformation campaigns.</p></li><li><p>Josh emphasizes the ethical considerations surrounding these tactics, and whether they violate the rules of war and international norms.</p></li></ul></li><li><p><strong>Impact of Social Media and Modern Technologies</strong></p><ul><li><p>How modern platforms like TikTok, deepfakes, and other technologies amplify the effects of information warfare.</p></li><li><p>Josh addresses the current debate on whether apps like TikTok are being used for state-sponsored influence operations and propaganda.</p></li></ul></li><li><p><strong>War Crimes and Civilian Targeting</strong></p><ul><li><p>Ethical concerns about targeting civilian infrastructure during conflicts, touching on debates about war crimes and dual-use facilities (e.g., water, power, and roads).</p></li><li><p>Discussion on proportionality and the Geneva Conventions in the context of modern and historical conflicts.</p></li></ul></li></ol><div><hr></div><h3><strong>Takeaways:</strong></h3><ul><li><p>Information warfare is a broad, evolving concept that has roots in historical military strategies but is amplified in the digital age through cyber and social media platforms.</p></li><li><p>Cyber warfare, while potentially disruptive, often serves as a complement to traditional military actions rather than as a standalone strategy.</p></li><li><p>Propaganda and psychological operations continue to play a significant role in shaping public opinion and undermining the enemy&#8217;s morale, with ethical dilemmas still prevalent.</p></li><li><p>Social media platforms and technologies like TikTok are potentially powerful tools in modern information warfare, with ongoing debates about their role in influencing public opinion.</p></li></ul><div><hr></div><h3><strong>Mentioned Resources</strong>:</h3><ul><li><p><em><a href="https://amzn.to/3TKTZca">How to Win an Information Wa</a>r</em> by Peter Pomerantsev </p></li><li><p><a href="https://risky.biz/BTN87/">Risky Business Podcast </a>&#8211; Between Two Nerds</p></li><li><p><a href="https://www.britannica.com/event/Battle-of-Alesia-52-BCE">Battle of Alesia</a></p></li><li><p><em><a href="https://amzn.to/3zBd6i5">Blitzed: Drugs in the Third Reich</a></em> by Norman Ohler</p></li></ul><div><hr></div><p><strong>Disclaimer</strong>:<br>The views expressed in this podcast are those of the host and do not reflect the official stance of any affiliated organizations. The podcast is based on publicly available materials and does not contain any classified or proprietary information.</p><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions in Depth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[002.5: PhineasFisher | The Legacy of HACKBACK ]]></title><description><![CDATA[Listen now (38 mins) | From PhineasFisher to Guacamaya: The Evolution of Cyber Resistance]]></description><link>https://www.intrusionsindepth.com/p/0025-pf-legacy-hackback</link><guid isPermaLink="false">https://www.intrusionsindepth.com/p/0025-pf-legacy-hackback</guid><dc:creator><![CDATA[Josh Stepp]]></dc:creator><pubDate>Mon, 26 Aug 2024 09:50:01 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148038211/9ce6884aae97a20fd5ccc6d16d51f68f.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this final episode of "<strong>The Curious Case of PhineasFisher,</strong>" host Josh Stepp dives deep into the legacy of one of the most infamous hacktivists of our time. From exposing the dark side of commercial spyware to inspiring a new generation of cyber-revolutionaries, PhineasFisher&#8217;s impact on the world of hacktivism is undeniable. The episode explores key moments in PhineasFisher's career, their influence on modern hacktivist movements, and a technical breakdown of recent attacks inspired by their methods.</p><div><hr></div><h3><strong>Main Topics:</strong></h3><h4>1. <strong>PhineasFisher: The Cyber-Robin Hood</strong></h4><ul><li><p><strong>The Gamma Group Hack (2014):</strong> PhineasFisher&#8217;s debut, exposing a company selling surveillance software to oppressive regimes.</p></li><li><p><strong>The Hacking Team Breach (2015):</strong> A massive data leak that revealed the inner workings of Hacking Team and sparked global controversy.</p></li></ul><h4>2. <strong>Hacktivism as Political Theater</strong></h4><ul><li><p><strong>Redistribution of Wealth:</strong> How PhineasFisher claimed to steal &#8364;10,000 from a bank and donate it to a revolutionary cause in Syria.</p></li><li><p><strong>The Hacktivist Bug Hunting Program:</strong> PhineasFisher&#8217;s initiative offering bounties for politically motivated hacks, targeting major corporations.</p></li></ul><h4>3. <strong>The Guacamaya Connection</strong></h4><ul><li><p><strong>Emergence of Guacamaya (2022):</strong> A new hacktivist group taking inspiration from PhineasFisher, targeting mining and oil companies in Latin America.</p></li><li><p><strong>Guacamaya&#8217;s Philosophy:</strong> A manifesto calling for the sabotage of Western companies exploiting Central America&#8217;s natural resources.</p></li></ul><h4>4. <strong>Technical Breakdown: Guacamaya&#8217;s Attack on Pronico</strong></h4><ul><li><p><strong>Exploiting Vulnerabilities:</strong> Use of Microsoft Exchange flaws and social engineering to infiltrate systems.</p></li><li><p><strong>The Cyber Knife Fight:</strong> A detailed look at the cat-and-mouse game between Guacamaya and Pronico&#8217;s IT team during the attack.</p></li></ul><h4>5. <strong>The Legacy of PhineasFisher</strong></h4><ul><li><p><strong>Inspiring the Next Generation:</strong> How PhineasFisher&#8217;s hacktivism has become a blueprint for others to follow.</p></li><li><p><strong>Ethics and Impact:</strong> The broader implications of using hacking for social change, and the risks involved.</p></li></ul><div><hr></div><div><hr></div><h3><strong>Subscribe:</strong></h3><ul><li><p>Subscribe to the podcast for more episodes on high-profile cyber intrusions.</p></li><li><p>Visit our website at intrusionsindepth.com for additional stories and insights.</p></li><li><p>Share your thoughts on social media using #IntrusionsInDepth.</p></li></ul><div><hr></div><h3><strong>Links and Resources:</strong></h3><ul><li><p>https://therecord.media/chamelgang-china-apt-ransomware-distraction</p></li><li><p>https://www.vice.com/en/article/meet-the-environmental-hacktivists-trying-to-sabotage-mining-companies/</p></li><li><p>https://data.ddosecrets.com/MilicoLeaks/README.txt</p></li><li><p>https://www.vice.com/en/article/phineas-fisher-says-they-paid-dollar10000-bounty-to-person-who-hacked-chilean-military/</p></li><li><p>https://www.vice.com/en/article/phineas-fisher-offers-dollar100000-bounty-for-hacks-against-banks-and-oil-companies/</p></li><li><p>https://en.wikipedia.org/wiki/Guacamaya_(hacktivist_group)</p></li><li><p>https://cyberscoop.com/environmentalist-hacktivist-collective-mining-company/</p></li><li><p>https://latinoamerica21.com/en/guacamaya-hacktivists-from-the-global-south/</p></li><li><p>https://malpedia.caad.fkie.fraunhofer.de/actor/guacamaya</p></li><li><p>https://therecord.media/interview-with-guacamaya-hacktivist-group-latin-america</p></li><li><p>https://enlacehacktivista.org/comunicado_guacamaya.txt</p></li><li><p>https://enlacehacktivista.org/index.php/Milico_Leaks</p></li><li><p>https://enlacehacktivista.org/index.php?title=File:MILICOS_CULIAOS_LEAK.txt</p><p></p><p></p></li></ul><p><strong>Credits:</strong></p><ul><li><p>Host: Josh Stepp</p></li><li><p>Produced by: Josh Stepp</p></li></ul><div><hr></div><p>Thank you for tuning in to Intrusions in Depth. Stay informed, stay safe, and see you in the next episode!</p><h4></h4><p></p>]]></content:encoded></item></channel></rss>