@guypod
Developer as a
Malware Distribution Vehicle
Guy Podjarny (@guypod)
About Me CEO & Co-Founder at Snyk Find & Fix - - PowerPoint PPT Presentation
Developer as a Malware Distribution Vehicle Guy Podjarny (@guypod) @guypod About Me CEO & Co-Founder at Snyk Find & Fix vulnerabilities in open source dependencies! Founder @Blaze, CTO @Akamai Security work since
@guypod
Guy Podjarny (@guypod)
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
Was 3GB in 2015
@guypod
@guypod
@guypod
@guypod
@guypod
WeChat (China’s WhatsApp) Didi (China’s Uber) Railway 12306 (Train Tickets) + Dozens of US apps
@guypod
https://possiblemobile.com/2015/11/a-lesson-in-xcode-ghost-third-party-frameworks/
@guypod
http://www.circleid.com/posts/20151001_verisign_idefense_analysis_of_xcodeghost/
@guypod
http://www.circleid.com/posts/20151001_verisign_idefense_analysis_of_xcodeghost/
@guypod
https://www.fireeye.com/blog/threat-research/2015/11/xcodeghost_s_a_new.html
@guypod
@guypod
@guypod
https://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store/
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
Ken Thompson, 1984
https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf
@guypod
https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf
@guypod
Originally described by Karger and Schell in 1974, dubbed Multics vulnerability
@guypod
“Solution” by David Wheeler, 2005: two independent compilers producing bit-identical output
@guypod
@guypod
(Especially code from companies that employ people like me.)”
@guypod
@guypod
https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf
@guypod
@guypod
https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5
@guypod
https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5
@guypod
@guypod
@guypod
@guypod
https://kromtech.com/blog/security-center/cryptojacking-invades-cloud-how-modern-containerization-trend-is-exploited-by-attackers
@guypod
@guypod
and introduced a vulnerability!
https://www.slideshare.net/x00mario/an-abusive-relationship-with-angularjs/54
@guypod
https://research.checkpoint.com/jenkins-miner-one-biggest-mining-operations-ever-discovered/
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
Masked link to an attacker controlled compromised site
@guypod
Some users entered their passwords…
@guypod
More users are compromised…
@guypod
@guypod
https://www.telegraph.co.uk/technology/twitter/10064184/Financial-Times-hacked-by-Syrian-Electronic-Army.html
@guypod
by Andrew Betts, a compromised FT developer
https://labs.ft.com/2013/05/a-sobering-day/
@guypod
https://labs.ft.com/2013/05/a-sobering-day/
@guypod
https://www.heavybit.com/library/podcasts/the-secure-developer/ep-16-security-training-with-elevates-masha-sedova/
run by Masha Sedova (@modMasha)
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
Chalker, 2015 Dan Godin, 2013
@guypod
@guypod
@guypod
@guypod
@guypod
https://www.youtube.com/watch?v=fDryj_9I5eM
Rachel Ilan Simpson @rilan Guy Podjarny @guypod
@guypod
@guypod
@guypod
@guypod
Masha Sedova (@modMasha)
https://www.heavybit.com/library/podcasts/the-secure-developer/ep-16-security-training-with-elevates-masha-sedova/
@guypod
Masha Sedova (@modMasha)
https://www.heavybit.com/library/podcasts/the-secure-developer/ep-16-security-training-with-elevates-masha-sedova/
@guypod
Masha Sedova (@modMasha)
https://www.heavybit.com/library/podcasts/the-secure-developer/ep-16-security-training-with-elevates-masha-sedova/
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
https://cloud.google.com/beyondcorp/
@guypod
https://www.slideshare.net/fortyfivan/beyondcorp-sf-meetup-closing-the-adherence-gap
@guypod
@guypod
@guypod
https://blogs.technet.microsoft.com/datacentersecurity/2017/10/13/privileged-access-workstationpaw/
@guypod
(windows centric)
https://blogs.technet.microsoft.com/datacentersecurity/2017/10/13/privileged-access-workstationpaw/
@guypod
@guypod
https://www.infoq.com/presentations/bless-security-ops-ssh
@guypod
https://www.infoq.com/presentations/bless-security-ops-ssh
@guypod
https://blogs.technet.microsoft.com/datacentersecurity/2017/10/13/privileged-access-workstationpaw/
https://github.com/Netflix/bless
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
@guypod
Guy Podjarny (@guypod)