Artwork

Вміст надано Chatcyberside. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Chatcyberside або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !

When the FBI Becomes Your IT Department

13:00
 
Поширити
 

Manage episode 462297088 series 3625301
Вміст надано Chatcyberside. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Chatcyberside або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

In this episode of Cyberside Chats, we explore the FBI’s daring takedown of PlugX malware. By commandeering the malware’s command-and-control infrastructure, the FBI forced PlugX to uninstall itself from over 4,200 devices globally. This bold move echoes similar actions from 2021, such as the removal of malicious web shells from Exchange servers.

We unpack the legal, ethical, and operational implications of these law enforcement actions and provide actionable advice for IT and security leadership to prepare for similar events.

Key topics include:

  • How the FBI executed the PlugX takedown and what it means for organizations.
  • The risks and benefits of law enforcement hacking into private systems to mitigate threats.
  • Preparing for potential third-party access to your network by “authorized” actors like law enforcement or tech vendors.

Takeaways:

  • Be aware that “authorized” third parties, such as law enforcement or Microsoft, may access your computers if they’re part of a botnet.
  • Monitor threat intelligence feeds so you’re informed when events like these occur.
  • Proactively communicate with your ISP about their processes for responding to law enforcement notifications.
  • Ensure your contact information is current with your ISP and DNS registrars to avoid communication gaps.
  • Review and update your incident response (IR) and forensics plans to account for potential third-party access.
  • Include scenarios involving third-party access in your tabletop exercises to improve preparedness.

Resources:

“FBI Hacked Thousands of Computers to Make Malware Uninstall Itself”

https://www.theverge.com/2025/1/14/24343495/fbi-computer-hack-uninstall-plugx-malware

“The Microsoft Exchange Server Hack: A Timeline”

https://www.csoonline.com/article/570653/the-microsoft-exchange-server-hack-a-timeline.html

“Taking Down the Waledac Botnet (The Story of Operation b49)”

https://www.youtube.com/watch?v=jdFD0a7-GsU

Have thoughts or questions about this episode? Contact us to discuss this and more with other cybersecurity professionals.

#cybersecurity #PlugX #PlugXhack #hack #hacker

  continue reading

3 епізоди

Artwork
iconПоширити
 
Manage episode 462297088 series 3625301
Вміст надано Chatcyberside. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Chatcyberside або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

In this episode of Cyberside Chats, we explore the FBI’s daring takedown of PlugX malware. By commandeering the malware’s command-and-control infrastructure, the FBI forced PlugX to uninstall itself from over 4,200 devices globally. This bold move echoes similar actions from 2021, such as the removal of malicious web shells from Exchange servers.

We unpack the legal, ethical, and operational implications of these law enforcement actions and provide actionable advice for IT and security leadership to prepare for similar events.

Key topics include:

  • How the FBI executed the PlugX takedown and what it means for organizations.
  • The risks and benefits of law enforcement hacking into private systems to mitigate threats.
  • Preparing for potential third-party access to your network by “authorized” actors like law enforcement or tech vendors.

Takeaways:

  • Be aware that “authorized” third parties, such as law enforcement or Microsoft, may access your computers if they’re part of a botnet.
  • Monitor threat intelligence feeds so you’re informed when events like these occur.
  • Proactively communicate with your ISP about their processes for responding to law enforcement notifications.
  • Ensure your contact information is current with your ISP and DNS registrars to avoid communication gaps.
  • Review and update your incident response (IR) and forensics plans to account for potential third-party access.
  • Include scenarios involving third-party access in your tabletop exercises to improve preparedness.

Resources:

“FBI Hacked Thousands of Computers to Make Malware Uninstall Itself”

https://www.theverge.com/2025/1/14/24343495/fbi-computer-hack-uninstall-plugx-malware

“The Microsoft Exchange Server Hack: A Timeline”

https://www.csoonline.com/article/570653/the-microsoft-exchange-server-hack-a-timeline.html

“Taking Down the Waledac Botnet (The Story of Operation b49)”

https://www.youtube.com/watch?v=jdFD0a7-GsU

Have thoughts or questions about this episode? Contact us to discuss this and more with other cybersecurity professionals.

#cybersecurity #PlugX #PlugXhack #hack #hacker

  continue reading

3 епізоди

Todos los episodios

×
 
Loading …

Ласкаво просимо до Player FM!

Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.

 

Короткий довідник

Слухайте це шоу, досліджуючи
Відтворити