Logo
    Search

    Episode 5: Backdoors, Apple, and the FBI

    enMarch 10, 2016

    Podcast Summary

    • Hackers create backdoors in digital security systemsHackers bypass security measures by installing backdoors, highlighting the importance of securing the entire system and being vigilant for intrusion signs

      Just as thieves in the physical world can create a backdoor when the front door proves too tough to crack, hackers in the digital world do the same thing. The Hatton Gardens Safety Deposit Company heist in London serves as a real-life example of this concept. In the digital realm, instead of drilling through concrete, hackers install backdoors in firewalls or other security systems to gain unauthorized access. This underscores the importance of securing the entire system, not just the front door. Hackers no longer target individual users; instead, they focus on exploiting vulnerabilities in the security measures designed to keep them out. To protect against such threats, it's crucial to strengthen the entire system and be vigilant for signs of intrusion.

    • Tricking Users into Installing BackdoorsHackers now use Trojan horse attacks to install backdoors by tricking users into downloading and installing malicious software, increasing the risk of unauthorized access to systems.

      Backdoors have been a common tactic in the world of cybercrime for gaining unauthorized access to systems. Initially, hackers would gain access and leave a backdoor for themselves to ensure future access. However, as gaining access became more difficult, hackers began using the ignorance of end-users to install backdoors without their knowledge. This method, known as a Trojan horse attack, involves tricking users into downloading and installing malicious software that includes a backdoor. These backdoors can be active, pinging out to the internet for further instructions, or they can remain dormant, waiting for the hacker to activate them. The prevalence of piracy and the uncertainty of downloaded software make users more susceptible to these attacks. Ultimately, the use of backdoors represents a significant shift in hacking tactics, from gaining access and leaving a backdoor, to tricking users into installing the backdoor alongside the desired software.

    • Unauthorized computer access through various methodsBackdoors can be installed through trojans, phishing, email spoofing, USB keys, CDs, software vulnerabilities, and even trusted sources like VPN services, firewalls, and software development kits.

      Gaining unauthorized access to a computer system, also known as a backdoor, can be achieved through various methods beyond piracy and tech savvy individuals. These methods include installing trojans, phishing, email spoofing, and even using USB keys or CDs. Once a backdoor is installed, an agent takes control of the computer, allowing the attacker to issue commands remotely. This can lead to large-scale attacks on websites or networks, using botnets and distributed denial of service attacks. Software vulnerabilities and even trusted sources like VPN services, firewalls, and software development kits can unintentionally introduce backdoors. Not all creators of software intentionally expose users to vulnerabilities, and sometimes, these backdoors can go unnoticed.

    • Hackers now target software manufacturers to infiltrate their codeHackers bypass IT security by infiltrating software manufacturers, compromising their code and putting thousands of users at risk.

      Cybersecurity threats have evolved from individual hacking attempts to targeting software manufacturers and infiltrating their code with backdoors, putting thousands of users at risk. Instead of bundling malware into software, hackers are now infiltrating the manufacturers themselves, compromising firewalls, VPNs, and other security solutions. This approach is particularly effective in the digital world, allowing hackers to bypass even the most robust IT security systems. The implications of this shift are significant, as manufacturers must now grapple with securing their own products to protect their customers. It's a fascinating and dangerous new frontier in cybercrime, where the top of the pyramid is no longer the hardest target to crack, but rather the manufacturers of the very solutions intended to keep us safe.

    • Software backdoors: Intentional or unintentional security risksSoftware backdoors, intentionally or unintentionally added, pose significant security risks and can be exploited by hackers for unauthorized access. Strong password protection is crucial to mitigate these risks.

      Software backdoors, whether intentionally added for testing or maliciously for unauthorized access, pose a significant security risk. It's not uncommon for software to contain master passwords or keys that open multiple vaults. Hackers have discovered such backdoors in various pieces of software. If you're security-conscious and enjoy a challenge, consider joining Bugcrowd's bug bounty program to hunt down bugs and vulnerabilities in exchange for rewards. Companies like Tesla, Pinterest, and Dropbox partner with Bugcrowd for top-notch security. For those developing software, it's tempting to add master passwords for convenience, but this can create serious security vulnerabilities. The FBI's recent request to Apple for assistance in accessing the San Bernardino shooter's iPhone isn't necessarily about creating a backdoor in encryption. Instead, they're asking for the removal of safeguards preventing brute force attacks on the phone's password. This highlights the importance of strong password protection and the potential risks of backdoors, intentional or otherwise.

    • FBI vs Apple: A Battle Over iPhone Security and PrivacyThe FBI is asking Apple to help bypass iPhone security to access data, sparking a debate over privacy, security, and technology company's role in law enforcement.

      The FBI is requesting Apple to help bypass some security measures on an iPhone belonging to one of the San Bernardino shooters, allowing them to use a brute force attack to guess the password. Apple has already provided the FBI with the iCloud backups of the data, but they want the most recent copy that is on the phone itself. Apple's refusal to help has led to a public debate about privacy, security, and the role of technology companies in assisting law enforcement. The FBI is not asking for a master key or a backdoor to the system, but rather a way to bypass the delay after multiple failed password attempts. If Apple were to develop a solution to allow digital brute force attacks, it could technically function as a backdoor if someone else were to use it. However, Apple argues that they already have some level of remote administration access to the device, and creating such a solution would weaken the security of all iPhones. The Center for Internet Security offers resources to help organizations meet their security and compliance requirements, as cyber threats and regulations continue to evolve. Ultimately, this case highlights the ongoing tension between privacy, security, and law enforcement in the digital age.

    • The FBI vs Apple: Balancing Encryption and AccessThe ongoing debate between the FBI and Apple highlights the complexity of encryption and the potential risks involved. While individuals can take steps to secure their systems, the challenge lies in protecting against threats from trusted sources.

      The ongoing legal battle between the FBI and Apple raises concerns about the creation of vulnerabilities, which could potentially be compared to backdoors in encryption. However, in this specific case, Apple is not being asked to create a backdoor but to help the FBI access data that is already stored on the iPhone. This discussion highlights the complexity of encryption and the potential risks involved. While individuals can take steps to prevent easy access to their systems, such as avoiding unknown software and emails, it becomes more challenging to secure systems when threats come from trusted sources. Ultimately, the cybersecurity landscape is constantly evolving, and the tools used to protect systems must also adapt to keep up with the ever-evolving threats. The ongoing debate underscores the importance of ongoing vigilance and the need for continued innovation in cybersecurity.

    • Cybersecurity Threats and Their ConsequencesCybersecurity threats can cause substantial economic and societal disruption, impacting financial markets and critical infrastructure. The stakes are high, and the ability to cause damage is easier and faster than ever before. Cybersecurity is not just about individual devices or social media profiles but also about critical infrastructure.

      As our world becomes increasingly digital, cybersecurity threats have become a significant concern with the potential to cause substantial economic and societal disruption. A successful hack can have far-reaching consequences, from disrupting financial markets to impacting critical infrastructure such as power grids and water sources. The stakes are high, and the ability to cause damage is easier and faster than ever before. The recent debate surrounding Apple and the FBI is just one example of the complex issues surrounding cybersecurity and privacy. The discussion around backdoors and security measures is crucial, as the line between physical and digital threats becomes increasingly blurred. It's essential to recognize that cybersecurity is not just about individual devices or social media profiles but also about the critical infrastructure that keeps our modern world functioning. The potential damage from a cyber attack is not ephemeral, and the consequences can be far-reaching and difficult to measure.

    • Engage with the hosts of Hacked podcastListeners are encouraged to interact with the hosts through email, Twitter, Facebook, and other platforms to share thoughts and feedback on the podcast or simply to acknowledge achievements.

      The hosts of the Hacked podcast, Jordan Bluman and Scott Winder, value and encourage their audience's engagement and feedback. They invite listeners to reach out to them through various platforms such as email, Twitter, and Facebook, to share their thoughts on the latest episode or the Apple case discussed, or simply to give a high five to Luca Harrison, who was the 2000th like on their Facebook page. The hosts express their appreciation for their audience's support and interaction, emphasizing that the conversation doesn't have to end with the podcast episode. So, don't hesitate, get in touch with them!

    Recent Episodes from Hacked

    Google Search Leaks

    Google Search Leaks
    Few things impact the shape of the internet more than Google Search, yet its inner workings are mostly a mystery. In May, Rand Fishkin received alleged leaked documents that peal back the curtain as to how it works. We speak with Rand Fishkin about his involvement in the Google API leaks. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJuly 02, 2024

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Big Pet Peeves - SCW #17

    Big Pet Peeves - SCW #17

    This week, Jeff and the crew discuss What is Risk-Based Security? How does compliance and/or security programs/points-of-view help or hinder risk-based security efforts? How can we change this? In the Security & Compliance News, Back to the basics What is the cost of non-PCI Compliance?, Endpoint Security the Foundation to Cybersecurity, Facebook settles data breach class-action lawsuit, CCPA cited in Hanna Andersson/Salesforce breach lawsuit, and Hanna Andersson Notice of Data Breach to Consumers!

     

    Show Notes: https://wiki.securityweekly.com/SCWEpisode17

    Visit https://www.securityweekly.com/scw for all the latest episodes!

     

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    How To Protect Yourself From A Personal Cyber Attack

    How To Protect Yourself From A Personal Cyber Attack

    How To Protect Yourself From A Personal Cyber Attack
    For a limited time, use code NEIL10 for $10 off any purchase of a YubiKey 5 Series key at https://yubi.co/NMW-YT. Promotion ends July 31st, 2021 #YubiSafe #YubiKey #2FA #ad

    DISCLAIMER
    This video is for entertainment purposes ONLY & designed to help your thinking, not direct it. These videos shall NOT be construed as tax, legal or financial advice and may be outdated or inaccurate; all decisions made as a result of viewing are yours alone.

    Sponsorships: Neil McCoy-Ward may earn an affiliate commission or referral bonus from any product or service listed or discussed.

    Support the show

    Is A Global Cyber Attack Coming?

    Is A Global Cyber Attack Coming?

    Is A Global Cyber Attack Coming?

    http://privateinternetaccess.com/neil - Secure Your Internet Connection! Get your VPN with 83% OFF! + 2 Months FREE!

    There have been a number of high profile cyber attacks this year, the World Economic Forum claims this is the most likely threat to take down our infrastructure and systems over the next year.

    Cyber Polygon takes place in July of 2021 and gives us more of an in depth view of the threats to expect next.

    DISCLAIMER
    This video is for entertainment purposes ONLY & designed to help your thinking, not direct it. These videos shall NOT be construed as tax, legal or financial advice and may be outdated or inaccurate; all decisions made as a result of viewing are yours alone.

    Sponsorships: Neil McCoy-Ward may earn an affiliate commission or referral bonus from any product or service listed or discussed.

    Support the show

    Big Pet Peeves - SCW #17

    Big Pet Peeves - SCW #17

    This week, Jeff and the crew discuss What is Risk-Based Security? How does compliance and/or security programs/points-of-view help or hinder risk-based security efforts? How can we change this? In the Security & Compliance News, Back to the basics What is the cost of non-PCI Compliance?, Endpoint Security the Foundation to Cybersecurity, Facebook settles data breach class-action lawsuit, CCPA cited in Hanna Andersson/Salesforce breach lawsuit, and Hanna Andersson Notice of Data Breach to Consumers!

     

    Show Notes: https://wiki.securityweekly.com/SCWEpisode17

    Visit https://www.securityweekly.com/scw for all the latest episodes!

     

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    Necessity is the Mother of Security - Tatu Ylonen - CSP #13

    Necessity is the Mother of Security - Tatu Ylonen - CSP #13

    Tatu Ylönen, SSH founder and inventor of Secure Shell, discusses the genesis for the protocol and his keen interest in the application of technological solutions to fundamental cybersecurity challenges...

     

    Show Notes: https://securityweekly.com/csp13

    This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!

     

    Visit https://securityweekly.com/csp for all the latest episodes!

    Follow us on Twitter: https://www.twitter.com/cyberleaders

    Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/