Privacy Please

S6, E248 - Inside the Walls: Military's Stark Warning on Network Compromise

Cameron Ivey

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 9:05

Send us Fan Mail

The US military has issued a stark warning to all forces to operate under the assumption that their networks have been compromised by Salt Typhoon, a sophisticated threat actor with ties to the Chinese government. This breach highlights the urgency for organizations to adopt Zero Trust principles as cyber warfare becomes the new battlefield.

• Zero Trust is a framework, not a single product or technology
• The first tenant of Zero Trust is treating networks as already compromised
• Salt Typhoon remained undetected in networks for almost a year
• The threat actor targeted telecommunications, energy, and transportation infrastructure
• Critical national infrastructure remains at high risk from similar focused attacks
• Traditional security approaches focusing solely on perimeter defense are inadequate
• Once compromised, networks may never be fully trusted again
• Verification must occur upon every access request, not just initially


Support the show

Welcome and Hacker Summer Camp

Speaker 1

Alrighty then , ladies and gentlemen , welcome back to another episode of Privacy , please . I'm Cameron Ivey , alongside Gabe Gumbs . How you doing , gabe , how we doing .

Speaker 2

I am good , I'm good , we are dead . In the middle of it . It's a couple of weeks before Black Hat and DEF CON , gearing up for that summer festival . Yeah , hacker Summer Camp , hacker Summer Camp when's that ? Again , that's coming up um august , august . So black , uh , defcon's august 7th starts at august 7th , but there's a bunch of things going on , right . So you've got b-sides which starts the weekend prior , right , black hat , which I think , kicks off on the 5th . I could be wrong about Black Hat , I don't remember , but DEF CON starts on the 7th .

Speaker 1

I was pretty excited and I haven't been . I don't think I've been to Black Hat one time , but I haven't been to any of those in a couple years now .

Speaker 2

Yeah , something about not going to the desert in the middle of summer . That's okay with me quite frequently , it's okay . It's okay . It's okay to miss one once in a while , Although it's a great time . It's an awesome time . I'm always good to catch up with friends and , you know , make some new ones in the security community . It's always some amazing talks on display . It's always a good time . No complaints , except for the weather . The weather be . The complaint . 120 night is . We're not built for that as humans , quite frankly .

Speaker 1

No , that sounds super uncomfortable .

Speaker 2

Yes .

Speaker 1

I was driving the other day I saw this guy on a scooter with like a black sweater hood , on jeans , walking in the middle of the day almost 100 degrees . I'm just like I don't how , why , what are you ? What's ?

Speaker 2

happening Across the street . Man Across the street Sounds like a Luigi's scenario , like I wouldn't be worried unless I'm the CEO of a large healthcare company , is it ? I don't know , we may have just lost a couple of subscribers on that one .

Speaker 1

No , no , we got this . So , gabe , I'm going to paint a picture for you and for , obviously , the audience , on what we're going to go into talking about today . So imagine you're in charge of defending a fortress . For years , you focused on strengthening the walls , locking the gates and watching the perimeter . Then , one day , a stunning order comes down from the top . Stop worrying about the walls . Assume the enemy is already inside with you . It's pretty powerful . Yeah , there was a stark you pulled me into this about a stark warning that the issue to all US forces to operate under the assumption that their networks have been compromised . Let's dig into this .

Speaker 2

So one of the more interesting things about that statement , of course , is and we've talked about it , I think , on this show more than a few times operating under the assumption of compromise . In fact , right before this , right before we hit the record button , we were talking about the last time I

Fortress Under Attack: Network Compromise Warning

Speaker 2

gave a public talk , and it literally just reminds me the title of that talk was the bust out the old deck , and maybe we'll link it to this episode , but it was around the very notion of how we adopt the NIS zero trust principles , because the NIS zero trust principles literally begin with the assumption of compromise , and so , in one breath , they're not saying anything that you shouldn't be doing or they shouldn't have already been doing from an operational standpoint , but what they're actually saying here is no , no , no , no , no . This is not a drill . This is not a drill . Assume that this network is freaking compromised that's a big deal .

Speaker 1

And what were your first thoughts , besides just saying , oh shit , like what , like this is a big deal .

Speaker 2

You can't shut the barn doors is the first thing that came to mind . Like I do not know if you can uncompromise a network . The thing with the assumption of compromise is you should assume that you also can't uncompromise the network . So in one breath it will certainly accelerate the adoption of zero trust within critical infrastructure . So that's a positive . But the thing that worries me there , of course , is well , the networks should just be considered actually compromised .

Speaker 1

Right , okay , so

Zero Trust Framework Explained

Speaker 1

real quickly . Most of our listeners should probably know this , but let's just play the fun role of Gabe . What is zero trust and why is it the recommended solution that it's going to fall into ?

Speaker 2

It's a framework . So , first and foremost , it is not something that is purely tangible . It is not any one singular product . So if anyone told you they have a zero trust that you can buy , be wary . We warned you , we warned you , we warned you . It is a framework under which one of the first , not one of , but the first tenant of zero trust is that network should be treated as though they already compromised . And when you do so , it means that you need to do things like validate access upon every request . So not just grant access and then allow access to always be given upon every request for an asset , revalidate access . That's just one of the many things that zero trust encompasses . It is a NIST framework , it is published by NIST I don't remember the number , unfortunately . I guess I'm not that big of a zero trust geek .

Speaker 1

Hey that's all right , that's all right , you don't know everything .

Speaker 2

I could probably quickly look it up but it is a framework , and so a lot of vendors selling different security solutions will kind of operate under this banner that their technology will assist you in doing so . That is a good thing . Quite frankly , it's difficult to achieve zero trust without some help in some of those environments . But again , the warning be there is no silver bullet for zero trust . And it is not just technology , it is also protocols and procedures . Right , there's quite a bit more to it .

Speaker 1

Can you humor me a little bit on this ? The sophistication and patience of Salt Typhoon . What exactly is that ?

Speaker 2

Salt Typhoon is a threat actor believed to be tied to the Chinese government . That is , the threat actor believed responsible behind this breach of the network .

Speaker 1

Well , they're a well-sourced cyber espionage group with links to the Chinese state . Yeah , their ability to remain in a network for almost a year without detection points to a high level of sophistication and patience .

Speaker 2

Hence the reason I don't know that one can ever trust that network ever again . A year is a long time to bury yourself in .

Speaker 1

Yeah , I mean . Obviously the biggest worry is their focus on stealing data that can be used for future , potentially more damaging

Salt Typhoon: Chinese Espionage Threat

Speaker 1

attacks on critical national infrastructure . Yeah , yeah , it's not good .

Speaker 2

No , it's not good . It's not good , it's not good at all Not good .

Speaker 1

So what's being done ? What do you know that's being done so far ? What do you think the this warning ?

Speaker 2

being issued . I don't know of anything being done . Well , like , who would handle this ? Do you think the this warning being issued ? I don't know of anything being that well , like , who , like , who would handle this , you think ? Like ? That's also a great question , you know . I'm honestly not certain I know the answer to that , but we've got some foods in the intelligence community . We should probably snag on the show to talk about that . Um , I don't know who picks up the ball from there . Really , I could I could throw out all kinds of wild guesses , but they , they might just be that are wild guesses . Yeah , I don't actually know . I know this much , though , that we should all certainly heed that warning and operate under the same tenets though , yeah , which I guess is just a long-winded way of saying hello , everybody , wake up Please . If you haven't already started adopting zero trust , do so . Do so now . Everyone should adopt ?

Speaker 1

Yeah , because to that point there's broader implications that go beyond national security and privacy . So beyond military networks , salt typhoon . Also targeted telecommunication yeah , just like at&t , verizon all compromised record like basically been accused of at&t and verizon was accused of recording private conversations of senior US political figures . There you go they . Targeted critical infrastructure like energy and transportation highlights the potential of widespread , so probably stuff like Uber , I would imagine .

Broader Implications and Next Steps

Speaker 2

Yeah .

Speaker 1

And Lyft and all those type of . There's so much information on that , so this is really big and it's it's saying that this is also a pattern , gabe , this is not just a one off of that .

Speaker 2

No , not at all , and it will continue to be .

Speaker 1

You know , cyber warfare is the new warfare . Yes , conventional warfare still exists , but it is the new war , yeah . So yeah , this is super interesting , but maybe we'll dig into this a little bit later . If anybody has any questions or knows more about this stuff , we'd love to have you on or just shoot us a message . But yeah , we'll see you guys next week . Gabe , thanks for the chat Right on , right on Next week . It is Sounds good . See you guys .