00:00:00 - 00:00:02
(upbeat music)
00:00:02 - 00:00:03
- Welcome back to The Deep Dive,
00:00:03 - 00:00:06
it's Tuesday, February 3rd, 2026.
00:00:06 - 00:00:09
And today, we're looking at a picture
00:00:09 - 00:00:11
of the cyber landscape that is,
00:00:11 - 00:00:14
honestly a little bit schizophrenic.
00:00:14 - 00:00:15
- That is certainly one way to put it.
00:00:15 - 00:00:17
It feels like we're looking at two different movies
00:00:17 - 00:00:18
playing on the same screen.
00:00:18 - 00:00:20
- No, really, think about it.
00:00:20 - 00:00:22
On one hand, you have this image of cyber crime
00:00:22 - 00:00:24
that's straight out of a Hollywood-high movie.
00:00:24 - 00:00:27
I mean, ATMs literally spitting cash out
00:00:27 - 00:00:28
onto the street corner.
00:00:28 - 00:00:30
It's loud, it's messy, it's physical.
00:00:30 - 00:00:32
- Exactly, you can reach out and touch the crime,
00:00:32 - 00:00:33
and then on the other hand.
00:00:33 - 00:00:34
- Well, on the other hand,
00:00:34 - 00:00:38
you have threats that are so silent, so invisible.
00:00:38 - 00:00:42
- They're hiding inside the pixel data of a company logo.
00:00:42 - 00:00:44
On a website, you visit every single day.
00:00:44 - 00:00:46
You don't see it, you don't hear it, but it's there.
00:00:46 - 00:00:49
- It creates a fascinating contrast.
00:00:49 - 00:00:52
Today, we're unpacking the buyer nickel's threat brief
00:00:52 - 00:00:55
for the second half of January, 2026.
00:00:55 - 00:00:57
And you're right, the theme here isn't just,
00:00:57 - 00:00:59
you know, scary computer stuff.
00:00:59 - 00:01:04
It's really about the evolution and the industrialization
00:01:04 - 00:01:06
of how these threat actors operate.
00:01:06 - 00:01:09
- Exactly, I've been going through this stack of data,
00:01:09 - 00:01:13
and we're seeing everything from a major shakeup
00:01:13 - 00:01:16
on the ransomware leaderboard, and yes,
00:01:16 - 00:01:16
there is a leaderboard.
00:01:16 - 00:01:17
- There's always a leaderboard.
00:01:17 - 00:01:19
- To the rise of AI-driven malware
00:01:19 - 00:01:25
that mimics human behavior, and some very heavy,
00:01:25 - 00:01:26
stick-sponsored sabotage.
00:01:26 - 00:01:29
And we really need to talk about who they're targeting.
00:01:29 - 00:01:31
Because if you think this is only a problem for,
00:01:31 - 00:01:34
like the Fortune 500 or the Big Banks,
00:01:34 - 00:01:37
the data from January is gonna be very rude awakening.
00:01:37 - 00:01:38
- A very rude awakening indeed.
00:01:38 - 00:01:40
So let's start at the top of the food chain,
00:01:40 - 00:01:42
the ransomware leaderboard.
00:01:42 - 00:01:44
Who's winning the race to be the worst?
00:01:44 - 00:01:46
- It's always a crowded field, but for late January,
00:01:46 - 00:01:50
there's a clear king of the hill, a group called Gule VOP.
00:01:50 - 00:01:52
- Gule VOP. - Yep.
00:01:52 - 00:01:54
They took the top spot with almost 20%
00:01:54 - 00:01:58
of all recorded attacks, 19.38% to be exact.
00:01:58 - 00:02:01
That is a huge chunk of the market for just a single group.
00:02:01 - 00:02:02
- That is massive.
00:02:02 - 00:02:04
But looking at the report, this wasn't just them,
00:02:04 - 00:02:05
grinding harder than everyone else.
00:02:05 - 00:02:07
This was a strategic play, right?
00:02:07 - 00:02:09
They executed a supply chain exploit.
00:02:09 - 00:02:10
- Precisely.
00:02:10 - 00:02:13
They targeted a platform called Clio.
00:02:13 - 00:02:16
And this is a perfect example of working smarter,
00:02:16 - 00:02:18
not harder in the criminal world.
00:02:18 - 00:02:21
- Okay, let's unpack supply chain exploit for a second,
00:02:21 - 00:02:22
because I think people hear that
00:02:22 - 00:02:24
and their eyes just glaze over.
00:02:24 - 00:02:26
But it's actually a pretty simple concept.
00:02:26 - 00:02:26
- It is.
00:02:26 - 00:02:27
Think of it this way.
00:02:27 - 00:02:31
If a burglar wants to rob 50 houses in a neighborhood,
00:02:31 - 00:02:32
they have two choices.
00:02:32 - 00:02:35
They can run around kicking down 50 different doors,
00:02:35 - 00:02:36
dealing with 50 different alarms.
00:02:36 - 00:02:40
- And 50 different dogs, which takes a lot of time
00:02:40 - 00:02:40
and energy. - Exactly.
00:02:40 - 00:02:43
Or they can break into the property manager's office
00:02:43 - 00:02:45
at the front of the gated community
00:02:45 - 00:02:47
and steal the master key.
00:02:47 - 00:02:49
- And Clio was the property manager.
00:02:49 - 00:02:51
- In this analogy, yes.
00:02:51 - 00:02:53
Clio provides file transfer software
00:02:53 - 00:02:55
for thousands of companies.
00:02:55 - 00:02:59
By hitting Clio, Clio P effectively stole the master key.
00:02:59 - 00:03:02
- So they didn't have to hack each victim individually?
00:03:02 - 00:03:03
- And at all.
00:03:03 - 00:03:05
They compromised the tool that all the victims were using.
00:03:05 - 00:03:07
That's why we see that huge spike in their numbers.
00:03:07 - 00:03:09
It's pure efficiency.
00:03:09 - 00:03:11
- Terrifying efficiency.
00:03:11 - 00:03:14
But they weren't the only ones making noise.
00:03:14 - 00:03:16
We saw a group called Quillin coming in second
00:03:16 - 00:03:20
with about 12% and another group called the gentlemen.
00:03:20 - 00:03:21
- Oh, I love that name.
00:03:21 - 00:03:23
- It's a fantastic branding choice for a criminal enterprise,
00:03:23 - 00:03:24
right?
00:03:24 - 00:03:25
They came in third.
00:03:25 - 00:03:26
- The gentlemen are interesting
00:03:26 - 00:03:30
because their methodology sort of matches their name.
00:03:30 - 00:03:33
They rely heavily on tailored fishing.
00:03:33 - 00:03:35
Very polite, very convincing emails,
00:03:35 - 00:03:37
trying to get you to open the door yourself.
00:03:37 - 00:03:38
- And Quillin.
00:03:38 - 00:03:40
- Quillin is more brute force.
00:03:40 - 00:03:42
They're heavily targeting the manufacturing sector.
00:03:42 - 00:03:43
- Okay, so speaking of targets,
00:03:43 - 00:03:46
this is where I need to drop the stat of the week.
00:03:46 - 00:03:48
Because I was reading through the victim demographics
00:03:48 - 00:03:51
in this report and my jaw just hit the floor.
00:03:51 - 00:03:53
- I think I know which one you're looking at.
00:03:53 - 00:03:54
The size breakdown.
00:03:54 - 00:03:54
- Exactly.
00:03:54 - 00:03:56
We always hear about the big hacks, right?
00:03:56 - 00:03:59
The massive tech companies, the pipelines, the hospitals.
00:03:59 - 00:04:01
But when you look at the actual breakdown
00:04:01 - 00:04:03
of victims by size for late January.
00:04:03 - 00:04:04
- Oh, that's the other number.
00:04:04 - 00:04:09
- 84%, 84.00% of the victims were small businesses.
00:04:09 - 00:04:11
Companies with 500 employees or less.
00:04:11 - 00:04:15
- And that is the aha moment for this entire deep dive.
00:04:15 - 00:04:17
- But help me understand the logic here.
00:04:17 - 00:04:19
Why are they hammering the little guys?
00:04:19 - 00:04:22
Surely a small printing shop has less money
00:04:22 - 00:04:25
to pay a ransom than say a multinational bank.
00:04:25 - 00:04:27
- They do have less money,
00:04:27 - 00:04:32
but they are also much, much easier to rob.
00:04:32 - 00:04:33
- So it's a volume game.
00:04:33 - 00:04:35
- It's entirely a volume game.
00:04:35 - 00:04:38
Large enterprises have security operation centers.
00:04:38 - 00:04:41
They have teams of people watching screens 24/7.
00:04:41 - 00:04:43
They have multi-million dollar budgets.
00:04:43 - 00:04:45
A small business with 50 employees.
00:04:45 - 00:04:47
They might have one IT person.
00:04:47 - 00:04:49
- Right, who also fixes the coffee machine
00:04:49 - 00:04:50
in order of the toner.
00:04:50 - 00:04:52
- So the attackers aren't big game hunting anymore.
00:04:52 - 00:04:54
- They're trawling, casting a wide net
00:04:54 - 00:04:56
and seeing what they catch.
00:04:56 - 00:04:59
The report notes a trend toward faster, more surgical campaigns.
00:04:59 - 00:05:01
- Meaning they want to get in and get out quickly.
00:05:01 - 00:05:02
- Exactly.
00:05:02 - 00:05:03
They get in, encrypt your data,
00:05:03 - 00:05:07
demand a ransom that is painful, but payable.
00:05:07 - 00:05:09
Maybe $50,000 instead of five million.
00:05:09 - 00:05:10
And then they get out.
00:05:10 - 00:05:12
- And for a small business, that 50 grand
00:05:12 - 00:05:14
might be the difference between making payroll
00:05:14 - 00:05:16
or closing their doors forever.
00:05:16 - 00:05:18
- The criminals know this.
00:05:18 - 00:05:21
They know the small business owner has to pay to survive.
00:05:21 - 00:05:24
- That is incredibly cynical, but the math makes sense.
00:05:24 - 00:05:26
And geographically, it looks like the US
00:05:26 - 00:05:28
is taking most of the heat on this.
00:05:28 - 00:05:32
- Yes, the US accounted for nearly 44% of the victims
00:05:32 - 00:05:34
than the UK and Canada.
00:05:34 - 00:05:37
So if you are running a small business in North America,
00:05:37 - 00:05:39
you effectively have a target on your back.
00:05:39 - 00:05:42
- Okay, so we know who they're hitting and why.
00:05:42 - 00:05:44
Now let's talk about how they're getting in.
00:05:44 - 00:05:48
The report calls it a nasty mix of edge and core.
00:05:48 - 00:05:49
- Right, and this is the part
00:05:49 - 00:05:51
where business owners really need to listen up.
00:05:51 - 00:05:54
- We have a list of specific culprits here.
00:05:54 - 00:05:58
VMware V Center, Smart or Mail, Zimbra, Yvonne T, Fortinet.
00:05:58 - 00:06:00
To the average listener, that just sounds like
00:06:00 - 00:06:01
a bunch of tech soup.
00:06:01 - 00:06:03
What's the common thread?
00:06:03 - 00:06:05
- The common thread is internet facing management.
00:06:05 - 00:06:07
- Okay, translate that.
00:06:07 - 00:06:09
- Imagine your house has a front door, right?
00:06:09 - 00:06:12
That's where guests come in, that's your public website.
00:06:12 - 00:06:15
But you also have utility box with all the circuit breakers
00:06:15 - 00:06:16
and the alarm codes.
00:06:16 - 00:06:18
- Sure, usually that's locked away in the basement
00:06:18 - 00:06:19
or a secure closet.
00:06:19 - 00:06:23
- Exactly, but what we're seeing here is companies
00:06:23 - 00:06:26
taking that utility box, their management dashboards,
00:06:26 - 00:06:29
and installing it on the outside wall of the house,
00:06:29 - 00:06:30
facing the street.
00:06:30 - 00:06:32
- That sounds like a terrible design choice.
00:06:32 - 00:06:35
- It is, but in the digital world,
00:06:35 - 00:06:37
it's convenient for remote management.
00:06:37 - 00:06:40
But if you leave these dashboards exposed
00:06:40 - 00:06:42
to the open internet without proper protection,
00:06:42 - 00:06:44
anyone walking by on the digital street
00:06:44 - 00:06:46
can just rattle the handle.
00:06:46 - 00:06:47
- And if the handle turns?
00:06:47 - 00:06:49
- If you haven't applied the latest security patch,
00:06:49 - 00:06:52
or if you don't have multi-factor authentication,
00:06:52 - 00:06:54
MFA turned on, it's like leaving the key
00:06:54 - 00:06:55
right there in the lock.
00:06:55 - 00:06:57
- And that's their initial access.
00:06:57 - 00:06:58
- That's how they get in the door.
00:06:58 - 00:06:59
- And once they're in, they can start
00:06:59 - 00:07:02
with the report calls, lateral movement,
00:07:02 - 00:07:05
which if I understand it means once they're in the lobby,
00:07:05 - 00:07:07
they can start trying doors to the other rooms.
00:07:07 - 00:07:08
- Precisely.
00:07:08 - 00:07:11
They move from the mail server to the finance database,
00:07:11 - 00:07:14
to the HR records, they establish a beach head,
00:07:14 - 00:07:15
and then spread out.
00:07:15 - 00:07:16
- So what's the takeaway here?
00:07:16 - 00:07:19
If I'm a business owner, do I just unplug the internet?
00:07:19 - 00:07:21
- You don't have to go that far.
00:07:21 - 00:07:24
But you need to lock the doors that face the street.
00:07:24 - 00:07:27
The report explicitly advises fast tracking patches
00:07:27 - 00:07:29
for these specific technologies,
00:07:29 - 00:07:32
and more importantly, segment these services.
00:07:32 - 00:07:34
- Won't just leave them out in the open.
00:07:34 - 00:07:36
- Right, put them behind a VPN.
00:07:36 - 00:07:37
- Yeah.
00:07:37 - 00:07:39
- For IT, admin, log into the secure network,
00:07:39 - 00:07:42
before they can even see the login screen
00:07:42 - 00:07:42
for the mail server.
00:07:42 - 00:07:45
- Simple advice, but crucial.
00:07:45 - 00:07:47
Now, I wanna pivot to the spy movie section
00:07:47 - 00:07:49
of the report, the malware spotlight,
00:07:49 - 00:07:53
because the creativity here is just, it's off the charts.
00:07:53 - 00:07:55
- It really is a showcase of different techniques.
00:07:55 - 00:07:57
- Let's start with something called GhostPoster.
00:07:57 - 00:08:01
This thing infected 840,000 users,
00:08:01 - 00:08:04
and it did it using, wait for it, stegonography.
00:08:04 - 00:08:05
- Stegonography.
00:08:05 - 00:08:07
- It's a fancy word for a concept that's,
00:08:07 - 00:08:08
I mean, it's ancient.
00:08:08 - 00:08:10
Effectively means covered writing.
00:08:10 - 00:08:12
- But in 2026, we're not talking about
00:08:12 - 00:08:13
invisible ink on parchment.
00:08:13 - 00:08:15
We're talking about hiding code inside pictures.
00:08:15 - 00:08:17
- Exactly, so you visit a website,
00:08:17 - 00:08:19
you see logo in the corner.
00:08:19 - 00:08:21
To your eye, it's just a PNG or JPEG file,
00:08:21 - 00:08:22
it looks totally normal.
00:08:22 - 00:08:25
But buried inside the binary data of that image,
00:08:25 - 00:08:28
literally in the bits that define the color of the pixels,
00:08:28 - 00:08:30
is malicious JavaScript.
00:08:30 - 00:08:33
- That is wildly sneaky, so the browser downloads
00:08:33 - 00:08:35
the image to display it, and in doing so,
00:08:35 - 00:08:38
it inadvertently brings the malware on board.
00:08:38 - 00:08:40
- Exactly, the malware just unpacks itself
00:08:40 - 00:08:40
from the image data.
00:08:40 - 00:08:42
- And what does GhostPoster actually do
00:08:42 - 00:08:43
once it's active?
00:08:43 - 00:08:44
- It's a parasite.
00:08:44 - 00:08:48
Infects your browser Chrome, Firefox, Edge,
00:08:48 - 00:08:51
and it starts hijacking your activity for ad fraud.
00:08:51 - 00:08:54
- So if I click a link to buy something.
00:08:54 - 00:08:55
- It swaps in its own affiliate code,
00:08:55 - 00:08:58
so the attackers get the commission.
00:08:58 - 00:09:00
Or it injects invisible ads,
00:09:00 - 00:09:01
iframes that you can't see,
00:09:01 - 00:09:03
but your computer's loading them
00:09:03 - 00:09:04
and clicking them in the background.
00:09:04 - 00:09:06
- It's turning your browser into a silent,
00:09:06 - 00:09:08
money printing machine for someone else.
00:09:08 - 00:09:11
- That's it, and because it hides inside a browser extension
00:09:11 - 00:09:13
and uses these innocent looking images
00:09:13 - 00:09:14
to deliver its payload,
00:09:14 - 00:09:16
it flies right under the radar
00:09:16 - 00:09:18
of a lot of antivirus software.
00:09:18 - 00:09:19
- Speaking of hidden processes,
00:09:19 - 00:09:22
let's talk about Android.Click.415.
00:09:22 - 00:09:25
This one was found in modified games and pirated apps,
00:09:25 - 00:09:28
especially on Xiaomi's GAT app store.
00:09:28 - 00:09:29
- And this is where artificial intelligence
00:09:29 - 00:09:30
enters the chat.
00:09:30 - 00:09:33
- Of course, it's 2026, AI's everywhere,
00:09:33 - 00:09:35
but we've seen click bots before.
00:09:35 - 00:09:37
What makes this one so special?
00:09:37 - 00:09:38
- The mimicry.
00:09:38 - 00:09:40
Old school click bots were dumb.
00:09:40 - 00:09:42
They just click and add every 0.5 seconds
00:09:42 - 00:09:43
like a metronome.
00:09:43 - 00:09:46
It was very easy pattern for fraud detection systems to spot.
00:09:46 - 00:09:49
- So how does the AI change the game?
00:09:49 - 00:09:52
- This malware uses AI-driven automation
00:09:52 - 00:09:54
to mimic real human behavior.
00:09:54 - 00:09:57
It varies the timing, it will scroll a bit, pause,
00:09:57 - 00:09:58
maybe highlight some text,
00:09:58 - 00:09:59
and then it clicks the ad.
00:09:59 - 00:10:02
- It's pretending to be a bored human surfing the web.
00:10:02 - 00:10:05
- And it does all of this completely in the background
00:10:05 - 00:10:06
while your phone is in your pocket.
00:10:06 - 00:10:09
- And these are just things, man, my battery's terrible today.
00:10:09 - 00:10:11
- Right, doesn't steal your credit card number,
00:10:11 - 00:10:12
it steals your device's performance,
00:10:12 - 00:10:15
it drains your battery, slows down your phone,
00:10:15 - 00:10:17
all to generate fraudulent ad revenue.
00:10:17 - 00:10:19
- Okay, so we've covered the invisible stuff.
00:10:19 - 00:10:21
Now let's go back to the loud and dramatic.
00:10:21 - 00:10:23
We have to talk about plautists.
00:10:23 - 00:10:27
- Plautists, named after the Greek God of Wealth.
00:10:27 - 00:10:28
- Very appropriate.
00:10:28 - 00:10:31
- Because this malware is for jackpotting ATMs.
00:10:31 - 00:10:33
- This is the physical crime we mentioned right at the top.
00:10:33 - 00:10:35
Plautists is a piece of code that,
00:10:35 - 00:10:37
when you inject it into an ATM,
00:10:37 - 00:10:40
it just overrides the dispensing logic.
00:10:40 - 00:10:42
- And forces the machine to empty all its cash.
00:10:42 - 00:10:44
- Literally spewing money onto the floor.
00:10:44 - 00:10:45
- Yes.
00:10:45 - 00:10:47
- And the report links this specifically
00:10:47 - 00:10:49
to the trend at Oragua gang.
00:10:49 - 00:10:52
- That's a transnational criminal organization, right?
00:10:52 - 00:10:54
- Correct, and we've actually seen news
00:10:54 - 00:10:57
about the US deporting Venezuelan nationals
00:10:57 - 00:10:59
involved in these schemes.
00:10:59 - 00:11:02
It's this fascinating blend of old school bank robbery
00:11:02 - 00:11:03
and modern coding.
00:11:03 - 00:11:06
- They don't need dynamite anymore, just a USB stick.
00:11:06 - 00:11:08
- Just a USB stick with plautists on it.
00:11:08 - 00:11:10
- It's wild, but.
00:11:10 - 00:11:12
And there's always a but.
00:11:12 - 00:11:13
There's a darker side to this report.
00:11:13 - 00:11:16
We move from criminals who want money
00:11:16 - 00:11:19
to actors who just wanna cause destruction.
00:11:19 - 00:11:21
- This is the most concerning part of the brief for me,
00:11:21 - 00:11:23
the rise of destructive intent.
00:11:23 - 00:11:24
- We're talking about sandworm.
00:11:24 - 00:11:27
- Sandworm, a Russia-linked threat group.
00:11:27 - 00:11:28
And the report identifies them
00:11:28 - 00:11:31
as the most worrying adversary right now.
00:11:31 - 00:11:31
- Why?
00:11:31 - 00:11:33
What makes them different from Colby OP?
00:11:33 - 00:11:35
- Well, Colopy wants your money.
00:11:35 - 00:11:38
If you pay them, they give you your data back.
00:11:38 - 00:11:40
It's a transaction, it's a business model.
00:11:40 - 00:11:41
Sandworm.
00:11:41 - 00:11:43
They don't want your money, they just want
00:11:43 - 00:11:44
to break your infrastructure.
00:11:44 - 00:11:46
- And the report details their weapon,
00:11:46 - 00:11:48
something called dino-wiper.
00:11:48 - 00:11:48
- Yes.
00:11:48 - 00:11:50
This was used in a failed attack
00:11:50 - 00:11:53
on Poland's energy sector back in December.
00:11:53 - 00:11:55
The keyword there is wiper.
00:11:55 - 00:11:58
It doesn't encrypt your files for ransom.
00:11:58 - 00:11:59
It overwrites them.
00:11:59 - 00:12:00
- So there's no undo button.
00:12:00 - 00:12:02
- There is no recovery path.
00:12:02 - 00:12:04
The goal is to turn the computer into a brick.
00:12:04 - 00:12:07
And when you target an energy sector with a wiper,
00:12:07 - 00:12:09
you aren't trying to steal data.
00:12:09 - 00:12:10
You're trying to turn off the lights.
00:12:10 - 00:12:11
- It's pure sabotage.
00:12:11 - 00:12:12
- Poo-in-sample.
00:12:12 - 00:12:13
- That's chilling.
00:12:13 - 00:12:15
And it fits into this broader list of
00:12:15 - 00:12:17
trending adversaries in the report.
00:12:17 - 00:12:20
We see groups like Connie and shiny hunters active as well.
00:12:20 - 00:12:22
- And Connie is an interesting one to watch.
00:12:22 - 00:12:23
They are specifically targeting
00:12:23 - 00:12:25
blockchain engineers.
00:12:25 - 00:12:27
And they're using malware that was built by AI.
00:12:27 - 00:12:28
- So it's an arms race.
00:12:28 - 00:12:29
The defenders use AI.
00:12:29 - 00:12:31
The attackers use AI.
00:12:31 - 00:12:32
- It absolutely is.
00:12:32 - 00:12:35
Which makes sense given another news item in this brief.
00:12:35 - 00:12:37
- Oh, you mean the illicit crypto stats?
00:12:37 - 00:12:38
- Yes.
00:12:38 - 00:12:40
Illicit funds flowing to crypto wallets
00:12:40 - 00:12:44
hit a record $158 billion last year.
00:12:44 - 00:12:46
- $158 billion with a B.
00:12:46 - 00:12:49
That's larger than the GDP of many countries.
00:12:49 - 00:12:51
- It's a massive underground economy.
00:12:51 - 00:12:53
And where there is that much money,
00:12:53 - 00:12:54
you will find groups like Connie
00:12:54 - 00:12:57
invested in advanced tools to steal it.
00:12:57 - 00:12:59
- Let's hit a few more news items before we wrap up
00:12:59 - 00:13:01
because the news roundup section here
00:13:01 - 00:13:03
really points to a specific trend.
00:13:03 - 00:13:05
The commercialization of crime.
00:13:05 - 00:13:07
- That's the perfect way to frame it.
00:13:07 - 00:13:09
- The one that really caught my eye is Stanley.
00:13:09 - 00:13:10
- Ah, yes.
00:13:10 - 00:13:11
- Stanley.
00:13:11 - 00:13:13
- It sounds like a helpful butler.
00:13:13 - 00:13:14
- Yeah.
00:13:14 - 00:13:16
- But it's a malware service.
00:13:16 - 00:13:18
- It represents the service model of hacking.
00:13:18 - 00:13:20
Stanley is a new service that guarantees
00:13:20 - 00:13:21
it can get your fishing extensions
00:13:21 - 00:13:23
onto the official Chrome web store.
00:13:23 - 00:13:25
- Wait, so if I'm a bad guy,
00:13:25 - 00:13:26
I don't even have to know how to hack
00:13:26 - 00:13:28
the Chrome store's security checks.
00:13:28 - 00:13:30
- Nope, you just hire Stanley.
00:13:30 - 00:13:32
You write your malicious code, you pay them a fee,
00:13:32 - 00:13:33
and they handle the distribution
00:13:33 - 00:13:36
and bypassing Google's checks.
00:13:36 - 00:13:39
The barrier to entry is just, it's cratering.
00:13:39 - 00:13:41
- So you don't need to be a coding genius
00:13:41 - 00:13:42
to be a cyber criminal anymore?
00:13:42 - 00:13:45
No, you just need a credit card and knowledge
00:13:45 - 00:13:47
of which service to hire.
00:13:47 - 00:13:48
It's hacking as a service.
00:13:48 - 00:13:49
- That's a terrifying thought.
00:13:49 - 00:13:52
It democratizes the ability to do harm.
00:13:52 - 00:13:53
- It does.
00:13:53 - 00:13:54
- So let's try to pull this all together.
00:13:54 - 00:13:55
We've covered a lot.
00:13:55 - 00:13:59
We have the automated nuisances, like the AI ad clickers.
00:13:59 - 00:14:01
We have the financial predators,
00:14:01 - 00:14:05
the ransomware gangs, hammering small businesses.
00:14:05 - 00:14:08
And then we have the geopolitical destroyers,
00:14:08 - 00:14:11
Sanworm trying to wipe out power grids.
00:14:11 - 00:14:13
- It's a three tiered threat landscape.
00:14:13 - 00:14:16
The noise, the thieves, and the saboteurs.
00:14:16 - 00:14:17
- And the common denominator
00:14:17 - 00:14:19
in almost all of this seems to be us.
00:14:19 - 00:14:20
- In many ways, yes.
00:14:20 - 00:14:23
Whether it's clicking a fishing link from the gentleman,
00:14:23 - 00:14:25
installing a sketchy browser extension
00:14:25 - 00:14:26
that Stanley put there,
00:14:26 - 00:14:28
or leaving a server exposed
00:14:28 - 00:14:30
because it's just more convenient.
00:14:30 - 00:14:31
- The technology is complex.
00:14:31 - 00:14:33
Stagnography, AI, wipers,
00:14:33 - 00:14:36
but the entry point is almost always a human decision.
00:14:36 - 00:14:38
- Vigilance, patching, skepticism.
00:14:38 - 00:14:41
- Skepticism, it's about not trusting that logo
00:14:41 - 00:14:42
just because it looks like a logo.
00:14:42 - 00:14:44
- Skepticism is your best firewall.
00:14:44 - 00:14:45
- I like that.
00:14:45 - 00:14:47
Skepticism is your best firewall.
00:14:47 - 00:14:48
- It really is.
00:14:48 - 00:14:50
- I wanna leave our listeners with a thought today.
00:14:50 - 00:14:52
We spend so much time worrying about the genius hacker
00:14:52 - 00:14:54
in a hoodie, you know,
00:14:54 - 00:14:56
breaking through complex encryption.
00:14:56 - 00:14:58
But when I look at GhostPoster hiding in a logo
00:14:58 - 00:15:02
or Stanley putting malware right into the official web store.
00:15:02 - 00:15:03
- It makes you wonder.
00:15:03 - 00:15:04
- It does.
00:15:04 - 00:15:06
If the malware is hiding in a browser extension
00:15:06 - 00:15:07
that we willingly install
00:15:07 - 00:15:11
because we wanted a cool dark mode or a coupon finder,
00:15:11 - 00:15:15
are we becoming the vulnerability that can't be patched?
00:15:15 - 00:15:17
- That is the uncomfortable question.
00:15:17 - 00:15:18
We can patch software,
00:15:18 - 00:15:20
but you can't really patch human curiosity.
00:15:20 - 00:15:22
- How do we secure our own curiosity?
00:15:22 - 00:15:24
That's the question for 2026.
00:15:24 - 00:15:25
Thank you for listening to The Deep Dive,
00:15:25 - 00:15:27
stay safe, stay skeptical,
00:15:27 - 00:15:28
and we'll catch you on the next one.
00:15:28 - 00:15:31
- Reach out to us at jbuyer.com for comments and questions.
00:15:31 - 00:15:33
Follow us at buyer company on social media.
00:15:33 - 00:15:35
And if you'd be so kind,
00:15:35 - 00:15:37
please rate and review us in your podcast app.
00:15:37 - 00:15:39
[Music]