Three Buddy Problem
(Presented by TLPBLACK [https://tlpblack.net]: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.) Three Buddy Problem - Episode 96: We're joined by WIRED writer Andy Greenberg to dig into SentinelLabs' bombshell FAST16 research, a newly deciphered piece of sabotage malware that predates Stuxnet by five years and quietly tampered with physics modeling software likely tied to Iran's nuclear program. We discuss the attribution rabbit hole (NSA? Israel? someone else?), the eerie "spiritual warfare" implications of corrupting scientific calculations, and Antiy Labs' very dialectical Chinese rebuttal. Plus, what AI reverse-engineering means for the next decade of cyber paleontology. Cast: Andy Greenberg [https://x.com/a_greenberg], Juan Andres Guerrero-Saade [https://twitter.com/juanandres_gs], Ryan Naraine [https://twitter.com/ryanaraine] and Costin Raiu [https://twitter.com/craiu]. Timestamps: 0:00 - WIRED’s Andy Greenberg joins the show 1:53 - How the FAST16 scoop landed in Andy's lap 6:45 - JAGS sat on this sample for 7 years 10:33 - How Costin and the Kaspersky team missed the sabotage routine 15:20 - The "holy moly" moment: what FAST16 actually does 18:26 - Territorial Dispute, Shadow Brokers, and the driver list 24:11 - The targets: MOHID, PKPM, and LS-DYNA's link to Iran 28:13 - No C&C, no victims: a worm built for air-gapped networks 34:45 - Was this part of a larger anti-Iran toolkit? 37:55 - Attribution: NSA, Israel, or someone else entirely? 51:39 - What was the actual sabotage? Unanswered questions 55:48 - "Spiritual warfare": the psychological angle and trust in computers 1:20:05 - Equities, going public, and the case for AI-powered reversing 1:32:19 - Antiy Labs' Chinese rebuttal and the apparatchik tone 1:43:04 - Shoutouts: Sergey Mineev, LabsCon CFP, PivotCon, and Ekoparty Links: * Transcript [https://docs.google.com/document/d/1m0kgtQ17e-_mOUJbhVvwLAmn-khQck_vOudjMTh4IZ0/edit?tab=t.0#heading=h.f9h50gafamn5] * fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet [https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/] * Flame: A complex malware for targeted attacks [https://static.crysys.hu/v1/publications/files/skywiper] * Territorial Dispute – NSA's perspective on APT landscape [https://static.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf] * Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program - and Predates Stuxnet [https://archive.ph/ZsaH6] * Kim Zetter's Countdown to Zero Day [https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196] * An Unprecedented Look at Stuxnet, the World's First Digital Weapon [https://archive.ph/BOolM] * The Flame: Questions and Answers (Kaspersky) [https://securelist.com/the-flame-questions-and-answers/34344/] * SentinelLabs [https://www.sentinelone.com/labs/] * Andy Greenberg on X [https://x.com/a_greenberg] * TLPBLACK [https://tlpblack.net/] * Antiy Labs: “Psychological Warfare” to Show Off Cyber Capabilities [https://www.antiy.net/p/a-psychological-warfare-to-show-off-cyber-capabilities-a-comprehensive-analysis-of-sentinelones-exposure-of-fast16/] * Who’s Really Spreading through the Bright Star? [https://securelist.com/whos-really-spreading-through-the-bright-star/68978/] * LABScon 2026 CFP [https://www.cvent.com/c/abstracts/0f2ae039-4175-42c2-a534-7f25ada9e539] * Ekoparty Miami 2026 (Agenda) [https://ekoparty.org/schedule-miami-2026/] * PIVOTcon Agenda [https://pivotcon.org/#agenda] * Decipher: Fast16, Stuxnet, and the History of Cyber Espionage [https://www.youtube.com/watch?v=Nemom0_vCYU]
220 episoder
Kommentarer
0Vær den første til at kommentere
Tilmeld dig nu og bliv en del af Three Buddy Problem-fællesskabet!