Poisoned at the Source. [OMITB]
Cybersecurity

Hacking Humans

Poisoned at the Source. [OMITB]

Hacking HumansJan 6, 2026

AI Summary

In this episode, Selena Larson, Keith Mularski, and Dave Bittner examine supply‑chain attacks, focusing on a large‑scale Android malware campaign that embeds malicious code in firmware and reseller‑installed system images before devices reach consumers. They compare this threat to other high‑profile supply‑chain breaches such as SolarWinds and the recent F5 incident, highlighting how attacks at the manufacturing stage can silently proliferate and evade conventional defenses. New intelligence on compromised Android devices originating from Chinese factories underscores the growing risk of pre‑delivery infections and the need for stronger provenance verification throughout the hardware lifecycle.

Episode Description

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller-installed system images. We connect the dots to other high-impact supply chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.

Show Notes

Poisoned at the source.

January 6, 2026

Authors / Hosts

  • Selena Larson – Staff Threat Researcher and Lead, Intelligence Analysis and Strategy at Proofpoint. She collaborates with fellow researchers to identify and investigate advanced cyber‑criminal threats and develop actionable threat intelligence.

  • Keith Mularski – Chief Global Ambassador for Qintel and retired FBI Special Agent with extensive experience in cyber‑crime investigations and intelligence operations.

  • Dave Bittner – Security podcast host and co‑founder of The CyberWire, with a long career in television, journalism, and media production.


Show notes / Article body

Welcome in! You’ve entered Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of the podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive Upper West Side, Selena is joined by her co‑hosts Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply‑chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller‑installed system images. We connect the dots to other high‑impact supply‑chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.

Comments

Want to join the conversation?

Loading comments...