![Poisoned at the Source. [OMITB]](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://megaphone.imgix.net/podcasts/8797f03a-a50b-11ea-b6c0-87ebb093948d/image/hacking-humans-cover-art-cw.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
Hacking Humans
The episode opens with a deep dive into the evolving threat of software supply‑chain compromises. 2025’s high‑profile F5 and BigIP breach mirrors the SolarWinds incident, showing how nation‑state actors—now shifting from Russian to Chinese groups—exfiltrate source code and internal vulnerability data to gain long‑term, stealthy footholds across hundreds of downstream customers. By compromising development environments, attackers embed malicious code that appears legitimate, allowing them to live off the land and evade traditional network defenses.
Beyond nation‑states, the hosts highlight a surge in criminal‑level supply‑chain attacks, notably the Triada campaign that backdoors Android firmware on counterfeit devices sold worldwide. With an estimated 85 million compromised devices, these implants can harvest communications, act as proxies, and bypass app‑store vetting. The discussion also touches on overlooked vectors such as routers, printers, and open‑source utilities like XZ Utils, emphasizing that attackers exploit any component lacking endpoint monitoring, turning everyday hardware into covert espionage platforms.
Mitigation strategies dominate the final segment. While Software Bills of Materials (SBOMs) promise ingredient‑level transparency, adoption remains uneven, leaving many enterprises blind to hidden risks. The panel urges a security‑by‑design mindset: rigorous verification of third‑party code, robust zero‑trust controls, and careful integration of AI tools that could inadvertently introduce poisoned dependencies. Strengthening vendor vetting, employing allow‑listing solutions, and maintaining continuous visibility across the entire supply chain are presented as essential steps to restore trust in both enterprise and consumer technology ecosystems.
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel.
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller-installed system images. We connect the dots to other high-impact supply chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.
Comments
Want to join the conversation?
Loading comments...