Logo

    Ep 37: LVS

    en-usApril 30, 2019
    What incident highlighted vulnerabilities in IT infrastructure for businesses?
    How does The Venetian's owner protect its IT systems?
    What skills are required for Network Security Engineer roles?
    What was the public reaction to Adelson's controversial remarks?
    What notable achievement did Sheldon Adelson accomplish in the 1970s?

    Podcast Summary

    • The Importance of Strong IT Security Measures for BusinessesCyber attacks can happen to any business, regardless of size or success. It is crucial to have preventative measures in place and be prepared for the worst, emphasizing the need for strong IT security measures for businesses dealing with sensitive data and transactions.

      The IT infrastructure of even the most successful global businesses can be vulnerable to cyber attacks, as seen from the hack on The Venetian in Las Vegas. The Las Vegas Sands company, which owns The Venetian among other properties, employs Network Security Engineers to protect their IT systems. Job openings on their website reveal that proficiency in various hardware and software is required to qualify for these roles. This emphasizes the importance of having strong IT security measures in place for any business that deals with sensitive data and transactions. Cyber attacks can happen to anyone, so it is crucial to take preventative measures and be prepared for the worst.

    • Protecting a Complex Network: The Challenges Faced by the IT and Security Team at Las Vegas SandsKeeping a complex network secure requires constant monitoring and dedication, with potential hazards ranging from equipment malfunctions to network attackers. Even with top-notch talent and infrastructure, unexpected issues can still arise, making a proactive approach essential.

      The IT and security team at Las Vegas Sands work hard to keep their massive and complex network secure. With thousands of customers and millions of dollars at stake, the team must monitor the network and surveillance cameras around the clock to prevent potential threats. Despite their state-of-the-art infrastructure and top-notch talent, something unexpected can always go wrong, leading to potential hazards from things breaking to network attackers and hackers. The team at Las Vegas Sands has done an impressive job putting systems in place to address potential issues. Their effort is critical, given the enormous number of devices connected to their network, including public WiFi, slot machines, retail sales networks, hotel reservation systems, surveillance cameras, and more, all requiring constant dedication to ensure the network operates efficiently and effectively.

    • Sheldon Adelson's Journey to Success Through Hard Work, Dedication, and Drive.Success is achievable through hard work, dedication, and a drive to succeed, as seen in Sheldon Adelson's journey from Comdex to owning the largest privately-owned convention facility space in the US, and being a prolific donor to the Republican Party and a vocal supporter of Israel.

      Sheldon Adelson's success story began with his Comdex computer show in the 1970s, which went on to become the largest trade show in Las Vegas. He sold Comdex for 860 million dollars and focused on developing The Venetian, which became the largest privately-owned convention facility space in the US. Sheldon is a prolific donor to the Republican Party and a vocal supporter of Israel, owning newspapers in both countries. He believes in using his wealth to bolster the causes he supports and has had a successful career in business and politics. Sheldon's success story proves that with hard work, dedication, and a drive to succeed, anyone can achieve great things in life.

    • Sheldon Adelson's remarks on nuclear weapons and their consequences.Controversial statements by business leaders highlight the need for responsible leadership, ethical decision-making, and data security in corporations.

      The controversial remarks made by Sheldon Adelson on using nuclear weapons against Iran led to widespread media coverage. The video of his speech recorded by a journalist caused a surge in public attention and negative reactions from Iran's Supreme Leader. It also exposed a security breach in one of Adelson's properties in Pennsylvania, raising concerns about cyber attacks and data security in large corporations. Adelson's strong political character traits and controversial statements emphasize the importance of responsible leadership and ethical decision-making in the business world.

    • Two-Factor Authentication Can Prevent VPN Password AttacksUse two-factor authentication to protect your VPN users from successful brute-force attacks. Also, be aware of the Mimikatz hacking tool that can extract clear text passwords from vulnerable Windows computers. Ensure remote users connecting via VPN establish a secure login process.

      Enabling two-factor authentication for VPN users can prevent successful brute-force password attacks. The Mimikatz hacking tool can extract clear text passwords from vulnerable Windows computers, allowing hackers to access sensitive information. Sands Bethlehem was completely isolated from the main Las Vegas Sands network, but the hackers needed to access the main data center. Remote users could connect to the main data center through a VPN, and the hackers were able to use a senior Sands IT administrator's login information to gain access to the main network.

    • The nightmarish tale of a Las Vegas casino under a vicious cyber-attackCybersecurity threats can cripple even the biggest establishments, but with strategic moves and a relentless IT security team, businesses can minimize the damage and keep critical systems operational.

      The Las Vegas Sands casino operator faced a disastrous cyber attack in 2014, where hackers breached their network and proceeded to wipe data, steal sensitive information and replace the LVS websites with a sinister message. The attack proved to be a nightmare for the IT security team, who worked relentlessly to protect the valuable servers, data centers, and networks while keeping critical systems operational at the casino and hotel. Despite the efforts of the security IT staff, the hack proved to be personal, but guests and gamblers were able to continue gaming and accessing their hotel rooms due to the strategic move of unplugging key servers to stop the spread of the wiper virus.

    • The First Destructive Nation-State Cyber Attack on US Soil: LVS Case Study.The Iranian government's cyber-attack on Las Vegas Sands, motivated by political speech, highlights the unpredictable and destructive nation-state cyber threats towards private companies and sensitive data.

      The cyber-attack on Las Vegas Sands was carried out by a nation-state actor, the Iranian government, motivated by Sheldon Adelson's comments about nuclear weapons in Iran. This attack was the first destructive cyber-attack on US soil carried out by a nation-state actor. The attack caused a full week of downtime for LVS and compromised sensitive data. The hackers retaliated against LVS's attempts to downplay the attack by uploading a video showcasing the extent of the stolen data. This attack raises questions about why a government would target a private company and why the Iranian government didn't take credit for the attack. It also highlights the unpredictable and destructive capabilities of nation-state cyber-actors.

    • The Destructive Cyber Attack on Las Vegas Sands in 2014 as a Warning SignWords matter when assessing risks, and sophisticated cyber threats can cause extensive and long-lasting damage by seeking to destroy valuable data. Proactive measures are crucial to secure IT networks and servers.

      The cyber-attack on Las Vegas Sands in 2014 was a destructive one that wiped out almost 75% of the company's networks and servers, causing significant damage to valuable data and costing over $40 million to recover. The attack was attributed to a nation-state actor, possibly Iran, in response to Stuxnet, a US attack on Iranian soil. The incident highlights the importance of words and the impact they can have on risk assessment. The attack shows the risk of sophisticated threats from hackers seeking to destroy rather than steal data. IT security teams must be vigilant and proactive in securing networks and servers, as damage from such attacks can be extensive and long-lasting.

    Recent Episodes from Darknet Diaries

    149: Mini-Stories: Vol 3

    149: Mini-Stories: Vol 3

    In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

    Darknet Diaries
    en-usSeptember 03, 2024

    148: Dubsnatch

    148: Dubsnatch

    Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.


    Darknet Diaries
    en-usAugust 06, 2024

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    The Real Story of Cybersecurity - Special Guest: Peter Schawacker

    The Real Story of Cybersecurity - Special Guest: Peter Schawacker

    Peter Schawacker has been involved in cybersecurity long before data breaches commonly made the headlines. In fact, he’s been helping businesses secure their data long before it was even called cybersecurity. Currently, he is heading the IT Security Team for Axiom Technology Group. In his career, he has been working with some of the biggest names in the business to protect their data and that of their customers. 

    The demand for the kinds of services that Peter provides has gone up a lot in recent years, particularly amongst private equity (PE) firms. In the past, such businesses didn’t concern themselves much with cybersecurity, leaving it up to the portfolio managers and others to deal with. However, the sheer number of security breaches and the resulting scrutiny that brings has forced them to rethink their priorities and take responsibility for their own security. Many of these PE firms are also small to mid-size, which is partly why they haven’t been able to keep up with the latest developments. They just don’t have the scale and resources needed to handle security on their own. That also makes these firms tempting targets. They have enough data and money to make it worth attacking but not so much that the companies or the government will spend a lot of resources to go after the hackers.  Fortunately, Axiom is there to pick up the slack. 

    One of the most important services that Axiom provides is a full survey of the weaknesses a given firm might have, delivering around 200 security assessments a year, with approximately a quarter of those experiencing some kind of cyberattack. Performing this task well and transparently has earned both Axiom and Peter solid reputations as transparent, honest, and interested in keeping the client’s interests foremost. This seems like it should be a no-brainer but as Peter points out, there are a lot of charlatans in the cyber world, less interested in helping their clients solve problems than they are in making as much money as possible from each client. This is just bad practice. It means not only that a given security company will lose the trust and business of their clients when they figure out that they are being taken for a ride, but it also harms the trust in the cybersecurity industry as a whole. 

    There is also the fact that most firms, PE and otherwise are looking to implement the least amount of security possible. This isn’t because they don’t care about their clients’ data, but because at the end of the day they need to make money, which in turn means any Axiom client is looking for the lowest cost services that will bring their risk of a data breach down to an acceptable level. Because the sad truth is that it is incredibly unlikely that data will ever be 100% protected. Someone will always leave a password out or share it when they shouldn’t and a hacker will use it to disrupt a firm’s systems, only letting them go when their ransom is paid. 

    When interacting with clients, it is important to keep all of this in mind so you don’t oversell them. It’s also worth keeping in mind that most people don’t know the details of cybersecurity and frankly, they don’t want to know. All they want to know is how you can help them and how much it is going to cost. If someone is ever trying to convince you how awesome security is, they are almost certainly trying to sell a bill of goods. 

    Another thing Peter goes into is who makes the best cybersecurity professionals. It isn’t who you might think. People who go through a specific IT program are usually farther behind the curve on the latest development and too rigid in their thinking. The best hires for him tend to be high school teachers and musicians. Both are capable of thinking critically and still improvising when needed. 

    What does Peter think is the most important thing to keep in mind when it comes to dealing with cybersecurity? Finding who you can trust. The person who knows his stuff, can deliver on time and isn’t trying to oversell you. That is the person who has your interest at heart, who wants to make your systems secure without taking you for a ride.

    What’s your security worth? www.tartle.co

     

    Tcast is brought to you by TARTLE. A global personal data marketplace that allows users to sell their personal information anonymously when they want to, while allowing buyers to access clean ready to analyze data sets on digital identities from all across the globe.

     

    The show is hosted by Co-Founder and Source Data Pioneer Alexander McCaig and Head of Conscious Marketing Jason Rigby.

     

    What's your data worth?

     

    Find out at: https://tartle.co/

     

    YouTube: https://www.youtube.com/c/TARTLE

     

    Facebook: https://www.facebook.com/TARTLEofficial/

     

    Instagram: https://www.instagram.com/tartle_official/

     

    Twitter: https://twitter.com/TARTLEofficial

     

    Spread the word!

    Ep 21: Black Duck Eggs

    Ep 21: Black Duck Eggs
    Ira Winkler's specialty is assembling elite teams of special forces and intelligence officers to go after companies. Ira shares a story about a time he and his team broke into a global 5 company. A company so large that theft of intellictual property could result in billions of dollars of damage. Ira's consulting company: Secure Mentum. His books: Spies Among Us, Advanced Persistent Security, Through the Eyes of the Enemy.  Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Ep 22: Mini-Stories: Vol 1

    Ep 22: Mini-Stories: Vol 1
    Three stories in one! In this episode we hear about a penetration test from Mubix that he'll never forget, a incident response from Robert M. Lee which completely stunned him, and a social engineering mission from Snow. Podcast recommendation: Moonshot. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    73: WannaCry

    73: WannaCry
    It is recommend to listen to episodes 53 “Shadow Brokers”, 71 “FDFF”, and 72 “Bangladesh Bank Heist” before listening to this one. In May 2017 the world fell victim to a major ransomware attack known as WannaCry. One of the victims was UK’s national health service. Security researchers scrambled to try to figure out how to stop it and who was behind it. Thank you to John Hultquist from FireEye and thank you to Matt Suiche founder of Comae. Sponsors Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial. This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2020 to get a $20 credit on your next project. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Ep 30: Shamoon

    Ep 30: Shamoon
    In 2012, Saudi Aramco was hit with the most destructive virus ever. Thousands and thousands of computers were destroyed. Herculean efforts were made to restore them to operational status again. But who would do such an attack? Very special thanks goes to Chris Kubecka for sharing her story. She is author of the book Down the Rabbit Hole An OSINT Journey, and Hack The World With OSINT (due out soon). This episode was sponsored by Eero. A solution to blanket your home in WiFi. Visit https://eero.com/darknet and use promo code "darknet". This episode is also sponsored by Cover. Visit cover.com/darknet to get insured today. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io