Jack Recider
๐ค SpeakerAppearances Over Time
Podcast Appearances
Oh, yeah, that's a whole other degree of responsibility, right? Because how exactly do these targeting systems work? Like, we have this Predator and Intellecta thing, right? Like, does this whole kit and infrastructure and everything get sold to the customer? And then once it's delivered, Intellecta just kind of steps back and wipes their hands clean of the whole thing?
Oh, yeah, that's a whole other degree of responsibility, right? Because how exactly do these targeting systems work? Like, we have this Predator and Intellecta thing, right? Like, does this whole kit and infrastructure and everything get sold to the customer? And then once it's delivered, Intellecta just kind of steps back and wipes their hands clean of the whole thing?
Or is it some kind of hacking as a service type of thing? where the customer tells IntellXa, here's what we want you to target, and then IntellXa does all the infections and delivers the data that they got off the phone.
Or is it some kind of hacking as a service type of thing? where the customer tells IntellXa, here's what we want you to target, and then IntellXa does all the infections and delivers the data that they got off the phone.
Or maybe it's a mix of IntellXa doing the infection, and once the spyware is on the phone, then the customer can access that data whenever they want, like listen to the phone calls or see where that person is. We don't know exactly how involved anyone is in all this. You see how this changes where the responsibility lands. Isn't this an important thing to know?
Or maybe it's a mix of IntellXa doing the infection, and once the spyware is on the phone, then the customer can access that data whenever they want, like listen to the phone calls or see where that person is. We don't know exactly how involved anyone is in all this. You see how this changes where the responsibility lands. Isn't this an important thing to know?
Is the government doing the hacking themselves or is this company doing it with authorization from a government? I mean, think about it like this. The phishing message that journalists got, it looked like a normal article from a financial news website, but the domain was changed from .gr to .online. And that is what hosted the malware.
Is the government doing the hacking themselves or is this company doing it with authorization from a government? I mean, think about it like this. The phishing message that journalists got, it looked like a normal article from a financial news website, but the domain was changed from .gr to .online. And that is what hosted the malware.
So someone had to register this domain, get it hosted somewhere, stage the malware on it, and then integrate it into the Predator package. And not to mention, craft a message that the target is likely to click on. And these domains get burned fairly often, so you need to create new ones all the time and integrate that into the package. Is the customer doing all that work?
So someone had to register this domain, get it hosted somewhere, stage the malware on it, and then integrate it into the Predator package. And not to mention, craft a message that the target is likely to click on. And these domains get burned fairly often, so you need to create new ones all the time and integrate that into the package. Is the customer doing all that work?
Or is Intellexa setting all this stuff up to make it easier for the customer to simply point and shoot? So at the conference, do we get kind of any information about Predator, how much it costs or anything?
Or is Intellexa setting all this stuff up to make it easier for the customer to simply point and shoot? So at the conference, do we get kind of any information about Predator, how much it costs or anything?
One-click infection. I imagine this means that someone has to click once for their phone to be infected, which is pretty sophisticated, I'll say. But the brass ring for spyware is zero-click.
One-click infection. I imagine this means that someone has to click once for their phone to be infected, which is pretty sophisticated, I'll say. But the brass ring for spyware is zero-click.
Or maybe you could do something like send a message to someone while they're sleeping, and when the phone tries to process it, like display the preview for what the website's gonna look like, then that preview somehow contains the malware that can infect the phone. Then when the phone gets infected, the text message can be deleted, and you have no idea that anything happened to your phone.
Or maybe you could do something like send a message to someone while they're sleeping, and when the phone tries to process it, like display the preview for what the website's gonna look like, then that preview somehow contains the malware that can infect the phone. Then when the phone gets infected, the text message can be deleted, and you have no idea that anything happened to your phone.
NSO has this capability, and it sounds like Intellecta wishes they did too. We're going to do a quick commercial break here, but come back because things are really heating up in Greece, and you're not going to want to miss this. This episode is sponsored by Arctic Wolf.
NSO has this capability, and it sounds like Intellecta wishes they did too. We're going to do a quick commercial break here, but come back because things are really heating up in Greece, and you're not going to want to miss this. This episode is sponsored by Arctic Wolf.
Arctic Wolf, an industry leader in managed security operations, surveyed a thousand security and IT professionals across the globe to better understand them. What are their top priorities, current challenges, and future concerns? This survey revealed some startling findings, and you can discover them all in the State of Cybersecurity 2024 Trends Report.
Arctic Wolf, an industry leader in managed security operations, surveyed a thousand security and IT professionals across the globe to better understand them. What are their top priorities, current challenges, and future concerns? This survey revealed some startling findings, and you can discover them all in the State of Cybersecurity 2024 Trends Report.