This week on the podcast, we discuss a recent warning from the FBI about hacking leading to stolen shipments. Before that, we cover the Vercel software supply chain incident before discussing the Vect Ransomware-as-a-service turned accidental wiper.
View Transcript
Marc Laliberte 0:00
Hey everyone, welcome back to the 443 security simplified. I'm your host. Mark Laliberte, and joining me over there is
Corey Nachreiner 0:07
that portal punch Corey, the notorious Robo blocks cheater. Nachreiner, actually, I've never played Robo blocks.
Marc Laliberte 0:16
You're not even
Corey Nachreiner 0:17
Roblox. ROBLOX. ROBLOX,
Marc Laliberte 0:24
Anyways, on today's episode, we will discuss how Robo blocks caused the security incident at a company twice removed from the point of that.
Marc Laliberte 0:33
They should catch that fish. If you got a robo blocks fish, that's kind of giveaway.
Marc Laliberte 0:39
Yep. We'll discuss a ransomware that's actually a accidental wiper, and then we'll end with an interesting public service announcement from the FBI on cyber crime turning into stolen goods off of trucks.
Corey Nachreiner 0:53
By the way, Mark in general, I recommend intentionally wiping and not accidentally wiping. It's a little uncomfortable, if it only happens accidentally.
Marc Laliberte 1:04
With that, let's go ahead and flush our way in.
Marc Laliberte 1:14
So let's start with, I guess it's about a week and a half ago now, the major software development company of vercel, disclosed a security incident impacting a limited number of their customers, as they said, if you're not familiar with vercel, they're the developers of Node js, a really popular JavaScript framework that many, if not Most, JavaScript single page applications and other tools use. They quickly updated their disclosure soon after publishing it to point to a third party tool as the source of this, though, and this is where the story gets really interesting. So we've had a lot of supply chain attacks over the last couple of years. This one was kind of a, I don't know, a calamity of storms. Basically, researchers found that a vercel employee was using context AI, which is a third party artificial intelligence platform, and they had given that platform access to their vercel Google workspace account. Basically, if you go to sign in to app with your account, hit the sign in with Microsoft or sign in with Google button, it grants a level of access with auth tokens to allow that application to access resources as if they were you. From that employees account, the attacker was able to pivot into vercel's production environment and ultimately steal and decrypt What vercel called non sensitive environment variables. Basically, if you're using their environment to host something, you might use environment variables to store a secret or a configuration item. Anything that wasn't encrypted wasn't marked with a checkbox that says sensitive was up for grabs from this attacker. But where this gets interesting, is a security researcher at Hudson rock pointed out that on February 2026, context, AI, an employee from them with sensitive access was compromised by Loomis, which is a info stealing malware that's making huge waves over the last Two, three years now, that stolen data showed up on a underground marketplace for sale. I think it was in one of the free samples for one of them even. And along with these stolen credentials was a whole bunch of other stolen data from this context, AI employees computer. You could see their entire web request history. You could see the requests from them logging into vercels Like tenant within context AI and working with them. So this employee had a lot of a lot of access within context AI's environment, and access into vercel's environment. Looking through that infected machines, browsing history though, which was a part of the dump, they found evidence that the victim was searching for Roblox cheats and auto farm script specifically, and it was very soon after that, or alongside that, that they received the Loomis dealer info stealer instead. So basically, the the path for this was employee at Context AI, searching for Roblox cheats, gets Loomis dealer Loomis steals that context. Ai employees credentials, gains access to their machine from there within context. Ai steals OAuth tokens to vercel's environment. Within vercel's environment steals customer data, including environment variables. But this all started with Roblox cheats,
Corey Nachreiner 4:41
what someone gaming at work and downloading kind of illicit things on a work computer,
Marc Laliberte 4:49
either that or like, Did they let their kid use their laptop like that happens too sometimes. I think,
Corey Nachreiner 4:55
yeah, but, but a work computer like I would definitely would let my kid use. My own gaming computer at home, but a work computer. I mean, there's a lot of takeaways that are obvious here, things you shouldn't do on corporate machines, and if you're lending it to a kid, the corporate machine is definitely not the one to lend to a kid.
Marc Laliberte 5:12
And it also points to a lesson that I learned 25 years ago, and you've probably learned even before me, that when you're searching the internet for cheats, for very popular games, you typically end up with things that you weren't asking
Corey Nachreiner 5:26
for along the way. Tracks right if you're going to do that kind of stuff, find the source, because the ones that are middlemen are usually adding fun things to it fun, I mean, things you don't want.
Marc Laliberte 5:37
Yep. I also thought this was interesting, that we could actually trace back the like point of origin for this, back to a Loomis dealer at a third party company, and trace it back to how vercel, in this case, was actually impacted.
Corey Nachreiner 5:51
It's an interesting combination, by the way, like before we even get into technical security, if there really were tech there are technical controls that might help here. But it first was a human issue, I mean, one a behavior that they shouldn't be doing to that human falling for things on the computer to I guess he really fell for his own, his or her under them, their, their own bad habit that the Fisher happened to be seen, plus supply chain issues too. Like, it really is, like, we like you and I like multi stage vulnerability hacks. This is like a multi stage supply chain social engineering situation, and it could continue going on further, because vercel themselves is a platform, like people host applications as a like cloud app on here, those environment variables, like, even though you're supposed to check a little checkbox to mark them as sensitive, which encrypts them and stores them elsewhere, like people could just not know that, not check it, whatever, and still put a secret in there, like an API key or some other authentication credential. And now this will gain access to other secrets that can
Marc Laliberte 7:00
be used for other incidents going forward, OAuth
Corey Nachreiner 7:03
tokens were involved. Remember the octa breach, which had lots of OAuth token like it. This is why supply chain is such a big deal, because you, even if you're a small business, you may not realize how connected you are to upstream vendors that are bigger than you, and lower stream vendors. And how all these connections, if you get these smart attackers that are figuring the supply chain out, can be leveraged, I really think supply chain is the next thing we have to worry about
Marc Laliberte 7:35
hit 100% is, and this is it's just when we take a step back and see this started with a video game sheet, and it could potentially go into a third stage it is that is how risky. By
Corey Nachreiner 7:46
the way, I'm not like, there are times like I'll admit that I've had steam on my work computer, not because I'm playing games on it, but because I logged into my Steam account once and wanted to activate a key while I was on the flight. So these are little human mistakes that can really add up, that you have to think about, that seem, might seem innocuous, but aren't always.
Marc Laliberte 8:09
So what's the takeaway here? Application allow listing
Corey Nachreiner 8:12
when it get there? That seems to be hard for small businesses, because it just creates the Help Desk nightmare, because people are going to be installing things. So how can you do Application Whitelisting in the most frictionless way?
Marc Laliberte 8:27
Yeah, well, even just good endpoint protection, like Loomis dealer isn't new, like we know how to check
Corey Nachreiner 8:32
Canvas dealer, yeah,
Marc Laliberte 8:34
and even I suspect that this context AI employees, machine was lacking
Corey Nachreiner 8:41
for sure. Yeah, I would also, like, I worry the hard part about this really kind of convoluted multi stage attack is the threat actor taking the time and having to know enough to, you know, first, you know, hack was a context. I AI to get the vercel, but then also to realize this one employee like something that they use as part of the target. What happens when agentic AI starts to like, we already know it's taken over lateral movement, but now it can take over this type of lateral movement too, which is learning everything about the person on a machine and then figuring out connections to other places there. This is all why we need to get some more AI security to help fight this war for us, besides
Corey Nachreiner 9:24
just
Corey Nachreiner 9:24
having the defense, like you said, EDR would catch Loomis dealer, watch card, EPR would catch Luma stealer.
Marc Laliberte 9:31
But like you said, as agentic, AI becomes more powerful, malware will become more evasive. There will be higher percentages of it slipping through endpoint protection, even strong endpoint protections, and that's where having good detection and response capabilities will be so critical, and especially ones that you can automate at scale. Because, man, I don't know, I feel like I'm losing more and more sleep every night. And
Corey Nachreiner 9:56
hey, we work for a security company that's using AI too. I was going to get in. To like this comes down to you said good detection response and a CERT team that manages that detection response. This is why MDR services are made. So it's nice to work for a company that has that service, and I think the ones that use AI will be sleeping a little bit better.
Corey Nachreiner 10:17
Yeah, I
Corey Nachreiner 10:18
just have to keep our AI smarter.
Marc Laliberte 10:20
Do I just still have trust issues? Yeah,
Corey Nachreiner 10:23
that
Corey Nachreiner 10:23
is true.
Marc Laliberte 10:23
That keeps me up at night.
Corey Nachreiner 10:25
I think all of us in this industry are a little paranoid and want to do things ourselves. Just to verify, a little
Marc Laliberte 10:31
paranoid. You can't see my tin foil hat because I left it in the at the desk, but it's there.
Corey Nachreiner 10:37
It's under my to pay.
Marc Laliberte 10:38
There you go. Yeah, because of all the hair loss, moving on. So the next story that was interesting. This comes from our good old best buddies at checkpoint, where their research team puts
Corey Nachreiner 10:50
no Sargassum in that at all right mark. Actually, checkpoint is cool, but our project is better.
Marc Laliberte 10:56
Yes, their research team is cool. They can hang they put out a really interesting post about a new, actually new ransomware variant called vect, which is a new ransomware as a service offering that made its very first appearance back in December of just this last year on a Russian language cyber crime forum. They claimed their first two victims back in January, but they really started making waves back just a little bit ago when they announced a partnership with Team PCP, which some of you may not know who that is. Team PCP is the I assume they have good parties. Yes, great parties. They made their fame from many of the software supply chain attacks from the last couple of months, including trivia checks, marks light LLM and telnix. So vect announced a partnership with them to expand the breadth of their ransomware as a service reach. They also announced a partnership with breach forums itself, the really popular hacking Forum, which
Corey Nachreiner 12:04
has
Corey Nachreiner 12:04
been taken down like 12 times and has come up every single time. Yep,
Marc Laliberte 12:08
really bad game of Whack a Mole. But so they offered every single registered user on breach forums affiliate access and the ability to use vect, which is how checkpoint and their team got their hands on it, as all of us are members of,
Corey Nachreiner 12:24
by the way, affiliate access, if you wonder how, like, the reality is the people spreading ransomware usually don't write it. And the way that the people who write ransomware monetize while, frankly, not really taking as much of the direct risk, is they create a ransomware product, and they can essentially give it away for free, but they have code within when they are taking the ransom, they take, like, 20% of whatever cryptocurrency is offered in ransom. So that's what an affiliate is on that. I mean, it's just like, I don't know, multi stage marketing here, you sell our product, although I guess in those multi stage marketing they make you buy the stock of the dumb teddy bears that you're supposed to sell, or the candles I would definitely put, like Herbalife on par with ransomware operators. That's that is a fair but most of the people spreading are technically efficient affiliates, and the ones making it have that arm's length away,
Corey Nachreiner 13:21
yep.
Marc Laliberte 13:22
But so checkpoint went into a pretty in depth technical analysis, which uncovered a few kind of interesting irregularities that I'll give you my hot take on. Why I think that they're in there. Like, first off, they describe a very specific type of encryption. They say they're using authenticated Cha Cha 20, specifically Cha Cha 20 poly 1305, turns out it's unauthenticated. Cha Cha 20 is a stream cipher, which, for the non nerds in here, that doesn't matter, but it's a discrepancy of what they say they're doing versus what's actually going on. They advertise a few other encryption related and usability related features that just weren't fully implemented in their ransomware product, for example, and there was one really big flaw in their ransomware that actually just turns it into a straight up wiper, where any file larger than 128 kilobytes,
Corey Nachreiner 14:16
I think it's silly that They call this a large file processing flaw, because 124 kilobytes is not large in my brain. No, this is a tiny, just a little bit bigger than tiny flaw processing empty
Marc Laliberte 14:32
word document is probably
Corey Nachreiner 14:35
the template for the Word document.
Marc Laliberte 14:36
Yeah, but anything larger than 128 kilobytes is actually permanently and irrecoverably destroyed, because as it's going and encrypting files, the cipher that it's using, it needs both a key and what's called a nonce, a number you use once. Those two together is what makes cryptography secure. That nonce is generated for each chunk of the file they're generated that they're trying to. Encrypt. And so when it's they get a large file, they break it into four chunks, they generate a nonce, encrypt the first one, generate a nonce for the second one, encrypt that, and so on and so forth. But in the way the code was written, they screwed up with how the variable is defined, and it's basically overwritten by each subsequent block, which means they're not storing it. They have no way of giving it to you. If you pay the ransom, the files are just gone if they are larger than 100
Corey Nachreiner 15:28
so tin foil hat, like Russian threat actors are known for when they're targeting places like Ukraine and actually want to deploy wiper malware, but want to do it under a black flag operation, they pretend it's ransomware,
Marc Laliberte 15:43
like, not Petya,
Corey Nachreiner 15:44
yeah, yes. And I guess the immediate question here is, why would this group publicly ask everyone to do that? Because it's not a target. But, you know, in checkpoints research, this is, like, maybe described as a mistake that makes it bad malware, bad ransomware. But was this a mistake for sure? What's
Marc Laliberte 16:04
the name of the logical rule where never attributes
Corey Nachreiner 16:07
or
Corey Nachreiner 16:07
never
Marc Laliberte 16:09
returning something to malice that could be better explained by this seems more like
Corey Nachreiner 16:16
razor,
Marc Laliberte 16:17
yeah, more like a big piece of vibe, coded garbage, is what I gather out of this.
Corey Nachreiner 16:22
Where could be, could be, for sure,
Marc Laliberte 16:24
they wanted to join the ransomware game. This what first came into the market December of last year. So AI assisted development is well established and highly capable in the right hands and the wrong hands. If you have no idea what the heck you're doing or how to validate it, you end up with stuff that technically runs, technically works, but may have
Corey Nachreiner 16:44
things this would come up on their test computer, though. I mean, you would think they would maybe test the decryption once if they want to get paid.
Marc Laliberte 16:52
Do you think reservoir operators have a QA department?
Corey Nachreiner 16:55
I guess if CrowdStrike doesn't test their updates
Marc Laliberte 16:59
and the world, maybe we shouldn't put it on our friendship with CrowdStrike ended. That is, yeah, totally fair, but I feel very strongly that this was some script kiddie got their hands on, like cursor or cloud code got around the guardrails, and now they generated a really crappy ransomware offering that doesn't do what it says it's supposed to do. So unfortunately, if you are or do become a victim of vect, which is free for everyone to use with a breach form account, your files are gone and there is no recovering from it. So unless
Corey Nachreiner 17:41
you
Corey Nachreiner 17:41
have backup, unless you do the normal things that business should do to prevent disaster or to allow business continuity and disaster recovery. Yeah,
Marc Laliberte 17:51
correct, which hopefully everyone listening right now does have a not just a backup, but a tested restoration process. Because, yeah, this could be bad. I do think this probably won't be a operator that lasts. I feel like the offering everyone on breach forms affiliate access is like a desperation move to try and gain clout. And like, at the end of the day, affiliates are trying to earn money, and if, like, word gets out that you literally can't recover from it. No one's going to pay the ransom, even those that would be inclined to do so normally. So does it have any exfiltration capability? It did not look like it did so and if it was supposed to, then I suspect that wasn't working either. So yeah, silver linings, if you are in the market for a new ransomware as a service offering, I would recommend staying away from this one. One out of five stars, bad experience. So moving on to the last one, I saw this email come through. I think just like yesterday, at the time of this recording, the FBI published a public service announcement last or last week at the time you're listening to this about how threat actors are using cyber enabled tactics to hijack freight, steal high valued shipments and reroute deliveries that are intended to go to other organizations. So since starting in 2024 they've gained unauthorized access to computer systems of brokers, carriers and like other shipping organizations, usually starting with social engineering, but they've got this big, long attack chain that we'll walk through and pull up here on the screen in just a second, and they basically trick carriers into handing over goods to a the attackers without like any any capability to stop them in many spots. So basically, this all starts the FBI walked through the attack chain. It all starts with them impersonating and spoofing a broker. So basically, shipping companies act through brokers to find organizations that want something moved from point A to point B. The carrier will go through their broker and say, I'll do that for $1,000 let's say, and they'll get assigned the shipment about pick it up, drop it off where they're supposed to. So this starts with pretending to be a broker, a actual, known one, and sending out an email to carriers with things like a carrier broker agreement they need to sign or say that they got a bad service rating that they need to address and review. So those are the hooks to trick them into clicking on the link which takes them to a realistic but illegitimate website designed to look like that broker that's hosting malicious executables that ultimately download legitimate remote management tools, RMM tools, by
Corey Nachreiner 20:51
the way, our listeners, most of which are Ms MSPs, know about rmms. I mean, these are tools you use all the time in your business to monitor the endpoints you're monitoring. So legitimate tools, definitely something this, obviously, is targeting a very specific vertical in these these carriers and cargo ships and organizations, but familiar techniques, man, you got to be careful with downloading rmms from bad sources.
Marc Laliberte 21:20
There's a reason they're using it because, like these are legitimate tools like McAfee, antivirus isn't going to block your whatever RMM tool, because RMM
Corey Nachreiner 21:30
typically, one of its default capabilities is to push executables and installers remotely on other places. So it's a excellent tool for threat actor as well, yep.
Marc Laliberte 21:41
So once they gain that access to the carrier's account, so like the actual trucking organizations, they then access the the truck load boards, the places where you bid for these using that carrier's account, but they impersonate a broker to compromise other carrier accounts and trick that and post like fake loads, fake like offers for transportation, and legitimate carriers will bid on these fake loads. So
Corey Nachreiner 22:08
it's kind of interesting. They've already infected someone, but they can also monitor some results of who they infected to and use them for these fake loads. So
Marc Laliberte 22:18
then they create these fake ones, create fake contracts for the threat actor. They then provide a malicious carrier broker agreement and compromise carrier and compromise additional carrier computers. So basically they're spreading throughout this like this marketplace, I guess
Corey Nachreiner 22:37
physical this literal, like carried cargo supply chain like this is what we think of. It the normal supply chain, and they're infecting all of this delivery supply chain.
Marc Laliberte 22:48
So then they'll use their access as a compromised carrier to accept shipments and from like unwitting drivers. They'll provide manipulated bills of lading, the actual like manifests and contract for transporting it, and they'll change the destination for the load too. So instead of delivering your Nike shoes to whatever city, they'll send it off to a different warehouse. They'll even change the legitimate carriers contact info with the regulatory agency here in the US for it. They'll update insurance information to let them carry loads that they were previously not permitted to carry. So think like electronics probably have lithium ion batteries. They may not have the right insurance for that. They'll update their insurance to be able to carry lithium ion batteries to steal a bunch of laptops. They'll then the unsuspecting carrier that has accepted this contract we'll go drive it to the location that,
Corey Nachreiner 23:43
by the
Corey Nachreiner 23:43
way they they call, I don't know if we're talking about the carriers or the drivers right now, but they call it partially unwitting drivers that pick up the load. So this gets me thinking about whole mule economy, which we don't talk about a lot like a lot of times when you're doing a scam, you eventually do need to get a person to transfer money or something, and there's mules that they typically are falling for social engineering too. But in my opinion, it's such obvious like, Why have I been contacted through text randomly to do this thing? That seems really weird, and I'm going to get a little money for so I am curious. I wish we had, we don't have the whole story there, but I wish we knew more about why they call it partially unwitting drivers, the
Marc Laliberte 24:30
partially unwitting drivers, though, then meet up with the totally malicious, or at least complicit drivers, who then cross load or cross dock the actual goods and then steal them, effectively, take them somewhere else and put them up for resale. Sometimes they even contact the broker and demand a ransom in exchange for the location of these details for the load. And they've had a ton of success over this, like the FBI mentioned very early on that in 2025 the estimate. Cargo theft in the US and Canada reached $725 million and this like stood out to me as a kind of no duh. It makes sense to see cyber related crimes making their way into every like area, but like cyber crime to physically steal goods like it's Ocean's 11 is it feel pretty nuts still.
Corey Nachreiner 25:24
You had terrorist all this, which I'm sure all of these carriers have to deal with, at least in their paperwork. I'm surprised tariffs can actually be paid and aren't being affected. Anyways, yes, this is a very cool but scary cargo cyber heist. Man, this is definitely Ocean's 11 on cyber.
Marc Laliberte 25:45
But there are, like, some takeaways from this, if any truckers or brokers happen to be listening right now, like, the biggest one is just social engineering, is how this typically starts, and they use all hallmarks of a good fish of urgency, like, you've got a bad review and you need to come address this, or we're going to stop shipping goods through you, or, Hey, we've got a new agreement that you have to accept before you're allowed to carry any more goods. And that's the hook to get them interested, fall for the site, and then from there, it's just a matter of tricking them into downloading
Corey Nachreiner 26:15
the links. I mean, the FBI goes into the links being used. When we've talked about shorteners before, those are scary. When you look at these domains, the FBI used their own domain as an example, but like the way you all know, the way people spoof legitimate domains, throwing in a hyphen or extra punctuation, doing a different top level, like instead of.com doing.io there's lots of or adding a couple words to something that's legitimate. So the techniques used were all techniques that you're familiar with. So so all your basic social engineering training should apply.
Marc Laliberte 26:51
And then on the RMM front, like you as an organization, probably use RMM tools, but you probably use one single, or at least within a single customer you service or business, you're at one single RMM tool. You should know what that one is, and you should be on the lookout for unexpected ones popping up on your computers. And this is where like or like MDR can really help, where we've got detection capabilities and anomaly detection to look for new RMM tools that we hadn't seen previously on a company and the network, and flag that is suspicious and trigger an investigation. Because, like your endpoint security, like Microsoft defender, on its own, is not going to flag something like connect wise as malicious, because it's
Corey Nachreiner 27:37
not. It knows it. There's a lot of human things you should learn from this, policy wise too. Like I one thing Mark and I in any CISO office knows is you can have all the technical security controls in the world, but people can still accidentally do a dumb thing. But these are all business processes, shipment requests, changes in pickup locations, bids that cost money. Anytime you're working with external partner or business, there should be human processes to check driver's licenses, vehicle numbers, the actual banks you send bids to. So there's also, I mean, really very I'm assuming shipment and cargo, people can add human processes that help them validate before they start doing things with external pickup organizations that might cause their cargo to get into the wrong driver's hands,
Marc Laliberte 28:33
at least pick up the phone and be like, hey, this you, I can help out a lot.
Corey Nachreiner 28:38
Exactly,
Marc Laliberte 28:39
yeah, crazy times, though, what do you think the biggest heist they had was?
Corey Nachreiner 28:45
I don't know. Man,
Marc Laliberte 28:47
yeah, the changing
Corey Nachreiner 28:47
insurance bikes. There's all kinds of fun EV stuff. If I were to target something besides laptops and GPUs, it would be like all these little EV longboards or dirt bikes or bicycles.
Marc Laliberte 29:00
I could see that being a popular target and something relatively easy defense, like iPhones, they know every serial number on the market,
Corey Nachreiner 29:07
GPS,
Marc Laliberte 29:08
but a bike, yeah, that could be it.
Corey Nachreiner 29:11
And they're high value. I mean, some of those dirt bikes are 5k so if you can steal a bunch of those, you got a lot of money, and they don't all have GPS in them to help find them
Marc Laliberte 29:20
crazy times, though, Keep on the lookout for cyber stolen trucks.
Marc Laliberte 29:29
Hey everyone, thanks again for listening. As always, if you enjoyed today's episode, don't forget to rate, review and subscribe. If you have any questions on today's topics or suggestions for future episode topics, you can reach out to us on blue sky. I'm at it's mark.me corey's SecAdept, and the both of us are on Instagram at Watchguard underscore technologies, thanks again for listening, and you will hear from us next week.