Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:02):
Welcome to Siberian Here, technology and cybersecurity are made simple
for everyone. Whether you're a tech geek or just curious
about the digital world, We've got you covered. Each episode,
we dive into the latest topics from technocratico dot it
and break them down so you can stay informed and protected.
Speaker 2 (00:23):
This is a.
Speaker 1 (00:23):
Siberian Media Miami production. Let's get into it.
Speaker 3 (00:28):
The scaber gulsis flame. Make us a blood bad fave,
to love it, to fuck.
Speaker 2 (00:36):
Its holess, see usselves.
Speaker 3 (00:42):
And remember this.
Speaker 4 (00:50):
Good morning, and welcome to today's in depth exploration of one
of the most pressing cybersecurity challenges of our time. Recently,
on December twenty fourth, twenty twenty four, a highly sophisticated
attack targeted Cyberhaven, a leading company specializing in data protection.
This incident unveiled significant vulnerabilities in browser extensions, one of
(01:12):
the most common tools used globally for data management and protection.
In this report by Rafael di Marcio, we delve into
the intricate dynamics of the attack, which exploited phishing techniques
to compromise the integrity of a Chrome extension, exposing user
sensitive data. The analysis will uncover the technical and strategic
implications of this breach draw parallels to similar incidents like
(01:35):
the infamous data speed scandal, and provide actionable recommendations for developers, users,
and organizations. Stay tuned as we explore how this event
highlights the ongoing evolution of cybersecurity threats and the crucial
need for resilient, multifaceted strategies to safeguard our digital ecosystems.
(01:55):
Let's dive into the details and implications of this compelling case.
Speaker 3 (02:01):
I hope everyone had a nice and relaxing holiday season. Yeah,
definitely a little bit more relaxing than what the folks
over at Cyberhaven experienced on Christmas Eve. This cybersecurity company,
you know, the ones that help businesses protect all their
sensitive data, got hit with a pretty sophisticated cyber attack themselves.
Oh wow, kind of ironic.
Speaker 2 (02:23):
Yeah, it really does make you wonder if a company that's,
you know, dedicated to data protection can be victimized like this.
It just goes to show how vulnerable we all really are. Absolutely,
and what's really interesting about this particular case is that
it all revolved around their Chrome browser extension. Oh really,
a tool that a lot of people use.
Speaker 3 (02:43):
I was going to say, I think a lot of
people probably.
Speaker 2 (02:45):
Listening use that, maybe even you listening right now, use
that for managing and securing data.
Speaker 3 (02:51):
Interesting. So that's what we're going to dive into today.
Let's get into it how this attack actually happened, what
it means for users like us, and then the bigger
lessons that we can all take away.
Speaker 2 (03:02):
From that big picture.
Speaker 3 (03:03):
Yeah, but let's just start by breaking down what happened here.
Speaker 2 (03:05):
Okay, so it all started with phishing attack. Okay, cyber
Haven had an admin account for their Chrome web store,
right presence, and that account was compromised.
Speaker 3 (03:17):
Okay, so when we say phishing attack, we mean like
when someone tricks you into giving up your login info,
right exactly. But I would think that a cybersecurity company
would have top notch security, you'd think on an account
as important as their web store account.
Speaker 2 (03:32):
Yeah, you would think.
Speaker 3 (03:33):
So, so how did this even happen?
Speaker 2 (03:35):
Well, even the most secure systems can be vulnerable if
the human element is exploited.
Speaker 3 (03:40):
Oh so it was like a social engineering type of thing.
Speaker 2 (03:42):
Yes, exactly, and in this case, compromising that single admin
account was essentially giving the attackers the keys to the kingdom. Wow.
So they could inject malicious code directly into the extension itself.
Speaker 3 (03:56):
So anybody who downloaded right or updated to that version
of the extension yep, I think it was twenty four
point zero point four, that's the one ended up with
a very nasty surprise lurking on their system exactly.
Speaker 2 (04:10):
And this wasn't just some random data grab either. Oh really,
this malicious version was designed to steal cookies Okay, those
little files that websites used to track you, right, and
authenticated sessions.
Speaker 3 (04:23):
So, like, think about all the websites you're logged into, yeap,
social media, banking, email, all of them. All that stuff
could have been compromised potentially. Yeah. So if a company
like cyber Haven can be targeted so effectively, what does
that say about the attackers here?
Speaker 2 (04:39):
Well, it's a sign that we're not dealing with amateur
hackers anymore. Right, the level of sophistication in this attack
points to an organized cybercrime group, Oh wow, with a
deep understanding of both the extension's inner workings and the
Chrome web store publishing process.
Speaker 3 (04:55):
That's really scary.
Speaker 2 (04:56):
Yeah, it is.
Speaker 3 (04:57):
Sounds like thankfully cyber Haven got this pretty quick though. Yeah, thankfully,
I think they yanked that compromised extension within an hour.
Speaker 2 (05:04):
They did, it was very quick, and released.
Speaker 3 (05:05):
A patched version twenty four point narrower point five. It's right,
So if anybody's using this extension, updated immediately.
Speaker 2 (05:13):
Immediately, Yes, But even with that quick response, there's still
that question of a potential data breach, right. We don't
know how many users might have been affected while that
malicious version was out there, right.
Speaker 3 (05:26):
And cyber Haven has acknowledged that they have. They've been
advising users not only to update, yes, but also to
change any passwords that we're using FIDOV two that's the
one which I think is that much more secure authentication
method that uses hardware ease or biometrics. And they're also
telling users to check their browser logs for suspicious activity.
Speaker 2 (05:47):
That's right, And they're not just sitting back and hoping
for the best. Okay, cyber Haven launched their own internal
investigation and brought in outside security experts to figure out
exactly how the attackers were able to slip through the cracks.
Speaker 3 (05:59):
So I think what's really unsettling here is that a
tool that's designed to protect data was the very thing
that was used to steal it. It really exposes this
inherent vulnerability of browser extensions, even though we use them
all the time and they offer so much functionality.
Speaker 2 (06:17):
That's the question this raises, right, Yeah, how do we
improve the security around these tools that we rely on
so heavily. We need robust measures throughout their entire life cycle,
from how they're developed to how they're distributed and how
they're monitored.
Speaker 3 (06:30):
Right, and this isn't just some abstract concept right now,
this cyberhan case is a prime example of how dangerous
these targeted phishing attacks may be, especially when they're hitting
accounts with a lot of access. So by compromising that
one admin account, the attackers basically weaponized a piece of
legitimate software, it's true, and turned it into this data
(06:53):
stealing machine.
Speaker 2 (06:54):
Yeah. And what makes this even more insidious is that
a user might not even realize anything is wrong. Oh wow,
extensions off and run in the background, quietly collecting data.
It's not like ransomware it locks up your computer and
demands money. This is much more subtle and potentially much
more damaging.
Speaker 3 (07:09):
Okay, so we've got a cybersecurity company that's hit with
a sophisticated attack. You've got a compromise extension spreading like
wildfire yep, and then users potentially losing control of their data.
Where do we even go from here?
Speaker 2 (07:22):
Well, I think to grasp the gravity of a situation,
it's helpful to look at some past incidents involving compromised extensions.
This cyber Haven case isn't an isolated event. Remember the
data spuy scandal back in twenty nineteen.
Speaker 3 (07:37):
Vaguely remind me what that was all about.
Speaker 2 (07:39):
So that was a massive case where a bunch of
Chrome and Firefox extensions were compromised. Oh wow, and they
were used to siphon off personal and corporate data from
millions of users. Just like the Cyberhaven attack shows how
attackers can exploit these seemingly harmless extensions. Data Spy exposed
the vulnerabilities in these platforms that are supposed to be
(08:00):
vetting and approving these tools.
Speaker 3 (08:02):
It's like the wild West out there. There really is
when it comes to these extensions. It really is. So,
you know, how do we make sense of all of this?
Speaker 2 (08:09):
Yeah, it's a lot to take in, it is. And
it wasn't just data Spy either. In twenty twenty one,
there was a major attack on a VPN provider right,
and hackers exploited a weakness in their distribution platform Wow
to spread compromised versions of their software.
Speaker 3 (08:26):
So we're seeing a pattern here.
Speaker 2 (08:28):
We are.
Speaker 3 (08:28):
These cases, along with Cyberhaven, all kind of point to
weaknesses in these systems. Yes, that are supposed to be
verifying and approving these extensions exactly like the security checkpoints
are failing. They are and allowing bad actors to slip through.
Speaker 2 (08:46):
That's right, and this underscores the need for stricter standards
when it comes to publishing and monitoring these extensions. These platforms,
the Chrome web Store, the Firefox aud On store, and
all the others need to be more pro act identifying
and removing malicious extensions before they can do any harm.
Speaker 3 (09:05):
It feels like we're constantly playing this game of whack
a moll it does with all these cyber threats. As
soon as one vulnerabilities addressed, another one pops up. Is
that just the nature of the beast or is there
a way to get ahead of this curve?
Speaker 2 (09:17):
Well, the fat landscape is definitely evolving at a rapid pace. Yeah,
it's no longer just you know, loan hackers tinkering in
their basements. We're talking about well funded organized crime groups,
even nation state actors with tons of resources.
Speaker 3 (09:33):
So it's like we're playing chess against a grandmaster.
Speaker 2 (09:35):
That's a good analogy.
Speaker 3 (09:36):
You can see five moves ahead.
Speaker 2 (09:38):
Yeah, these attackers are constantly innovating, developing new techniques and
tools to exploit vulnerabilities.
Speaker 3 (09:46):
It's not just about technical prowess either.
Speaker 2 (09:49):
It's also about social engineering. Oh, those psychological tricks that
they use to manipulate people into giving up sensitive information.
Speaker 3 (09:58):
Like phishing attacks. I've seen some that looks so real.
Speaker 2 (10:02):
I know me too.
Speaker 3 (10:03):
It's really scary, it is.
Speaker 2 (10:04):
And then there's the fact that our digital ecosystem is
becoming more complex. We rely on this vast network of
interconnected devices, systems, applications, and each new connection, each new
piece of software, introduces potential vulnerabilities.
Speaker 3 (10:20):
It's like adding more doors and windows to a house. Yeah,
the more entry points you have, the harder it is
to keep everything secure precisely.
Speaker 2 (10:29):
And all of this makes for a very challenging environment
for anyone involved in cybersecurity. But that doesn't mean we
should just throw our hands up in defeat. Right, there
are things we can do individually and collectively to address
these evolving threats.
Speaker 3 (10:46):
So let's talk about solutions then.
Speaker 2 (10:47):
Okay, where do we even.
Speaker 3 (10:49):
Begin to tackle something as complex as cybersecurity?
Speaker 2 (10:54):
Well, for starters, I think we need to break down
these silos that often exist between different organizations and sectors.
We need more collaboration, more sharing of information about threats
and vulnerabilities, best practices, like a neighborhood watch exactly, like
a neighborhood watch for the digital world.
Speaker 3 (11:10):
I like that.
Speaker 2 (11:11):
If everyone's looking out for each other and sharing intel
about suspicious activity, we can create a much safer environment.
Speaker 3 (11:17):
But this collaboration needs to go beyond just individual companies.
Speaker 2 (11:23):
Absolutely, it's a global issue. It affects everyone, so.
Speaker 3 (11:27):
We need international cooperation.
Speaker 2 (11:29):
Yes, we do to.
Speaker 3 (11:29):
Effectively combat these threats. Because cyber attacks don't respect geographical boundaries.
They don't, so our response needs to be just as global.
Speaker 2 (11:38):
It's like we need a United Nations for cybersecurity. I
like that, a global task force dedicated to sharing information,
coordinating responses, setting international standards.
Speaker 3 (11:50):
Okay, what about the role of governments?
Speaker 2 (11:51):
Yeah, what about them?
Speaker 3 (11:52):
Do they have a part to play in this?
Speaker 2 (11:54):
Absolutely, they have a critical role in setting clear standards
and regulations.
Speaker 3 (11:59):
Okay, cybersecurity, so like data protection, privacy, all that incident
reporting requirements.
Speaker 2 (12:05):
It's like having building codes for the digital world. I
like that analogy, establishing those minimum security standards. Yeah, all
organizations must adhere to.
Speaker 3 (12:14):
Levels of the playing field. Make sure that everyone's building
their systems with security.
Speaker 2 (12:18):
In mind, exactly. And governments can also play a role
in fostering innovation and research in cybersecurity.
Speaker 3 (12:24):
Yeah.
Speaker 2 (12:25):
Supporting the development of new technologies and tools can help
us stay ahead of the current.
Speaker 3 (12:30):
So we've got collaboration, international cooperation, government involvement. What else
needs to be part of this?
Speaker 2 (12:37):
Okay, Well, let's shift gears a bit. Cybersecurity isn't just
about preventing attacks, right, It's also about being prepared for
when they inevitably happen.
Speaker 3 (12:46):
Yeah, So it's not just about building walls, but also
about having a plan exactly for what to do if
someone breaches those walls.
Speaker 2 (12:53):
That's right. Organizations need to have robust incident response plans
in place, okay, and these plans should include procedures for detecting, containing,
and recovering from attacks. That's like a fire drill, exactly,
like a fire drill for the digital world.
Speaker 3 (13:07):
I like that.
Speaker 2 (13:08):
Everyone needs to know what to do in case of emergency,
right to minimize the damage and get back on their
feet quickly.
Speaker 3 (13:13):
But what about the individual user?
Speaker 2 (13:15):
Yeah? What about them?
Speaker 3 (13:17):
What can we do on a personal level to protect ourselves?
Speaker 2 (13:20):
That's a great question. Yeah, you know, we often feel
powerless I do in the face of these sophisticated attacks.
But there are simple, practical things we can do to
improve our own cybersecurity. What we can empower ourselves to
be active participants in our own digital security? Okay, not
just passive bystanders.
Speaker 3 (13:41):
So let's break down some of those practical tips. Let's
do it, I'm all ears.
Speaker 2 (13:45):
Let's start with the basics. Passwords. Okay, strong unique passwords
are essential. Ye, but how many of us actually use
a different complex password for every account.
Speaker 3 (13:56):
I'll be the first to admit I don't.
Speaker 2 (13:57):
I know. It's hard to keep track of them all.
Speaker 3 (13:59):
It really is.
Speaker 2 (14:00):
Thankfully, there are tools that can help password managers. They
can generate and store those strong, unique passwords. Okay, so
you only have to remember one master.
Speaker 3 (14:09):
Password, like a digital vault for your password exactly, Much
safer than writing them down on a sticky note.
Speaker 2 (14:14):
Much safer. What else, enable multi factor authentication whenever possible.
That adds that extra layer of security by requiring a
second form of verification, like a code sent to your
phone or email in addition to your password, makes it
much harder for attackers to get in even if they
have your password.
Speaker 3 (14:35):
It's a two step verification process, it is, okay.
Speaker 2 (14:37):
What about software? Keep your operating system, your browser, and
all your software up to date.
Speaker 3 (14:44):
Yeah.
Speaker 2 (14:44):
Those updates often include security patches okay that address known.
Speaker 3 (14:49):
Vulnerabilities, like getting regular checkups.
Speaker 2 (14:51):
For your computers exactly to make sure everything's running smoothly
and securely.
Speaker 3 (14:55):
Good point, because it's so easy to ignore those update notifications.
Speaker 2 (14:58):
I know it's tempting.
Speaker 3 (14:59):
What about downloads from the internet.
Speaker 2 (15:01):
Yes, be very cautious about what you download and install, okay.
Only download software from trusting sources, okay, And be wary
of clicking on links or attachments in emails from unknown senders.
Speaker 3 (15:14):
It's like being careful about what you eat.
Speaker 2 (15:16):
You got it. You don't want to ingest something right
that could harm your system. We can't forget about social engineering.
As we discussed earlier, attackers are very good at craft
and convincing phishing attacks. Yeah, so be vigilant about the
emails and websites you interact with.
Speaker 3 (15:32):
So be a detective exactly.
Speaker 2 (15:34):
Look for clues that something might not be what it seems.
Speaker 3 (15:37):
What are some of those clues.
Speaker 2 (15:39):
Pay attention to the sender's address, Okay, look for typos
and grammatical errors. Hover over links to see where they
actually lead before you click right. Don't just blindly trust
everything you see.
Speaker 3 (15:51):
Be skeptical.
Speaker 2 (15:52):
Be skeptical and cautious. One more thing. Backups. Oh yeah,
back up your important data regularly okay, to an external
hard drive, to a cloud service.
Speaker 3 (16:03):
Okay.
Speaker 2 (16:04):
Think of it as an insurance policy for your data.
If something happens, you'll have a copy of those important files.
Speaker 3 (16:10):
Yeah. Backups are a lifesaver, especially if you get hit
with ransomware, or if your computer.
Speaker 2 (16:15):
Fails absolutely, or even if you accidentally delete.
Speaker 3 (16:17):
Something that's happened to me before me too.
Speaker 2 (16:20):
So we've covered a lot here. Yeah, passwords, software updates,
social engineering, backups, all simple but effective steps to enhance
our cybersecurity.
Speaker 3 (16:32):
It seems manageable, it is.
Speaker 2 (16:33):
And remember, cybersecurity is an ongoing process.
Speaker 3 (16:37):
Okay.
Speaker 2 (16:38):
It's not something you do once and forget about. It's
about developing good habits, staying informed about the latest threats
and best practices.
Speaker 3 (16:48):
So it's like brushing your teeth or exercising exactly something
you do consistently, Yes, to maintain good health digital health
in this case digital health.
Speaker 2 (16:56):
And if you're feeling overwhelmed, Yeah, there are plenty of
resources available online. NIST, SISA, the Sans Institute all have
great websites with tips and guidance.
Speaker 3 (17:05):
Okay, so we've talked about the evolving threat landscape, we
have the importance of organizational and governmental action, ye practical
tips for enhancing cybersecurity. But before we wrap up, I
want to leave you with one final thought. Data is
arguably our most valuable asset. It is it's what drives
our businesses, our personal lives, and society as a whole.
(17:29):
So are we doing enough to protect it?
Speaker 2 (17:31):
That's a great question.
Speaker 3 (17:33):
Are we taking cybersecurity as seriously as we should?
Speaker 2 (17:36):
Those are profound questions. Yeah, we all need to grapple
with individually and collectively. That's a lot and while there's
no easy answer, one thing is clear. We can't afford
to be complacent. Cybersecurity is everyone's responsibility. We all have
a role to play. In creating a safer, more secure
digital world.
Speaker 3 (17:57):
It's not just about protecting our devices or accounts. It's
about protecting our privacy, our livelihoods, and our way of life.
Speaker 2 (18:04):
That's right.
Speaker 3 (18:04):
The stakes have never been higher. They haven't and the
time to act is now.
Speaker 2 (18:08):
It is. You know, as we've been talking about all
these cybersecurity challenges, it's become clear that this isn't just
a technical problem. It's a human one too.
Speaker 3 (18:16):
Yeah. We can have the most sophisticated security systems in place,
but if we don't address that human factor, we're always
going to be vulnerable. That's right, Like having a state
of the art security system for your house, but leaving
the front door wide open exactly.
Speaker 2 (18:30):
Human error, negligence, even malicious intent. Yeah, these can all
undermine even the strongest defenses.
Speaker 3 (18:41):
So how do we bridge that gap between technology and
human behavior. How do we make sure people are just
as security conscious as the systems they're using.
Speaker 2 (18:51):
Well, you mentioned education a few times, Yeah, and I
think that's going to be a big part of the solution.
Speaker 3 (18:56):
It seems like it would have to be.
Speaker 1 (18:57):
We need to.
Speaker 2 (18:58):
Start early teaching kids about online safety, Okay, digital citizenship,
the importance of protecting their personal information.
Speaker 3 (19:06):
So it's like teaching them basic hygiene exactly, but for
the digital.
Speaker 2 (19:09):
World, washing your hands, brushing their teeth. Yeah, being mindful
of their online activity makes sense.
Speaker 3 (19:14):
But it can't just stop with kids.
Speaker 2 (19:16):
Right, Adults need this too, We all do.
Speaker 3 (19:18):
Especially with these threats evolving so quickly.
Speaker 2 (19:21):
We need to raise awareness about the latest scams, the
tactics these attackers are using, the steps we can all
take to protect ourselves. Think about it. We teach people
CPR right first age to prepare them for physical emergencies.
We need that same level of preparedness for the digital world.
Speaker 3 (19:40):
So it's about empowering people to be savvy digital citizens exactly,
not just passive consumers of technology.
Speaker 2 (19:47):
Yeah, but how do we create that kind of culture shift? Right?
Speaker 3 (19:50):
It feels like a big challenge.
Speaker 2 (19:52):
It is a big challenge, but I think it starts
with making cybersecurity education more accessible, Okay, more engaging. It
shouldn't be or technical. We need to meet people where
they are, whether that's through interactive online courses, social media campaigns,
even gamified learning experiences. Make it fun, make it fun,
make it relatable, something that people actually want to do exactly, and.
Speaker 3 (20:14):
This culture shift needs to happen at all levels. Yes, does,
from individuals to organizations, even to governments.
Speaker 2 (20:20):
Absolutely. Organizations need to invest in cybersecurity training for their employees, okay,
make sure they understand the company's security policies and procedures.
Speaker 3 (20:29):
So create a security conscious workplace exactly where everyone's aware
of the risks.
Speaker 2 (20:35):
And how to respond.
Speaker 3 (20:36):
Right. What about governments.
Speaker 2 (20:38):
Governments can do a lot. They can support public awareness campaigns. Okay,
fund cybersecurity research, develop policies that promote online safety.
Speaker 3 (20:48):
So create a supportive environment where cybersecurity is a priority.
Speaker 2 (20:53):
Exactly, not an afterthought, not at all. Okay, So we've
got education, training, supportive policies. What else is important in
building this culture? I think transparency and accountability are essential.
Speaker 3 (21:05):
Okay.
Speaker 2 (21:05):
When cyber attacks happen, organizations need to be open about
what happened, what data was compromised, that steps they're.
Speaker 3 (21:12):
Taking to fix things, So build trust.
Speaker 2 (21:14):
Yes, show they're taking the situation seriously and are committed
to protecting their people.
Speaker 3 (21:20):
What about when individuals make mistakes?
Speaker 2 (21:22):
Ooh, that's important.
Speaker 3 (21:23):
We've all clicked on a fishing link or fallen for
a scam.
Speaker 2 (21:26):
At some point, we have it happens. We need to
create a culture of support, not blame. Okay, shaming people
who've been hacked or fallen for a phishing attack just
discourages them from reporting these incidents right and seeking help.
Speaker 3 (21:40):
Nobody wants to admit they messed.
Speaker 2 (21:42):
Up, Nobody. It's like blaming someone for getting sicka. We
need to create a culture of empathy and support, recognizing
that everyone makes mistakes and we can learn from each other.
Speaker 3 (21:53):
And you know, while we're focused on all these challenges
and risks, I think it's important to remember that cybersecurity
isn't just about protecting ourselves from harm, right, It's also
about promoting positive uses of technology.
Speaker 2 (22:07):
Yes, it's not just about building walls. It's about creating
opportunities using technology to empower people to connect, to learn,
to make a positive impact.
Speaker 3 (22:17):
So be mindful of the risks, but optimistic about the
opportunity exactly. Yeah, it's easy to get bogged down in
all the negativity it is surrounding these cyber attacks, but
it's important to remember the technology can be a force for.
Speaker 2 (22:29):
Good, a huge force for good.
Speaker 3 (22:31):
Absolutely. So, as we wrap up this deep dive, yes,
I want to leave our listeners with a sense of hope.
I like that we've talked about the challenges, the threats,
the vulnerabilities we have. Well, we've also talked about the solutions,
the strategies, the potential for positive change we have.
Speaker 2 (22:50):
It's been a fascinating conversation. It has You've given us
a lot to think about.
Speaker 3 (22:54):
What are your final thoughts?
Speaker 2 (22:55):
My final thoughts. Cybersecurity is complex, but it's something we
can address if we work together. It's about collaboration, innovation,
a shared commitment to creating a safer, more secure digital
world for everyone, for everyone. Ultimately, it's about empowering ourselves
to be responsible digital citizens.
Speaker 3 (23:17):
I like that.
Speaker 2 (23:17):
Shaping the future of technology and a way that benefits all.
Speaker 3 (23:20):
Of humanity beautifully said. Well, on that note, I want
to thank you for joining us. It's been my pleasure
on this deep dive into cybersecurity. To our listeners, we
encourage you to continue exploring this really important topic. Yes,
please do stay informed, stay vigilant, and stay engaged in
this conversation because the future of cybersecurity really depends on
(23:41):
all of.
Speaker 2 (23:41):
Us, it really does. Well said, Until next time, Yeah,
stay safe and stay curious. Sous loselves you go it to.
Speaker 3 (23:58):
All reproduction rights are reserved by Siberian Media, Miami Production
and Technocratico dot it. For inquiries, you can reach us
at podcasts at Siberium dot media.