RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
Threat ResearchOctober 1, 2024

When hackers get hacked: Sam Curry on his career — and his latest research

In a new ConversingLabs podcast, the independent security researcher talks about his early entry into the field — and his latest connected-car research.

paul roberts headshot black and white
Paul Roberts, Director of Content and Editorial at RLPaul Roberts
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
hacker podcast sam curry title slide

In the latest edition of the ConversingLabs podcast, ReversingLabs talks with Sam Curry, one of the most prominent independent security researchers today. This talented white-hat hacker has a penchant for finding and exploiting holes in public-facing web applications — especially the growing number of cloud-based apps and other infrastructure backing internet of things (IoT) deployments.

His research frequently makes headlines, and his latest is no exception. Curry joined our podcast to explain how a remotely exploitable flaw in a web server operated by the automaker KIA could be used to track vehicle owners and obtain personal information, including the owner's name, phone number, email address, and home address.

Curry's latest find comes less than two years after an even bigger survey he and other collaborators published, Web Hackers vs. the Auto Industry, which disclosed wide-ranging, exploitable flaws in vehicle telematics systems by 16 car makers.

Read on and check out the latest ConversingLabs podcast for a deep dive into Curry’s life as an independent security researcher — and his latest research.

War Games, anyone?

Curry had an early introduction to cybersecurity, at the age of 11 or 12. “These were like the old video game-hacking days when there were flame wars between forums and stuff. And yeah, ever since then, just like deep-diving web security,” he told me during our ConversingLabs discussion.

That eventually led to a War Games-like scenario at age 15, with Curry hacking into his school's network. He ended up face to face with the district’s IT manager — and they hit it off. “That was like my first conversation with someone who did computer stuff,” Curry said.

The broadband router compromise

One of the highlights of this ConversingLabs episode is the discussion about a blog post Curry published in June, in which he detailed how his discovery of a malicious IP address interacting with his home network kicked off an extensive investigation. The IP address replayed HTTP requests he had sent, suggesting his broadband router had been compromised.

Digging deeper, Curry found that his internet service provider, Cox, had a vulnerable application programming interface (API) capable of remotely managing customer devices. However, the hack occurred before this API was implemented, indicating a different method was used: the exploitation of an embedded software flaw, which pushes the possible date of compromise back by a couple years.

Curry’s thorough investigation, which included assistance from professionals in the threat intelligence community, revealed that the IP address was linked to various phishing domains targeting a security firm in South America that is a major consumer brand. In the podcast, Curry shared insights on the widespread risks facing IoT devices and embedded software used in homes, businesses, and critical infrastructure. And he offered some guidance about what consumers (and security researchers) can do to monitor that risk.

Investigating airport security

In the months between the router hack and the KIA revelations, Curry was busy on other projects. Among them was delving into airport passenger-screening systems with security researcher Ian Carroll. Curry and Carroll discovered vulnerabilities in a system used to validate pilots’ credentials. By exploiting these weaknesses, they could theoretically add unauthorized individuals as valid pilots. This alarming finding demonstrates the real-world implications of software vulnerabilities in critical infrastructure.

The big picture? Transparency matters

In this latest ConversingLabs podcast, Curry explains the broader implication of his research: that many organizations still rely on outdated security practices. Whether it’s automotive telematics, broadband routers, or airport security systems, the urgent need for robust cybersecurity measures is clear.

Curry's work brings attention to these exposures as he and others push for better practices and greater accountability within the industry, noting that the cybersecurity landscape is ever-evolving — and that it’s imperative to stay ahead of threats.

Get key insights and more in this latest ConversingLabs podcast — and check out Curry's blog for his latest research

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Threat Research

More Blog Posts

ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Claude AI adds PromptMink malware to crypto trading agent

Claude adds malware to crypto agent

PromptMink has evolved into a malicious dependency in a package that allows access to crypto wallets and funds.

Learn More about Claude adds malware to crypto agent
Claude adds malware to crypto agent
Graphalgo supply chain campaign respawned.

Graphalgo fake recruiter campaign returns

An attack targeting crypto developers has been respawned — with an LLC and new techniques.

Learn More about Graphalgo fake recruiter campaign returns
Graphalgo fake recruiter campaign returns
TeamPCP supply chain attack

The TeamPCP supply chain attack evolves

The malicious campaign started with Trivy and Checkmarx and has shifted to LiteLLM — and now telnix. Here's how.

Learn More about The TeamPCP supply chain attack evolves
The TeamPCP supply chain attack evolves

Fake install logs in npm packages load RAT

The final-stage malware in the Ghost campaign is a RAT designed to steal crypto wallets and sensitive data.

Learn More about Fake install logs in npm packages load RAT
Fake install logs in npm packages load RAT
Malicious npm packages use fake install logs to load RAT