Join me and fellow computer security industry veterans Vanja Svajcer and Carole Theriault as we have another casual video chat about whatever is on our minds. You can either watch the video, or listen to the podcast.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Here we are, Episode 3, Smashing Security, 12th of January 2017. I'm joined by my good buddies Vanja Švajcer and Carole Theriault. Hi guys, how you doing?
The big computer security story of the week and it's changing by the hour. He's of course, he's actually a friend of the show, friend of the podcast, Donald Trump.
Can't come on today, unfortunately, he's a little bit busy. But he has been talking yet again about hacking.
And as I'm sure you guys have seen, there've been a lot of developments over the last few weeks, and in particular in the last few days with the secret dossier being released, allegedly compiled by an ex-MI6 operative, who collected intelligence on Trump and his dealings with Russia and his team and all kinds of allegations there, some of which a little bit salacious and seedy, I have to say.
And I would worry Yeah, I mean, obviously everyone's thinking about that bit of the report, but I think there's other concerns there as well.
But that was kind of interesting.
For instance, there is a claim that maybe Telegram, which is a very popular secure messaging app, may have been compromised by Russian intelligence.
Telegram's long been in a battle with Moscow, and if it has been compromised— of course they've denied it.
But all of these claims are, frankly, we have no idea whether they are true or not.
And what interests me is that these claims have apparently been circulating amongst the media and people— oh, Carole, do you want to get that?
These claims have been circulating amongst high-profile politicians and amongst intelligence agencies and the media for a while, but the media have chosen not to publish it, you know, until now.
And then of course CNN wrote that story following the Mother Jones report from last October, and then BuzzFeed took— oh, we're just going to post up the entire And that has enraged some people, none less than the president-elect, of course.
But then on the US side, on whatever opponent side, there may be people who are skilled, and they can write a report like that. It sounds pretty plausible.
I don't know what. I don't know if I'm paranoid. Maybe I'm paranoid.
And I think there is always the concern whenever these sort of big stories grab the media's attention, whether in fact it's happening in order to divert us from something more important.
I don't like to be a conspiracy theorist either.
I guess we just have to wait and see, because if even a tiny proportion of these allegations are true or have some merit, then that's something which surely the US intelligence services will be investigating as a matter with real priority, because they'll want to get to the bottom of it and make sure that the incoming government isn't compromised in some fashion.
And you're fighting with your intelligence community, you're fighting with the Russians, and you're fighting with the press. And so yeah, it's crazy times.
He'd probably get a little bit bored if fists weren't swinging in one direction or another. But anyway, no doubt we will come back to this story and other stories like it.
About the intelligence services and Mr. Trump as well. But today, tell you what, let's go back to our regular schedule.
Let's look at some of the stories which have caught our attention this week. And I wanted to start with one which has all to do with MongoDB databases.
Tens of thousands of them have been wiped.
So attackers are finding these databases which are connected to the internet with no passwords, no attempt to authenticate who's going to access them. So they're open to the world.
Hackers are able to gain access and they're wiping the databases and they're replacing the databases with messages saying, you've got to pay us so many bitcoins in order to get your data back.
So there's demand for the safe return and tools like Shodan, which is the search engine which finds things connected to the internet rather than your traditional search engines.
Make it so easy to find vulnerable servers like this, which anyone can really walk into.
You know, there were some Google search terms, they call them Google dorks, where you can actually enter to find all the vulnerable servers in a particular category.
You can use Shodan for exactly the same purposes.
And obviously there's a configuration issue when you install MongoDB by default, where that allows you some other remote access and editing of the data, which is pretty serious.
It is too easy. To install this software and leave it wide open to attack. And now they're the ones who are dealing with this PR problem and damage to their brand.
So I think that may be a trend we'll start seeing maybe even more as the desktop or traditional kind of desktop defenses against ransomware will improve over time.
And indeed, they have been improved over a couple of years.
Rather than hitting one, you know, a particular client, a targeted attack. So, yeah.
The interesting thing is that we're now seeing reports which say that virtually none of the victims have paid the ransom, who've paid the ransom, have got their data back.
And the reason is that once your Mongo database has been compromised, once it's been wiped, and because it's wide open, what's happening is other hackers are now coming in, going to the same database and replacing the ransom message with one of their own.
Saying you have to give money to a different bitcoin address. And it's like—
Maybe there's a service someone could offer where they say, you know what, I'm seeing all these insecure Mongo databases. Maybe what I should do is not go in and wipe their data.
I'll back it up for them. And when inevitably they get hacked, I'll say, oh, don't worry, I backed that up for you already.
But at the same time, if you're not driving very well.
So if you're not, if you're an admin and you're not changing a default password, maybe you need a kind of driver's ed course just to get back on, you know.
So yeah, it's probably shared blame.
This is just not a situation you wish on anyone.
And the problem is, I suspect that the common victims who are suffering from this particular attack are hospitals, small businesses, educational establishments who probably don't have huge IT resources.
That's why they're using this software. That's why it's not configured properly in the first place. They quite possibly aren't doing efficient backups either.
And, you know, they're just installing it. And so they may not be seeing the alerts.
What we should do is in the show notes, we should link to the advice Mongo have distributed about how to set up your database more securely.
But it is the very worst people who are getting hit by this, the ones who are least able to cope with it, I suspect.
Maybe when they do it in the development mode, then they don't have to secure it as much.
But once when they actually move it from development to production, then they need to be aware that they actually have to include the kind of security, secure the database management system.
What else is going on, Carole? What else have you got for us?
So this is about ex-members of Microsoft's online safety team suing Microsoft for neglect. Now they both have been diagnosed.
There's two guys, so I have their names, I'll get them in a second. So these two guys have both been diagnosed with post-traumatic stress disorder.
So PTSD, because their jobs involved looking at all kinds of horrible images day in, day out.
So we're talking, you know, child abuse, we're talking violent porn, we're talking murders, we're talking lots of gruesome, horrible things.
And we all know what some things exist on the corners of the internet and we dare not go. These people basically had to look at this stuff all the time.
So it just got me thinking, because Vanja, obviously, you used to work in the lab. So what's that like, looking at, you know, having to look at these awful images?
I mean, this is the first time I've ever heard of a desk job leading to PTSD. And maybe it's happened before.
Yeah, I mean, we did this when we would receive a number of emails and we would look at the URLs, the ones that were not automatically classified as spam.
And I can imagine the guys from the online safety team in Microsoft would have that multiplied, the kind of intensity they were seeing. So it is pretty tough.
It's a tough work environment. And you probably do—
Because I imagined, you know, because it all grew and we needed people to do that, we never really thought about the impact of looking at these images all the time.
And then I guess there was, you know, we realised the need when some people started to complain that we have to acknowledge that, you know, we agree that as a part of our job, we will have to see some of those really awful stuff.
And according to these two guys— sorry, Graham, go ahead.
You're aware of that. And according to these guys, so it's Henry Soto and Greg Blower, I don't know how to say his last name.
According to these two, yeah, they didn't ask for these jobs, right? They were kind of, they found themselves in these roles.
It wasn't roles that they had mentally prepared for and, you know, wanted to do.
But there is something in imagery and so forth which may haunt you for months, if not years, potentially some of the things which you could see.
And I would imagine as it accumulates over the years and the more things which you get to see, it begins to have an impact.
So maybe companies like Microsoft need to make sure that they are doing enough to protect their workforce.
When's the point when you say, well, now this is a kind of a critical point where you actually have to start thinking about allowing these guys to stop working in this position?
So if you've got people that are complaining or expressing difficulty doing this job, I think a company needs to take it seriously.
This is pretty, you know, this is pretty heavy stuff.
And it's going to be interesting to see what happens because obviously Microsoft are saying that they did have support for them.
So there's arguments on whether that support extended enough or really dealt with the issues that they were facing.
But I think what I really wanted to say is for all those people out there who actually do this, who look at these images every day to try and make the internet a bit safer and to try to get it out so that I don't have to look at it.
I just want to say high five. It's got to be a hard job.
You know, maybe it was popups, you know, it seems a lot safer now, but maybe it's because we have so much layers of security on my system.
There was a news that a little girl in San Diego managed to order a dollhouse using her Amazon Echo device, which basically, when the TV covered this story, many other Amazon Echo devices attempted at least to order the same dollhouse because they listened to the girl saying, Alexa, Can I play dollhouse with you?
And can you get me one, please?
I think it's— what if your partner's name is actually Alexa? What do you mean?
And from then on, they send the request in a protected way encrypted to Amazon servers in this case where it's processed and then the response comes back.
And yeah, I'm sure that they're recognizing it locally, yadda, yadda, yadda, you know, so that's kind of less scary.
And they're only sending the message if you really want the message to be sent.
But at some point, some smart cookie is going to work out how to hack these things so actually they can listen to you all the time, or someone's going to produce a cheap knockoff, one of these in China, which doesn't have proper security built into it, which does get compromised.
So what they're actually hoping, I guess, to hear is if anybody's used Alexa, because then Alexa is recording what happens in the background, not just the person who wants to say, to give an order, but all the other sounds.
So you know, when you had a tape deck, you had that really strong— don't you wish you had that for video and microphones?
I know it's all slick and cool, I get it, you know, it's all slick, there's little lights, there's tiny little buttons, but I kind of want this big power button where I can go, "Turn off," you know, and power it all off.
Obviously you record from radio, what else? Where do you get your music?
And it was a bit of an analog experience trying to get this Google Hangout to work today, I have to say, because we had to press so many buttons to try and activate it.
It was a bit playing play and record at the same time, go ka-chunk on it.
But so if you do have an Alexa, what are they called, Echo device, an Amazon Echo, if you have some device which is running Alexa, the thing is that things purchases are enabled by default, voice purchasing.
So it might be a night you may want to turn that off or you may want to have your own.
It could be something Rapunzel or something.
You know, everyone's going to have the same bloody password, aren't they? What a pain. OK, well, look, that cheered us up anyway.
So we're now on episode 3 and we've had some feedback on the last episode as well. Thanks to everyone who gives us the feedback. We really appreciate it.
We want to make this as good as we can with some effort, but not— we want to keep it as real and natural as we can. Not too much effort.
The three of you have a nice dynamic. Not when we're in person with each other. And I could get used to making a habit of watching, listening. Oh, don't push yourself, John.
Although you were all gorgeous people, it's fun to watch your expressions. I think I'll probably listen to a podcast in future. And he says 20 minutes is a good target.
Well, we are certainly thinking we're definitely going to produce a podcast version of this, and we will let you know as soon as it is available for those people who don't want to look at our ugly mugs.
In fact, Angelina— Angelina was the only person who bothered to vote after we said, "Why don't we get the audience to vote on who had the least tedious story?" So thank you, Angelina.
Angelina's all right with me. I know that she is a chess-loving, ballet-dancing security geek. What a fantastic combination that is. And we also have someone who has a crazy name.
Kirill, maybe you can tackle this. Final bit of feedback we'll cover here.
Yeah, so he says, actually, Vanja, for you, howitzers are not cannons as they have rifle barrels. Cannons are smooth.
But maybe you want to find out more about security. Make sure you tune in next time when we'll be discussing the latest computer security stories.
That just about wraps it up for us this time. Thanks for tuning in. If you liked the show, please tell your friends, maybe follow us on Twitter. We are @SmashingSecurity.
Because the way Twitter works, we couldn't get the G on the end of Smashing.
So it's Smashing Security, and you can find us there, and you can let us know what you think and give us feedback on the sort of things that you think we can talk about.
But until then, on behalf of the guys, I think we should all say cheerio.
This week, in Smashing Security #003: “Alexa! Get me an axe!”, we discuss Donald Trump and *that* secret dossier, MongoDB databases under attack, Microsoft employees suffering from PTSD, and Alexa buying doll houses.
Recorded live: Thursday 12 January, 2017.
Hope you enjoy the show, and tell us what you think! You can follow the Smashing Security team on Bluesky.
Show notes
- Donald Trump finally believes Russia hacked the DNC
- 27,000 MongoDB servers have their data wiped, receive ransom demand for its safe return
- Advice on how to secure MongoDB
- Microsoft Anti-Porn Workers Sue Over PTSD
- TV News anchor says ‘Alexa, buy me a dollhouse’ with predictable results…
Great fun watching the 3 of you – I hope there'll be many more episodes. Just a thought – why didn't that murder suspect just say "Alexa – get me an alibi!"?
My kids have Echo dots hooked into their own amazon accounts – that way it can't use my credit card for purchases. Great way to wake up my teenage daughter though – lean into room and whisper – Alexa – play Bohemian Rhapsody, Alexa – volume 10. then close the door quickly and leave. The song starts quiet enough for a stealthy exit.
The audio was much better this time; I'm not sure what/if anything you did different.
I did hear feedback / echo at a couple of points (nothing particularly bad) but I'm guessing that it's caused when people inadvertently talk over each other. Duplex sound transmitted over the internet hasn't quite caught up with the landline yet.
I like the idea of a podcast. Maybe you can rip the audio track from Google Hangouts On Air and upload that – it'd save any extra work.
On a side note regarding the Trump dossier: here's an interesting, and probably accurate, point of view taken from another blog –
"Imagine that you are someone in the CIA, concerned about the future of America. You have this Russian dossier on Donald Trump, which you have some evidence might be true. The smartest thing you can do is to leak it to the public. By doing so, you are eliminating any leverage Russia has over Trump and probably reducing the effectiveness of any other blackmail material any government might have on Trump. I believe you do this regardless of whether you ultimately believe the document's findings or not, and regardless of whether you support or oppose Trump. It's simple game-theory."
Thanks for the feedback Bob. The audio improvement is a "work in progress", and we're not entirely happy at the moment. It will get better I promise.
Meanwhile, our wish is your command. :) You can now subscribe to an audio-only podcast version of "Smashing Security".
On iTunes you can find it at https://itunes.apple.com/gb/podcast/smashing-security/id1195001633?ls=1
Alternatively, you can just search for "Smashing Security" in your favourite podcast app and you should be able to find it. Let us know if your podcast app doesn't include it, and we'll see what we can do to get it sorted out.
Oh, and if anyone wants to give us a review on iTunes that would be great. it really helps boost visibility and encourages other people to give the podcast a try. :)
Cheers!