
Hackers are holding HBO to ransom after a massive data breach, and have leaked the phone numbers and email addresses of “Game of Thrones” cast members. Has security firm Carbon Black been leaking customers’s sensitive files while trying to scan them? And Disney’s mobile apps are accused of spying on kids…
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by John Hawes.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Recorded Future is the real-time threat intelligence company whose patented machine learning technology continuously analyzes technical, open, and darkweb sources to give organizations unmatched insight into emerging threats.
Sign up for free daily threat intelligence updates at recordedfuture.com/smashingsecurity. And thanks to Recorded Future for supporting the show.
Smashing Security, Episode 37: Boobs, Dragons, and Data Breaches with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to Episode 37 of Smashing Security for the 10th of August, 2017.
My name is Graham Cluley, and I'm joined as always by my good buddy and co-host, Carole Theriault. Hello, Carole, how are you?
It's just ridiculously grey and cold, and it should be August and sunshiny and barbecue weather, and it's definitely not that.
But let's have a little sunshine in our lives because we have a very special guest, don't we?
Let's hope we manage to get the podcast out before that begins. And then there's the story of Marcus Hutchins, aka MalwareTech, who was arrested in Las Vegas, of course.
It means he didn't get back from Las Vegas where he was attending the Black Hat and DEF CON conferences.
But there's been a lot of outcry from the security community and people have been raising money to aid in his defense. But we wait to see what's going to come out of that.
I think he's next to appear in court next Monday, so we'll see.
This is either a case of the FBI making the most enormous cock-up, pointing the finger at the wrong person, or someone who was considered very much a hero turning out to be a bad guy after all.
I think either way it's going to be a shock.
It's kind of like being a burglar and everyone calling you Burglar Jim.
That's what we're here to discuss today. And one of the stories which I've been following, and it's been developing over the last few days, is the HBO hack.
You could either work in some sort of chicken farming factory or something, or you could be an actress out there on some exotic beach, not even having to learn your lines, because all you have to do is go, "Skana ran, skana min, skana wan, skana harl, skana skrull," speaking in some ancient dragon dialect because you're on Game of Thrones.
How fantastic would that be?
There are some drawbacks.
And in particular for the cast of Game of Thrones, there's a drawback right now because HBO got hacked and the bad guys got into the email account of HBO's VP for film programming, a guy called Leslie Cohen.
And they stole his email archive, and allegedly they stole 1.5 terabytes.
And they released them onto the internet late last week prior to transmission.
I watched the first series. Do you guys watch it at all?
And then they sent a video ransom message to HBO CEO demanding something in the region of between $6 and $7 million worth of bitcoin.
Let's take a look at it.
Your competitors will know about your current and future strategies." 'Your inner circle inside HBO and senior staff will be thrown into chaos. Muahaha!
There'll be downfall in the stocks.
As you're in the business from decades, you yourselves will be full aware'— I'm sorry about the poor grammar— 'of catastrophic consequences, so make a wise decision,' they say.
They're not very good at putting in commas, and they're making some grammatical mistakes. And so there might be some clues there.
I don't know if it'd be enough to identify them unless we've already identified the hacker and then say, well, there's a good chance you did write this.
But they've got this message.
Winter is coming, HBO is falling, or winter is coming, HBO is standing and everlasting.
And the latest thing which they've leaked is a document containing the email addresses of some Game of Thrones stars, including the, that little guy, Peter Dinklage.
If you want to. You can imagine what Game of Thrones fans are like.
I suppose if you're going to perv over these people, you might as well perv over the right bodies.
You send them a message, you know, you pretend to be the CEO of HBO, dropping them a line from your personal email account saying, would you like to appear in next series?
You're also putting your trust in other people and organizations to keep your personal details out of the public gaze.
But they need to lock down their security, and it's interesting that this HBO senior exec's email was accessed because I certainly know that the stars of Game of Thrones have in the past been told to lock down their accounts with two-step verification to make it more difficult for people to hack inside.
So I wonder whether those HBO execs were actually doing what they were getting their stars to do. Maybe they weren't.
Is that just because they're of particular interest to the kind of people that like to go around hacking people?
And I think that some criminals are thinking, here is an opportunity maybe to make some money by stealing this digital content.
May not even be directly from the studio, it may be from partner companies.
If you're talking Game of Thrones, they did say it took 6 months, but that is something that you would just work at and work at to get that information, be it if you were trying to leak it because it's such big news, everyone's covering it.
You know, if they really have stolen 1.5 terabytes of data, there may be more information out there and there may be further embarrassments for HBO, but I'm not sure if HBO's likely to pay any ransom.
So what's the ransom gonna pay for?
So it's one of these— I mean, VirusTotal is the obese gorilla in the room here, but there's lots of these services where you basically, you can upload a file and it gets scanned by multiple antivirus products to say whether or not they think it's a good thing or a bad thing.
And this research firm has been looking at the files and they've managed to connect some files that they found to a particular security company which is called Carbon Black, used to be known as Bit9 apparently.
They're quite well known.
Yeah, so part of their process for dealing with files that they find on their customers' machines, if they don't recognize them, they upload them to a multi-scanning service.
So if they don't detect something as being malware on your computer they take the executable file from your computer and they put it through a process whereby it gets scanned by lots of other security products, right?
So pretty much any security product that you have on your machine has access to cloud-based resources back at the home base.
So it'll look at a given file and maybe make a judgment based on local data, maybe say, "Oh, I don't have enough information here to make a call, so I'll call home and see if they have more data." And if the headquarters doesn't know what it is, they might send the file up to their cloud for further analysis, which could be automated in some kind of sandbox system.
It could eventually end up being a person looking at it.
But in this particular product, and I would assume quite a lot of other products as well, it's being then farmed out to a third-party So the concern is then that if you—
And so your file, unknownst to you, could end up in all sorts of places.
I know VirusTotal has a very strict privacy policy, and they say they only share with other security industry players for the purposes of security.
But I wouldn't be at all surprised if I was the security operative in a major corporation, I might be able to get access to VirusTotal and claiming it's for research purposes.
But then I might also be able to troll through other stuff that I find in their feed, looking for interesting information on rival companies, for example, which I think is the point that Direct Defense is trying to make here.
And they found things like keys to cloud services like Amazon AWS, Azure, Google Compute, which you could use to then access the cloud resources of that company.
They found App Store keys for Google Play, for the Apple App Store. They found internal usernames and passwords, information about the layout of people's networks.
And if you're an admin in a big company, have you told everyone in your company what's going to happen to the files on their machines if they look interesting to an antivirus product?
And whether they are grabbing your non-detected files for further analysis and whether they're sending them off to one of these services.
But you're also reliant on these cloud scanning services being very careful as to who they allow in the club. And this isn't very good, John, is it?
Okay, so Bitdefender/Carbon Black, how are they responding to this? Have they made any sort of public statement, do we know?
So that's a hard place to be because responding, saying, "Well, we're not alone," doesn't really fly with the media who are going to be contacting them, wanting a comment.
You might want some advance warning of this to protect your customers." You know, reading the blog post, it sounds like they've actually reached out to some of Carbon Black's customers to tell them about it, stirring up things a little bit.
I wonder what the reaction will be from some of these malware scanning services online as well as to whether this is a legitimate use of their services.
Well, it sounds like there's going to be a bit of a bunfight in the security industry yet again.
So you have AV and anti-malware running and unbeknownst to you, it's being leaked out as you work on your dev product or on your application you're working on.
I think it sucks for the end user. That's what I think.
I don't know if you know anything like that.
Sounds like an interesting story, and certainly if you are a user of one of those products which is behaving in this fashion, you may want to speak to your vendor and see what guidance they have as well as to how you might be able to better protect your privacy.
The problem is, of course, you may be able to better protect your privacy, but at the same time you may be lessening your security because there's no doubt that sometimes these things actually will help you find more malware by using these services as well.
So turning off some of those cloud facilities may actually work to your disadvantage. Carole, what have you got for us?
And I wanted to talk a little bit about the subject. So let me just give you a bit of background.
So this mom's name is Amanda Rushing, and she's suing Disney for allegedly tracking children via its gaming apps for the purpose of future commercial exploitation.
And they're doing this, according to the lawsuit, all without parental consent.
She is suing on behalf of herself and all parents whose kids play Disney Princess Palace Pets and 42 other Disney-branded games that allegedly fail to comply with the Children's Online Privacy Protection Act, or better known as COPPA.
I'm just going to delete them.
Basically, the gist is to halt developers and third-party advertisers from snooping on and profiting from kids, right? So it all makes sense.
Now, this lawsuit is seeking an injunction to bar companies from collecting and disclosing the data without parental consent.
In other words, parents should okay whether they're happy for their kids to be tracked or not.
Okay, so basically the lawsuit is accusing Disney of embedding advertising-specific SDKs within their apps.
Advertising-specific SDKs are kind of blocks of code which operate to collect a user's personal information and then track online behavior in order to facilitate behavioral advertising or marketing analysis.
So this means that Disney's apps and its ad partners who it works with can track your kids' behavior while they play these online games.
And they can collect critical pieces of data from the mobile device.
Now, rather than using names or going after things email addresses, they often rely on things called persistent identifiers.
So this is kind of a unique number that's linked to a specific device or player.
And these persistent identifiers allow SDK providers to detect a child's activity across multiple apps and platforms on the internet, across different devices, and effectively providing a full chronology of the kids' actions across devices and apps over a month.
Let's say, for instance, that we agree that Disney is indeed collecting data, and that's found to be the case. Okay.
This whole idea of this anonymized ID number as opposed to identifying the actual identity of the kid is where I think things are going to get a bit sticky.
So Disney is probably going to argue that it's not compromising the child's identity and therefore does not need to worry about COPPA.
The other thing that's interesting is I wonder whether Disney's collating and parsing this data now and not planning to make use of it until the child turns 13. Right?
Because instead of starting from zero, once they're of age, they can have this glut of user information that they've collected while they were younger, not used, and then kickstart the behavioral ads as soon as they turn of age.
Now look, okay, look, I'm a kid from the '80s, right?
And basically every single TV show that I probably watched around the age of 10 was basically an ad targeted at kids so that I'd beg my parents for merch in the form of action heroes or plastic vehicles or terrains or costumes or books or whatever.
So we all know that kids are big business for corporations like Disney. But I bring this all back to, aren't you shocked that this might be happening without parental consent?
Like, it's kind of, I can't believe that ads would not request parents saying, are you okay for this?
And the kid will be getting their sticky little jam-infested fingers going click, click, click, 'cause they want to go and play Robot Wars, right?
The advertisers can say, "Hey, we did ask and someone gave consent." I think the problem here is that there are apps being made for kids, which are just plugging in advertising SDKs, just bog-standard advertising SDKs, right?
And those advertising SDKs as standard collecting a huge amount of information about you. What I would like to see are far more games where you can actually buy them properly.
You can spend your dollar or $2 or however much they are, and they don't come with any ads at all because the ads are irritating.
The ads are tracking, you know, they're getting in the way of the fun. And frankly, for a couple of dollars, who cares? Let's pay the money.
You make a really good point because I think a lot of people think, oh, well, what's annoying about, you know, the reason to get a free one is to avoid getting the annoying ads, not about the tracking of information.
So people aren't thinking about that. And I think that's right.
I think I'd like to see rather than just parental consent, you know, in a long form and have it be item 65 amongst a whole list, is it has to be explicit.
And, you know, we did the whole GDPR podcast a while ago. But that's all about explicit consent. And I think that's what I would like to see here as well.
The kid has access to the Apple ID and is allowed to buy things, you know, with just using, well, put your fingerprint here, it's free.
Maybe that just needs to be policed a little bit more.
And you have to go, no, sorry son, you can't have that game because it's going to track you.
Like, so people are so apathetic about the fact that kids are being tracked as well, which just feels a bit gross. I don't think we want our kids to be exploited through ads.
I just think it should be completely banned on apps.
And the other advantage is your kids won't be tempted to download other games, which are constantly being advertised midway through the game they are playing.
Isn't it time for Pick of the Week?
It's a movie called Adult Life Skills. Now, as you know, I am a bit— I'm a tiny, tiny, tiny, tiny, tiny bit of a Doctor Who fan, and I'm slightly excited.
I know I have never mentioned it before on the show. I'm a little bit excited that they've named the next Doctor Who and that it is a woman. Who can imagine that?
And it's Jodie Whittaker. And of course, like every other Whovian out there, I'm now desperate to find out if she's any good or not.
And so I've been sort of scouring the internet for things that she's been in before in the run-up to regeneration. And she's in this movie, it's called Adult Life Skills.
It's an offbeat British independent movie. It's northern, it's set in Yorkshire, it's sad. It's got lots of scenes in a garden shed. I mean, what more could you want?
It's a little bit depressing in places, but I like a bit of depression, frankly. And her life is going nowhere and there's some death in the family.
But anyway, other than that and terminal illness—
I think it came out last year, and it's called Adult Life Skills, and I enjoyed it. It's not as good as Fleabag, though.
Starring Phoebe Waller-Bridge, who possibly should have been Doctor Who instead of Jodie Whittaker.
Our hero is a good at heart gangster guy running his business out of a seedy strip club, as all good criminals do.
And there's a lot of the politics of both the cops and the gangsters and how they kind of scheme against each other and things like that.
But it's, for me, it's mainly fun for the Canadian-ness.
But this one is kind of explicitly, it's all very Vancouver-y and they, pretty much every scene features someone walking past a beer tap serving Molson Canadian or wearing a Canada cap or something like that.
And it's also quite fun.
You know, you get a holdall, you get a couple of kilos, you're laughing.
There's a Canadian Ethan Hawke who looks very seedy. But yeah, our main guy is basically logistics.
He runs trucking and shipping and stuff because there's just so much space needs to be taken up to do all this stuff.
And then also that nowadays it's pretty much pointless because it's all being legalized everywhere.
So podcast number 1 I recommend is called Secrets, Crimes, and Audio Tape. It's from Wondery. It's hosted by David "Whatavoice" Reinstrom. I swear his voice is just great for radio.
I love it, I love it, I love it. And this podcast basically dramatizes stories involving crime, politics, love, mysteries, conspiracies.
The scripts are good, the sound effects are good. It's been going for about a year, so that means there's a nice little backlog for you.
And it's all about celebrating the golden age of audio drama. So I love it, check it out. I'm sure it'll make lots of people happy. Second one is called Seriously.
It's a BBC production. It's hosted by Rhiannon Dillon. The website description of this is perfect.
It's basically a rich selection of documentaries aimed at relentlessly curious minds. So no subject is too strange, no idea too weird.
And I think that alone should entice lots of people to go listen to it. And plus, there's a huge archive there.
You never quite know what you're going to get, but it is interesting.
Thank you very much, Carole Theriault.
If you are on Facebook, we now have a Facebook Smashing Security group, and you can have a look for Smashing Security on Facebook, or you can go to this link: smashingsecurity.com/facebook, which will take you directly there.
We also now have an online store where you can buy things like a t-shirt for the global thermonuclear war that's about to begin.
So you can check out the merch at smashingsecurity.com/store.
If you like the show, tell your friends and leave us a comment on what you think. You can go to smashingsecurity.com or you can go to iTunes and leave a comment there instead.
Until next time, toodle-oo, bye-bye!
Show notes:
Please check out the show notes for this episode of the podcast on the Smashing Security webpage.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
John Hawes
Thanks to our sponsor:
This episode of Smashing Security is made possible by the generous support of Recorded Future – the real-time threat intelligence company whose patented machine learning technology continuously analyzes technical, open, and dark web sources to give organizations unmatched insight into emerging threats.
Sign up for free daily threat intelligence updates at recordedfuture.com/intel
Thanks to Recorded Future for their support.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on iTunes or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!