
A Namecheap vulnerability allows strangers to make subdomains for your website, Troy Hunt examines password length, and ex-Google and Facebook employees are fighting to protect kids from social media addiction.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Troy Hunt of HaveIBeenPwned.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Smashing Security, Episode 64: So Just a Teeny Tiny Security Issue Then, with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to another episode of Smashing Security, Episode 64.
Have you seen where you sent the worst people?
We sent them to us and we sent them to Australia of all places. We should have gone to Australia and left them in— Yeah, when I say we, I am Canadian. So you're sort of—
People are the key to minimizing your cybersecurity risk posture, and MetaCompliance makes this easier by providing a single platform for phishing, cybersecurity training, policy, privacy, and incident management.
Listeners can get a 10% discount off the high-quality cybersecurity e-learning catalog by quoting the code SMASHING. Just visit www.metacompliance.com. That's www.metacompliance.com.
It is an intruder analytics solution that gives you the confidence to detect and investigate security incidents faster.
You can download a 30-day trial by visiting rapid7.com/insightidr.
And as always, what we've been doing is looking back over some of the security stories, things which piqued our interest in the world of computer security and online privacy and computers going wrong.
And there are various ones which we thought we would bring to your attention. Let's start by talking about phishing.
You know, the traditional way that phishing works is that the bad guys trick you into clicking on a link to take you to a website which may appear to be your online bank.
The fact is, it looks like a legitimate login page, doesn't it, for your bank, your social media account, but really it's on a different domain.
If you could check out the actual domain it really is on, you'd realize, oh, it's not on Lloyds Bank, you know, it's on sort of IIoids Bank instead.
Or, you know, they might have used a trick like that, or they may have used some HTML shenanigans in the email to make you think you were clicking on one thing, but you end up on another.
Yeah. And so that's fundamentally, I think, how phishing works, right? But what if the phishers were able to actually create a subdomain of your real site?
So if you ran a company called example.com, www.example.com, what if they were able to create a subdomain which was login.example.com or accountlogin.example.com or something like that, which that would seem pretty convincing, wouldn't it, if it really was part of example.com.
And it would imply and infer that the bad guys had managed to breach your organization in order to create that subdomain.
And he's a longstanding Apple Mac journalist. So he knows his onions.
And he also runs a blog called Kirkville.com, and Kirk had received this weird email from Google's Webmaster Console telling him that Google had found hacked content on his site.
And I mean, Troy, I mean, I think people like you and me who run our own blogs, that would be a nightmare scenario, wouldn't it?
You know, the number of WordPress blogs out there that have got a phishing page somewhere on the site, and it is leveraging the fact that, you know, here you have a domain that's existed for a while, it doesn't have a negative reputation, and they leverage that.
And I guess it's the same thing here, grabbing a subdomain.
It will find a blog or something where the bad guys have managed to inject spam selling Viagra or something onto your pages, maybe exploiting a vulnerability in WordPress or something that in order to get their messages out there.
But in this particular case, the bad guys had created subdomains for his site, such as latestnews.kirkville.com, which isn't a subdomain that he uses.
And on those, they planted content which was ripping off the likes of the Huffington Post, and they'd splattered money-making ads all around it as well.
And when Kirk contacted me and said, what should I do about this? My initial thought was, well, someone must have hacked your account and created a subdomain.
And I said, you need to check out your— I found out where his website was hosted and the name servers, which were at a company called Namecheap.
And well, yeah, yeah, yeah, the clue's in the name, guys, the clue's in the name, not always, but you know.
Anyway, he assured me, look, I have a strong unique password, which I believed, and I've enabled two-factor authentication.
And when he did actually log in, he could not see the subdomains in his control panel. So what on earth had happened?
And there was a bit of toing and froing, and he contacted Namecheap, and Namecheap support said, ah, yes, well, we've had a little look.
It looks like another user added the subdomains to their hosting account, but they've been connected with your domain.
Now, in Kirk's case, it probably isn't that catastrophic, right, because it's just a blog. But imagine if he had been some online site which people logged into.
This could have been used for phishing instead, and that could have caused all manner of problems and highly convincing login pages could have been created.
So Kirk wrote about this on his site saying this has happened, and he wanted really to warn other people, you know, if you get a message from Google Webmaster Console, if you've been warned you've got hacked information on your domain, then this is something to watch out for.
So I tweeted out a link to Kirk's story, right? Namecheap, not very happy.
They tweeted a reply to me saying, look, look, we definitely don't want word to spread about this, and we want to keep these— You are kidding.
But the thing was Kirk wasn't saying how it was done. Kirk doesn't know how it was done. I still don't know how the bad guys did it. All he was saying was, this has happened to me.
Watch out, chaps. It might've happened to you. Be aware of it.
Don't panic if you get one of those hacked messages from Google, which you need to sort out because it appears to be a Namecheap problem.
So obviously that was really silly of them to do, but I think that's the story we come across so often, isn't it? Anyone can have a vulnerability.
Anyone can have a screw-up and there can be bugs and daft things like this can happen or bad guys can exploit them, but it's how you handle them, how you respond to them.
We're recording this on Tuesday evening and they haven't contacted the customers yet. Maybe by the time this podcast comes out, they will have done.
What they have said is on Twitter, they've said that the problem only affected, and I'm quoting, a teeny tiny group of users.
And as a journalist, I run a blog that I've been running for 20 years. This is the kind of material we write about when we encounter a problem like this and we figure it out.
I would assume that I would assume they'll be sending an email to all users that are affected, which should include me, even though I'm the one who brought it to their attention.
But as of now, we are 30 hours later and I haven't heard anything other than their replies on Twitter.
Of course, as you know, moving a website takes a lot of time. It's not something you just do at the drop of a hat, but this is really, you know, the last straw with them.
If Kirk didn't have Google Search Console set up for his site, he probably would never have known that this was going on.
I'm not a customer of yours. I was linking to McElhaney's blog.
And for a little bit of context, I put out last year this massive set of passwords called Pwned Passwords as part of Have I Been Pwned. And they're about 320 million passwords.
They're all SHA-1 hashed because some of them do have a bit of PII and stuff in them.
And the sort of the premise of it was you could take these and then when someone registers, logs in, changes password, you could hash that, compare it to the set, and say, hey, if your password is in this 320 million set, it has appeared somewhere in a data breach, probably not a good password, you want to do something else with it.
But, you know, the premise is, I guess, not so much to check your own password, but more if you are running a web application and you want to try and encourage your users to use good passwords, the theory is that you should be looking at previous breach corpuses to see if someone's using a password that's appeared publicly before.
So I'm doing a V2, which incidentally is now over half a billion. I've just finally wrapped up the complete set.
And as part of that exercise, I wanted to sort of look at, could I possibly try and reduce the size of this a little bit by trimming out the stuff that was beneath some sort of certain threshold?
Because websites just shouldn't be allowing that length. And I thought, oh, look, I'll go through and do this little exercise.
I'll just see what sort of minimum length the world's largest websites have.
I'd probably want it to be longer than that though.
And to the earlier point about locking users, the challenge here is that the shorter we make it, the easier we make it.
The shorter we make it, people will also fall down to that lowest available level of security, and that will pose other risks. So I often ask this question when I run workshops.
I sort of go, okay, well, look, you know, what's the right number? And most people sort of guess it around the, you know, 8-12 kind of mark.
And the interesting thing I found, I looked at 15 of the world's largest websites, is that by far the most common number is 6.
So Facebook, Reddit, Amazon, Twitter, Instagram, LinkedIn, Pornhub, eBay, and Imgur all allow 6. And then there are only 4 of them which had the next highest limit, which was 8.
And we had Google, Yahoo, Microsoft, and Twitch all allowing 8. Now that was sort of the usual spread. That the couple of outliers here is that Netflix only requires 4.
And I can kind of get that in so far. Yeah, well, all right. So, well, this is an interesting sort of tangential discussion.
So what I was going to say is I can kind of get it because you're often entering this on a TV remote. So from a usability perspective, there's that.
The tangent there around— I think that the path we're about to go down there is it's only your TV, you know, and it's only movies and things.
I linked back to that story from years ago about Matt Honan's epic hacking, the one where someone basically got the last 4 digits of his credit card from one service, then used that as identity verification into others.
So, you know, my Netflix password, I'm pretty sure, I definitely know it's not 4 characters. It's not the usual sort of 30 or 40 I'd use with a password manager either.
Because that will then bring the size of this whole thing down and it will be a little more manageable.
But when I found that and it was such a small number, I was like, there's really not much point chopping that out.
Now you've got to remember also that these passwords come from real data breaches, so that the number under 6% is not so much a representation of "Oh, thank God people don't choose really, really bad passwords." It's going to be more to do with the fact that there are a lot of sites that have a minimum length of 6.
So what I'm going to do when I publish these is I'm going to write this up and I'll do a little bit of analysis on the distribution of passwords by length as well.
And it will just be interesting to see if there's a very heavy distribution towards 6 and 8 character long passwords because that's the minimum that so many sites require.
There's no one saying it has to be 5.
And I even had a couple of people reply going, "The number I choose is 9." And I'm like, "Okay, why?" "Because it feels right." It's like, oh, that's— this is the whole thing, right?
This is not a scientific decision.
And a lot of the point of the blog post as well is to sort of make the observation that passwords these days are becoming a lot more than just, do I have two strings, right?
So do I have a username and a password? And are the ones in the system the same ones that are provided by the user who comes to log in? So they're evolving beyond that.
And we're really getting to a point now where there are many other mitigating controls with authentication.
You know, that could be everything from resilience to brute force attacks to confidence levels in user agents and IP addresses to all sorts of other things.
Hopefully monitoring my own password set and making sure the password's not in there.
So it's getting much, much more sophisticated and we're moving away from these really simple, basic mathematical criteria, you know, X number of characters long, uppercase, lowercase, you know, all this kind of rubbish.
So fortunately, that is now starting to go away and we're getting a bit smarter about them.
And every single time someone pops up and says, "Oh, we've got a thing which is going to fix the problem with passwords and we will never need them again." I've, in fact, I wrote something just yesterday on a column I write about precisely this.
Every time someone pops up and says they've got a thing, it never happens. And it never happens because passwords are something that's so simple that everybody understands them.
And that's why they live.
Don't be rude because we've had a complaint about—
So the thing is, is after sleep and work and basic life maintenance, by which I mean eating, bathing, you know, making sure your kids are awake and going to where they need to go, you apparently have as an adult about 4 to 6 hours of personal time.
And this is where, you know, you do your hobbies, you have a hot date, you have family time and all that cool stuff.
So apparently this 4 or 6 hours that we have, we are spending about 90% of it on our screens.
But I somehow excuse it because I think most other people are doing the same thing, so it must be okay.
So in 2015, only 2 years, 3 years ago, it was about 75%. So it's gone up quite a lot in the last few years. And one of the reasons is to do with FOMO, or the fear of missing out.
But some people are saying that algorithms that are designed and implemented by the big internet giants are actually fueling addictive behaviors in us that very much counter our well-being.
So for example, social psychologist Adam Alter maintains that we are literally addicted to modern technology products.
And there was this excellent piece published in The Guardian this weekend about how YouTube's algorithm distorts truth.
And it talks about how YouTube cherry-picks controversial or sensationalist up next for your autoplay to keep you glued to the screen.
Now interestingly, these are all ex-Facebookers, ex-Googlers, who basically now have seen the error of their ways, and they have called— their organization is called the Center for Humane Technology, or humane-tech.com.
The group is dedicated to raising awareness about the negative effects of social media and technology on society. And it's spearheaded by Tristan Harris.
Now, he spent years working at Google as a design ethicist, but has started campaigning against the dangers of these big websites like Facebook and Google.
Anyway, so the group this week have announced a partnership with nonprofit media watchdog Common Sense Media to basically talk about tech addiction. And this isn't small potatoes.
They got $7 million from Common Sense Media. And they got $50 million in free media and airtime from Comcast and DirecTV.
So I'm suspecting a lot of our American friends are going to see these ads.
I do think there really is a case that people are getting addicted to these things.
Are the big kids on the block doing what we want them to do, or have we all become slaves to their offerings for reasons we can't even understand?
Humane Tech say Facebook, Twitter, Instagram, and Google are all caught in a zero-sum race for our finite attention. And they need that to make money. Things like Snapchat.
I don't use Snapchat, but Snapchat has this feature called Snapstreaks. And basically it shows users how many days in a row they've sent a Snapchat picture to their friends. Right?
So if you miss a day, if you miss it in 24 hours, you lose your streak.
And your parents force you to go on vacation and you have no airtime, apparently very stressful because you lose your number that you've been working on for so long.
And for many of us, it's time to catch up on all the things we missed since yesterday. Right.
So you're checking on everything that's happened from the last time you've been on the phone. And it's a slot machine style approach.
It has this thing called intermittent variable reward.
So every time you check your notifications, you don't know if you're gonna have a message, a comment, a share, a follow, or like. You might have lots, you might have none.
And that slot machine kind of mentality, you know, you think, well, okay, so what? Except slot machines are very addictive.
They make more money in the States, this is TIL, I learned this today, they make more money in the United States than baseball, movies, and theme parks combined.
So there you go, slot machines, who knew?
And if you can do something that tunes you out for a couple of hours, so yeah, I'll play tennis or I'll get on the water or do something like that.
And I sort of have a couple of hours where you can't look at it. And of course you come back afterwards, right? And there's a flood of whatever's happened while you've been gone.
But yeah, I think that more than anything, that is the way to tune out. And that's good for you in all sorts of other ways too.
So it's basically about taking back control and making sure you use it properly. And it's also for your kids, right?
I mean, Graham, you've got a kid and you've mentioned before that he's online a lot.
And actually, I remember an old video that Troy put out on his YouTube channel where he was introducing his son, I think, to a site called code.org, which is basically teaches kids how to program and write little games and things.
And it's fantastic.
And so what I've tried to do is I've taken my child's interest in technology and things like that and said, look, if you're going to be stuck in front of a screen because it's a rainy day and you want that, let's at least—
Well, he's back at school at the moment, so he's just exhausted in the evenings, but half term's coming up and I'm sure we'll be doing it again.
I'm trying them. So this is turning off notifications. So anything that interrupts your thoughts or current activity.
So in other words, go visit your WhatsApp feed and your Twitter feed when you're ready to do so rather than getting the feed, getting the notifications.
Create specific no-screen time for the family, be it Tuesday night or whatever. But really, you were saying, go out and get some exercise.
But you see, I go out for walks a lot and I, well, when I could walk, but I do it with headphones, right? I'm always listening to podcasts.
So I kind of think I may have to unplug completely for a bit of the time. Set alarms. People say no screens rule in the bedroom. I've heard people have that rule.
And turn off autoplay. I think that's a big one.
Turning off autoplay can pull you out because you'll notice a lot of these apps, they hide the clock as well because I use my phone obviously as my watch, right?
And they'll hide the clock. So sometimes I'll be on a feed, something reading, I read and I think, I wonder what time it is.
And because it's not top of the phone, I'll actually go, I'll look later and carry on snarfling up the feed.
Kind of, you know, you play a movie and then it'll you know, whatever, a little video, and then it'll just decide for you. And who's deciding that? So that's the other problem.
They're deciding that based on the feeds, the things you've already watched.
But what if you're watching something for research that I may not necessarily be interested in personally? I don't need them in my feed.
But I think that there is a real addiction problem with this technology, and we are teaching our kids to be addicted as well.
And I think in many ways smartphones are the new cigarettes and people do get very twitchy if they haven't checked their feeds for a while or they haven't checked out Facebook on who's posting what.
And we do need to try and be much more disciplined and grown up about this. And I think, I mean, I'm putting my hands up as well.
Okay.
Trusted by over 6,700 organizations globally, Rapid7 security solutions harness the critical information essential to protect an organization's best interest.
Rapid7's InsightIDR has been named a Visionary in Gartner's latest SIEM Magic Quadrant.
InsightIDR unifies SIEM, UBA, and EDR and is an intruder analytics solution that gives you the confidence to detect and investigate security incidents faster.
You can download a 30-day trial by visiting rapid7.com/insightidr. That's rapid7.com/insightidr.
You can save 10% as a Smashing Security listener off the high-quality cybersecurity e-learning catalog by going to metacompliance.com and quoting the code SMASHING.
That's metacompliance.com. And don't forget the code Smashing Security. On with the show. And welcome back.
You join us at our favorite part of the show, which we like to call Pick of the Week.
It could be a funny story, a book they've read, a TV show, a movie, a record, an app, a website, a podcast, whatever you like. Doesn't have to be security related necessarily.
And my pick of the week is a movie. I think I checked it out on Netflix a couple of nights ago and it is called AlphaGo. And you may remember the AlphaGo project, quite fascinating.
And there is a documentary all about it. The movie follows Dr. Demis Hassabis. I hope I said that correctly. He comes from Oxford, actually.
He's one of the brains behind DeepMind, which is now a Google company, and his team, and he pursued a dream which he had had for over 20 years to build a computer program capable of beating the best in the world at Go.
And they took on the world's best player, as you can see in the documentary.
His name is Lee Sedol, and he's a national hero in Korea and one of the greatest Go players who's ever lived. They have the news conference.
Lee Sedol says, you know, I'm going to beat the machine. Obviously I'm going to beat the machine. 5-0. You know, maybe if I have a bad day, it'll be 4-1.
But anyway, you can guess what's going to happen. That's right. Professional Go player thrashes the computer. Humanity wins the day. Hooray! Hurrah for humans! We win! Yeah.
Oh no, hang on. That isn't actually what happens. I got that slightly wrong.
It's actually quite emotional because your heart cries out for this fantastic Go player Lee Sedol, who's a national hero, and you don't want him to be crushed by the computer in the glare of the country's TV cameras.
You wonder how he's— every day he has to go back to the board and he's becoming more and more of a shadow of himself, playing another match and the humiliation on his shoulders.
It is a fantastic movie.
There are some real surprises in it, and I think there's some things we can learn about artificial intelligence, and there's some beautiful moves which are expounded upon in the documentary.
And there's actually a Wired article, which I will include in a link in the show notes, where you can read all about move 37 in game number 2, which was very exciting.
And it was a conversation with Eliezer Yudkowsky, who's a decision theorist, computer scientist, who is all about AI. And he was talking about AlphaGo and exactly this topic.
So it's worth listening if you're into it, go listen to that podcast. It's quite interesting. And he's an interesting guy.
I mean, I personally would have preferred a little bit more depth in the documentary, I think, because I kept on thinking, You know, there are some scary things about this which aren't touched upon at all.
It's more the, "Oh, isn't this a tremendous achievement?" And clearly it is a tremendous achievement from a programming point of view. Wow.
You know, that they've managed to do this, but I think there's deeper stories to tell here.
And I wanted to talk about what I redid with my network a little while ago.
I ripped out all the old crap, which was this sort of consumer-grade, the kind of box you get from your ISP kind of router deal, ripped it all out.
And I went and bought a bunch of Ubiquiti stuff and put that in through the whole house. And my house glows at night now.
Put it this way, I've got so many wireless access points and now what happens is I can go into this one central administration interface.
I can see all the different devices around the house. I can see all the clients that attach to them, where they move around. I can remotely administer them.
So I set up my parents and I set up my brother and I remote update stuff via the cloud, which is actually really cool because it actually updates.
And one of the things I know— I'm getting really choked up.
You know, I got excited about the fact that here I have firmware and software which actually updates.
Because when I thought back to the other devices I had, it's like, wow, those things never change. And you just know that there's flaws within this stuff.
So what I'm doing now is I either remotely update it, or I went around to my brother's house the other day and I'm sort of sitting there and I'm on his Wi-Fi and I pull out the mobile app and it's like, yeah, you know, there's a slightly new version of the access point.
Yeah, we'll take that update, you know, and we'll update each one of these and we'll do a rolling update so that it's across your 7 access points in your house.
We don't lose them all at once and the kids don't get disconnected from the TV and all this kind of stuff.
And I just love the fact that I hadn't really even thought about it again until today when I was sitting here going, what am I going to talk about?
Oh, isn't it nice that my connection actually works?
Yeah, yeah, no, Google it. Seriously, there's a blog post about it.
Having said this, none of this solves the problem that my outbound internet connection maxes out at less than 2 megabits a second up.
So that still is a problem that even Ubiquiti can't fix.
And because of— I had to scrap it all because of my little back snafu. So what to do, right?
Literally, you just make a ton of crepes, stack them up, and between them put layers of delicious stuff. That's it, really. And it's good. Everyone loves it. Kids love it.
Everyone loves it. I have a crepe recipe inside the show notes. It's a good one. And here's some favorite fillings. I'm doing this. I'm doing this. You ready?
If you haven't already checked out Troy's blog at TroyHunt.com or his fantastic Have I Been Pwned project, which you should definitely sign up for so you get notification if you're included in some of these ghastly data breaches, then please do so.
And Troy, where's the best place for people to follow you. I guess it's on Twitter, isn't it? That seems to be where you are. You're there right now, aren't you? @TroyHunt.
And if you're going on Twitter, you can also check us out. We're at Smashing Security without a G. Twitter didn't let us have a G.
And maybe if you like the show, you might want to rate us on Apple Podcasts.
It helps new listeners discover the show, which keeps us happy and it entertains Carole Theriault as well.
If you leave a review, because at the moment she's stuck in her bed, unable to move. And the only thrill she gets is refreshing iTunes.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Troy Hunt – @troyhunt
Show notes:
- Namecheap Name Server Vulnerability Allows Unauthorized Users to Create Sub-Domains
- That’s not how security works, security is not obscurity
- Update on Recent Hosting Breach – Namecheap Blog
- Have I been pwned? Pwned Passwords
- How Long is Long Enough? Minimum Password Lengths by the World's Top Sites
- Center for Humane Technology
- Adam Alter: Why our screens make us less happy
- Ex Facebook, Google Employees Launch Anti-Tech Campaign
- Social Networking Sites and Addiction: Ten Lessons Learned
- 'Fiction is outperforming reality': how YouTube's algorithm distorts truth
- AlphaGo movie
- In Two Moves, AlphaGo and Lee Sedol Redefined the Future
- Ubiquiti Networks
- Basic Crepe Batter Recipe
- Gateau de crepes
- Smashing Security on Facebook
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
People are the key to minimizing your Cyber Security risk posture. MetaCompliance makes this easier by providing a single platform for Phishing, Cybersecurity training, Policy, Privacy and Incident management. Listeners can get a 10% discount off the high-quality CyberSecurity eLearning catalog by quoting the code SMASHING. Visit www.metacompliance.com now.
InsightIDR is an intruder analytics solution that gives you the confidence to detect and investigate security incidents faster. You can download a 30-day trial by visiting www.rapid7.com/insightidr
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
