
How do fraudsters exploit abandoned domains to steal your company’s secrets? How can you better protect your privacy when looking for love online? And who has the longest arms in the animal kingdom?
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security Episode 93. My name is Graham Cluley.
Imagine running a company, hiring new staff, and worrying that one of them might bring their bad password habits into the office. Horrendous nightmare.
That's one of the reasons why businesses small and large need a password management solution like LastPass Enterprise.
LastPass brings a vast array of features for enterprise users, including company-wide policies, reporting, user groups and roles, and new support for Microsoft Active Directory.
As an administrator, you can create highly secure passwords for your new starters right from the onset. Means no snafus.
Listeners can check it out for themselves by visiting lastpass.com/smashing. No more password snafus, no more boo-boos, just LastPass.
Through stories, realistic scenarios, the MetaCompliance guys provide animated e-learning and even games like phishing drills to test your knowledge.
Plus, these guys get passwords, they get GDPR, they get security, and they've won awards for security awareness.
Smashing Security listeners, you guys can get 10% off by visiting smashingsecurity.com/metacompliance and entering the code SMASHING. That's smashingsecurity.com/metacompliance.
When I was a wee young thing, I went to work for a company called S&S International.
And David headed up the technical support department.
Eventually the World Wide Web arrived on our doorstep and we created email addresses and we had things like, so I was , I think.
And we had a website at drsolomon.com eventually as well. And those domains were acquired by McAfee when McAfee bought our company.
But yes, so they acquired the domain names and of course they wanted any customers who are looking for information about those products to find out about McAfee and its solutions instead.
Now I went to those domain names this morning. And if you go to sans.co.uk, you don't see the old website of S&S International or even of McAfee.
Instead, you get to a web page which says, "SANS, are you looking for sandy beaches?" And it's all about beaches for some reason. And drsolomon.com is even sadder. That is now Dr.
Solomon's Casino Blog, where they are promoting online casinos. So clearly McAfee did not renew these domains, and they've fallen into the hands of other people. Now that—
And anyway, Gabor Szathmari and some of his colleagues decided to acquire 6 abandoned domain names, some of them formerly owned by Australian law firms.
He's based down in Australia.
So when companies have chosen or simply forgotten to renew them, and you can say, oh, that one looks interesting, I'll have that. I'll put down my $3.
But quite often, you know, people just simply allow domains to die. Well, that can be a problem.
And what Gabor and his colleagues focused on were legal practices, because they figured it like this: legal practices, you know, they're established and wound up just like any other business happening all the time.
But what makes them unusual is that they frequently merge with each other or are acquired, and that often coincides with a name or a brand change.
Because there is some new research done by a guy called Gabor Szathmari of the anti-phishing firm Iron Bastion.
Why are all computer names Hacking Humans, one of those sort of outfits. And suddenly we don't become cluleterio.com anymore.
We become cluleteriocyberwire.com or something like that.
We forget about it because we've forgotten about it. Yeah. We have a new spiffy brand.
Well, bad guys can register that abandoned domain name and take control of its email services, and that's what Szathmari did as well.
He grabbed some domains, set up the MX records, the mail server records, to forward any email using a catch-all system, sent the domains to him, and waited for sensitive information to begin to pour in.
Okay, sounds like a cunning plan, doesn't it?
They may have it as an autocomplete when they're typing in addresses to send to. They may not have heard that you've rebranded, for instance.
Or maybe you signed up to websites which are providing you with information, and you simply forgot to update those websites and web services with your brand spanking new email address.
But once they'd waded through all that, they did find email correspondence which was sensitive.
And they realized that they were able to use the email accounts which they now controlled Carole Theriault at clueletheriault.com, for instance.
And so it'd be possible to reset passwords on your G Suite from Google or Office 365 and access the archives of old email, which the company used to be receiving.
So if people can access your old email, that could be a real godsend for business email compromise and fraud and things like that, because it's they've hacked in.
Well, they have hacked into your email in a way, haven't they?
Now you can work out where people might have had accounts by using services like haveibeenpwned.com, okay?
An email administrator for an organization, so basically , can go to Have I Been Pwned, say, "Hey, I basically run the email for this organization," and you can confirm it by receiving an email.
"Let me know about any data breaches involving staff who have the same domain name as me."
It's only me working here really, but you know, I've got different email addresses and I want to know if any of them appear in a data breach.
And that's a real shortcut for any criminals. Now it gets even worse. There is a rival service to Have I Been Pwned called SpyCloud.
And SpyCloud does something which I'm rather less comfortable with, which Have I Been Pwned doesn't do, which is it doesn't just tell you the email addresses which are in different data breaches, it also tells you the passwords.
So if you run that domain, it will say, "Oh yes, Fred at your domain had an account on LinkedIn and this is the password that has been breached."
And as Zaf Murray, the researcher who was looking into this, he says that the results he got showed that many legal eagles were using very weak passwords, were reusing passwords constantly, and are likely to be using the same passwords in their new job or at the new domain where they're working.
Or in their private life as well. It's pretty serious stuff, isn't it? Do you want to hear some worse? Because it goes on.
Many people have got their past work email addresses associated with their LinkedIn profile and they forget to remove them when they no longer work there or if the company is rebranded.
Because what do you care if you don't get an email from LinkedIn anymore? You know, it's like a bonus, isn't it?
But there's also the issue of having this whole, you know, when I leave a job, I'm leaving behind a ton of email.
And I'm trusting that company to either delete those or archive them in a, or encrypt them in a safe way.
People are using that email address, maybe for their Dropbox account, where there could be confidential information or PayPal or Gabor Szafmari also found that it was possible to access court portals used by Australia's federal court system and access legal info.
All kinds of bad stuff going on.
Because I'm sure this will be sending shivers down many a spine.
One thing I'd recommend is if you're a company and your domain name changes or you get acquired or something, don't let the old domain name wither and die.
It doesn't cost you very much. It'll only cost you maybe $10 a year or something.
There's something—
It's nice and short, right? Sands.co.uk. It's a great little name. I'm sure lots of people would want that. And of course, you'd probably get a pretty penny for it as well.
So what you're saying is even though someone's not using it, you just got to cling to it forever.
So I've actually got this set up on my phone, for instance. People leave me a voicemail, I actually get an email with a transcript of what they've said.
So I don't have to listen to the message, right? I get that emailed to me. Now, if that was going to my old domain email address, that could be embarrassing, couldn't it?
So even if they've got your password, when they try and log in, it's going to ask them for an additional authentication.
You know, always remember the three main authentication factors. What can be easily guessed, which might be your password, what can be left in a cab and what can be chopped off?
Think about those factors. Use those to better protect your online account.
And it's just, ugh. These apps though are seriously big business. Tinder alone claims to be responsible for over 20 billion matches. Can you believe that?
Tinder and Bumble are amongst the top earners in the Apple App Store as well. And according to Statista, 1 in 5 US internet users have used dating websites or apps.
Now, yes, I do actually know a few success stories, you know, people that have met, people whose paths would never have crossed had they not used one of these dating apps, right?
And now they fall in love, they marry, they start a family, and it's all bliss, bliss, bliss.
He's from Atlanta, and he scared the shit out of a potential date he was meeting via the dating app Jack'd.
All right, so he invited the victim, aka date, over, and when the date showed up at the house, Clements demanded $100 from him.
When the victim said he had no cash, Clements apparently ran outside jumped into his own car, honked the horn repeatedly saying he had friends inside with guns.
Now cops are accusing Drayton of using dating apps to prey on women. Earlier this year, Drayton was arrested on charges that he choked an ex-girlfriend in Nassau County, New York.
Now Drayton had a list of violence against women as long as a gibbon's arm. I say gibbons because I looked it up and they have the longest arms relative to body size.
However, due to some clerical error, his out-of-state criminal activity against women was missing from the court file.
So last month, the judge waived bail and let him out on his own recognizance to await trial.
And two weeks later, the cops say Drayton used Tinder to find his next female victim, a young nurse from Queens he met on the app. Drayton is now accused of her rape and murder.
This guy seems to be the definition of a monster.
So when the cops located this guy in an LA hotel room The cops say Drayton was holding another woman captive that he had just raped.
He nabbed this one after convincing her to share an Uber.
And the interconnectivity of all these apps and social accounts happens a lot under the hood. Not a lot of people kind of see how they all interconnect.
So I have a few points here, a few tips that might help keep people a little safer while they're out there trying to look for love.
And in fact, use a different handle than you do on other social apps and accounts, right? So people can find you by searching for particular handles.
So use a unique handle for each app that you're using.
It's not hard for people to be able to kind of find you on Facebook, for example, and be able to go, yep, same picture being used. Excellent.
And it can also give access to not only your photos, but photos and comments made by your friends. Avoid putting in your workplace or school.
It is super easy to find someone on Facebook by filtering the school name or the workplace. Right? Because that makes this kind of a small network.
And one of the things is be cool with blocking people, you know, if you get any kind of creepy vibe or weirded out vibe, just block them.
There's tons of people out there, there's no need to kind of put up with any stuff like that.
And think about what you post, you know, oversharing and giving away location or identity-based info, that's what you want to avoid, especially until trust is, you know, established.
Think about using a burner number or the equivalent of a burner number.
So at this year's DEF CON, Lauren Rucker advised that dates set up a Google Voice number and maybe even have a video chat using this Google Voice number or burner number before you meet in person.
Now, Google Voice is only available in the US, I think, still. I don't think they've rolled it out further than that. But for non-US, you may want to look at apps like Switch.
That's S-W-Y-T-C-H. This is because people like Graham have kept all the names to themselves. This is an app that detaches the number from the SIM card and hosts it in the cloud.
So according to the Next Web, Switch lets you use up to 5 burner UK phone numbers from a single device. And that might be a cool way to get around that.
Just for example, if you're checking in on an app and you're always checking in from home and you're always checking in at work, it can be pretty easy for someone to kind of get an idea of what your schedule is, your vicinity, and where you're going to be at what particular time.
So there's even more advice I imagine out there as to what to do when you actually go on the date, you know.
And the other thing that's interesting about this though is if you put all these things into action, so say I was on these dating sites and I'm looking for someone, if someone did all these things—
But the thing is, if someone were acting in this way, that might give me— be weird for me because I'd be like, I can't find them anywhere online. So there's a catch-22 here.
There's a catch-22.
Apparently, this was perfectly normal. And this is 15, 16, 17 years ago.
And, well, she did find out about some Graham Cluley, but she didn't believe I was likely to be the computer security one.
She thought I was just someone with an equally unfortunate name, although it turned out I was that guy.
But I think it's about keeping your wits about you and maybe look at this list of advice and see which ones are appropriate for you to do, and especially for women, right?
Check the privacy information within the app to see what they're sharing and consider which of these tips are good for you to implement and won't get in the way of finding the love of your life.
Slash MetaCompliance and enter the code smashing with a G.
Well, piff, paff, poof, Carole, because if you're running LastPass Enterprise, you can integrate your password manager with Microsoft Active Directory.
Security, and that means the same password that your employees are already comfortable with using to log into your system will unlock everything.
It will unlock their passwords, it will unlock their work. Makes it super easy to bring LastPass into your enterprise.
And you join us at our favourite time of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like. Doesn't have to be security related necessarily.
Because, you know, we talked about Overcooked and Maria talked about Octopath Traveler the other week.
Once again for the Nintendo Switch, which is the mightiest of all the video game consoles. And it is a game called Bomb Chicken.
Well, it has cute graphics, a bit like Angry Birds, but this is your everyday story of a chicken suffering a freak accident and becoming a bomb-laying free-range hero.
What I love about this game is it's really, really simple, very addictive, and actually very hard. It's simple in terms of what you can do.
All you can do is go left, right, or lay a bomb.
So the only way to go up, for instance, is to lay bombs underneath you, and you start going up on a Tetris tower of bombs which then begin to explode, and you don't want to be an exploding chicken.
But that's how you move around, and then you do a bit of left and right, and there are things— it's a bit like a platformer, and it's very entertaining. It has slightly retro—
This is all thanks to me having a lot of trouble sleeping, right?
And I subscribe, I don't know, I was looking at this the other day, I subscribe to over 100 podcasts, and I listen regularly to about 12 of them.
And still, I'm always looking for new, or at least new to me, podcasts.
You know, you think you're so connected, and you think you know everything about podcasts, you know the landscape, and then suddenly this brand new one just pops into your echo chamber, and you're like, oh, this is great.
The other night I was listening to a podcast I've talked about on the show before called We the People Live, hosted by Jurno Joszepps, and I'm a big fan of that one.
And on that show he was interviewing the host of the Godless Spellchecker Podcast. So the Godless Spellchecker Podcast is an award-winning weekly show served up in long format.
The host is bright, thought-provoking, and he interviews public figures and also unknowns who have important stories or views to share.
Thing is, is Stephen Knight seems to talk about a lot of the issues that many of us just shy away from.
So religion, politics, gender issues, societal issues, they're all fair game here. Now I've only listened to 3 or 4 episodes so far, but I find it super listenable.
I find him a critical thinker, and I love talking about these issues that are affecting us all. Now it's not going to say that everyone's going to agree with him.
The whole motto of the show actually is, I think we've all learned something here today.
It will help solidify your thoughts and opinions whether you agree with them or not. So that's the reason I suggest it.
We're sorry not to have brought you a guest this week, but as you heard, I think it's for circumstances beyond our control, but hopefully he will be back in a future episode.
If you want to follow us on Twitter, you can do so @SmashingSecurity, no G, Twitter won't allow us to have a G.
You can go to our spanking new refurbished, wonderful online store to grab merchandise like stickers and t-shirts. They're going like hotcakes.
I keep hearing about people saying to me, oh, I saw this review and I thought it sounded great, and then I discovered you and you're amazing.
Hosts:
Graham Cluley:
Carole Theriault:
Show notes:
- What do the drsolomon.com and sands.co.uk domains look like now?
- Hacking law firms with abandoned domain names
- Fraudsters Can Access Sensitive Information from Abandoned Domains
- Have I Been Pwned: Domain search
- John and Lorena Bobbitt
- He Used Tinder to Hunt the Women He Raped and Killed, Police Say
- Missing Paperwork Got Him Out of Jail. Then, Police Say, He Raped and Killed
- Man jailed after attempting to rob man he met on dating app
- Search for images with reverse image search
- Swytch lets you use up to five 'burner' UK phone numbers from a single device
- Smashing Security 072: Why are firms so cr*p with our private data?
- A Hacker's Guide to Protecting Your Privacy While Dating
- How to Protect Your Privacy While Online Dating
- Gibbons have the longest arms relative to body size of any primate
- Bomb Chicken Teaser Trailer – YouTube
- Bomb Chicken for Nintendo Switch
- Fortnite fury over how Google handled its security hole
- The Godless Spellchecker podcast
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
People are the key to minimizing your Cyber Security risk posture. MetaCompliance makes this easier by providing a single platform for Phishing, Cybersecurity training, Policy, Privacy and Incident management. Listeners can get a 10% discount off the high-quality CyberSecurity eLearning catalog by quoting the code SMASHING. Visit www.smashingsecurity.com/metacompliance now.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.
