
Jack Rhysider from the “Darknet Diaries” podcast joins us to chat about his interview with the elusive Hacker Giraffe, how a death is preventing cryptocurrency investors from reaching their money, and how ‘beauty camera’ apps are redirecting users to phishing websites and stealing their selfies.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast, hosted by cybersecurity veterans Graham Cluley and Carole Theriault.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Ransomware and Phishing Beauty Apps with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 114. My name is Graham Cluley.
And then here we are together. So stop.
And during the course of the podcast, we'll talk a little bit more about the Darknet Diaries as well, because probably a lot of listeners will be interested if they're not already listening to it.
But what have we got coming up on the show this week, Carole?
And I'm visiting the world of fake beauty apps feeding off the kids' love for digital surgery. All this and more coming up on episode 114 of Smashing Security.
Every security team can benefit from that kind of threat intelligence.
Grab yourself a copy of Recorded Future's free handbook, which explains why threat intelligence is an essential part of every organization's defense against the latest cyberattacks.
Go and get it at smashingsecurity.com/intelligence. And thanks to Recorded Future for supporting the show.
I couldn't possibly remember all my passwords for all my accounts.
Let LastPass Enterprise do the hard work for you because they take security seriously and they're really responsive. Check out LastPass Enterprise at lastpass.com/smashing.
I'm on the show.
So I think this is stuff which they've sort of safely borrowed away onto the cryptocurrency exchange and it's been stored away by these fellows who are looking after it.
And they've put it in cold storage with the thought that it's going to be hard for the hackers to access it.
It'll be offline hopefully and protected by a hard to crack password, strong encryption, you know.
If you remember during 2017, the price of Bitcoin absolutely exploded. It rocketed, didn't it? An extraordinary rate. Until the end of the year.
I think it got up to about $20,000 per Bitcoin.
And then it suffered that really rapid fall as well, which is making John McAfee's bet that I think— was he predicting that Bitcoin would be worth $2 million or something by the end of 2020?
I can't remember.
The point I'm making is that because Bitcoin's exploded in their price, lots of people who had Bitcoin investments— maybe people just sort of made a punt and they spent $300, right, years and years ago on buying some Bitcoin.
Suddenly they found out, oh my goodness, it's worth $300,000. How can I get hold of that money? But they couldn't remember their passwords and they couldn't get their Bitcoin.
I was reading about this South Carolina hypnotist who was actually offering his services helping people recall. No, for real.
His name is Jason Miller, and he was charging 1 Bitcoin plus 5% of the amount recovered. If he managed to hypnotize the password out of you.
But, but yeah, that's what he was trying to— that's what he was trying to sell to people. Some people would turn to things like this.
I've also heard where someone threw away a hard drive which had bitcoin on it, and then years later they went back to the dump with an excavator and tried to find their hard drive.
In the case of QuadrigaCX, the Canadian cryptocurrency exchange, the problem wasn't so much that the password couldn't be remembered, but the only person who knew the password had died.
And they posted this message saying, "With a heavy heart, we announce the sudden passing of Gerald Cotten, a visionary leader." He died due to complications of Crohn's disease.
In December, he was in India. He was opening an orphanage, helping kids in need, giving them safe refuge. You think, "Oh my goodness, how terrible."
But they haven't said anything about passwords.
The thing about the password was only revealed at the end of January, the end of last month, when they revealed that Gerald Cotten was the only person who knew the password to Quadriga's cold storage, meaning that its clients' $190 million worth of holdings couldn't be repaid to them.
Maybe magnify, enhance the picture, going to analyse his brain, plug a couple of jump leads into the cerebellum. It'd be fantastic, wouldn't it?
Now, all of that makes me wonder, was it really sensible for them not to have written down the password or put it somewhere securely?
Because we tell people all the time, be very, very careful with your passwords, right? And maybe you shouldn't write them down, but what's going to happen if you die?
Shouldn't we be thinking more about our digital legacy, about our accounts after we've gone? And we kind of think—
If you're really keen to secure your clients' cash, you might be very nervous about sharing that password with one of your colleagues who might go rogue.
It's $190 million, for goodness' sake.
We're advocates on this show, of course, of password managers and making sure that they're securely held that way.
But how many of us honestly think about the situation of what we're going to do with our passwords once we've popped our clogs, like this guy Gerald Cotten, the CEO of Quadriga, does?
Or, you know, you don't know what they might need to log into and how inconvenient it's going to be if they can't access accounts.
But, you know, if you have a bunch of Ledger wallets or bitcoin around and something happens to you, is your partner able to understand that technology or your family or whatever to be able to know this is supposed to go to them?
This, you know, you need to do something with that.
So I think I'm glad you brought this back around to us, make it more relatable to us, Graham, because I think it is a good practice to find someone you trust to somehow make them the tender of your digital world after your passing, because you give it to someone you can trust and they can take care of it for your family for you or whatever, because your family may not know how to work the password vault or log into all those accounts or something.
And that's a really good question.
I'm thinking of things like investments. That may be a critical length of time.
It may be that you actually want access sooner than that because you're basically in a real pickle as well as having your head befuddled by what's happened.
Now, if you look at some of the most popular password managers, things like LastPass, things like Dashlane, they have emergency access features.
And the way in which they work is you can, before you die, you can nominate someone who you trust and you can say, if this person needs emergency access, give it to them.
And the way it works is they apply for emergency access, it then emails you, the deceased person, and if you don't respond within a certain time frame, right, then it will assume that you are granting them permission.
So you have the ability to say no, no, no. What on earth are they doing?
You can also do this with Google too.
And you can say, look, if you don't hear back from them for a week or two, you can choose what the time is, then the account access will be granted to this other person.
Anyway, so that's the kind of thing they should have considered.
And that would normally have been the end of my story, but there is an additional wrinkle in the story of QuadrigaCX, because I discovered that in October 2018, October last year, it was reported that Canadian Imperial Bank of Commerce had frozen a number of accounts linked to the cryptocurrency exchange's payment processor and its owner, Mr.
Cotten. In all, they froze $28 million because they were a bit suspicious about goings-on at the company. Oh.
And that left hundreds of the platform's customers stranded and strapped for cash.
There is a researcher and data analyst, his name is Crypto Medication, which is a rather strange name. Mr. and Mrs.
Medication decided to call their son Crypto, and he has conducted an in-depth analysis of Quadriga's bitcoin holdings.
And his claim is that they never actually lost access to their bitcoin holdings.
And the number of bitcoins which is being held is substantially less than is now being claimed by the widow of the allegedly deceased CEO.
Who knows?
There's a rival crypto exchange called Kraken, and its CEO Jesse Powell has—another name—he's very suspicious of the whole thing, and he's even questioned the validity of the death certificate issued in India.
So there's another crazy theory: is this man really dead at all?
Yeah, they have a big decision to make on whether to take the money and run, or give it back to the company and whoever else it owns. So who could it have gone to?
It could have gone to the co-founder. It could have gone to the wife.
No, I haven't received any emails.
Fantastic. Thank you very much. TM, TM. Don't steal it, listeners. We'll edit all this out. We don't want the listeners to hear this bit.
Jack, what are you here to talk to us about today?
All right, so imagine you're on the internet and you're clicking around and you find that 50,000 printers are exposed to the internet in a way they shouldn't be, and you have the ability to print whatever you want to 50,000 printers.
What would you do in that situation?
I think it's unethical to use somebody else's equipment without their permission. Maybe I'd put it in the hands of the media.
So would you print something? No. Why not? I think I would not print anything because that seems kind of weird and maybe a misuse of resources.
And I really like trees and that's a lot of paper.
The thing is that some people think that this person is one of the goofiest hackers because what he's done is hacked printers to promote PewDiePie.
But the thing is that the media has just ran with the story that printers are being hacked for PewDiePie propaganda and such like that.
But I think let's put all that aside for a second, the PewDiePie part, and let's talk about the security issues here. The printers that he was able to access—
It's possible because of poorly configured UPnP settings on home devices.
Or is it the user's fault for not knowing what to do with their settings.
So I don't even know where to go. There's hackers on my system. Let's burn everything down. That's a scary situation to be in when somebody gets in your stuff.
But if you recognize that it's as simple as, "Oh, my router was exposing that port and I didn't even know that was happening," then you can get control of this pretty quick.
I had zero concerns whatsoever about any consequences. I was so into it. I was like, yes, this is working. This is so cool. I got to tell everybody that this is working.
And pretty much that first day I was in contact with him, pretty much advising him this is not a good idea to lean into this. But he was just, he was on cloud nine.
He loved the attention. He loved all this stuff going on. All those news was reaching out to him and the stories were coming out crazy. And it just fueled this excitement for him.
And so I've been following him and trying to get together with him, but you know, scheduling guests is a very difficult thing.
Yeah, we never quite aligned with our schedules until it was all over and he went completely dark.
And he reached back out to me then and said, hey, give me a bit of limelight, baby. Yeah, not so much that, but hey, look, all this is over.
Do you want to cover it from the beginning to the end now? And that's the best story that I think is worth telling is the news is that first draft of history.
But once everything is over and we can see from the beginning all the way to the end what happened.
For those people who don't remember it, and we spoke about it in an earlier podcast as well, so we can link back to that and some of the news stories about this as well.
It got the media's attention on a massive scale because the message which was sent to all of those insecure printers was, well, part of it was subscribe to PewDiePie's channel because PewDiePie was in a subscriber war effectively with T-Series and Indian music.
I still think that if it just sent out ASCII art of the Pink Panther or something like that, that would have got lots of coverage as well.
And it was a goal that he seemed to want from listening to your show, Jack. Do you agree with that?
And we like PewDiePie, so we'll help him out, but that wasn't the goal here. The goal was to expose this in the biggest way possible to get the most attention possible.
And that's what comes across in the interview you did with him.
I want to know what was that feeling like when you had to call the FBI or you had to call your executive to tell them the breach is happening?
Because that's the most scary, spine-chilling moment. And here I have access.
I was able to interview him for 2 hours with telling me all of the emotional experiences that he had gone through, like the decision to push that button, to hit enter, and then all of the depression that hit because you have this distance, this difference between the popularity of being online and the loneliness of being in the real world.
And it's like the more popular he got, the more depressed he got because he couldn't match that in the real world.
And I just think that that's such a fascinating aspect to pretty much all hacker stories. I'm sure all big hackers have gone through this when they've done something big.
They can't take credit for it and they have this isolation. They can't tell other people. And so there's this loneliness. And it's so fascinating.
Like I'm doing something a little bit bad. I know it, but I'm doing it for the greater good because I've signed off and said, hey, you're vulnerable.
But then all the guys and girls who actually follow the rules and try to do responsible disclosure and try and go through that whole horrendous bureaucracy of trying to get a hold of the right person to say there's a problem.
And, you know, they ring and ring and ring and there's no one home. I just feel frustrated for them, right?
It's kind of like, I always think of it like, who's in charge of making the roads safe? Is it the drivers? Is it the people who make the roads so it's not too curvy or fast?
Or is it the police that need to drive by faster to check and make sure everyone's following the rules?
He also did that playing YouTube through the Chromecast, right? Later on in your podcast, you cover that as well. He did two of these events, right?
I think he should just apologize to the people that he either freaked out or really gave a headache to.
And, you know, we could have had something recursive going on there instead. Does he think what he did was wrong?
The question would be, would you be surprised, Jack, if you saw him in the headlines doing something like this in the future?
I think he— I mean, I really hope that he has learned his lesson and that he doesn't, because it sounds to me like as I'm talking to him, it sounds like he's a good guy with a bright career and future ahead of him.
And he's not a hoodlum trying to make a ruckus out there, cause destruction. He really— a couple other factors here.
The tool that he used could have given him command line access to those printers. It's possible to send a malicious PDF to a printer and get command line to it.
He didn't take that step. The tool he used could have made him a botnet of 50,000 or 800,000 nodes and taken down something bigger. He didn't do that.
All he did was just send a print job to it and he took, you know, extra steps to not cause this kind of disruption.
And, you know, that's what kind of makes me think he's probably, you know, good deep down.
And so I also want to talk about that Chromecast hack he did as well, because what he was able to do was figure out that there was certain ports that the Chromecast was telling the router, open this up, and the router was doing.
So that's again UPnP, and these are API endpoints.
And so when those ports are open, they were open to the whole world, and we're talking over 100,000 Chromecasts were exposed in this way, which means that people can play videos or take control of your Chromecast from around the world.
But not only that, while he was doing that, he also discovered that some Google Home devices were also listening in on that same port, and he could connect to the Google Home device and see how much noise level the mic was picking up.
He couldn't listen to what the mic was picking up, but he could see the, you know, the bar, the volume unit, to say, oh, there's a lot of noise here, or no, no noise at all.
And that, that alone is kind of a scary point that a lot of this media doesn't cover.
They're just all PewDiePie, PewDiePie, but it's, wait a minute, why are thousands of Google Home devices letting people listen to the noise level remotely? This is a huge story.
But the risk at the same time is that maybe there are more people now who are aware of this kind of exploitation.
So you could see copycats and, you know, will no one think of the trees? You know, the amount of paper and the—
So that's kind of the problem here as well is it's one of those immune systems that makes it worse at first and then safer because I think what, now that it's exposed, there's copycatters out there saying, oh, I could just do this.
I will do this, and they're doing a lot worse situations, right?
Now it's like, okay, well, we really actually need to stop focusing on PewDiePie and really do need to focus on this security issue, and at some point we'll get there.
Yeah, I mean, I am not a fan of him. And I did— I had to watch a lot of videos to understand this story.
But yeah, it seems it's targeting, I don't know, a younger audience or something.
So he did deliver on a few, but it was rare. And I got mad and I shut off the computer. I said, it's not fair. You won't win this round.
Now, during this time, you might have found me spending my hard-earned cash on mags Bazaar or Vogue, and the worst of them all, Cosmopolitan.
And here, for example, I've— I'm sending you guys a typical cover. Okay, this was from 1989. I mean, just look at the headlines here.
My point is, this was during the supermodel era, and I literally would obsess about how flawless these women looked, right?
And it really, this was just a thinly veiled pity party for one me because I was sporting a mullet, right? A poodle perm. I had braces. So yeah, I had a long way to go.
But I remember the day when I finally freed myself from this bogus beauty shackle is when I found out that most of these model pics went through severe Photoshopping before they went to print.
Right? And I thought, fuck that. It's, what a sham. And that, from that day on, it was a complete lie to me.
And how could I have predicted if we were to fast forward to today, it wouldn't just be top-tier models that go through this humiliation of being digitally scrubbed and buffed and polished and smooth, but a whole generation of girls that go out and do it to themselves in selfies of their own accord, and they often pay for the privilege.
And you know, it's dubbed, the whole thing is dubbed selfie surgery.
It's been there for ages and most of the users are 21 to 34 and 70% are female. And it's currently at number 6 in the US in top paid apps.
I'm sorry, listeners, because there's a lot of money in these kind of apps, right? Remember, number 6 in the US.
We're not surprised that there are some internet ne'er-do-wells who thought this might be an ideal market to target.
So of these 29 apps, some would display full-screen ads every time the user unlocked a device. And what was sneaky is it didn't tie it to the app.
It kind of obfuscated its tie to the app. So you just see this thing pop up and you'd be like, oh, why is this ad here?
But you wouldn't be able to figure out how to turn it off or where it was coming from.
Enter your phone number and email address here.' And some were even actually trying to steal photos. Okay, Trend believes these could be used on fake social accounts.
It's not like there's a shortage of pictures of people on the internet.
Like, honey, oh, we'll show everyone what you truly look like.' Now apparently, these apps were reportedly incredibly difficult to catch out.
So they were packed and compressed, the files were all obfuscated, the relationship with ads was all kind of hidden, so you wouldn't be able to tell where everything was coming from.
And the apps have now been— you don't have to worry if you're into this kind of stuff, because the apps have been removed now from the Google Play Store.
But as if there's not going to be more in there in the near future. How do people avoid being enslaved by these kind of malicious apps pretending to be something else?
Don't just go willy-nilly and go, that looks cool, and download it. Delete all accounts and apps you don't use, no longer want.
And I follow this rule of thumb: if I haven't looked at it in 6 months, I don't need it. Get rid of it.
I know I say this all the time, but you know, if they're legit, at least you have an idea of what they're gonna do with the information they're taking from you.
If you're a vain 14-year-old and you want to compete with sexy Shirley in the other class and have an equally sultry picture, you're not going to think about permissions, are you?
You just want to install the app.
Could be a funny story, a book they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like. Doesn't have to be security related necessarily.
And Mr Puzzle has, at the time of broadcast, 632,000 subscribers, and I find him rather addictive. I've been watching him for about a year on and off.
You get some sort of logical puzzle which you'd have to sort of undo and unravel, and you're like, haha, I've worked out the combination.
It's a bit like picking a safe, you know, and opening it up. And he's made a series of these videos of incredibly complicated puzzles.
I watched one earlier today, which is the impossible Excalibur sword puzzle, which took him 23 minutes worth of fiddling before he was able to get the sword out.
And he was hoping that everyone else would be able to follow it as well. And I find it rather lovely.
First of all, I love his accent because he has a charming German accent and he has a lovely way about him.
But these puzzles are terrific, and I would be quite tempted to buy some of these puzzles.
And I noticed that some of the puzzles— there's this sort of homespun market where people are creating their own puzzles, and what they will do is they can sell you basically the blueprint of the puzzle, and then you make it for yourself on your 3D printer.
So people who can't sell them commercially—
And so he goes over the history of security and hacks that have been against the nation or have been things like a nation-state level.
And it's just really great to see to hear the stories from the FBI agent on what they saw and experienced during some of these big-time hacks.
So one of the things that was really fascinating to me was, I think he calls it something like the 1,000 hacks that killed a company or something.
And basically, Dyson, the vacuum cleaner company, was being hit with a lot of hacks from China that were just trying to steal intellectual property and so that they can make Dyson ripoff stuff or use the technology somehow.
And the FBI was seeing a lot of this kind of stuff where a lot of intellectual property was being siphoned over to China through hacking in the last couple decades.
And he just goes into great detail on how all this has affected world markets and changed how we do business online and all this stuff.
And it's just a really great kind of catch-up on where we are in the security world today and how we got here. And all the things that have shaped it.
So he would have had some visibility on these things.
If I'm on a bored conference call where I just don't want to be on that call anymore, I'm going to get your puzzles out and I'm going to start solving your puzzles.
And that's going to be so, so great to me.
But if I'm flying on an airplane or I don't know, doing something where I need to, because this is an audiobook as well, you know, then I can use it there. So.
Look, you can listen to a little snippet. Okay.
Jack, for people who want to find out more about you and Darknet Diaries, what's the best way that they can do that?
The quickest way to find us is to search for Smashing Security, and you'll find our subreddit up there.
If you want more fab guests like this on Smashing Security, help us boost our listenership in this world of podcasts. Download numbers talk.
So high fives to everyone who listens to the show, who's taken a few minutes to give us a review, who recommend us to friends or salty coworkers, or who sends us a lovely spot of love by email, Reddit, or Twitter.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Jack Rhysider – @jackrhysider
Show notes:
- This hypnotist helps people recover lost bitcoin passwords — CNBC.
- Good News! You Are a Bitcoin Millionaire. Bad News! You Forgot Your Password — Wall Street Journal.
- Quadriga CX announces the death of their CEO Gerald Cotten — Facebook.
- Set Up and Manage Emergency Access — LastPass.
- What is the Emergency feature and how to use it? — Dashlane.
- Inactive Account Manager — Google.
- Banks Hate Crypto In Canada: QuadrigaCX Exchange Sees $28M Frozen — NewsBTC.
- QuadrigaCX Owes Customers $190 Million, Court Filing Shows — Coindesk.
- John Darwin ("Canoe man") disappearance case — Wikipedia.
- Is it ever acceptable for a journalist to hack into somebody else’s email? — Naked Security.
- Hacker Giraffe — Darknet Diaries podcast.
- The PewDiePie Hackers: Could hacking printers ruin your life? — BBC News.
- Smashing Security on Hacker Giraffe's printer hacking exploits.
- Behind the apps: Why we want to look different online — BBC News.
- Various Google Play 'Beauty Camera' Apps Send Users Pornographic Content, Redirect Them to Phishing Websites and Collect Their Pictures — Trend Micro.
- Mr. Puzzle — YouTube.
- Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat — Amazon.
- Everything That Will Kill You… From A to Z — YouTube.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
For anyone who is baffled by threat intelligence, and the benefits that it can bring to your company, this is the book for you. “The Threat Intelligence Handbook” is an easy-to-read guide will help you understand why threat intelligence is an essential part of every organisation’s defence against the latest cyber attacks.
Download it for free at www.smashingsecurity.com/intelligence now.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.


