
Should possessing malware be illegal in itself? How did a Russian cryptocurrency exchange millionaire lose his fortune? And what on earth are Amazon Ring doorbell cams up to now?
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Lisa Forte.
And don’t miss our special featured interview with Adrian Sanabria, all about Thinkst Canary.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
Lisa tells us a crazy Russian heist story. And I give Amazon a bit of a spanking. Plus, we have a bonus featured interview for you today, thanks to our friends at Thinkst.
Stay tuned to hear all about their Canary tool, which Graham and I both think sounds pretty darn cool. All this and so much more coming up on this episode of Smashing Security.
Take heed because the state of Maryland in the good old US of A is proposing a new law that could ban the possession of malware, actually make it a crime to be carrying malware.
But what's kind of interesting to me is that actually, when you look at what the bill is that they've put forward, it says possession and intent to use. Yes.
And what I don't understand is, why can't it not just be strict liability?
You know, in the same way that in the UK, possession of a firearm or possession of Class A drugs, you know, the fact that you've got it on you is the crime.
I don't understand why that wouldn't be the situation.
And I speak as someone who used to be employed by an antivirus company which had millions of pieces of malware on its network for completely legitimate reasons, for analysis and research.
And it would have been a complete nuisance if we hadn't been able to store the stuff and indeed share it with other researchers.
And so distributing malware, I don't think should be a crime either.
You'd like to think that was what was going on and that people that shouldn't actually have access to that stuff, it's illegal.
And the reason it's a problem is because computers are not vaults, right?
So if you've got malware sitting somewhere, that is maybe not fully secure and that gets out, that can cause all kinds of havoc.
But who says that you shouldn't be allowed to have a virus-infected computer if you want to have a virus on your computer or a piece of ransomware?
Imagine you are a 19-year-old student and you're really interested in computer security and you would love to have a job working for an antivirus company, but none of them will give you a job.
Because you haven't been able to demonstrate your expertise. And so you think, right, I will become an independent security researcher.
There's a piece of ransomware which is spreading right now. Let's imagine, for instance, the WannaCry worm, right, which hit the NHS.
And I will analyze it on my computer and I will try and work out some kind of antidote or some way of stopping it.
Should that person be guilty of a crime simply because they possess the ransomware? I would argue, no, they shouldn't.
So maybe companies or individuals who are in the business of analyzing malware should have some sort of checks done to make sure they're not, you know, don't have a neckbeard.
You know, if you think of cocaine, and someone, I don't know, the police confiscating it and sending it then to a lab to test that it was in fact cocaine.
That lab is in possession of cocaine at that moment in time, but they're exempt from being charged with the strict liability offense of possession of a Class A drug.
So I think we're talking about sort of outlying people, but I think the general public who are not interested in analyzing malware, certainly not in my household, why should they have that on their computers anyway?
Is the big point going to be that, oh, I got hit by ransomware, therefore there's ransomware on my network computer, therefore I'm breaking the law?
So in respect to this law in Maryland, I have to backtrack a little bit because the specific Senate bill, which has been proposed, labels the possession and intent to use ransomware in a malicious manner as a misdemeanor punishable by up to 10 years in prison and a $10,000 fine.
So you have to prove that they've also got intent to use it maliciously, which hopefully antivirus companies and security researchers don't have.
So it's an interesting debate, this, you know, should all malware be banned? I personally don't think it should be, but yeah, and intent is an interesting word, isn't it?
So, if you look at this Senate bill that's been proposed in Maryland, it says a person may not knowingly possess ransomware with the intent to use the ransomware for the purpose of introduction into a computer or network or system of another person without the authorization of the other person.
And I agree. I think existing computer crime laws pretty much cover that.
And they say, you know, you can go on to other people's computers, you can break into their networks if you've got their permission.
If you don't have their permission, if you don't have their authorization, then that's something which is obviously illegal.
And similarly, so I don't see why this law is necessary because it's already committing computer crimes through the malware actually breaking into the computer without the permission.
So maybe with web— anyway, it's cookie— no, no, no, it's nothing to do with cookie legislation, Mary.
But anyway, look, the real reason is this, the real reason, I'm sure someone out there eats Maryland cookies.
Who can forget Baltimore in Maryland, which in the space of one year, the city of Baltimore was hit twice by ransomware.
Once they had their 911 emergency dispatch system that was knocked offline.
And the other time they were hit by the Robin Hood malware when a bunch of merry men rode in on their horses wearing green tight pants and installed malware onto the computer systems.
Anyway, Baltimore refused to pay up, as we discussed way back in Smashing Security episode 151. And the mayor said, well, we're not going to give in to the extortionists.
You know, we're just gonna recover from our backups. Although it later turned out that their backups were shit because they were—
Now, did I not read this week that New York is going to propose that paying ransomware is... You know, paying for ransomware, what's it called? Paying ransomware.
It's not illegal now, but they're thinking of doing that, which is interesting because they're basically saying you're helping fuel more ransomware attacks by paying them off, even though you get on your feet faster.
So I think people are beginning to move that way a little bit.
Again, I'm not sure if it should really be legislation because sometimes a ransomware attack, you may have no option but to pay.
You know, it's your business goes bust if you can't recover the data.
I mean, if you think about in the UK and the US, it has to pass through a bicameral system. Two houses have to approve any piece of legislation.
That's why in the UK, we're stuck with the Computer Misuse Act of 1990.
Obviously, I'm encouraged by the fact that they're saying you have to have intent and you have to infect or attempt to infect without authorization.
The bad guys are making so much money anyway. I would have thought existing computer crime laws were enough to bring these guys to book if they've been identified.
And if they haven't been identified, this isn't going to help do it, is it?
So then someone changes the formula ever so slightly, and that substance is no longer an illegal substance anymore.
Well, I just hope that legitimate security researchers never find that they have to go and apply at the local council office or sub-post office to apply for a license to handle malware, rather like getting a dog license or something like that.
I don't think any of our listeners do either. Jeez.
So 6 years ago, two Russian gentlemen, Alex and Alexei, discover each other online, and they've never met, and they decide to start a cryptocurrency exchange together as a business.
And that is that they're not going to require anyone who invests to provide any ID. So no prizes here for guessing who this might appeal to.
Anyway, so this cryptocurrency exchange becomes the third largest in the world. So they actually do really, really well out of it.
And in a celebratory spirit, Alex says, "Well, let's go to Greece and take our families on holiday."
And it turns out this was at the FBI's request.
So his family quickly call Alexi, his business partner, and say, "Oh my God, you know, he's been arrested." So he quickly smashes up his laptop, runs to the airport to go back to Russia.
Successfully. It transpires that the FBI have seized all of their stuff from their company because they were laundering stuff for people like the Fancy Bears and other criminals.
So Alex is in a Greek jail and Alexi is now back in Russia. The FBI have seized all his stuff. So you might be thinking, what is an entrepreneur to do in this situation?
Well, Alexey decides to recoup his losses by setting up another exchange.
And the billionaire says, "Oh, well, you should go and meet with these two FSB guys I know who will help you with your security." Oh, yeah.
Anyway, so Alexei goes and meets these two guys from the FSB, and they say to him, "Look, you've got to watch out for those pesky Americans, and we will set up special FSB fund, and if you transfer your $450 million into this fund, we will keep it secure from them." Okay, so yeah, so Alexi's thinking, "Oh my God, this is a genius idea, why didn't I think of this," right?
So he did it.
He's feeling sick because he suddenly realizes that this doesn't make sense.
And it transpires that the billionaire, the FSB agents, and the $450 million have all disappeared into thin air.
Now if you're listening to this and you're thinking, funnily enough, men posing as the FSB stole $400 million out of my account, you would report that to Action Fraud.
You know, and before you know it, ka-ching, you're making a little bit from every transaction which is happening. But my goodness.
And this must be the extreme version of that.
And last month alone, shoppers bought around 400,000 of the things from Amazon and other retailers your Best Buy, Costco, Home Depot, and that sort of thing.
I was down the chess club the other night and my mate Liam— hello Liam— he showed me his phone.
And he's been complaining that people who are a little bit worse for wear coming home from the pub on Friday night to use that little enclave as a urinal.
And don't be confused by the word party here. This isn't like the party that any of you want to be attending.
By third-party trackers, I mean companies that Amazon agrees to do business with, and these guys get a proverbial front seat so they can hoover up all kinds of personal identifiable information from Ring users.
So four main analytics and marketing companies were discovered to be receiving information such as the names, private IP addresses, mobile network carriers, persistent identifiers, and sensor data on the devices of paying customers.
So there are four of these. One of them is called AppsFlyer.
It collected loads of stuff, but also collected info from the sensors, so that's your magnetometer—I don't know how you say the word.
Oh, Facebook.
So information delivered to Facebook, even if you don't have a Facebook account—like we don't, Graham—includes time zone, device model, language preferences, screen resolution, and a unique identifier which persists even if you reset the OS-level advertiser ID.
Now, what was slightly ironic here, so all this information's going out of your phone, right? Going out of your phone via the Ring app to these third-party providers.
So it made it much more difficult, according to the EFF, for security researchers to learn and report of these serious privacy breaches.
I can understand how they might want to understand the user's experience, or if there were problems, or work out what kind of devices they were being run on and try and troubleshoot problems like that.
But I can't understand why they would be sending information to the likes of Facebook and some of these other firms.
So all this information is allowing these third-party marketing firms to build up a unique fingerprint of your activity, location, behavior, which in turn allows them to market services or products or anything to you much more accurately.
Do you want to know how to know if your piglet is sick? Or is your sheep okay?
So they've been in hot water about Ring for a number of months now for different reasons. And they've been doing a lot of, excuse me, the security is fine in Ring.
Actually, I think you'll find it's the user's problem because their Wi-Fi isn't secure enough or they're not choosing correct passwords or they haven't enabled two-factor authentication.
And this is just a little bit dirty because according to the EFF, they are not clearly stating in any policy and getting clear consent from anyone in all this.
Hang on, let me just do this and see.
We are, even though it's, you know, better for us to be on Facebook because it helps us promote our show and do all that stuff.
It makes you wonder whether we as a collective should be actually giving the richest man in the universe more money.
So that's that problem solved.
So we're very happy to get people to pay less than minimum wage to be working 12-hour shifts peeing in bottles so they can get you your fuzzy whatever you ordered quickly to your door.
But then the problem was that people were stealing these packages, 'cause they're getting delivered at all times of the day.
And so basically, I think he's been onto this for a long time.
He's, now I can give you doorbells so you can watch your packages be, you know, mount up on your doorstep and make sure no one steals them.
I say this to people and they say, I don't really care if people have that data.
And when it comes to cybersecurity, that is super important. So listeners, listen up.
If you do not have a password manager in your organization, please check out LastPass Enterprise.
They offer centralized admin oversight and control, shared access, and automated user management. All this stuff makes your life easier.
Plus, you can even use LastPass single sign-on to protect all your cloud apps and give seamless access to employees. Check it out at lastpass.com/smashing.
Let me try that again, folks. Check it out at lastpass.com/smashing.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
It is a whatever, because my pick of the week is a person who sadly died this week. Who? Nicholas Parsons has died. Oh no. Oh no, are you finding out live on the show, Carole?
Oh crumbs. So Nicholas Parsons died on Tuesday morning, and he was the host of a very long-running, over 50 years, a radio show called Just a Minute.
Which is broadcast on the BBC World Service and Radio 4 here in the UK. And if you have access to the BBC Sounds app, you can also download episodes there.
And Just a Minute was a terrific game show where you had to—
And the point of the quiz, for anyone who hasn't ever heard Just a Minute, is to speak for 60 seconds without repetition, deviation, or repetition.
He was incredibly funny, very, very rude about Nicholas Parsons. It was just extremely entertaining.
So I'm going to put in a couple of links where you can read more about Nicholas Parsons and the Just a Minute show.
And I've also included a link in the show to a video of Nicholas Parsons at the age of— well, he must have been in his mid-90s— being interviewed very recently by comedian Richard Herring.
And you will see that he was just as sharp as anything right at the end of his life. Very funny and an absolute star.
So this game is called Her Story, and it's by a guy called Sam Barlow, and it's a really fascinating game.
Basically, you are given access to a fake police database and you're asked to review files to solve a murder that happened back in the early 1990s.
So you have to start watching a few videos and pick out pieces of vital information that the victims or that, you know, friends and family and whatever give.
So it may be that they say something about the company that the victim worked at, and then you search for the company name and pull up employee videos and so on and so forth.
And there's so many avenues to go down, you can literally go down the wrong avenue for ages and then realize it was a red herring.
But it's an amazing game that's kind of a new genre of gaming in a sense.
And this is like an NSA database that's been loaded onto a stolen laptop and you have to start piecing together that story. So it is really, really good.
You have to pay for it, but it does mean that you don't get served up ads and have to buy additional credits and stuff like that.
I watched the trailer for this, a little video, and the fact that you're sort of having to watch police interviews and videos and sort of then pick apart from the statements that people are giving you, it looked really interesting, all the different avenues which you could go down.
They were secret, probably because she's quite witty and attractive in that fashion. Maybe he was sharp enough to her, who knows.
But as he's not the actual queen, the judge threw it out.
Anywho, anywho, anywho, Marina wrote about the whole Saudi Arabia Geoff Bezos scandal that you were alluding to at the end of my story.
And according to a forensic report prepared for Bezos, Bezos got the infected video file on WhatsApp, and claims that it opened a backdoor on Bezos's phone, and that's how all the pictures got leaked.
Right now, of course, the Saudi Embassy in Washington is saying this is absurd. But Marina wrote about this, and she had some— let me just read a little excerpt for you.
Guys, so she says, "What elevates the story of how Bezos's underpanted selfies may have made their way into the public domain is the identity of the hacker, who was probably none other than Saudi bear and human lumberjacker Mohammed bin Salman.
From here on in, we will refer to the Crown Prince by his desired nickname, MBS, which he has no idea sounds like a dinosaur carpet warehouse on the Ring Road, or the name slapped on the off-brand trainers your mum picked up at the supermarket, which she insists are exactly the same as Nikes except for a couple of tiny bits that no one's going to notice." Cute, right?
She's got a real cute way about her.
Sometimes you need someone with a bit of sass.
Now he works at a company called Thinkst and Thinkst creates this pretty nifty little tool.
Graham and I got a demo last week and we both thought it was so cool that you might want to hear about it from the horse's mouth. Well, not a horse's mouth, but Adrian's mouth.
And it's, you know, we're used to seeing these dwell time metrics in the hundreds of days where attackers have just been lounging about doing whatever they want to do, whatever they need to do on our networks.
And it's frustrating, right? I'm sure it's embarrassing and it's frustrating to think that somebody might be in right now and you wouldn't know it. So that's what we go after.
And if it's taken months and months, then the amount of data which could have been stolen is enormous.
You can make them look like various different things, anything from a SCADA device, you know, something from Honeywell or a Windows file server, something like that.
And they look the part down to the MAC address, how they talk on the network. You know, they look and talk and walk like the ducks we make them to look like.
You know, you put them places, there's some strategy behind it. You know, where are you going to place them, how many you're going to use, what you make them look like.
You want them to look enticing to the attacker.
You know, we want to be the first device that the attacker goes after so that you find out as quickly as possible that there's been an intrusion.
And the idea is you have a chance to, you know, once they go after our device and we start sending off alerts, which is going to happen the moment they start messing with it, if they scan, if they try and log into it, do anything with it, that it's gonna scream bloody murder, let you know.
More that if they are sniffing around your network already, you want to have them go into a honey trap as opposed to on a real live, you know, bona fide data service.
So this works equally well for insider threats as it does for external threats.
These are literally little black boxes or can be little black boxes, which you plug in, you scatter around your network, maybe pretending to be some old Windows computers or running whatever operating system you wish, disguised as different things.
And so if an intruder or if a malicious insider was snooping around, they might trigger it just by almost like trying the handle of the door.
It's not like they can get into them, but just trying the handle will set off an alarm which you will pick up, but they won't even know that they've triggered it.
And I to say, unless the attacker's just extremely lucky and lands right on top of a very detailed Visio diagram of your network and how to get to the good stuff, they're going to have to do some snooping.
They're going to have to take some actions to search the network to find what they're looking for. And we use that to detect those actions. We use these canaries.
So maybe you could walk our listeners through that.
It takes 3 or 4 minutes to set up these devices, whether it's the physical one that you mentioned or we've got VM versions where we've got an Azure, AWS, and Google Cloud versions all take 3 or 4 minutes to set up.
We to say you know, you could stay back from lunch, let your colleagues go out to lunch. By the time they get back, you could have 10 or 20 of these deployed and be done, right?
another philosophy is we don't want— we didn't want to create another product where you've got somebody in the organization labeled the canary guy.
And what the canary guy does is he comes in, he logs into the canary console, and the canary console creates busywork for him to click things and tune things and gives the illusion that he's doing security work when he's really just got busy work inside of this console.
I don't want to say that what you're doing isn't important, but there's a chance that it might not be all that helpful in the greater scheme of things.
So yeah, we wanted to avoid that. And there's our devices update themselves once you've deployed them. There's nothing left to do except wait for them to send you alerts.
It's not you're saying run Canary tools, you know, put these in place across your network and chuck out your antivirus and chuck out all these other protection measures which you— this is something which very much complements your existing security.
You know, it lets you know if something fishy is going on on your network or if we get into talking about the Canary tokens in other places, you know, so we've got tokens that you can put in your email on file servers, on flash drives, even in physical places, you know, to allow you to trap and trick people in other ways.
So if someone— yeah, so if someone was to go into an email or maybe into an Amazon bucket and mess around there, you could trigger one of these things and you'd be thinking, whoa, what's going on here then?
There's obviously some badness going on.
And the problem with going any further out than that, we wouldn't ever recommend putting a canary on the public internet, for example, is all of a sudden you go from this device that we can easily get down to zero false positives.
When it fires off and alerts you, you can be sure that something's going on that shouldn't be. When you move it to the outside, those types of activities are normal all day long.
There are thousands of IPs that are just scanning the entire internet, trying to log into things, and all of a sudden you get that alert fatigue issue again and you're just overwhelmed with maybes instead of higher quality alerts.
What if you actually challenge a company to see what your defenses are like?
I would imagine they might stumble across some of these things and think that they've hit the motherlode, think that they've almost accessed some great big database or some such.
If you think about it, some companies have been doing pen tests for almost two decades now, and they're used to the pen testers coming to them and just laying down this laundry list of things that they should feel ashamed about.
Look at all the ways that I pwned your systems.
We hear stories like, oh, you know, while waiting in the lobby for them to come get me and show me to the cubicle where I do my pen test work, I already broke in and I got domain admin.
And, you know, we hear stories like that. Now from our customers, we hear the opposite.
We hear, oh, we caught the pen testers in the first 10 minutes, or stories like, you know, the pen test was supposed to end on Friday, but they continued on Monday, and we know because our canaries told us.
And although they wouldn't necessarily be able to download it, they could see the file name and they would keep on trying to access this darn thing.
And that's something you can do with the canary too.
Just get a password generator, get a bunch of real sites, and fill that thing with real data. None of it's actually real, but the attacker doesn't know and name it appropriately.
And that spreadsheet will let you know anytime anyone opens it anywhere in the world. It's not dependent on being on your network. And also, this is a service we give away for free.
You can go to canarytokens.org and you can create these for free. We've got over 100,000 people that use this free service.
And the commercial version has a few more things that make it more polished, more nice to use in an enterprise.
But generally, most of the same tokens we have in the commercial version are available in the free version.
And I know people that, for example, upload their resume and token the resume so they know if people have opened their resume after they've sent it off. When did they open it?
How many times did they open it? Did they open it right before the interview?
For example, just a standard Word document token will at most let you know what IP address that they were coming from when they opened that Word doc and it reached out.
So that'll be somebody's internet address. In my case, that'll be my AT&T broadband IP address. But in other cases, we have some macro Word and Excel.
And if somebody enables that macro, which you can do if you name it the right type of file, you know, a lot of accounting departments use macros in their documents.
Maybe you can get somebody to enable that macro and that macro will pull your username, the hostname, and the internal IP address as well.
So that's kind of the other extreme of the information you can get. You know, we're not putting a remote access Trojan or anything like that.
So there's still some information.
And with the canaries, the idea is, well, what if that would just come to you?
What if we flip that model and we set up your network in such a way that badness would just reveal itself automatically?
And tells you you've got a data breach. You don't know anything about it until it's brought to your attention that way.
Something like this will hopefully catch an intruder much earlier on in the process and hopefully before any damage is done and data is stolen.
What's the best way for folks to do that?
And don't forget that if you want to ensure that you don't miss a future episode of Smashing Security, you should subscribe to us in your favorite podcast app.
Just go to the App Store, whatever flavor of smartphone you have, and check out a podcast player such as CastBox.
Also, a big shout out to this week's sponsor, LastPass, and to our special guest, Thinkst. Their support helps us give you this show for free.
Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
He has brought it up to me about 4 times now, and the way he does it, goes, what's with the wheeze? What's with all the wheezing?
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Lisa Forte – @LisaForteUK
Show notes:
- Senate Bill 30 (PDF)
- Maryland: Make malware possession a crime! Yes, yes, researchers get a free pass — The Register.
- The City Of Baltimore Blew Off A $76,000 Ransomware Demand Only To Find Out A Bunch Of Its Data Had Never Been Backed Up — Techdirt.
- Smashing Security 151: Frankly, sometimes paying the ransom is a good idea.
- Maryland Computer Crimes Laws — FindLaw.
- Maryland Cookies TV advert — YouTube.
- Hunting the missing millions from collapsed cryptocurrency — BBC News.
- Inside the hellish workday of an Amazon warehouse employee — New York Post.
- Ring Doorbell App Packed with Third-Party Trackers — Electronic Frontier Foundation.
- Nicholas Parsons: 'Broadcasting legend' dies at 96 after short illness — BBC News.
- Just a Minute — Wikipedia.
- Nicholas Parsons interviewed by Richard Herring — YouTube.
- Her Story – A Video Game About a Woman Talking to the Police.
- Her Story trailer — YouTube.
- Her Story follow-up takes place on a stolen NSA hard drive — Polygon.
- Bezos learns the harsh lesson of texting a crown prince fond of crucifixions — Marina Hyde, writing in The Guardian.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Most companies discover they’ve been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in.
Go to canary.tools to find out why its Physical, VM and Cloud Based Canaries are deployed and loved on all 7 continents…
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Castbox, Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

