
Journalists spying on their rivals, the NHS rejects Apple and Google’s approach to Coronavirus-tracing, and universities are hit by an old-fashioned sexy lady attack.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Rik Ferguson.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
If you can be arsed, please go to smashingsecurity.com/vote and vote for your favourite security podcast.
Voting closes on the 11th of May, so don't delay or I'll electrocute your eardrums. That's smashingsecurity.com/vote. Now, on with the show. On with the show.
Smashing Security, Episode 176: Hacking Hacks and University Attacks with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security, Episode 176.
My name's Graham Cluley.
Is this maybe our last show, Graham?
I've had a couple of decades and a half of lifetime in this industry, and my basic responsibilities are about creating engaging and informative content and making sure people get to see it, read it, listen to it, whatever it might be.
This is maybe over 10 years ago, right? You were putting a bed sheet on or something and you tucked your fingers in and it just snapped off.
And it was my right hand, so whenever I'm holding the clicker, I'm holding the clicker in my right hand with a splinted middle finger.
And every time I'm waving my arms around talking to the audience, giving everyone the bird.
So of course the sheet wasn't moving very much because I was on it.
Now on today's show, Graham tells us how a bunch of journos suffered a scoop snag. Rik finds out how the UK is getting on with its COVID infection tracing app.
And I'm going old school, reminding us that good old phishing attacks are still big business for scummy scammers.
All this and much more coming up on this episode of Smashing Security.
Less and less of the things are being sold than ever because, well, I think people are getting a lot of their news for free online.
Hoping to make money by going digital, selling subscriptions, have a paywall, monetizing the content via advertising. But even that isn't going well during this time of coronavirus.
A lot of advertisers are actually choosing to block their adverts from appearing alongside C19-related content because they think it would basically leave a bad taste in people's mouth to see an advert for a holiday or whatever it was along something about coronavirus.
They're actually blocking those words, which is a real problem for the press because all they're writing about at the moment is coronavirus.
So the newspapers online are getting loads of traffic, which they're having to pay for, of course, in terms of servers and bandwidth.
But they're not making enough advertising revenue.
Because I can see from a direct standpoint, if you were saying, hey, holidays in the sun on sale right now.
But I think a lot of them are concerned that it's just something that they don't want to be associated with, or they don't want anyone to think, how can you have this advert alongside reports of thousands of people dying?
So when there's that weird juxtaposition, people always catch it, share it, point it out, even when it's inadvertent like that.
People aren't picking up their free newspaper to get on the train and reading it that way.
So far fewer newspapers are being sold, and they're not making as much money from the websites. And there's a real crisis going on right now as a result.
A lot of those workers must have been really worried about that.
Not worried because I don't know if you saw this story which came out a few days ago, about the phishing attacks which come out.
So what the bad guys are now doing is they're disguising their phishing attack as a Zoom invitation from your HR department to talk about your performance.
So imagine that, imagine getting one of these emails, it says, oh, you've got to have an urgent Zoom call with HR about your performance. You're going to be worried about that.
That's not the kind of thing The Independent were worried about. It wasn't even Zoom bombing either.
There's been lots of Zoom bombing, of course, people taking over the screen, showing pornographic content, playing loud rock music, Rik. Generally, that was a rumour.
That was a rumour. Generally being a bit of an arse, you know, that is a problem. Actually, what happened during the Independent Zoom call was the opposite of Zoom bombing because—
According to The Independent, they checked their Zoom log files, and they saw that an account registered to a journalist who worked at the Financial Times, one of their rivals, briefly joined the video call, which was just intended for The Independent's own staff.
And no one saw his face. But briefly, in the 16 seconds that he was connected, the name flashed on screen of Mark DiStefano.
And DiStefano used to work at BuzzFeed, but is now the media and tech reporter at the Financial Times.
And so he briefly— 'cause of course you get people's names when they're on the Zoom call, right? At the bottom of their window.
So if you have it on speaker view, if he made a little bit of noise at his end, even tapping the table or whatever, then his black screen with his name on it is gonna have filled the screen of anyone who has it in speaker view.
Because then someone anonymously connected to the video call. Again, with his camera turned off.
They were going to be briefed about the changes later on.
But what was happening was at the same time as the call, the Twitter account of Mark DeStefano at the FT was basically live-tweeting information about what was going on on the call.
According to The Independent, they said the anonymous user account was linked to the mobile phone of Mark DeStefano. And of course, he published all this information.
The Independent weren't very impressed.
You cannot misrepresent yourself. You cannot use subterfuge.
Anything like that can only be done if it's in the public interest and only when the material cannot be obtained by other means.
And The Independent say, we had a press release all ready to go.
So if they'd just simply asked us for a statement as to what was happening at our newspaper, we would have told them.
But because he was publishing details of it before they went public, there were employees, maybe stateside and who weren't able to make the Zoom call, who found out because of him at a rival newspaper, which isn't very nice to find out that maybe you've lost your job.
Right?
It was unwarranted intrusion into our employees' privacy. And they want to make sure that it's not going to happen again.
Now, the funny thing is, that people have gone back through Mark DeStefano's tweets over the last few weeks.
Turns out, at the beginning of April, he reported on an internal video call at another newspaper, the Evening Standard.
But my feeling is, if this isn't really in the public interest and some of this information could have been gathered via traditional routes rather than unauthorized access to a private Zoom call, then that does begin to sound a bit like the computer misuse act, doesn't it?
Even if it's not technically hacking, it's unauthorized access.
And I know as security researchers, and you must have this as well, Rik, at your company, there are quite clear rules.
Even though you might be capable of doing something, there's a lot of things that you will not do because it would have breached computer crime laws.
If you are gathering stuff which is gonna be passed to law enforcement for an eventual prosecution, you want that stuff to be able to be used in court.
And if it's been obtained illegally or unethically, you can't do that.
So if, say, this meeting was happening in a restaurant and I happened to be at the next table and I could overhear it and I was a journo and taking notes, that would be okay, presumably.
In a way, you've trespassed on the Zoom call as well. So that's interesting.
I remember this extraordinary story. Do you remember Canoe Man?
And his wife acted all surprised and, oh, he's back from the dead, how fantastic.
He couldn't explain where he'd been, and it later transpired that he and his wife had been in Panama buying property, and they'd been photographed with all the insurance money.
So she was obviously giving him food through a trapdoor somewhere. And he had a little air hole and lived there.
And he'd been going out sometimes for walks and things and got more audacious.
But yeah, they'd claimed life insurance, pension policies, and they'd want to start a new life together. Yeah, in Panama.
A Sky News reporter hacked into the email account of Canoe Man, John Darwin.
And again, you were saying, Rik, the danger of that is, of course, you could compromise evidence.
So there's an arguable public interest.
But in terms of, you know, listening into a Zoom call where people are being told some pretty bad news about their jobs, I mean, the Computer Misuse Act is pretty clear.
It's also very gendered as well, I've just noticed. The only people who break the Computer Misuse Act are all called he.
We have a rolling blog on the Trend Micro blog of all the different threats and criminal actors using it as leverage, whether that's business email compromise or phishing or malware.
I mean, there's not a spike in cybercrime, but certainly cybercriminals have taken to using COVID-19 as a lure for things that they would be messaging otherwise if COVID-19 wasn't around.
So you can't avoid COVID-19 in the news. And one of the news stories that caught my interest over the past few days actually is a global one, but also with a very strong UK focus.
A lot of different countries are either deploying or talking about deploying mobile apps to track movements and keep people safe and notify people if they've come into contact with someone who later goes on to develop COVID-19.
Yeah, and it's veritably crazy how different it is from country to country.
Right, and there are a lot of conversations I've had with people who don't work directly in the information security space, and even some that do actually, maybe who haven't done the reading or whatever, have some huge concerns about privacy.
They're talking about, I don't want my location to be shared with the government at all times. And if you do a bit of reading, it's pretty clear that that's not what's happening.
It's not GPS reporting, for example. They're not literally drawing a map of where you go and who you bump into in any way.
Probably wouldn't have the accuracy required if you were using GPS to say whether or not you'd been near enough to someone who went on to become infected.
So they tend to be using Bluetooth, but there are two conflicting models at the root of it all. There's a centralized and a decentralized way of doing this.
Now, Australia rolled out their app earlier this week, and that is using a decentralized model.
And what that means is that all of the data about the people that you've come in close proximity to is held on your own device.
And it's only later when you, if you choose to identify as being diagnosed, being infected, that that data is then used in order to notify the other Bluetooth IDs, which are changed and rotated and so on.
You'll just know that you have come into contact with someone who later went on to be confirmed.
So they've worked really hard, and actually two of the companies that have worked hardest, I think, to address those privacy concerns are Apple and Google being the major, you know, best buds, manufacturers.
Yeah, they love each other, but they've actually, no, they've been working really closely and coming up with a very, what I think is a very good decentralized system.
But then what I was really disappointed to read is that our National Health Service in the UK is effectively rejecting Google and Apple's model and they want to go for a centralized model.
So if the NHS argues, if all of that decentralized data is centralized in a database that they have access to, then they can draw much greater conclusions about how the disease is spreading.
But of course, it raises much greater privacy concerns.
But a lot of people are gonna have access to that data. So who is gonna have access? Which third parties? How will that be managed?
How do you know that that data has been effectively secured, as you mentioned, but then how do you know that that data is being effectively aged out and effectively deleted and that it's not being repurposed and reused for something that you didn't consent to in the first place?
These are all kind of the reasons why GDPR was born.
And one of my concerns is if all this data is being stored centrally, of course, is that going to affect take-up as to how many people want to actually install this app and are prepared to run it, or will people leave their smartphones at home?
Now, we're obviously a security podcast, so we probably have a lot of— not that obviously, actually.
Well, we probably have a higher proportion of privacy-conscious listeners than the typical show.
And so we probably have an audience which would be more reluctant to run an app which did something like this.
But in this current crisis, I think even they, there would be a, probably a larger proportion who would be prepared to do it than—
To my mind, there are two key things that speak very strongly for allowing those operating system manufacturers and device manufacturers in some cases to play a leading role, at least in this.
One of them is making the best use of the hardware, because it's gonna be on all the time broadcasting and transmitting and receiving all the time over Bluetooth.
So you want something which isn't gonna suck up your battery life and kill your device super quickly. One, if your device is dead, the app's not going to work anyway.
Two, if you find out that after installing that app, your battery runs down really quickly, you're going to remove the app, defeating the object.
So the manufacturers will have a much better handle on power management. And in some cases, they have privileged access that the non-manufacturer app developers won't have.
And the other one, yeah, is absolutely about product adoption.
If you can't allay people's privacy concerns, then you're not going to get that critical mass of people that you need installing the app and rendering it useless.
If this is being done without the sort of informed participation of Apple and Google, if the NHS are gonna go alone, what they will do is this.
They will first of all tell you that you have to carry your phone with you all the time, and that your phone has to have the NHS app installed upon it, right?
There'd just be a little bit of legislation, they roll it out saying that's the rule from now on.
But the other thing will be that everyone has to wear a backpack full of batteries, which is going to permanently power your phone, and that way you can leave Bluetooth turned on all the time, it's not going to run out.
And it's to tackle the obesity crisis.
What was it called? It was a polytechnic that I went to. And I went to a polytechnic. I got my Higher National Diploma. Good. And I— there you go.
He was a lecturer in mining or something like mining technology, something like that. That's true.
In fact, one of the things, this is my token of proof that it was true, he presented me with a mummified monkey wearing a waistcoat with a rope around its neck.
Which they had found up a chimney in Nottingham.
I don't know if it's apocryphal or not, but Nottingham Polytechnic, they had to obviously change their name when they became a university, and they had settled on the name, totally logical name, of City University of Nottingham on Trent.
And they'd gone with it, and they were very happy with it, and didn't realize until they got all their stationery printed up that the acronym was unfortunate, to say the least.
So for instance, this week, Sky News reported that the University of Warwick suffered multiple data breaches. Yes.
And Smashing Security was hacked in 2019 when a staff member installed a remote viewing software, letting hackers gain access to student info, personal info, staff members, volunteers, the whole thing.
But no one was informed because no one knew that it actually had been hacked because security was so poor on the system. They had no idea what was going on.
Now they've all cleaned this up. There's someone new in charge. But this wasn't the only university-based security news this week.
There's a new phishing attack which was reported by Proofpoint that has been targeting specific groups of people, including staff and students at US colleges and universities.
Now, tell me, pretend you guys are phishers trying to dupe a user to click on a link and download something nasty, and you're targeting unis. How would you go about it?
Graham, I'm not going to say this will be hard for you, okay?
And we know maybe during these times of staying at home, there must be quite a few sex-starved students out there right now, right?
They're probably climbing the walls at home with mom and dad in the other room, or—
So it came just for our listeners, right? The subject is "Waiting for your reply." And then you go in and you have this in big font.
It says, "Make your choice." And you have two scantily clad women, one blonde and one brunette. So, you know, they're not the same.
It just says make your choice and you select.
Now, this RAT's been around for at least 10 years and has loads of features and capabilities like allowing people to access the infected machines, remote access it, has rootkit functionality, so it means webcam monitoring, it can log your keystrokes, steal your passwords.
So all the stuff that we don't talk about a lot anymore. We don't really talk about RATs and Trojans as much, do we? But they're still out there. Oh yeah, they are very huge.
They're Swiss Army knives in an enterprise scenario.
If you can get a remote access Trojan on a system, then it gives you access to information, it gives you access to functions, it gives you access to architecture and infrastructure.
I'm amazed it was successful because you make your choice and I don't know, the assumption is maybe that you are going to download some video, get some pictures, I'm not sure what, but what you get is a download for an executable called 'X Live.' So first of all, alarm bells should start ringing, but then you look at where it's coming from, and it's coming from gogominer.com.
I mean, that's alarm bells, klaxons, foghorns, and what more do you want?
I know there's a lot out there, but I think now that people are trapped at home and don't have the IT person around the corner, I can imagine we're gonna see a lot of scams for "This is how you can make sure your Zoom call stays safe," right?
Leading to something bad.
And one of the real sweet spots here for the bad guys are the companies that have basically always had a staff on site, haven't had to worry about remote workers, may not have a huge security budget 'cause they may be just a small SMB, and they're now having to have all their workers use their own machines from home to contact the network.
And they may not have the security layers in place. So companies beware.
Maybe you don't have a single sign-on password manager, or maybe you do and you're not really happy with it.
Well, why don't you start a free 14-day trial of LastPass Enterprise and you can manage every access point with integrated single sign-on and password management.
Let me tell you about some extra features: central admin dashboard, easy user management, group management, directory integrations, federated login, more than 100 security policies, advanced reporting, multifactor authentication options, password sharing, and the list goes on.
Check it out at lastpass.com/smashing. On with the show.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security related necessarily.
Better not be.
Now, my pick of the week this week is not security related, but it deals with an issue that many, many of us have, which is that someone will come into the living room and say, I really want to watch Paddington 2, or I want to watch Shark Attack 3 with John Barrowman.
And you think, oh, such a good film. It is a great movie. But you think, oh my goodness, where will I find it? And where will I find it the cheapest?
It's like, okay, yes, it's there on Amazon, but then I have to pay for it. Is it on iPlayer? Is it on Netflix?
And what it means is if you don't have a clue whether a particular movie or TV show is on Amazon or Netflix or iPlayer or something you need to splash some cash on, you just type in the name of your movie and it will tell you everywhere that it is and what you will have to pay, if anything, on those particular services.
And very handy it is too, because you spend a lot less time wasting around when the kids want to watch some animated nonsense.
You can find it for free instead of forking out for it. It's also available as an app. It's an app for the iPhone and Android as well.
Yeah, okay, okay, but you know. Collect your zip code to find out what's available to you.
We get it once every two months, this massive box of it. So that's my, that's a top tip for the future.
Subscribe for those things that you don't want bulking up your boot when you go shopping.
I'm an Amazon Prime member anyway, like many, many people, and I discovered that for 99 pence I could get Fire for Kids Unlimited for 3 months, which means that my kids on their Paperwhites can access tens of thousands of books.
So there's no reason for them to come to me and say, I'm bored, I have nothing to do, there's nothing new for me to do, I can't go to the bookshop, I can't— you know, you have tens of thousands of books, go read and leave me alone.
I have a podcast to do with Graham and Carole, and I spent 99p on it.
Do you know what that is? Oh, that was a joke. Oh, really? Oh, sorry, I didn't even get it. Oh my God, I'm so bad. Jesus Christ. I was just trying— 'cause Graham had no idea.
Graham, I just spoke to him before the show. He had no idea. So I just assumed. I had heard of Jeopardy!.
The whole premise of the song revolved around a contest that had been set by Sarson's Vinegar to think of a slogan and the winner would get a night out with Nicholas Parsons.
Trebek is sick and he's recently announced that he has survived one year of cancer. Right. And I was reading about this and he's one of those people you just love.
You just— he's just one of those good people. I found this guy who is obviously a Jeopardy! fan.
And if you click on the link in the show notes, he has created an entire website of every question that's ever been asked on Jeopardy! since 1984.
Just for those who don't know, the way the game show works is I put the answer in the form of a question and you give me the question in the form of an answer.
In the category for Drinks for $200, this children's cocktail is ginger ale and grenadine garnished with a maraschino cherry.
In the Dylan category for $800, take a load off and tell us the name of this group, formerly the Hawks, who backed Dylan starting in 1965.
So if you click on the link, they give you the entire game grid that you get on the game show and you could actually play with friends, read out the questions, do it for fake money or for real money, have some fun.
What's the best way for folks to do that and find out what you're up to?
Just look for Smashing Security subreddit up there.
And for those of you that have kept supporting us via Patreon through all this, you're in for a pretty sweet treat very soon.
Also, a huge, huge thank you to this week's Smashing Security sponsor, LastPass. Its support helps us give you this show for free.
Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
Yeah, it's a habit my son seems to have got into, is everything is literally.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Rik Ferguson – @rik_ferguson
Show notes:
- Vote for Smashing Security in the EU Security Blogger Awards!
- Financial Times reporter accessed private calls at Independent and Evening Standard — The Independent.
- FT suspends journalist accused of listening to rival outlets' Zoom calls — The Guardian.
- Sky News admits it hacked Canoe Man’s email — Naked Security.
- Is it ever acceptable for a journalist to hack into somebody else’s email? — Naked Security.
- NHS rejects Apple-Google coronavirus app plan — BBC News.
- Threat Actors Repurpose Hupigon in Adult Dating Attacks Targeting US Universities — Proofpoint.
- Warwick University kept data hack secret from students and staff — Birmingham Live.
- JustWatch – The Streaming Guide.
- Just Watch — Apple App Store.
- Just Watch — Google Play.
- Fire for Kids Unlimited — Amazon UK.
- Kindle Limited for Kids — Amazon.com.
- J! Archive.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.


