
The FBI think they’ve identified the HBO hacker, the US military have been caught with a leaky bucket, and web tracking has just got scarier than ever.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Iain Thomson from The Register.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Just a quick note, we recorded this episode before news broke of the extraordinary Uber data leak and how Uber paid the hackers in order to keep the breach quiet.
You can read about all that in the show notes, but anyway, that's why we didn't mention it. Sorry about that. On with the show.
Hi, this episode of Smashing Security is supported in part by Netsparker.
Netsparker is a web application security scanner that can automatically find security flaws in your website and fix them before hackers can exploit them.
If you want to automatically check your web applications for cross-site scripting, SQL injection, and other vulnerabilities and coding errors that can leave you and your business exposed, then you need NetSparker.
Try it out now by downloading a demo from www.netsparker.com/smashing. Smashing Security, episode 53: Game of Thrones.
Ransomware, major Amazon cloud leak, and web tracking gone crazy with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 53.
My name is Graham Cluley and I'm joined as ever by my good chum and co-host, Carole Theriault. Hello, Carole.
Yes, it was supposed to be a 1-year trip, but then things kept on getting extended, and then I met a local, and it now looks like I'm out here for the duration.
But yeah, no, I mean, I will always be British and I would like to move back, but my wife doesn't like British winters. So yeah, we'll have to see.
But it's me longing for The Archers.
Well, every week what we do is we each pick a topic, something which has happened in the world of computer security, and have a little bit of a chat about it.
Now, do you guys, do you all watch the fantasy starring lots of boobs and dragons, Game of Thrones. Are you all fans of that?
And he'd actually managed to get hold of their contact checklists of the actors and actresses, their mobile phone numbers, managed to get hold of some scripts of upcoming episodes, which of course, the feverish fans are all desperate to get their claws on.
Well, that story has continued because this week, the FBI held a little news conference at lunchtime. You can imagine it, can't you?
They had all the cucumber sandwiches out and everything else.
Well, they said, "Right, gents, now you're all here, what we'd to tell you is that we believe we have identified and are going to charge the person we think hacked into HBO." And they have named him as Behzad Mesri, also known, and this was his hacker online handle, as "Sk0t Varshat." Oh!
I've never quite—
So anyway, he is a self-professed expert hacker and believed to be a member of the Iranian hacking gang, the TurkBlack Smashing Security team.
I don't know where they get all these names. He's been defacing websites for a long time, leaving his—
But then earlier this year, according to the FBI, he targeted HBO, the maker of Game of Thrones and other shows Curb Your Enthusiasm. And he did this not in a sophisticated way.
I mean, frankly, this is the kind of way in which companies do get hacked. Quite often it won't be that sophisticated.
He simply grabbed employees' usernames and passwords and logged in using their accounts. Maybe he did that through phishing or piece of spyware.
I suspect it was probably just phishing.
And we've all, you know, okay, possibly not you two, but I mean, I had an incident recently where I tweeted a response to a far-right person on Twitter and somebody tried to log into my Facebook account, which was using a password which was just over a year old.
Thankfully two-factor was on, but I mean, we all do it and there is, you know, this guy seems to have got lucky.
And then when I think I got caught up in the LinkedIn hack, there was a reused password in there, but I've got, you know, you've got to have two-factor on all accounts now.
I mean, you guys know this. You really do.
So if one site like LinkedIn, which famously got hacked, of course, even Mark Zuckerberg himself was caught with his pants down on that particular one by using a dumb password, which he was reusing in places.
And so, yeah, maybe that's what happened to these HBO staffers as well. But the fact is, according to the FBI, Behzad Mesri, or let's call him Mr.
Varshat, managed to break into these HBO accounts and gain access. He stole actual unaired episodes of Curb Your Enthusiasm and other shows Juice and Ballers.
He stole the scripts for upcoming episodes of Game of Thrones, grabbed this confidential information, and then he tried to extort money.
He sent them messages saying, "Hi to all losers. Yes, it's true. HBO is hacked. Beware of heart attack." Not quite sure what that means.
It's them having a copy and that copy being as powerful because it hasn't been released yet.
And if you've got sensitive information, which you can pass on to journalists Iain Thomson of The Register or something this, or one of the others out there, and you can damage a company's brand, can't you?
Because it, fair enough, it's a good story, which security journalists will want to write about.
We are, and I think a lot of journalists out there are quite ethical about this and they're not willing to be used in that way.
It's kind of if a security company comes to us and says, we've got a fantastic new hole, the first question we ask is, is it patched?
Because we can't report about it until the patch is out there. And everyone I know in the industry is very, very strict about that.
So in this case, he was, I think, more interested in putting it out onto the public web and sort of hitting HBO's profits that way.
But, yeah, Graham, it's a really, as you say, it's a very bad form of ransomware. You know, it's just the complications are too high.
I mean, certainly I've been approached by groups the Dark Overlord in the past who've shared sensitive information from inside companies which they've hacked and said, why don't you publish details from this?
And I refuse. It's just well, look, it's interesting that that company has been hacked, but I'm not going to publish their personal emails or details of their databases.
Obviously there'd be commercial damage which would be done if things like Game of Thrones episodes leak onto the internet, and they didn't want that.
And there were some emails which came out of HBO.
I'm not quite sure how they appeared on the internet, but it appeared that some of their sysadmins had been given the authority to offer up to a quarter of a million dollars.
They weren't prepared to pay him the $6 million, but they said, look, we can offer you this as a bug bounty if you will agree to our terms and conditions.
So you have to tell us your name, address, sign the contract.
Or if we're going to present this as some kind of bug bounty, and it's understandable, some hacker in Iran, if he's offered a quarter of a million quid and thinks he's not going to get anything else, he might say, okay, here are my details.
You can send me the money. And then the company might go to the FBI and say, we've identified our hacker. So maybe that has happened. Behzad Mesri is believed to still be in Iran.
It's likely he's beyond the reach of American authorities, quite frankly, because of that.
But if he ever takes a little trip to Disneyland or something, he's going to be in a spot of bother, isn't he?
He was arrested in the Maldives, which doesn't have an extradition agreement with the US, but for some reason he was expelled.
The US lent on the local government, he was expelled from the country and then picked up immediately and flown to Guam by American agents.
So I mean, there are ways around this, but yeah, as long as he stays in Iran, he's not going anywhere.
And 9 times out of 10, it hasn't even been accessed by an outside thing. But I'm just getting a wee bit sick of writing these stories.
And then we had the really big one on Friday, which was terabytes of data from the US military.
That certainly seems to be the gist of it, although we're still waiting from the US military for comment. Anyway, this obviously gets huge amounts of data.
Just one of these buckets had 1.8 billion social media scrapes, organized within a searchable format.
So yeah, terabytes of compressed data just left wide open on the web for anybody who was happening to pop along to find, and not even well hidden.
It was named CENTCOM and PACCOM after Central Command and Pacific Command. This is not deep camouflage from the US military.
So as I say, it was available, it shut down, and it's about time companies really did something about this because I'm sick of writing this stuff and it's a major security hole.
But just getting an account, anybody can do.
What they've done to actually find this stuff is built scripts to search for S3 buckets and their open S3 buckets and then looking inside them.
And it's that kind of automation of it that should make anybody who's leaving this open very worried.
There's a certain irony here that what this was, was a database of publicly posted social media posts by people around the world who are of interest.
And you can kind of go, weren't they silly leaving their privacy open so anyone could read these things on social networks?
And then the US military has published it itself publicly for anyone to view.
A couple of weeks ago, they announced these new security protocols to help protect against this sort of thing.
And that amounted to basically a bright yellow button and a warning screen saying, are you aware you're leaving this bucket open? Now, you both know how well security buttons work.
You just click through to get on with it. You can't get past that human problem.
And presumably somebody left these open so that they could be shared with another member of the team and then forgot to close it off again.
And it's that kind of basic human failing that I think we're going to be seeing again and again.
And yes, okay, it may be a bit rich for me to whinge about having to write about this, but for God's sake, people, get it together.
It's the information of, probably kids, you know, who don't know better about how to protect their Facebook pages or their other social media accounts.
I mean, they do have these warning messages, like you said, they've put together advisories and things on their site.
And I wonder whether there should be an option for make it public for an hour or, you know, and after an hour, then it goes back to private or something like that.
I mean, I wonder if that would be a good safety net for some of these organizations.
I mean, I spoke to Chris Vickery, who's been finding a lot of these over at UpGuard, and he was saying the only solution really is to enforce a total lockdown.
You can't leave open buckets, but that would cut into massively into Amazon's profits and would piss off a lot of users. So the timed session is a great idea.
Two-factor is a must, an absolute must.
A lot of times default settings in these situations tend to be less than what I would recommend as secure, just to simplify the installation and getting up and running.
And you know, we get lazy, we get sloppy and, you know, get the defaults in, just insist on a certain level of security.
A lot of companies are worried that this is going to turn people away from their services, but I think once they see the benefits, you know, it's why companies hate spending on IT security because, you know, when it's going well, nothing happens.
But I bet most of you've never realized how much websites actually can track you. So let me introduce you to a type of third-party script known as session replays.
So session replays are tools that are traditionally used by web developers to help improve the page during testing phases.
So tools can help you audit or fix a bad or confusing webpage, specifically pages forms where you would input sensitive information, or you might make a purchase.
Pages are considered quite important and you want to make sure that you get them right. But what would happen if these session replay tools were used on a live site?
So session replays effectively record everything that occurs during a session. It's almost a live recording of everything that happens on your screen.
So it can see what you see, what you type and delete, where your mouse goes, where you click, and what's even displayed on the page.
I expect you're going to tell me that hardly any websites are doing this. Is that the story, girl?
So everything that's even dynamically displayed on the page can be recorded as well as anything you input on that page, even if you input something and then change your mind.
So how often has it ever happened to any of you guys that you've put your password into the wrong field in a form or you've pressed paste expecting something to be pasted in and actually you've pasted in something really, really private in a address field, for example, on a webpage.
Does that happen?
But the fact that this was even created is just, you know, you can understand the reason for it, but leaving it around for people to use, it's a time bomb just waiting for someone to take it up and run with it.
Definitely.
Okay, this is people Yandex, FullStory, Hotjar, User Replay, et cetera.
And to see if they were actually installed on popular live sites, and they found that 500 of the top 50,000 most popular sites, according to Alexa, had session replay scripts installed on the live site.
Now, this list includes some pretty well-known names The Telegraph, Samsung, ancestry.com, AVG, CBS Sports, Skype, WordPress, Microsoft, and Adobe. There's a lot of them.
In one, they list both people that have these session replays installed, but they also could detect if the session replay was actually running during their visit to the page.
Or traffic that comes from a particular geolocation.
However, when they were doing their research, they actually found evidence of session recording on Costco, Comcast, HP, iStockphoto, and Norton, that other well-known security company.
Pretty shocking.
And that—
So I've put together, you know, a little chart in front of you to show you.
Now all the ones that are blank is information that by default is sent to third parties when the form is filled in.
Do you see social insurance number is cleared for anyone to see in FullStory, Hotjar, Yandex, and SmartLook.
But you can see here that name, email, phone number, address, Social Security number, and date of birth is in the clear sent to third parties for 4 of the 7 people they looked at.
One thing, since this research has been published, Walgreens and Bonobos, these were two sites that actually were actively collecting information at the time of the testing, have publicly stated, we are getting rid of this and we take privacy very seriously.
So it kind of gives me the impression either they're freaking out because of the PR snafu or they actually didn't realize it was happening.
They didn't actually read the small print.
So I believe that according to Motherboard, Adblock Plus is now protecting you against all of the listed companies that were doing session tracking.
You might also want to refuse to engage or do any mouse movement at all on non-HTTPS websites because then of course any information that you put in there is not encrypted.
And web developers out there, just check your site. If you're not sure you're running any of these session replays, take a look on your live site.
And if you are, raise the alarm because from a compliance point of view, this is a big no-no and GDPR is around the corner.
Now he may have left the company and it's just been lurking there for months or years and you're unaware that it's running in the background and doing all these things.
You know, some marketroid may have years ago convinced the IT team to install it and it's been long forgotten about.
And I just want to hat tip these researchers at Princeton Center for Information Technology Policy. I think the research is great. And this is part one of the research.
So we're looking forward to seeing what else they have to tell us in the next upcoming weeks.
We've seen this with the DDE vulnerabilities with Microsoft as well.
It's all about cleaning up code and, you know, getting rid of stuff which seems on one level quite useful, but when it's—and it is for the short term, but when it's left in for the long term, it can be a major security headache.
Are you worried that your website might be the backdoor through which hackers can access your information and steal data? Well, if so, you'll be interested in our sponsor today.
NetSparker is a web application security scanner. It can automatically find the flaws in your website security and fix them before hackers can exploit them.
You can try it out right now. Download a demo from www.netsparker.com/smashingsecurity. Smashing Security. On with the show. Bling, bling, bling, bling, bling, bling. And welcome back.
And it's that part of the show which we like to call Pick of the Week.
Could be a funny story, a book we've read, a TV show, a movie, a record, an app, a website, a podcast, whatever we like. Doesn't have to be security related necessarily.
It can be, but it doesn't have to be.
You remember Speed?
Well, no, basically I went out to an aviation security conference in Indonesia, flew back with Air Kuwait where they actually check your water bottle for alcohol before you get on board because it's strictly banned.
And on an 18-hour flight, the only English language film was Speed 2. And I just, it sends me into a cold sweat just to hear the word.
I can never think of Speed actually without thinking of that Father Ted episode where they have the milk float, which if it goes above 5 miles per hour will explode or something.
Listen to me. There's a bomb on the milk float. A bomb, right? Who's that for? No, you're not supposed to deliver to anyone. It's going to go off and kill you.
Pat Mustard put it there because I got him sacked. When you go under 4 miles an hour, it'll go off. The bomb will go off. Have you got that? Oh God, help!
I don't want to be a milkman anymore. You'll be safe as long as you don't slow down. Oh, Ted, look, it's a big bunch of boxes in the middle of the road. Just stay over 4.
Again, I don't know how our American audience will appreciate Father Ted, but we will.
Toy Story followed by Toy Story 2.
In fact, I would argue that Toy Story, even though it has the voice of Thom Hanks, who I can't abide, is possibly the greatest movie trilogy of all time.
Look, many films these days, there's lots of sex and violence, isn't there? But there's too much of that, some people say. Personally, I can't get enough of it. I love that stuff.
But when I'm fed up with flesh, I'm not afraid to turn to fur. And so I—
And I thought her character was entirely unnecessary, and it should have been just a simple plot involving a bank robbery or something like that.
Because I took young children to see the original Paddington. They did not like that at all.
It's got Hugh Grant, who's playing a part without umming and erring his way clottishly through his usual character. And he's doing something a little bit different.
It's got fantastic cinematography, great production design. There's nothing scary going on about it. I mean, family-friendly, apart from the bit where—
And it was all great stuff for the kid as well, because apart from the bit where Paddington almost drowns, which is probably only suitable for kids rather than middle-aged podcasters.
I've got one little quibble about it, which if you guys haven't seen, you can probably still chip in on. Aunt Lucy, who appears in the movie, calls Paddington Bear Paddington.
And my understanding is that Paddington Bear only gets that name after he's discovered at Paddington Station in London. Surely Aunt Lucy calls him or something like that.
As a child of the '60s, I grew up watching this on TV and to have it turned into an animated movie, I haven't even dared watch it because so many times Hollywood has taken a big steaming dump on my childhood and I just wasn't prepared to let that happen again.
Yeah, I mean, it is a masterpiece. And if anyone gets the chance to see the Paddington special where he recreates Singing in the Rain—
I do dislike sometimes that he isn't wearing his duffel coat and he's effectively naked. I just don't think that's appropriate for a Paddington movie.
I like him to always be wearing it because a man's got to know where his marmalade sandwich is.
But other than that, good movie, and that is why Paddington Bear 2 is my pick of the week. Iain, what's your pick of the week?
It's Edgar Wright's Baby Driver, and it's— they've stuck the first 6 minutes up on YouTube, and I can quite understand why because it's an amazing scene, but it just blew me away.
It takes all the best epic parts of Spaced, of Shaun of the Dead, and chucks it into an action movie format. And beautiful visual scenes as well.
I sincerely recommend people check this out.
But it's that melding of soundtrack and visual effects.
If you remember Shaun of the Dead, when they're in the pub and the Queen comes on the jukebox and they're trying to kill the zombies.
Imagine that spread over 120 minutes of car chases and robberies, and you've got a pretty good idea of where you're going, and it's well worth the trip.
I'm looking forward to it appearing on Netflix or something that, because I think it's no longer at the cinemas here in the UK. But I'd to catch up with it soon.
Carole, what's your pick of the week?
They've got this wall of lava lamps called the Entropy Wall, and they video the lava lamps' movement and then turn the images into unpredictable data, which helps them create keys that encrypt the traffic on the Cloudflare network.
Kinda cool.
I mean, if you look at sort of the emissions of pulsars or quasars and, you know, the way that this can be used to help augment the GPS system, nature, it seems, still has the edge on technology in some regards.
It wouldn't really work at all.
You can buy a t-shirt by visiting smashingsecurity.com/store. Thank you very much, Iain, for joining us on the show today.
Where can people find you and check you out or follow you on social media? What's the best place that people can find out what you're up to?
If you don't know anybody else at all in the universe, then just go to Apple Podcasts and leave us a positive review, and we'll be very, very appreciative about that.
And you can catch up with past episodes at smashingsecurity.com. Until next time, cheerio, bye-bye.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Iain Thomson – @iainthomson
Show notes:
- Uber paid hackers $100,000 to keep data breach quiet
- HBO offered its hackers $250,000 after attack, leaked email claims
- Game of Thrones stars’ personal phone numbers leaked, as HBO hackers attempt to extort ransom
- Smashing Security 037: Boobs, dragons and data breaches
- Iranian ‘Game of Thrones’ Hacker Demanded $6 Million Bitcoin Ransom From HBO, Feds Say
- Sealed Indictment
- Over 400 of the World's Most Popular Websites Record Your Every Keystroke, Princeton Researchers Find
- No boundaries: Exfiltration of personal data by session-replay scripts
- Data release: list of websites that have third-party “session replay” scripts
- The dark side of Replay Sessions that record your every move online
- Shark Attack 3 – That Famous Line (NSFW!)
- Father Ted: Dougal the Milkman & the Booby Trap
- Paddington 2 – the movie
- Paddington Bear, Singin' in the rain
- Baby Driver – the movie
- Baby Driver – 6-Minute Opening Clip
- Mathmos Lava Lamps
- Tom Scott's How Lava Lamps Keep the Internet Secure
- Smashing Security on Facebook
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Netsparker is a web application security scanner that can automatically find security flaws in your website and fix them before hackers can exploit them.
If you want to automatically check your web applications for cross site scripting, SQL Injection & other vulnerabilities and coding errors that can leave you and your business exposed to malicious hacker attacks, then you need NetSparker.
Try it out now by downloading a demo from www.netsparker.com/smashing
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

