
The Darkside ransomware gang thinks it’s a modern-day Robin Hood when it donates extorted Bitcoins to charity, the micro-targeted ad industry could pop like a bubble, and would you trust a burger-flipping robot?
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Tim Hwang.
Plus don’t miss our featured interview with Recorded Future’s Levi Gundert.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
This week, shout-out goes to Saskia Muller, John, Janice Fris Beinslev, E. July, Devin Branch, Stanley Karas, Oleg Skutsenya, Chuck Davis, Jeffrey Beauregard, and Peter Baird.
Thank you. Having your support means the world to us, and we extend our extreme thanks.
If you want to join this amazing community of Patreon supporters, all you got to do is go to smashingsecurity.com/patreon. All right, let's get this show on the road.
See, it's all part of the, so they've got someone in PR working for them. They've got a campaign manager that has built this whole little thing up.
Hello, hello, and welcome to Smashing Security, episode 201. My name's Graham Cluley.
Not only did we have a fab episode last week with Maria Vamarsis, but some people will have seen us live with their own eyes on our YouTube livestream.
It felt like one of my old house parties that I had in the olden days before many of us had children and got married and, you know, got important at work.
Do you remember those days? It was a bit always crazy and you'd kind of come out of it going, how did that all happen? What, what, what? How has 7 hours gone by?
SmashingSecurity.com/live will take you there and you'll be able to see it and follow the live chat as well of the hundreds of people who were watching it at the time, which was really great to see so many folks.
And Carole, we are joined this week by an extra special guest, aren't we?
I'm a writer and researcher based in New York, and I'm just out with a new book entitled Subprime Attention Crisis, which basically argues that the money machine at the center of the internet may be total garbage when you take a close look at it.
Now, coming up on today's show, Graham talks of a digital Robin Hood who may not be up to any good. Tim will be telling us just how we are getting manipulated online.
And I'll introduce you to Flippy and Roar. You may want to stay at arm's length, though.
Also, we have a great special interview with Levi Gundert, or Gundert, depending on from where you hail. He's a global intelligence guy at Recorded Future. And know what?
Pretty smart, Graham. You should pay attention. All this and much more coming up on this episode of Smashing Security.
Because there are once again people on the internet who are robbing from the rich and giving to the poor, specifically.
They're encrypting data. They're asking for huge amounts of money with their ransom demands. That's not unusual in itself.
But what's happening with this particular ransomware gang, a gang called the DarkSide Group?
It's always Dark This, or Dark Avenger, or one of these sort of World Wrestling Federation kind of names meant to instill fear in you, rather than Fluffy Unicorn.
Anyway, DarkSide, what they're doing is, of course, they are stealing gigabytes of sensitive data HR data, data from your finance department, your payroll details, business plans, even commercially sensitive information.
They're giving you plenty of incentive to pay because your data isn't just encrypted and locked up away from you.
They also run their own website on the dark web, accessible via the Tor browser, and they're publishing even press releases on that site.
Just this week, they said they were only targeting profitable big companies. So, so far, nothing terribly unusual there. Most of that is stuff we've heard about before.
So for people that are targeted by something like this and all their real data is put up, they need a new identity effectively to operate online.
Otherwise, they're going to be pinned and prodded at every opportunity.
To say, "Oh, well, weren't you hacked?" Or, "Oh, actually, your number's already been used by other people." Or, "Are you sure you're at where you say you are?" Right?
It'd cost you a fortune in new business cards. Imagine it, it'd be horrendous. You can't do that.
The obvious way, it seems to me, is they would announce they're no longer going to hack companies and install ransomware.
That seems to me, if you really want to make the world a better place, stop committing cybercrime, right? That'd be a good idea. Anything else they could do?
How about they were to install patches? How about if they were to secure the systems they hacked into? Would that be a better thing to do?
What they're doing is they're taking the money which they managed to extort out of the hacked companies, and they're donating at least some of it to charity.
According to a press release which they issued this week, they said, "We think that it's fair that some of the money the companies have paid us will go to charity.
No matter how bad you think our work is, we are pleased to know that we have helped change someone's life. Today we sended— there's very bad grammar in this press release.
Couldn't we just go to our local Blackwells in Oxford and buy it there? And then he was like, of course, let's do it.
And then there was the stumbling block of, oh, now we have to create an account on another website. But I think it's worth it anyway.
So we're going to try and support businesses that do things well, like proper bookstores, proper grocery places.
And this is a service which basically acts as a proxy for around about 67 different charities and nonprofits around the world.
They claim that they give cryptocurrency millionaires a way to make charitable donations directly to nonprofits and benefit from tax incentives.
And so you can do it kind of anonymously, although the two charities who got the money were Children International, who are obviously, you know, out to protect children and their families and communities around the world, and also a charity called The Water Project.
Who are building reliable water systems across Africa. So you can donate to them directly, but these two donations were made via the Giving Block.
And what's unclear at the moment is whether the Giving Block is able to tell who exactly gave that money. What we do know is the Giving Block tweeted.
They actually tweeted before perhaps they realized that criminals had donated the money. Oh, someone's just made a very generous donation of $10,000 each to two lucky nonprofits.
So I think they didn't realize it was a ransomware gang there.
But what I wonder, okay, so here's conspiracy hat, conspiracy hat.
Why are they stealing from— well, we know why they're stealing from the rich. I think we worked that one out. But why are they making these donations to charity?
I think it's important to remember that the victims of these corporate ransomware attacks, they're still made of individuals. There may be people who lose their jobs.
There'll be people whose privacy is destroyed by email archives and so forth being published online. People might lose their jobs as a consequence of this.
What's interesting is Children International, so one of the charities which received $10,000 from this ransomware gang, they say that they're going to return the money.
And so should it go back to the giving block? Should the money maybe be given to charity?
Would we see one charity saying, "Well, look, we don't want this money, but we'll pass it on to another charity" because we feel bad about accepting. It's peculiar, isn't it?
It's a bit like a big bag of cash arriving on your doorstep as a charity.
By announcing it, they put all the charities in a hard spot where they have to return the money.
I wonder whether they are, for some reason, publicising their gang, because of course this has got them some attention and maybe they're fed up of some of the other ransomware gangs.
Worked at Google and was part of a joint Harvard-MIT project on the ethics of AI. And the thing I've been really into recently is very wonky.
In fact, so wonky and boring that most people don't think about it on a day-to-day basis.
And that topic is ads and programmatic advertising online and what it means for the future of the internet.
In fact, it looks a lot more like the New York Stock Exchange, right, or the NASDAQ.
Basically, you have these vast marketplaces where algorithms are trading attention in split-second intervals, millions and billions of times a day.
And this way of doing advertising, to buy and sell advertising, is referred to as programmatic advertising in the industry.
We can target a message exactly where people are most vulnerable and get them to buy something, right?
And what's interesting is I think even when you talk to people who are really critical of the tech industry, they tend to buy the same thing.
They say, oh my God, Mark Zuckerberg, he's got a mind control ray, right? He can reach into our brains and control what we think.
And intuitively, maybe an argument that makes sense, which is, okay, we have lots of data about people, we can target these messages, why wouldn't it be very influential?
And I think there's two maybe stories that I'll tell that I think you might find interesting.
So the first one is in 2017, Procter & Gamble, which is one of the biggest advertisers in the world, decided that it was going to cut out a little bit from its digital advertising budget, about $200 million out of its digital advertising budget.
And they— They had chump change, right? Compared to a ransomware gang, this is way more money.
And what's fascinating is that they reported just a year later that there was absolutely no change to their bottom line, right? That no change in sales occurred.
In fact, they even announced that some of the cost efficiencies meant that their advertising was reaching about 10% more people than it usually did.
What's fascinating is, in many cases, some of the academic experiments that I've done on this, it suggests that all this data, what it really gets you is the ability to advertise to people who would have already bought your product anyways, right?
And so it ultimately ends up being a lot of wasted money. But you don't even have to get to the question of whether or not ads are effective or not.
Google even came out with a study a few years back that suggested close to 60% of ads are never even seen on the internet.
They're delivered, but you know, they're below the fold or they're hidden or, you know, they're otherwise placed in a place that people don't notice.
There's actually an amazing quote, which I can't read in just a second from, you know, the representative of the online advertising industry.
Because I think they are very worried that, you know, ad blocking is up on browsers, ad blocking is up on phones, and it really is cramping the ability for these ad businesses to actually buy and sell ads.
And so, you know, one of the things I talk about in the book is, is this a big bubble, right? And at some point, is it going to pop?
And one way you could imagine it popping is basically, you know, essentially sufficient numbers of people blocking ads to the point where the market actually can't function anymore.
But I suspect that that's misplaced. I think the reason people use ad blockers is because the ads are fucking annoying, right?
And they got so overwhelmed by them, they had to just do something. And they talked to the one person in their family that knew about tech and got it set up.
And of course, they're slowing down your browser too.
Where, you know, ultimately what they're doing is they're paying the ad blockers to let their ads through.
And so ironically, some of these ad blocker companies have become ad networks onto themselves, right?
But I think that that's, in some ways, I think that is an exception rather than the rule in the space.
I think the overall story that you see when you look at the data is that ad blocking is up all over the place.
There's a lot of money being wasted if all this is what you're saying is, you know.
So this is a scam in which you try to basically pull money out of the advertising ecosystem by creating a device farm that clicks on ads or watches YouTube videos every day.
And I think the size of the fraud there is Forrester Research Company came out with a report a few years back where it was about 56% of display ads, that traffic is all fraud basically.
You know, some people have said to this book, they say, oh, well, is the main thing I need to worry about just that Mark Zuckerberg has less billion dollars if this market crashes?
And I always point out that there's just so much on the internet that relies on ads to subsidize.
Like Google Sheets, Google Docs, right? Those are all subsidized by ads. I used to work in AI, right?
And a lot of the labs doing the most cutting-edge research in machine learning are loss leaders for those companies, right? They're being subsidized by the ad business.
And so I do think that if there was a problem in this market, we would see ripple effects in many places that we wouldn't expect.
And what I find interesting though, as well as that, is also we hear all the time about this huge amount of data which is being collected by these big tech companies about us.
But you are saying it's not actually helping sell stuff. It's not actually as effective as we imagined. Is that right?
I mean, would they be just as successful if they weren't specifically trying to target us with these ads, do you think?
I was on a panel last week where someone said, so why are we building this enormous surveillance infrastructure if the whole thing doesn't work at all? And it is right, Graham?
You know, there's a professor by the name of Alessandro Acquisti that's been doing some really interesting research into, okay, do ads that are targeted with cookies work better or worse than ads that are not targeted, right?
And what he finds is effectively it's the same. It's really at the margin that this makes a difference. And it's partially because the data is not very good.
A lot of it is very faulty.
But there's also just a question about whether or not all this targeting really gets you to get a message to the person at a point where they're ready to buy.
So I think there are a lot of questions about this data.
I think one of the reasons it's been collected, one of the reasons we've built this system, is for a long time, the digital advertising industry has wanted to show that it is better than earlier generations of ads, right?
Oh, we're better than billboards. Oh, we're better than magazines. Oh, we're better than television. And one way of proving that is they collect lots and lots of data.
And I think there's a certain bit of theater with that data that has kind of incentivized this collection, even though it may not actually amount to much in the end.
And I suspect then when they manipulated it, it got to 80/20 again.
By the time it got to whatever stakeholder had asked for it, I'm sure the stuff was so far off the real point, you know? The whole thing, I agree. I felt the artifice.
And this is, you know, thinking back 15 years ago.
And then their boss, and it goes all up to CEO who goes, "Wow, my life is fantastic. This is great." And it's just the whole thing just a pile of shit.
Like, why wouldn't you just go to the person who's doing the web and going, is everything okay or not okay? You know, like, just ask. I agree.
Yes. Right.
And I think one of the most interesting takeaways from that report was the conclusion that for all of the data Cambridge Analytica had and for all their claims of the power of psychographic advertising it's actually unclear whether or not any of their messaging made a difference, right?
And I think there's one way of looking at it, which is, okay, no harm, no foul.
I actually take the other position, which is there's even more reason why we should be uncomfortable about this, right?
That like it's a privacy intrusion, but it's also a meaningless privacy intrusion ultimately.
Tim, me, that'll be 40, 50 years.
And I think a lot of the empirical evidence that we have from, say, the 2016 US presidential election is that there's a really big question as to whether or not any of this Russian interference actually influenced votes.
Now, that's a different question from whether or not it's bad for democracy, corrosive to institutions.
But maybe we should think about this in a way that doesn't rely on, again, advertising being this mind control, right?
Maybe there's some other kind of promotion which people could do. Maybe something which an ad blocker doesn't stop, a podcast perhaps.
Maybe some of that money should be redirected and siphoned towards quality podcasts. Do you think that would be?
So it's the same voices, but there's a lot of podcasts out there who have this digital kind of inclusion of ads. And sometimes the sound's way louder or the voice is very different.
Let's get it into apps. In some ways, it's the scent of desperation, right?
They want to expand their business into places that aren't being so corroded by ad blocking, ad fraud, and so on and so forth.
You know, the problem though is that search and display advertising, it really is a financial rocket ship, right? We don't have anything else that scales in the same way.
And so there's a question that even if these other forms of advertising, you know, are effective, are good, are free from the problems that plague the existing system, whether or not it will be enough really to kind of make up the difference.
You know, so that's the other side of it is there's going to be a lot of businesses and a lot of people that are dependent upon some of the funding that comes from that.
Yeah, I know it's very harsh of me to say that, but, you know, I'm worried about, you know, I mean, the COVID-related downturn in the media right now is a great example of this.
We have an ecosystem which is so brittle that even the most apparently stable, long-standing media entities can't even retain their staff for two months of a downturn.
That strikes me as a structural issue for sure that I worry a lot about.
Okay, so I'm a big fan of the old American-style hamburger, you know, like a big protein slab, right, with all the veggies and the sauces and the perfect bread bun thingy.
It's a true thing of beauty. It can be. You just slap a little baby poutine on the side, and that's me, heaven.
What's it called? This beefy guy with the platinum hair. Cutting him hair, and he drives around in his little hairdresser car.
But it's like a calling to these people. It's a craft. It's an art form making a great burger. I make a great burger. And I'll tell you what, it's like high-end art.
Because Miso Robotics, the people behind Flippy, didn't make Flippy look like a stereotypical Burger Master, right?
You're not going to confuse him with Bob from Bob's Burgers, which is about the cutest burger cartoon chef ever. But no, this is basically an arm. It's an arm on a trolley.
It cooks perfectly every time and boasts 100,000 continuous uptime hours, can work a grill or a fryer, recognizes and monitors food items. Switches between cleaning and cooking.
It's all cloud-based, which is really cool, and monitors and learns and complies with health standards, works with people.
In other words, it's a way cheaper, way more reliable, way more efficient option to hiring a human being, it seems.
You had to wait in this huge line and the thing would get stuck, or the bag was too big to go through the gap, or the thing was turned off accidentally. And it was just ridiculous.
And back then that caused a problem because human workers couldn't keep up with it.
It's fascinating, honestly.
Literally letting the robot arm swoosh from cooking station to cooking station, a bit like, you know, Thom Cruise in his underpants in Risky Business sliding across the wood floor.
It can obtain frozen food and cook it without assistance from any human team member. Right. And don't worry, right?
It alerts all the workers when orders are ready to be served, right? Can you just hear it? Shelley, please pick your order. Shelley, please pick up your order. Shelley, now, please.
Shelley, Shelley, I'll need to tell management. Shelley, Shelley, now, now.
One day he's gonna get fed up of flipping 2,000 burgers an hour and take over the world.
Now listen, Roar can cook chicken tenders, chicken wings, tater tots, French fries, waffle fries, chicken sticks, potato wedges, corn dogs, popcorn, shrimp, chicken, and onion rings.
That's it.
And I focused on Flippy and Roar and the food industry, but really there are few industries out there that aren't considering how they can robotize their services because it's cheaper, more efficient, more reliable than all us humans.
And you know me, so lady doom and gloom, I'm thinking Flippy's getting a lot of press here, right? Their privacy agreement is laughably small.
All you're saying is, can I have a burger, please?
Basically, as I predicted or as I thought, robots are just like any other device in the whole wide world.
So I'm saying to the robotics industry, which is obviously on a growth path right now, what with pandemic, loads of people don't wanna be maybe working in hot kitchens.
Companies are trying to think, how can I keep business going? 'Cause people gotta eat. And the robotics industry is on a growth, but I say take heed, guys, take heed.
As you're all chomping at the bit to get your wares out, you know, and secure all those mega contracts so you can sell up and go buy Geoff Bezos's neighboring mansion, you've got to take security seriously because you're now dealing with things like oil, like restaurants where people are hanging out.
What if they start juggling the oil, for example?
It's not like anyone ever hacked anyone that actually takes security seriously and got away with it.
Let's give them naked flames and oil and tell them to get on with it. And let's, most importantly, let's connect them to the internet. What could possibly go wrong?
I think it costs $30,000 a year to run, and then you've got a running fee. So $30,000 all out and then a running fee per year, SaaS fee.
Why should we have to get up and go to a burger joint? Why can't we get a robot to do that for us?
He's not there anymore.
So I'm imagining these robot arms, people are going to get bored of them and they're going to want them to have better personalities.
And then you're going to hear, you're going to hear, you know, maybe you'll have Graham in one of the arms.
I think Elvis will be consuming them.
They empower organizations revealing unknown threats before they impact a business, helping teams respond to alerts 10 times faster.
Recorded Future does this by automatically collecting and analyzing intelligence from technical, open web, and dark web sources.
Well, you too can access the up-to-the-minute security intelligence that allows Recorded Future clients to make fast, confident security decisions by installing their free browser extension, Recorded Future Express.
Go and grab it now at smashingsecurity.com/recordedfuture.
The idea behind this free ebook is it gives you a guided tour of how the MITRE ATT&CK framework can totally simplify and strengthen your cybersecurity security skill strategy.
It literally is a go-to framework. Learn more at immersivelabs.com/smashing. And thanks to Immersive Labs for sponsoring the show.
In fact, tens of thousands of companies rely upon LastPass to protect themselves.
LastPass Enterprise simplifies password management for companies of all sizes and helps you secure your workforce. So whatever the size of your business, go and check it out.
Go and visit lastpass.com/smashing to find out more. And thanks to LastPass for supporting the show. And welcome back. Can you join us on our favorite part of the show?
The part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
And one of the things that some people are missing, well, I wonder if you chaps are missing it as well, is flying. Do you miss getting in an aeroplane and pootling around?
You have this little mini TV and this tiny little chair and yes, awesome.
It's called Airplane Mode, and it delivers all the thrills of a real-time, 6-hour commercial airline flight.
But it's not I'm missing being the pilot, right? Because I never sat in the front. They never let me do that.
No, airplane mode recreates the monotony of sitting in a cramped seat with rubbish food in real time.
So you can travel for 6 hours between, I don't know, JFK in New York near you, Tim, to Reykjavík. Or you can go on a two-and-a-half-hour journey from JFK to Nova Scotia.
You can look— you think I'm joking? This is for real. It's real. I'm going to put—
And it's got an airport airline information card, flight safety video, you can watch in-flight magazine, you can order booze.
Now there's a slight problem because this simulation, it seems, from what I've read, it suffered from some bugs.
But they had some flights which were just going over the Bay of Biscay and back. So they'd take off from Heathrow, go around a little bit, and then come back.
And some people would book these things just because they enjoyed going on a flight. It wasn't to be in the front.
So I think for them, this might be the perfect COVID-safe way of experiencing an airplane flight. So my pick of the week is the game Airplane Mode.
I haven't played it, but maybe some of you can tell me what it's like.
Tim, what's your pick of the week?
It's a little bit of an odd story that I'm not sure even if it's well known within Britain, but around the 1930s, there was a family in the Isle of Man that claimed to be haunted by a talking mongoose named Geoff.
And my friend told me this story, and the Wikipedia page is incredible, and I suggest anyone check it out.
But a number of years ago, the MIT Press put out a book which is an exhaustive investigation of the talking mongoose, and the book is entitled Geoff!
The Strange Tale of an Extra Special Talking Mongoose.
Apparently multiple investigators went to the Isle of Man and confirmed that there was, for a period of time, a "talking mongoose" or "man weasel," as it was referred to in the British papers at the time.
And it's still unresolved, and the author actually went to go investigate it. And it's sort of a paranormal investigation story, but probably in the most absurd way possible.
Geoff, this mongoose, sometimes assumed the role of a cat.
And for you, I would suggest a podcast, not Sticky Pickles, which you've already subscribed to and you're planning to—
Now, I think I've got a pretty good radio voice, but I bow at the voice prowess of the Lady Demi Moore. And it's just, how does she craft that voice?
The podcast is called Dirty Diana.
And she's kind of— I know she sounds like a bit of a control freak.
So, of course, to escape from her carefully curated life and dying marriage, Diana secretly runs an erotic side hustle where she meets and records other women's intimate and often a little more fantasy these.
Now, I can't say it's not rude.
Oh, but in order to give you guys a proper endorsement, unlike Graham, I forced my way all the way to the end. I actually freaking listened to all of it.
Anyway, so my dirty pick of the week is Dirty Diana, a podcast from Q Code. Check it out if you dare.
What do you say if you were being asked your name? I don't know, say in English. SPEAKER_03. I think in England, I go with the Americanized version. It's Gundert.
But if I'm in Germany, I think it has to be sort of that hard guttural Gundert.
So what does Recorded Future do? Just give us a bit of background, would you? SPEAKER_03. Yeah, absolutely. So I have to tell you this story really quickly because I find it amusing.
So we were in— I was in London last year with Recorded Future doing a bit of work in our London office, and I was fortunate my family came with me.
And I have three sometimes charming children. And we were sitting there one night at the table after work, and we were playing cards, and I had a business card sitting on the table.
And my 9-year-old, he reaches over to grab a card off deck and he looks at my business card and he stops sort of frozen.
And all of a sudden he yells and he goes, you're the senior vice president of global intelligence? And I was, yeah, that's my title, dude. That's what I do.
So when you think about threat intelligence, I think the best way to think about it is if you want really up-to-date, real-time news on financial markets, you go to a Bloomberg terminal.
And the coolest thing about Recorded Future is it's a product. So it's software as a service, or SaaS as we like to say in inside speak.
And it is real-time threat intelligence for the world, just like Bloomberg is for financials. It's very much what Recorded Future is.
And so we take all kinds of data, unstructured data, structured data.
And we do sourcing and collection of it, aggregation of it, analysis of it to really present something that's very consumable and very easy to do something with.
And we do that through a product.
And so it's really from the inception of Recorded Future, some very smart guys in Sweden with PhDs got together and figured out the technology behind it.
But in the end, it's really this incredibly powerful product that brings threat intelligence to hundreds and hundreds of clients around the world that need that to be able to better secure their organizations and ultimately reduce risk.
They're like, we don't know what's going on and we want to know before it happens.
If we sort of understand how a phishing attack works, then when we see one that shows up in our inbox and purports to be from Apple or Netflix or whatever it may be, we sort of understand when there's something misspelled in the email that, oh, that's a phishing attack and we delete that and move on.
Well, for companies, there's so much exposure.
They have so many technical assets and they're continuing to build out digital transformation strategies that sort of expand the technology landscape.
And with that comes increased exposure and increased risk.
So the whole point with threat intelligence is being able to be proactive, to understand how adversaries and actors operate so that you can sort of make the countermove right before the attack actually happens.
And that's really philosophically the whole point behind threat intelligence. And it's really become so critical vertical.
We have so many clients now at Recorded Future that it's sort of industry vertical agnostic.
We have clients in food and beverage, we have clients in aviation, in public sector, in healthcare, financial services, because everyone understands that it's table stakes.
So regardless of what you do and the widgets that you produce, security becomes a very basic requirement to actually be able to run any sort of business these days.
So let's say my digital space that I want to protect, whatever that may be, if I compare it to my house and I think about my house being under threat and people keep telling me threats are coming, threats are everywhere, but they don't tell me whether it's coming by air, through the window, via the front door, via my back garden, whatever.
So I'm constantly building fences and alarms and having floodlights everywhere to try and protect me from an unknown unknown.
But if you have the intelligence to know, look, there's a guy in your neighborhood, he's coming through windows that are left open, watch yourself.
That information can make your job way easier as a homeowner. So my contentious question is, are people actually coming to you to really simplify their job?
Because maybe they just need a little break, right? Because they're going to know where to look with the information you give them.
And I think if we wanted to play that out, really what businesses are dealing with today is an army of people that come down the street at night and they try every door on your car, they try every door and window on the house, and that's sort of one wave, right?
And then there's a second wave or third wave of people that come down the street, and there's less of them, but they're more advanced.
And so they will open a storm sewer grate and put an amphibious drone in there, and it will follow some pipes and pop up out of your toilet in the bathroom.
I think as you say in the UK, the loo. And it will steal something or it will spy on you, and you won't necessarily know it's there.
So, the problem is the volume of threats and the volume of actors that perpetrate those threats only increases.
And so, it is really for companies to try to understand, yes, we understand that people are testing the doors and testing the windows, but it just goes so much further than that.
The complexity with which and the speed with which adversaries move means that if you don't understand those tactics, you don't understand the tools and infrastructure they're using, that they're using drones, that they're using crowbars, that they're using other types of technology, then it becomes very hard to think about how you're actually going to defend against it.
We actually do a podcast together. The podcast is called Off the Record. And I'm having a lot of fun doing that with Adam. We're co-hosts. And we have a ton of fun.
But the real work that Adam's doing is On the Record. And as I said, it's really an independent property and Adam is really looking at new and unique takes on security events.
And a lot of it is supported by Recorded Future in terms of analysis and some of the researchers we have within the team at Recorded Future. But it is very much its own vehicle.
Cool, and it's very exciting.
You guys are talking about topics that we wouldn't have touched with a 10-foot pole, and that's really exciting.
And I think it's also because you've got some serious journalist backbone behind it, don't you?
I think for Recorded Future, we realized that there are a lot of stories that need to be told, but we can't always use PR firms and we can't always be pushing on media companies to necessarily align with what we think is important.
So Adam is independent, but he is looking for those angles and he is looking for the unique stories to tell. I think it's just a great opportunity. And yeah, it's very exciting.
So, you know, that is one topic that's really not going away. And we've sort of seen this whole ecosystem develop around ransomware.
Where they're not just locking systems and encrypting data, but of course stealing data and trying to ransom the data or even engaging in these denial of service attacks where they try and take a site or a company network offline.
So it's really become this full ecosystem and it's sort of interesting, not just looking at the responses that businesses are taking in terms of, do we pay the ransom?
And that really is a business decision.
But also all the actors and adversaries that are sort of selling what we call unauthorized access into these companies to begin with, or hacking these companies and then selling it to people that then push their ransomware.
So it's kind of been this whole ecosystem development over the last 18 months that we've really been exploring quite a bit.
So we have some serious elections coming up in the US particularly, and we are getting the question at Smashing Security, people asking like, how do I know, like, you know, what should I look out for?
I know that bad guys are going to try and disrupt this.
And we know that what we call the Big Four—so Russia, China, Iran, North Korea—3 of those 4 have a pretty determined interest in some sort of disruption of election.
And it's really hard.
And I think I actually am going to turn the question around to you a little bit because I love to ask reporters especially, how do consumers of news, how do they do any sort of validation when they're looking at a social media post and they click on the link to look at the story?
How do they know it's valid? How do they know that it's actually factually based and that it doesn't contain deepfake images or a completely fabricated story?
I mean, whilst not formally, over two decades of working in the industry, I feel I've got a pretty good nose for that sort of thing.
And I'll still get caught out in terms of finding a news post, getting clickjacked.
The headline gets me and the graphic looks very similar to graphics that might be used on say something like The Economist or the BBC or something—you know, one of the places I might go to.
And I won't check the URL because I'll be like, "Ooh, ooh, this looks hot." And then there I am in it reading some garbage.
So the average user, it scares me to death when I watch them on a computer. If I work with—you know, I have a book club, right?
And there's a lot of more senior people in the book club. And, you know, we do a lot of tech support for that book club. And I love saying, "Just show me how you work for a bit.
Just show me how you go about, do your online shop." And just watching them, you know, flail around with the mouse and hitting the wrong things and not realizing that that has impact is very scary.
But hey, they're filling their house with IoT tea, right? So because it makes life more convenient. So there's this real push-pull right now that's happening.
And I think there is that tension between we want everything now and we want it to work and we want it to be tailored, but we're also starting to realize that we need a little privacy too.
And, you know, Apple lately has been on a real ad campaign kick, you know, touting the privacy features of their hardware. And I think it does resonate with a lot of people.
And right now with the election, disinformation and information operations are a very real thing. And we learned this 4 years ago.
And Russia in particular is very adept at not just generating fake content that they're then very good at propagating, but they're also very good at jumping on existing threads, whether it be some sort of conspiracy theory or whether it be completely fabricated.
They are very good at taking that and amplifying it, especially within social media circles.
But the other interesting thing we've seen at Recorded Future is that criminals are also getting in on the game.
So it's not just actors that receive, for lack of a better word, a Russian government paycheck through one means or another.
It's actually criminals acting on their own that recognized that disinformation is actually a capability that they can sell to businesses that want to essentially throw shade on a competitor.
And we have actually done the research and we've actually seen the results. And it is incredible.
I mean, they will write articles, they will get in place with media outlets and publications. They will get the advertising done. They will get the social media propagation done.
They can do deepfake videos and images.
You know, you have to do the due diligence to question everything. And unfortunately, that's the new reality.
Fortunately, you're doing this podcast and I think podcasts are great because it's an opportunity to actually talk and think and offer perspectives, and it's not the 30-second soundbite, you know, and it's not designed to be consumable and propagated through social media.
Like, you know, you've made really good arguments, and I was able to do that in a period of 10, whatever, 15 minutes. And that's so refreshing. SPEAKER_03.
It's good you're not a politician.
Oh, this has been great. This is fabulous. Thanks so much for the time.
You should, one, check out Recorded Future's free Express browser extension, which you can find all the information at smashingsecurity.com/recordedfuture.
If you want to read the Recorded Future blog, check out therecord.media. And lastly, check out Levi's podcast, Off the Record, wherever you get your podcasts.
So you're going to give us the real juice then on the podcast? SPEAKER_03. Yeah, I think we try to. I mean, we do.
Adam and I, you know, we try to open the kimono a little bit in terms of sources and methods and some of the things you don't necessarily see.
Coming from you, that's a huge compliment for a very fly-by-night operation.
That's an unanswerable question, but I think that you both as a tandem and a tag team do a wonderful job.
Tim, I'm sure lots of our listeners would love to follow you online, find out more about you, and indeed read your book as well, Subprime Attention Crisis: Advertising and the Time Bomb at the Heart of the Internet.
Where should they go to find out more about you and to check out the book?
And don't forget, if you want to be sure never to miss another episode, subscribe in your favorite podcast apps such as Apple Podcasts, Spotify, or Pocket Casts.
Thank you for listening to us each week, supporting our work, sharing with your friends, etc.
Of course, shout out to this week's Smashing Security sponsors: Recorded Future, Immersive Labs, and of course LastPass. Their support helps us give you this show for free.
Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
This is as sexy as it— Seriously, I can't turn this on any more than it already is.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Tim Hwang – @timhwang
Show notes:
- Smashing Security celebration livestream — YouTube.
- Ransomware gang donates part of ransom demands to charity organizations — ZDNet.
- Mysterious 'Robin Hood' hackers donating stolen money — BBC News.
- Donate Bitcoin – Give to Help Build Wells and Water Projects — The Water Project.
- Donate cryptocurrency to Children International
- Ad Tech Could Be the Next Internet Bubble — Wired.
- Subprime Attention Crisis: Advertising and the Time Bomb at the Heart of the Internet — A book by Tim Hwang.
- Miso Robotics unveils its next-gen robot kitchen assistant — VentureBeat.
- Flippy — Miso Robotics.
- Miso Robotics Flippy Robot flips burgers like it's its job — YouTube.
- Flippy the burger-flipping robot too good, fired after one day — Naked Security.
- Cybersecurity a Must for Safe IIoT Robots — Robotics Online.
- How to Improve Cybersecurity for Robots — RIA Robotics Blog.
- Airplane Mode — Steam.
- Enjoy a 6-hour flight in real-time with economy class sim Airplane Mode from tomorrow — Eurogamer.
- Airplane Mode: Live Action Trailer — YouTube.
- Airplane Mode Gameplay — YouTube.
- Gef the Talking Mongoose — Wikipedia.
- Gef! The Strange Tale of an Extra-Special Talking Mongoose — MIT Press.
- Dirty Diana — QCODE.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Immersive Labs delivers hands-on, challenge-based training and exercises to make your team ready to fight real-world threats.
Check out their free ebook all about the MITRE ATT&CK framework, and how you can use it as part of your cyber skills strategy and improve your security posture by identifying weaknesses. Visit immersivelabs.com/smashing now.
Recorded Future empowers your organization, revealing unknown threats before they impact your business, and helping your teams respond to alerts 10 times faster. How does it do this? By automatically collecting and analyzing intelligence from technical, open web, and dark web sources.
For up-to-the-minute security intelligence that can help you make fast and confident security decisions, install the free browser extension Recorded Future Express.
Get it now at smashingsecurity.com/recordedfuture
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

