
Watch out for a whole different type of shoulder-surfing, researchers uncover the CostaRicto hackers-for-hire gang, and we take a peek at who is behind Parler.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Chris Cochran from the Hacker Valley Studio podcast.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
This week, shout out goes to Mikey Wells, Raffaele the Doctor, Gepenst, Pavel Ponomarev, Jessica Orth, Nigel Scott, Martin Chapman, Yan Su, Xylar, and William Reddig.
Huge thanks to you all. Especially those of you that make me use Google Translate to try and get your names right.
Now, if you want to join this incredible group of people, you need only go to smashingsecurity.com/patreon. But if you're fine just as you are, we love you too.
Stay safe, stay warm, remember to smile as often as you can. All right, let's get the show on the road.
My name's Graham Cluley.
So really we look at the fringes of cybersecurity. As you saw, we had Grandmaster Maurice Ashley on the podcast.
So we talk about strategy and how to succeed and become somebody in the thing that you want to do.
So yeah, you made better use, I think, of Maurice.
Now, coming up on today's show, Graham tells us about an unusual way to steal passwords on a Zoom call.
Chris talks about a mercenary hacker group, and I see why people are talking about social platform Parler. All this and much more coming up on this episode of Smashing Security.
Have you ever had an arch enemy in your office?
And then they let a little girl in the competition and inside, I just knew that was the end for me. She could have done whatever she wanted to.
She could have sat on the stage, sucked her thumb, and then she would've destroyed me. But she actually did phenomenal. And I was, okay, at least I lost to a great dancer. But yeah.
You might want to maybe steal some information or have the upper hand against your work nemesis, but maybe they're wise to phishing attacks.
Maybe they don't click on your malicious links. Maybe they haven't chosen dumb passwords. What are you going to do to get better than them? To drag yourself ahead of them?
Because there they are, brown-nosing up to your boss all the time, smarming away, "Mm, mm, mm," every week on the catch-up call with the rest of the team.
It's, "Ahahaha!" So what you need, what you need is their password, right? So imagine you're in that mentality.
And you're all working remotely. You don't even have access to their computer.
But the one thing which brings you together each week is a Zoom call or a Skype call or a Hangout or a house party, or whatever it is.
Alright.
Doesn't matter which video calling system you're using. They say there's a chance you could find out their password just by having a video call. Now, it ain't easy, right?
There's now end-to-end encryption, so calls can't be intercepted or eavesdropped upon. People have got strong passwords, multifactor authentication.
This is what's happening right now. Okay, carry on.
So if you're having a legitimate video call with someone, it doesn't matter that the conversation's encrypted because you can see what they're doing.
You can split all types of typist into 3 groups. There's the hunter and pecker, which is sort of, which button do I press now? There's the touch typing sort.
You just obviously use the keyboard a lot.
That's always difficult for me working out what key combination I have to press or a pipe or something like that. So there's hybrid, there's touch typing, and hunting and pecking.
Okay, so those are the 3 groups of typists.
You also need to consider the different types of keyboard. Because some keyboards are very clacky, right?
So your first thought might be, well, maybe I can do some analysis on the sound as people are typing on the video call.
And these researchers say, well, they looked into that, but it's not really very effective because there's all kinds of noises going on in the call anyway, which mess things up.
And audio on video calls isn't that great anyway, which is why we're not doing this as a video call right now, right? We've just connected.
Well, there's more reasons than that that we're not doing a video call, Graham. So I'm going to explain what they do. Okay, fuck. Nice. You get on the video call, right?
And the researchers say you observe the typing behaviour and you attempt to detect if typing is taking place off screen, because obviously the webcam isn't pointed at your keyboard.
So what these researchers do, they say, is they're able to look at the micro movements in people's shoulders and upper arms and work out what you might be typing. Oh my God.
I know— see, this is what I would want to know right away, and I know you wouldn't even think about going to research that, but who is funding this research?
And there they are smoking on a doobie or something. I've got a crazy idea. Let's look for another one.
So what we need to do is we need to somehow protect against this problem because they also say that this is a problem which has become more serious because of the increased quality in webcams.
Everyone's been upgrading their webcam because they're stuck at home? Yes, Chris.
Oh, because their screen's locked because they get so bored of listening to the call, they don't do anything?
Maybe you're simply after a URL or a credit card number or who knows what.
And where your shoulders are, because most people have them more or less in the same place.
Or if you were a fly, not actually a real fly, but if you had more than one arm, you could do that.
So, for instance, if they used a dictionary—
So, what they do is they feed the software common passwords or common dictionary words, which they're looking for.
And that helps them begin to identify what the most likely word is if your hand and your shoulder indicate that you've gone left on the keyboard or up or whatever.
And so they're trying to make a guess. So they did have some success, but they also came up with some solutions. So having dreamt up this frankly ridiculous threat—
And so the rest of your body should be pixelated or blurred.
So instead of having your whole body, it would just be this tiny little sun-like thing of your face.
And go, "Look, I don't know, I'm sorry. It's the best thing I can do." Or it's a bit steamy in here. You know, I was cooking. That's why some of it missed me.
If you had one of those, and if you went onto your Zoom call with one of those, you just stick.
You wouldn't be able to type anything, of course, 'cause your arms wouldn't be able to come through.
You could have two of them over each shoulder, right? With fans underneath. Just wiggle, wiggle, wiggle, wiggle.
I'm not sure it was that serious a threat, to be honest, but maybe in some extreme circumstances it might be.
I suppose maybe the best advice of all is just choose a really strong complex password and don't type it in while you're on a Zoom call or get a worse webcam.
Like, or Chris's idea of get some grease.
You'd have to say, "Hello, I made this meeting for no reason and you don't know me, but please type in your password now." And you'd be like, "Okay, sure." I don't think that's gonna work.
But yeah, BlackBerry Research, the reason they believe it's a mercenary group is because they are targeting all over the place, different countries, different industries.
And what's interesting from a threat intelligence perspective is that you're not gonna know or be able to predict where they're going next because they're hackers for hire, so they will go where the money takes them.
So government entities, to give them a little bit of that separation between who is actually doing the operations.
And that's another thing that's interesting from an intelligence perspective, because you might think it's this team, but really it's X country.
So that really can muddy the waters in terms of attribution.
We haven't got much resource here on the island to do some hacking.
They would approach a group like Costa Ricto and say, hey, can you do some hacking for us to find out what other islands in the Pacific might be up to? Or stealing information.
So you could go based off of that, but they don't know whether that malware came from this group or they hired another group to build it for them. So there's that.
There's some behavioral stuff that they can track, some tunneling stuff, but again, that could be anybody, so tracking them is going to be unique.
How does that intelligence agency know they're dealing with the real Costa Ricto gang and not—here's an idea for anyone enterprising who's listening—and not some fake Costa Ricto hacking gang who's gonna scam, because it'll all be cryptocurrency, won't it, who will scam the intelligence agency or the country into paying them to do something, and then they'll not do anything?
Oh yeah, I'm retired, we need you to come back in, you know, that type of thing. Is it like that? You go and get the retired hackers?
Anyway, so interesting question you've got there, Chris, which is how are they going to hire members of their team? Because it would be a bit like bringing in Stallone, wouldn't it?
Maybe they should sponsor our podcast, Carole.
You know, a silent war, I'll go, "Look, we need to parlay." And he grabbed it from, I don't know, some TV show, but it was great.
And recently they've seen a huge uptick in users, but they've also been getting some heat.
So I say, gentlemen, let's grab our trowels and let's do a little digging and see what's going on.
So if you go first to the Parler website or in their messaging, Parler is an unbiased social platform focused on open dialogue and user engagement.
We allow free speech and we do not censor ideas, political parties, or ideologies. We protect your privacy and we'll never sell your personal data. Log in, sign up, right?
So it started with this messaging and it was bubbling along slowly, but then it burst into the spotlight this past June.
And this is when Twitter had labeled 5 of the current president's tweets with warnings that perhaps the information was not based in 100% truth.
And Trump retaliated by signing an executive order that opened the door for an internet shield law to be considered. And then Facebook announced it would start labeling posts.
The Trump campaign even publicly declared that it might decamp from Facebook and Twitter and refocus its efforts through Parler.
Surprise, surprise, Parler got an upshot of users, possibly because the Trump campaign had given it some endorsement, but also because it markets itself as a free speech and unbiased alternative to Twitter and Facebook.
The go-to place for people who may have been banned from mainstream social networks as well.
If you're worried about— if you've been thrown off another system, because I don't know, you've said something grossly and utterly horrible, don't worry, come here, because you can definitely do it here, right?
Is the basic message. Okay, so I think that's true.
I can understand there'd be a group of people that say, 'You know what, I don't think that's fair.
I want to go somewhere else.' And certainly Parler it's advertising itself as that, right?
And you've got, you know, Trump's endorsement of, you know, well, I might go if you don't do what I want.
Now, the chief executive and co-founder of the company is called John Matze, right?
And he said, quote, we initially attracted conservative users because they felt disenfranchised by other social media platforms.
And he is right, because conservative influencers such as Katie Hopkins, Lara Loomer, and Alex Jones have sought refuge on Parler after being banned from other platforms.
So, you know, people started digging around, and journalists and users have been criticizing the service for its content policies that some are saying are more restrictive than the company portrays.
They're flying in the face of the free speech banner, right?
There's a number of rules they have, you know, we're not gonna have violence, we're not gonna have hate, we're not gonna have this, we're not gonna have that.
But he also added, building off the company's existing guidelines, when you disagree with someone, posting pictures of your fecal matter in the comments section will not be tolerated, said the CEO of Parler.
So that's the kind of thing they want to censor.
And this ideology clash is basically causing Parler to up its moderator game. And even the CEO misses lunch, right?
Too distracted by banning these trolls, quote unquote, that he calls them. He, Matze, this is CEO, says he knows the leftist trolls.
He knows their ages because some have verified their accounts, coughing up selfies and driver's licenses and passports.
And some are saying that's quite a high set of unusual requirements for proving identity and registering for an online account.
But there has to be a bit of a worry about that because people want to feel comfortable saying what they're going to say without repercussions, and now the company will know who you really are.
And then at the end, I want to know whether you'd use Parler, right? Okay.
So in talking about these trolls, right, as Matt Sey labeled them, and he's saying that some are making it unpleasant for the app's conservative users to post and interact with each other.
Quote, "They're trying to get people to have a bad experience and leave. We've got a big army of volunteers to help take care of this.
It's going to be handled within 48 hours." So there's this whole free speech question, right? Like you have free speech, but only if you do what we like you to do.
And free speech is a whole weird thing in the digital world anyway, because presumably spammers could be, you know, that's free speech, surely, to get your message out, right?
But yet we stop spam.
Which is, you know, and I invite people to join if they want to, can I not as the app owner decide who I want to come to my party and who doesn't come to my party?
Because that's how it would work at a dinner party, right?
If I find someone objectionable, if they say something or they behave in a way I don't like, then I'm allowed to say, well, actually, you can't come to my dinner party.
Okay, the suggestions included the conservative political commentator Sean Hannity. Yes, Sean, who has called for an exodus from Twitter.
You have internet personalities Diamond and Silk who were throttled by Facebook in 2018 for sharing dangerous content.
And you also have conservative talk show host Mark Levin whose Facebook account was recently restricted for repeated sharing of false news, right?
So these are people that were actually put on her page saying follow these guys. 5 minutes later, she saw that she had a comment on her intro post. It came from Team Trump.
Quote, "Welcome to Parler. Help us make America great again by clicking the link below.
Be sure to text TRUMP to 88022." And she navigated to the Team Trump page and they had left this exact comment on many, many other Parler user accounts up to 1.6 million times.
So then she's asking, is that spam? Why aren't you controlling that? I didn't ask to receive this. They're obviously sending this crap everywhere.
I mean, presumably Trump has done some kind of deal with the makers of this in order to promote their account.
I didn't just say I was all in, Carole.
It's like, I think it's got like 10 million users now or something like that. Wow. Who the heck is funding this? Right? Like the question I had for you earlier.
Now, Mike Masnick from TechDirt writes, there's no big VCs named or known investors behind the company. And it wasn't clear how it was surviving, right?
Because it wasn't making any obvious cash at this point. Anyway, so they dig around, they dig around, they dig around and they hit the motherlode. Okay.
This was, I think, the Wall Street Journal. And they revealed that Parler was being funded by the Mercer family.
Robert Leroy Mercer is an American hedge fund manager, former principal investor of the now defunct Cambridge Analytica. Hmm.
Oh, Mercer played a key role in the campaign for Brexit by donating data analytics services to Nigel Farage.
I mean, if he's someone who has maybe right-wing views and he feels that there isn't a place for people with similar opinions to congregate and exchange chit-chat, then he's well within his rights to fund a site which produces an app which does that, isn't he?
Now, over this weekend, this last weekend, Rebecca Mercer, Robert Leroy Mercer's daughter, took it up a further notch by claiming that it's not just CEO John Matze that's running the show.
She was also the co-founder of the company. Here's the working theory from Tech Dirt.
Cambridge Analytica's entire claim to fame was collecting a shit ton of data on people by abusing the rules on an academic personality quiz, wasn't it? From Facebook.
Then they used that to target political messages.
This is why Facebook got hit by that huge FTC fine because it let Cambridge Analytica extract a bunch of data that it promised it wouldn't.
Do you remember? Yeah, yeah. He had pink hair. Yes.
Noted this weekend that the Mercers had always wanted their own social media network in order to cut the middleman out and collect the data directly. Right. How interesting. Right?
So you have some bona fide rich conservatives who have expressed publicly a wish to run their own social media platform, at least in front of Christopher Wylie.
And they really wanted to collect the data directly. And they had their thumbs right in Cambridge Analytica's. And presto, now they have Parler.
And they say obviously on their website that they don't share any data with anybody. But if you read their privacy policy, I need a jingle when I say privacy policy.
They say that, you know, your information can be used for marketing purposes and they also can remove any content that you put on.
So Graham, if you still decide to go on, just know that they can remove any content and terminate your access to the service at any time for any reason or no reason.
See, it's the same principle, Carole, same principle.
In fact, tens of thousands of companies rely upon LastPass to protect themselves.
LastPass Enterprise simplifies password management for companies of all sizes and helps you secure your workforce. So, whatever the size of your business, go and check it out.
Go and visit lastpass.com/smashing to find out more. And thanks to LastPass for supporting the show. Smashing Security is sponsored this week by Recorded Future.
They empower organizations revealing unknown threats before they impact a business, helping teams respond to alerts 10 times faster.
Recorded Future does this by automatically collecting and analyzing intelligence from technical, open web, and darkweb sources.
Well, you too can access the up-to-the-minute security intelligence that allows Recorded Future clients to make fast, confident security decisions by installing their free browser extension, Recorded Future Express.
Go and grab it now at smashingsecurity.com/recordedfuture. That's smashingsecurity.com/recordedfuture.
And welcome back, and you join us at our favorite part of the show, the part of the show that we call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
Better not be. Well, my Pick of the Week this week is not security-related. It is a useful tool which I use on all of my Apple Macs and my MacBooks as well.
It is a tool called Hazel, and it is effectively a digital housekeeper.
What it does is it monitors folders on your computer, and when it sees certain things happen in the folder, like a new file appear for instance, it will run a series of rules over it.
And so you can create a rule to automate files being moved or sorted or renamed and other functions as well.
And you can create quite complicated rules on each folder on your Mac to get to do the really menial tasks that frankly you consider beyond you, and that's why you've hired Hazel to help you do it instead.
So for instance, I've got rules which if I take a screenshot rather than cluttering up my desktop.
So lots of people on their desktop, they've just got hundreds and hundreds and hundreds of icons, right?
And then when I get too many folders, I throw them all into a folder called 123.
So what it would do is it would take different kinds of files which it sees on, for instance, your desktop, and then it could file them away into subfolders automatically.
So you could file all the MP3 files, all the screenshots, all the I don't know, Word documents or whatever it is. And you can even get cleverer than that.
You could change their names to include the date, and you could put them into subfolders.
I've got a script or a rule running in my Hazel on my computer, so if I take a screenshot, maybe for an article I'm writing on my blog, it will automatically run an AppleScript which will then optimize it to reduce the size of the image because I don't want really big fat images, it will remove any EXIF metadata and then convert it to the correct file format that I want.
So if it was a GIF, for instance, it will change it into a JPEG or whatever it is.
Or Carole, if I dump a podcast, an MP3 file into a folder, it will share it with you or it'll put it into an archive and make sure that we have a backup of it.
So just all those menial sort of really sort of spring cleaning kind of activities. Tidy maintenance, it will do all for me.
It comes from a company called NoodleSoft. So what more reason than a company called NoodleSoft do you need? It is cute. To choose. Do you identify with Hazel? Do you identify?
For having a soft noodle. You know, at my age, it does happen sometimes. Chris, I'm sure you don't have that trouble.
My pick of the week is a book called Make Noise by Eric Newsom. It was actually recommended by a friend of yours and a friend of mine, Jack Rhysider.
It's his favorite podcast book and it's now mine. I'm sure people ask you all the time, how do I get into podcasting? How do I make my podcast better?
And I think this book does it really, really well. There's a part in the book where you talk about your 10-word description.
So our old description for our podcast, Hacker Valley Studio, was exploring the human element of cybersecurity programs and technology. And so you write it out in this activity.
And then in the paragraph below, he basically said, I can't read what you just wrote, but it is way too vague. And I was like, well, how did he know?
So then I reworked it and I made it better. And so now we're exploring the human condition to inspire peak performance in cybersecurity.
And I've mentioned it to Jack and he loved it. And so I think that folks need to learn that, you know, podcasting isn't always easy and there is a science and an art to it.
So I would say that that is my pick of the week this week.
So my other half was perusing the New York Times this morning and he told me about this 8-minute film and said, no one says anything, there's only one camera, watch it, it's going to be your pick of the week.
So I was like, yeah, yeah, yeah, sure. I watched it, it's my pick of the week. It's called C'était un rendez-vous, it's a French film from 1976.
Don't let that put you off, millennials or Gen Z, it's awesome.
So the premise is this: early one morning, the director of this little mini film, Claude Lelouch, got into his hairdresser's car, a Mercedes, and fastened the camera to his bumper.
And he just floored it down the broad Avenue Foch, right, Avenue Foch — I was waiting for you to laugh, Avenue Foch — okay, where he clocks 125 miles an hour.
He goes past the Louvre, past the opera, through red lights, around blind corners, even onto sidewalks, right?
And he goes to the height of Sacré-Cœur, and he scares people, he scares drivers, pigeons freak out, he careens, he's squealing around corners in the arrondissement.
But he has his reasons, and you only find out at the end if you watch it. Now, have you boys watched it? Okay, what did you guys think, am I overselling it?
There's no — it's kind of a moment in history because there's just no way you could do it in any city now without getting caught.
And there are some extraordinary tales — for instance, there are a couple of completely blind corners which look suicidal, or if not for him, he's going to cause some damage to someone else.
And I heard that he had an assistant on a radio who would have been able to tell him if there was danger.
There was one particular place where he was turning left, I think it was, down a tunnel, and it was completely blind, especially at the speed which he was going.
Unfortunately, his assistant's radio actually cut out, so if there had been a problem, he would have had no way of communicating with the driver, which when you watch the video, you will think this really is bonkers.
But it's very impressive.
But it's mesmerizing, almost like a meditation if you just sit there and watch it.
Trust me, it's worth it, links in the show notes.
I'm sure lots of our listeners would love to follow you online and find out more about the Hacker Valley Studio. What's the best way for folks to do that?
The best way for folks to get in touch with us is just go to hackervalley.com and you'll see all of our social right there and be able to subscribe to our podcast as well.
And don't forget, if you want to be sure never to miss another episode, subscribe in your favorite podcast app, such as Apple Podcasts, Spotify, or Overcast.
And of course, high five to this week's Smashing Security sponsors, Recorded Future and LastPass. And of course, our Patreon supporters.
These are the people whose support give you this show for free.
Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
You'd say, "I'm not for sale." Ridiculous.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Chris Cochran – @chriscochrcyber
Show notes:
- Hackers could now know what people type on Zoom video call by evaluating the shoulder movement of users — Digital Information World.
- Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks — Cornell University.
- The CostaRicto Campaign: Cyber-Espionage Outsourced — BlackBerry.
- New stealthy hacker-for-hire group mimics state-backed attackers — Bleeping Computer.
- The conservative alternative to Twitter wants to be a place for free speech for all. It turns out, rules still apply — Washington Post.
- Parler: what you need to know about the 'free speech' Twitter alternative — The Conversation.
- What If Cambridge Analytica Owned Its Own Social Network? CA Backer Rebekah Mercer Admits She's A Co-Founder Of Parler — Techdirt.
- Hazel — Automated organization for your Mac from Noodlesoft.
- Make Noise — A creator’s guide to podcasting and great audio storytelling by Eric Nuzum.
- Rendevous C'était un Rendez vous 1976 — YouTube.
- C'etait un Rendezvous, The Original Street Racing Video — YouTube documentary.
- C'était un rendez-vous — Wikipedia.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Recorded Future empowers your organization, revealing unknown threats before they impact your business, and helping your teams respond to alerts 10 times faster. How does it do this? By automatically collecting and analyzing intelligence from technical, open web, and dark web sources.
For up-to-the-minute security intelligence that can help you make fast and confident security decisions, install the free browser extension Recorded Future Express.
Get it now at smashingsecurity.com/recordedfuture
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.


