
PC manufacturer Acer might have received a $50 million ransom demand, a warning spreads on Facebook about a trick being used by hackers, and why are the City of London’s police not happy about Sci Hub?
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Alex Eckelberry.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
It's actually very cool.
And, you know, I had an antivirus software company, company called Sunbelt Software that's now Viper Security.
I sit on the board of a company called Malwarebytes, which is a wonderful product, endpoint security.
And, you know, I was also an early board member of a company called KnowBe4, which is a security awareness training company. So I've done a lot of work on the board side.
Also was a board member of StopBadware, which is the originally Google-backed outfit to help with malware on the web. So, you know, look, I love security.
I live it, eat it, breathe it. And I'm definitely in the mix.
What I'm going to do right now, while my judgment is obviously slightly squiffy—
You know, you could criticise someone's food or their hairdo, how they have spinach stuck between their teeth on Zoom calls or whatever it is.
You could send off some message or tell your wife that she has halitosis or who knows what.
Maybe even worse than texting would be if you were to publish it publicly and tag them, post it on Twitter or maybe post it on their Facebook wall and say, "You look fat in that dress." I don't know if, Alex, if you've ever been accused of looking a bit fat in a dress.
As if it weren't painful enough carrying the stigma of being a Facebook user, it turns out that hackers can send hurtful comments to your Facebook contacts which look like you sent them or you posted them up on their wall, but — And here's the sneaky bit.
Your contacts can see the messages, but you can't see what you post. A bit like —
You can't see what's wrong with it. Well, similarly, you can't see what you've posted up on the Facebook.
Tell all your contacts that if they get an offensive or inappropriate message from you, it's not really you.
Which I think is a rather fantastic alibi because you've now been given free rein to say whatever the hell you want to whoever you want.
So it must have been a hacker.
And also it means that when the person calls you up and goes, "WTF?" you can go, "What are you talking about?" You can say, "Oh, what, what, what, what?" Which is the best thing to do, right?
What?
I was looking for sunglasses. But yes, I am on Facebook and I can definitely see that situation.
I really didn't say this terrible thing." Well, this is true.
There's been a series of— I think I've lost count the number of times a rapper, for instance, has said something homophobic or misogynistic.
And I think there've been some politicians who in the past have liked tweets by Pornhub and things like that, and then said, "Oh no, no, no, I didn't do that." Awkward.
So either there is some kind of threat going around, in which case Facebook should come clean pretty soon and go, "Whoa, this is happening." Or people are actually getting drunk, sending the messages, and then playing—
We're pivoting now. We're pivoting. Right? Because the whole warning is absolute nonsense.
People are spreading this message saying, "Oh my goodness, hackers are posting messages on walls.
You'll see offensive things, but it's not been sent by you and you can't see it." Facebook has now come out and said, "No, no, no, this is all a load of old cobblers." Right?
This isn't actually happening.
Is that people believe that they are being helpful to each other, that they believe, I found something out. I can help my pals. I can warn them about this as well.
You know, this is a hoax, dude.
But yes, because you see Mimi, your friend Mimi, posting this message, you think, well, Mimi's lovely.
Maybe you discuss it in other places off Facebook as well and say, oh, by the way, did you know this is going on on Facebook?
And so people are spreading this left, right, center, upwards, downwards. And it's an old school hoax.
In fact, this hoax, if you just spent a couple of minutes researching it before you shared it with other people, you would have found it on Snopes, which has been debunking this particular claim since 2012.
So it's been going around for a while.
I just got in an argument on Facebook yesterday about somebody posted a huge picture of this tree that's 2.5 miles wide. It's a fossil and it went up 10 miles.
And it's a picture of this, it looks this giant tree. And I looked at it and I said, well, obviously you can't have a tree that goes up 10 miles. It makes no sense.
You can't have a tree that's 2.5 miles wide. So of course this is people, oh my God, when giants roamed the earth.
I'm, okay, so I do a quick Google search, find out it's some mesa in Tunisia. And then, you know, I say, guys, this is a mesa in Tunisia. I move on. Of course, how do you know?
How do you know that for sure?
Alex, are you in front of a computer?
It's just the start of the information being shite, right? The engine of communication is working fine. We can't blame that.
I think maybe we should get a seatbelt for internet users that they have to wear, you know, or something which just prevents them from— Well, something which stops— Do you remember back in 2008, right?
This isn't just a Facebook problem, but email, as you mentioned. 2008, Google introduced a feature to Gmail called Mail Goggles. I think they got the name from beer goggles.
So, you know, the experience when you go to a bar or something and you drink too much beer and suddenly everyone becomes 3 times more attractive than they are in reality.
Now, with Mail Goggles on Gmail, if you enabled the feature, what it would do is it would ask you to complete a few simple maths problems in a limited period of time.
So say 29 plus 14 and things like that, right?
Before it would send an email and it would activate automatically late at night on weekends when they thought you were most likely to be drunk emailing your ex-girlfriend or telling your boss what you thought of him.
And maybe that was a good idea.
And maybe we should have something like that on WhatsApp and Signal and Slack and everything else, just in case people are, you know, doing things before thinking.
The name is actually inspired by the Resident Evil movie series. And REvil is a ransomware as a service.
So if you're an aspiring lowlife criminal, you can contact the REvil folks and say, "Hey, can I become an affiliate?" And then REvil will cut you in for part of the profits, and then you go off and try to hack into somebody.
And the REvil folks, they even went so far as to have a blog, which they call with great irony, Happy Blog, where they post— it's literally what it's called— where they post examples of stolen data and then threaten to release the files if they don't get paid the ransom.
So you get hacked and then they post a bunch of— they almost always hack corporate networks and they'll post a picture of here, we've got this spreadsheet of all your customers or your— this spreadsheet, whatever.
And then of course that's public.
Because of this Happy Blog, some very enterprising security researchers, including people at Bleeping Computer and a few other places, discovered that REvil is claiming they have attacked Acer and are demanding a $50 million extortion.
Now, they put some leaked documents allegedly from Acer, including financial spreadsheets and bank balances and that sort of thing.
And there's kind of this weird back and forth, and I guess some security researchers can kind of figure this out, that the REvil folks have actually been enterprising and are offering a 20% discount if they got it by March 17th, which of course has already passed.
Now, it's up till March 28th to meet the demands. And after that, it goes double, $100 million. This is the biggest one we've seen from this group.
I think last year, there was one for around $30 million. This is rough.
Of course, Acer has said, in their defence, they've said there is an ongoing investigation and they're unable to comment. They haven't actually confirmed this.
To their credit, this is still an ongoing situation.
And, you know, it might have even come— we don't know this for sure, but it might have even come from this really nasty Exchange server exploit that's been going around.
Again, there's a lot of speculation, but, you know, it really goes to show, though, there's these holes that ransomware folks go after, and including, you know, Remote Desktop Protocol, which is how a lot of people enter remote networks.
That's a bad one.
You know, again, patch your systems, disable RDP, you know, get a security expert to audit your systems and check it, because when you get this stuff, it's very bad.
Because the REvil gang, there was an interview done with a member of the REvil gang in the last week or so, a chap going by the name Unknown.
The guys at Recorded Future interviewed him.
And one of the things which he said was that they target organizations that have cyber insurance because they presumably think they're more likely to pay up because they've already spent money on the insurance.
They then hack those who are insured, and then afterwards they hit the insurer as well. So it's quite clever and quite targeted, some of the things which they're doing right now.
Really, if you run a business and you're in IT and you're a smart person, there's some very basic things you can do to protect yourself against ransomware.
There's plenty of good advice out there, but realize that it is a real issue. It was heartbreaking.
A few years ago, I had a very close friend of mine who got hit with ransomware and he called me up and he had 3 servers. He's running an internet business.
He got hit and it was a lot of money and it's terrible when it happens. So not to be a downer, but it's just basic security. Put it in, put it in place, put it in hard.
It's not the world is coming to an end, but it's definitely when it happens, it's not something you want to have to experience.
Asking IT departments to block access to Sci-Hub on networks. And I'm like, oh, this is interesting, right? So I start doing a little digging.
But anyway, you know, but then other people could look that up and read about my research.
And she was born in the mid-'80s, and no surprise, she seems to be a super strong supporter of the whole open access movement, OA, for short.
And it's basically this set of principles where research outputs are distributed free of cost and without barriers. So anyone can access it anytime.
And I certainly ran into this where I would start to Google various epidemiological studies and that sort of thing, just understand what we were dealing with.
And of course you do hit the paywalls. Now, whose economic benefit?
I don't know if the researchers are getting— I mean, if somebody at Stanford or Harvard or, you know, or even my local University of Florida here is doing some postdoctoral research on some sort virus strain, I don't think they're getting paid for that, right?
And so there's some economic interest on these aggregators of data, and but there's a value to what they do.
They manage a peer review process, they manage how people get the data disseminated, they ensure that the data is vetted, there's an editorial process.
I think information, once vetted, should be made accessible to everyone rather than all the junk we have available, to wade through a pile of shit to get anything valuable on the internet.
And there's companies, publishing companies like Elsevier, who make their cash by providing paid access to research, exactly as you said.
So, on average, Elsevier will charge $31.50 per paper for access. Access, whereas repository outfits like Sci-Hub will offer them for free. Okay.
And Elbakyan's whole position is taxes pay for universities, universities produce research, they then pay publishing companies to publish the research, and then they have to pay to access said research and research from other universities or science labs.
And that's a big problem with someone who supports open access, because it's a very different model, isn't it? All this to say, Sci-Hub and Elsevier are not the best buddies.
So in 2017, 6 years after Sci-Hub had launched, it had 70 million papers represented. That's two-thirds of all published scientific research available.
It's a juggernaut of a site, but there is a little issue. Let me get to that in a sec. So she's basically saying, fuck you, academic publishers, right?
I don't think you should be putting a paywall here. And she also has a ginormous amount of clout because she's got a lot of articles up there.
So, I was like, how— I'm sure you're wondering the same thing. How did she scoop them all up, right? They are behind paywalls. So, let me tell you how it works.
This is based on the Scholarly Kitchen. So, let's say you want to learn about something. You may do a Google search and you would see Sci-Hub pop up somewhere.
You would click on Sci-Hub and a captcha would show up to verify that you're not a bot, of course. Ironic, but there you go.
Now Sci-Hub works with a repository called Library Genesis, or LibGen, and that is basically where all its research sits. You put a copy in, it then puts the request to LibGen.
LibGen, if it has the research you're looking for, it then sends you a copy.
However, if it does not have a copy in LibGen, then it uses multiple institutional access systems okay, to search across publisher platforms like Elsevier perhaps and others, bypassing any access control barriers, and it retrieves a copy of the item.
It delivers a copy to the user who requests it, and it stores a copy in LibGen so it's easier to serve up next time.
So effectively, it's stealing the research and making it available to all.
Basically Google, for every search it can add or, you know, add or use something that it already has. And during this whole process, Sci-Hub asked for donations.
Which is how it makes its money. Bitcoins are preferred. So you can see why Elsevier are very pissed, right? And they've been pissed for a while.
So that they can access the research and they have authentication processes to go through in order to access that research.
And authorities in the US and the UK are saying that Sci-Hub uses techniques like phishing to get a hold of these legit authentication logins to get into these research papers, and then using them to scoop up the research.
And this is where it gets kind of interesting, because obviously we can all understand why Elsevier and other publishing firms are really pissed off, because it's cutting off— it's hitting their business model.
Now, of course, Elbakyan strongly denies this, right?
She says that it mostly came from exploiting libraries and university subscriptions, saying that she gained access to around 400 universities that way.
And she says also that many academics have offered in their login information. But, you know, 2.5 times the size of Wikipedia.
Because it's in Russia, outside US jurisdiction. PayPal blackballed them as well, but now they use bitcoin. So it's kind of like the WikiLeaks of science research.
Do you think it's kind of like that? It's like we're publishing information that's not ours for the benefit of all.
And do we have any confidence that that is being done safely and securely?
IT guys at universities block access to Sci-Hub as well because A, it's an illegal site, and B, they operate in a way that is deemed dangerous.
I'd love to know what they mean by illegal site though. I mean, I think, is it just like Pirate Bay?
So it doesn't have legitimate authorization to do that. So it is doing things which appear to be illegal. So there's a simple solution here.
Well, I say simple, it's not that simple, but there is a solution to this, which is two-factor authentication.
If these universities had two-factor authentication rather than simply username and password, then the username and password won't be able to be abused by Sci-Hub, as the police are alleging, because that magic 6-digit token or whatever would be changing every 30 seconds.
So the legitimate student would be able to enter it. But it would be useless for Sci-Hub, right?
That's just an easy no-brainer. And put on two-factor authentication if at all possible.
Two, this site is considered illegal, and I'm not sure exactly what that means for you as a visitor of those sites.
And I did try and look, but I think that means be very careful before you visit the site or share links to it.
I saw a number of articles about people saying, would it be illegal to share a link to an illegal site, right?
Even if you don't go to the site, there's a whole legal quagmire there.
You can also go to archive.org, that's A-R-X-I-V dot org, that's currently the largest legal source of open access papers. So that one at least is legal.
And you know what, ask the person who wrote the paper. 9 times out of 10 they'll just say, "Oh yeah, I'm so delighted, here you go." Done.
I actually had a COVID paper that I was very curious about, about the vaccine, and I just emailed the author and I said, you know, I have some questions on this.
He's a professor at a major university. He emails me back and answers my question. So it's not like it's all ivory tower. A lot of these folks are accessible.
And, you know, a lot of these people are in this field because they want to help.
Well, let's move on.
It offers end-to-end encryption you can count on.
You get auto-lock and manual lock for the 1Password app, multifactor authentication, safe autofill on secure websites, privacy cards, and loads more.
Plus, if you switch to 1Password, you can receive its switching bundle.
It includes a subscription credit towards your current password manager, hands-on migration support, and free family accounts for every single member of your team.
Go to smashingsecurity.com/1password. And thanks to 1Password for sponsoring the show.
You know you can't do business without technology, and you also know you can't securely access technology without identity security.
Enter SailPoint, identity security for the cloud enterprise.
It enables access and protects businesses with automated, managed, and governed access in real time with AI-enhanced visibility and controls.
SailPoint lets companies run with speed, security, and scale in a cloud-critical, threat-intensive world.
Plus, it tracks usage and enforces policies for all users, apps, and data continuously. Want to learn more? I bet you do. Check out smashingsecurity.com/sailpoint.
That's smashingsecurity.com/sailpoint. And thanks to SailPoint for supporting the show.
Could be a funny story, a book that they read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security related necessarily.
Now, are you familiar with the YouTuber Mark Rober? He is a YouTube star. He's got gazillions of subscribers, including my 10-year-old son.
He's famous for making videos about obstacle courses for ninja squirrels. Filling swimming pools with jelly.
And also he did a great video a couple of weeks ago about the Perseverance Mars rover, which actually he had worked on. He'd worked on some previous Mars rover type thing.
So he knows all about the science as well. He is a social media star and does some great videos. Quite entertaining.
Which he has devised himself, contains a camera inside it, and it explodes with lots of glitter, and it records people and even sprays fart smell over people who steal packages from people's doors.
So what happens is the Amazon driver comes along, he dumps something on your porch, and then a criminal comes along walking down the road, an opportunist, and thinks, oh, I'll have that.
They take it, and then he records, and these videos come out, and they're covered in glitter so the police know who they were, right? So he's done that in the past.
So the people who ring up little old ladies and trick them into— well, the specific confidence trick is they ring you up, they say, "We owe you a refund for something or other," and then they trick the little old lady into believing they've been given maybe $20,000 rather than $200.
So the scam is, you accidentally, you believe that you've had $20,000 put into your account because you can see it on your online bank account, and the scammer has remotely accessed your computer and has changed the appearance of what's on your screen.
And then the phone scammer says, "Oh, I'm going to lose my job, this is disastrous," but we can fix this. Can you mail me back via UPS or FedEx the difference?
So please send me $19,000 or whatever it is to make up for it. Right. And people do this. People put huge amounts of money in the post.
Now, what Rober did was he intercepted with the help of some other fantastic YouTubers who fight phone scammers like Jim Browning. He intercepted some of these calls.
Told the people who were about to be scammed about what was going to happen.
And in the place of the parcel they were going to send, instead sent a parcel with a glitter bomb inside it. So it didn't have money inside, it had a glitter bomb instead. And so—
And I mean, you know, there was my daughter was shopping for some car or some— she was shopping for a golf cart. And, you know, there's this incredible deal on the golf cart.
Of course, you contact this person, well, they want to contact you offline, and then there's all this stuff.
And of course, you're going to end up having to send some money to somebody that you're never going to get anything for. So be careful out there.
But I get these— I get these— I honestly— all joking— I get these heart-wrenching, heart-wrenching texts or people—
And then this one woman, she emails me, she got me, she got my Gmail address for some reason, and she goes, I'm sorry that you had to, you know, you just no longer talk to me and you've broken up with me.
And I emailed her back, I have no idea what you're talking about. Yeah, the scammer took her for something $9,000. I mean, but it happens routinely, and you bastard, Alex.
I mean, I've got— this happens to me literally on a constant basis.
We're talking about scams but this is something that is— I mean, you know, we could do a show on this because apparently I've become an expert.
I know you know what this is, and I know, yeah, you've got some issues because it's called The One.
Yes, and it has a very similar premise to the Amazon show which I reviewed a few weeks ago, and I can't remember the name of—
So this one's love and lies kind of spiral out of control when this DNA researcher discovers a way to find the perfect love, the one true love, and then creates this bold new matchmaking service.
So that's the premise as you open, right? And the whole first episode is she's at the top of her, you know, find your number one love game.
And, you know, she's the CEO of the company.
And you've got founders, and you got all kinds of action-packed type deception stuff. And it's— but I found it a very solid piece of entertainment, you know? Graham?
The premise was quite fun, which was imagine a world where you can sign up for a service, and it will tell you the one person you are guaranteed to fall in love with and they will fall in love with you on a biological level.
You know, I thought, oh, this could be interesting. But what a load of old cobblers it was watching this show. I'm sorry, Carole.
And you said, oh yes, there's going to be twists and turns. And so I watched all ruddy 8 episodes. Yeah.
And I— okay, I don't want to be— I don't want to slag off your pick of the week.
Anyway, I thought it was great. She has excellent clothing. If nothing else, guys, watch for the stylish, stylish, stylish Rebecca Webb. And I thought it was great.
Alex, I'm sure lots of our listeners would love to follow you online, maybe get into a romantic relationship with you.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app.
And if you want to do something for the show, sure, you could become a patron, but you know, hey, that's going to cost some money.
Maybe just tell your friends about Smashing Security. Spread the word. That's one of the best ways in which you can help us.
All these people help make this show free for all.
For additional information on any of the stories we've covered here, sponsorship details and the entire back catalog of 219 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Alex Eckelberry – @alexeck
Show notes:
- Hackers cannot post Facebook comments on your behalf without you seeing it — AFP Fact Check.
- Does a Facebook Hack ‘Hurt and Offend’ Friends? — Snopes.
- Stop sending mail you later regret — Gmail blog.
- April Fools Check: Did Google Really Release Mail Goggles? — TechCrunch.
- When was blinking invented?
- Computer giant Acer hit by $50 million ransomware attack — Bleeping Computer.
- Ransomware gang says it targets firms who have cyber insurance. And what’s more, it will hack insurance firms to identify them… — Graham Cluley.
- Is the staggeringly profitable business of scientific publishing bad for science? — The Guardian.
- Police warn students and universities of accessing an illegal website to download published scientific papers — City of London Police.
- Meet the pirate queen making academic papers free online — The Verge.
- Sci-Hub: How Does it Work? — The Scholarly Kitchen.
- Glitterbomb Trap Catches Phone Scammer (who gets arrested) — YouTube.
- After Life — Netflix.
- The One — Netflix.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
With 1Password you only ever need to memorize one password. All your other passwords and important information are protected by your Master Password, which only you know. Take the 14 day free trial now at 1password.com
SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less.
Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services.
Learn more at smashingsecurity.com/sailpoint
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

