
Google loses its domain in Argentina, how do gripe sites make their dough, and has John Deere solved the cybersecurity problem?
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security, Episode 225. My name's Graham Cluley.
Do you know when you use WhatsApp, it basically tells the mothership when you're online?
But there is actually an online status that you can't turn off.
And what's happened is this ecosystem of apps and websites has grown up around this undocumented API that allows them to tell when other people are online.
And so what's happening is that people are using these apps to try and work out if their partners are having affairs by putting in the phone numbers of their partner and the person they think they're having an affair with, and then comparing when they're online on WhatsApp.
Well, forget all your dreams, Carole and Mark, because I'm going to crush them for you. It's very unlikely you will ever be the Supreme Leader.
It's a life which is out of the reach of most of us. But what about having the number one website in a country? Wouldn't that be kind of— wouldn't that be a substitute?
You've noticed that the traffic on your website has gone up a little bit, and you're trying to convince us that in a way that makes you like the leader of a country. Okay.
All right, Graham. All right, Graham. You're the leader of Grahamland.
Well, one person who had that power is a chap called Nicolas Corona.
But I think in these times of pandemic, when we're under lockdown, to be quite so meticulous with your facial hair as to leave the soul patch but get rid of the moustache seems like you've got too much time on your hands.
Not google.com, but google.com.ar. Right? Because there are lots of different Google websites.
Now, normally you'd shrug, you'd think, oh, big deal, right? Google's down, so what?
The NIC are the people who are responsible for controlling the Argentina country code domain.
And to his surprise, he was greeted by a message saying that google.com.ar was available if he wanted it.
Now, having bought it, what would you do if you acquired the domain?
He could have sent it to a porn site, maybe through an affiliate link, and made himself some pesos that way. He could have created a webpage rammed full of Google ads, couldn't he?
And made some money. Because imagine how much traffic a page like that's going to get.
Well, there's some mystery to how this all happened because it sounds like Google simply forgot to renew its domain and have let it expire.
Yeah, but some people have dug around and they've said, no, no, no, no, no. They say Google.com.ar wasn't scheduled to expire until July. So Google had plenty of time to renew it.
So there is a mystery as to how this happened. Did the NIC, did they somehow goof up and allow this domain to be acquired?
Seems very peculiar and worrying because if Google didn't goof up, then presumably that means potentially this could happen to any number of other domains.
We need to get to the bottom of this because he's had a bit of a traffic spike. Okay?
Can't afford for that to be ruined by some Nazi script kiddie with a soul patch buying up his domain.
Maybe Google got in touch, who knows? But they grabbed it back.
I was thinking when he bought it, actually, that's on the one hand, hey, this is fun. It's curious and interesting. And there's a great story here.
And I can give it back to them like a bit of a hero. On the other hand, they're clearly going to want this. This is obviously a mistake and they're going to want it back.
And if I remember correctly, Google has money and lawyers. So you're going to give it back to them.
So you buy the domain, then you put on hey, give money to the poor, feed the poor, something like this.
Google then take it offline, then you've got a PR crisis on your hands because Google just shut you down even though you're trying to do a good thing.
So they didn't actually hack Google Palestine. They managed to phish somebody who managed the domain name.
They got control of Google Palestine and effectively redirected the traffic. Now, I think it was sort of a hacktivist script kiddie, kind of the usual.
In September 2015, a former Google employee called Sanmay Ved purchased google.com, the real google.com.
'Cause I think he realised quite—
How can Google's own domain service allow me to buy its domain?" But it worked. And so he quickly turned—
In 2003, Microsoft forgot to renew its Hotmail.co.uk domain, which was very alarming for the 17 people who were still using it.
I think you'd be sitting on the motherlode.
Because registrars, they generally have hold of this idea that you probably want to keep your domain name.
And so the process is very rarely these days, you buy a domain name and then on a given date, that's it.
What happens normally is that, you know, you buy a domain name and then months and months before it lapses, they're emailing you saying, "Your domain name is up for renewal in 3 months' time.
Would you like to renew? Would you like to sign up for 50 years?" And then when you actually get to the date, most of them have some sort of a purgatory period.
So they will often sort of reserve it for you for 3 months. So they kind of hold on to it anyway and keep it working. And then you just sort of pick up in arrears.
And then even after that, there's often another period where they sort of put it in cold storage where you don't have it anymore.
And I think you have to pay them a little bit extra, but they won't sell it to anyone else.
Now, this depends on the top-level domain, you know, so maybe the rules are different for .ar than they are for .com or for .co.uk or what have you.
But by and large, this is quite hard. And then, and that's aside from anything your own calendar reminders.
Because if you're Google, you would think that's quite an important thing to keep ownership of.
And if they have, then we can all just stop banging on about computer security. Thank God. And we can do something else.
Carole, you could— I don't know, you could go and start a podcast about difficult situations or something.
Anyway, I think I may have discovered the most secure software vendor in the world.
But anyway, I read the article, so in a way. I am talking, of course, about the $120 billion Internet of Things supergiant John Deere.
You need to think about fleets of automated GPS-guided heavy farm machinery running millions of lines of code and passing terabytes of data back and forth with giant cloud data centres.
So companies like John Deere can hoover up all this data about what's happening where, and then they can actually say to the farmer or the farm machinery, "This is when you want to do stuff." Yeah.
"This is when you want to plant, this is when you want to fertilise, this is when you want to—" Don't think, just do.
I can't find the cornfield. But it's the same cornfield that you harvested yesterday. But I can't find it now. Where's it gone? Anyway, back to John Deere.
As it happens, what I'm trying to say is John Deere is actually a very, very serious software vendor.
And according to Roberts, it has never had a single publicly disclosed software vulnerability in any of its products. Not one, not ever. Thank you. Ding ding. Game over.
And if we can all just do that, then we can go home. And I'm sorry that it means the end of this podcast, but, you know, it's a small price to pay.
Let's reward you with a trip around the factory.
So as you know, publicly disclosed vulnerabilities go in the Common Vulnerabilities and Exploits database, the CVE database. And John Deere, nothing in the CVE database.
None of its major competitors do either. The whole sector got this thing sorted. So now, computer security, solved. Mm-hmm. How good is that? I mean, it's amazing.
It's almost too good to be true.
If you're a company, then actually you're massively reliant on the efforts either directly or indirectly of third-party security researchers, either because you use software that they have helped protect, or that software uses other software or libraries that they have helped protect, or because they're helping you directly either on a voluntary basis or for bug bounties or for whatever reason.
But their involvement is enormously important to the functioning of the whole security ecosystem.
But if you're a security researcher, how easy do you think it is to get hold of a $1 million combine harvester? In order to go looking for problems.
And the really worrying thing about that is when you talk about something like a million dollars. So is a million dollars an impediment to a freelance security researcher? Yes.
Is $1 million a deterrent to a ransomware gang that has just successfully hoovered up $50 million ransom for a single attack? No, probably not.
And what about a nation-state attacker? You know, the kind of attacker that was attacking the Indian power grid back in autumn of last year?
Would a fleet of giant threshing blades be of interest to them? And would $1 million be a deterrent to them?
You've made an irresponsible disclosure of a potential— I'm sure John Deere has got this all covered.
I'm sure they've got their own penetration testers and a brilliant team checking their systems all the time.
So the thing is, even if you could afford $1 million or $800,000 or whatever it is to get a piece of heavy farm machinery— Chump change, yeah— you could find yourself in court if you did.
What? Because it turns out that when you buy a million-dollar piece of heavy farm equipment, you don't so much own it as have what John Deere calls an implied license to operate it.
And there is an entire community of activists— I'm not going to go into it now, but there's a whole community of activists out there who will tell you that you don't have the right to repair your John Deere or other heavy farm machinery, which these days, you know, it's heavy farm machine wrapped around a computer and the software itself is extremely important to the operation of that machinery and to the business of John Deere, and it is protected by copyright law.
And there's a whole legal fight going on, people trying to get the right to repair the equipment that they thought they have purchased.
Now, there are arguments on both sides because I can see reasons why it might be a bad idea to let people hack their own giant killing blades. But it's a thing.
So assuming you did manage to get your hands on the tracker and you didn't fall foul of the copyright lawyers, there is, according to security researchers, no way for you to report your findings, even if you did manage to find something.
Now, as security researchers will find a way, and just a few weeks ago, a researcher who goes by the name Sick Codes revealed that they had signed up for a John Deere developer's account and had actually managed to report some bugs to John Deere, including one that allowed them to download the data of every owner of every single John Deere tractor in the world.
Dun dun dun. A bit like I was explaining so beautifully with the WhatsApp situation earlier, what happens is these tractors use APIs to talk to the sort of John Deere mothership.
And one of those APIs, you send it a VIN, a vehicle identification number, and it sends you the details of who owns that vehicle, like their name and their address and when their license started and all this kind of stuff.
Lovely. Exactly. So they tried to report this thing in a number of different ways because there isn't an official way to report these bugs.
As so often happens, the researchers actually try very hard to get in touch and they send emails, but they don't want to reveal sensitive information over email so that they're twittering and so on.
They thought they were scammers. Yeah. Eventually, they did actually manage to get hold of somebody and that person said, "Go and submit the bug through our HackerOne account." Oh.
Now, you've heard of HackerOne.
So Sick Codes logs into the HackerOne account and it turns out there's only one security researcher registered on the HackerOne account. And it's them.
And the HackerOne account was opened that day. Fancy that. So HackerOne is a bug bounty thing.
You know, if you want to offer people bounties for finding bugs, you open a HackerOne account and they submit it through HackerOne and HackerOne do the brokering.
And then eventually the researcher gets paid. So did they trump the—
And no bounty was being offered. So why was there a HackerOne account? Because the one thing the HackerOne account did have was a non-disclosure agreement attached to it. Oh.
Oh my god, how—
And I mean, John Deere do employ security people, and they do say that they take security very seriously. Oh, that's— I've never heard that before. Oh, that's cool.
But my takeaway on this is I think that there are two kinds of company in the world, or two kinds of industry sectors, really.
There are those that have been absolutely raked over the coals by cybercriminals, and those that haven't.
And the ones that look like they're doing really badly are just the ones that are in the process of being raked over the coals.
And the ones that look like they're doing really well are the ones that just haven't been raked over the coals yet.
And so obviously, what's happening here with John Deere just looks like all the other industries in the world, all the other companies in the world that have not yet had that encounter with serious cybercrime, which inevitably they will, sad to say.
Wow. So we're going to have to carry on doing the podcast, guys.
And a thought occurred to me, if you can't reach them via Twitter or email or HackerOne, you could, you know, crop circles. Yeah. Maybe you could.
Carole, have we got, have we done Carole's story yet? Or was that— No, no, no.
And most people haven't heard of these sites because they're actually not really designed for people per se. They're designed for computers to sniff out.
So the problem is, say someone like me put something up on one of these sites about one of you, you might not all be feeling perky and gay because as soon something is posted on one of these sites, they mushroom out of control.
They can get cross-posted across all of these sites. Now you think no one's reading this, so who cares? But the thing is, Google reads them and Bing reads them.
And the upshot is that it can sink your online reputation in la stinky merde because these shitposts often rise to the swirly heights of the first page Google ranking.
There's a bunch of links in the show notes. They have way more information.
But effectively, this reporter team created a software program to download every post from a dozen of the most active complaint sites or gripe sites.
They collected more than 150,000 posts. And then they set up a web crawler that searched Google and Bing for thousands of the people who had been attacked on these sites.
And for about a third of them, the nasty posts appeared on the first page of their Google or Bing results. Yeah. Right. So basically you can't control it.
Your reputation's in tatters at this stage.
So what they decided to do, New York Times, is they wrote a shitpost that said that Aaron Krolik, one of the journos in this team, 'Aaron Krolik, New York, is an unqualified loser,' along with an awkward selfie.
And they posted that up on one of the sites. And then they did a similar version of the same insult, but with unique watermarks to allow them to track if it showed up anywhere else.
What could we say? For journalism. I will allow my name to be rubbished. What should we say?
So if this happens to you, I mean, Graham, you've got a bit of an inflated reputation.
And what they were doing was they were posting up, I think, images of people who'd been arrested.
And the whole scam was that you could pay the website money to have your entry removed because they had your screenshot and it was appearing in the Google search engine.
I mean, I'm just wondering, what is the motivation for the people who are running these sites?
Are they always created with good intentions even though it then gets skewed, or is there actually some commercial evilness behind it?
Okay, so there's all this stuff. So you go and check out your online personality and you put in Graham the King Cluley, right, into Google and it says I'm a big fat—
So there's new posts all the time. Now, any other ideas of what you would do, Mark? Would you do the same thing? What would you do?
There's no guarantee that it's going to work, because they're using the same sort of technology and trying to reverse engineer what Google is thinking.
So is there someone that you could— can you go to these sites and say, 'Can you remove me?
You've made a mistake.' Or, 'Can you remove me if I explain the mistake by writing it on this stack of dollar bills?' Or could you make a DMCA complaint about the—
Okay, now traditionally, these were used by PR firms, right, to help organizations stay in the know.
So for example, if someone was dissing a product or a service or your brand, your PR company would be, hey, we need to take action and try and salvage some stuff.
But since individuals have been commoditized to the point of becoming brands themselves, this industry is helping out CEOs, celebs, influencers, you know, to manage fallout like this.
So how much do you think it cost to remove Gunk?
So interesting fact, to your point, it seems to get a post removed even the reputation companies do something that you suggested, they pay a bit of wonga.
So if you are a reputation management firm, you pay this admin fee to the gripe site's webmaster. See, apparently they answer when you're offering them money, the web guy.
And then when they finish typing it in, a little pop-up appears on the monitor of the guy sat next to them.
Here's $10K, $20K, whatever, you know? And then they just go and give half of it to the gripe firm. And then everyone's quiet, right? And problem goes away.
Do you think the problem goes away at that point?
So they wait a little, they wait a week or two and then put it up again, I would imagine. Apparently a few months.
And months later, he said copies of the post began to reappear online. And guess what? He suspected the reputation management company for being responsible. Well, yeah. I'm shocked.
And their names are listed across different company letterings and papers and documents across firms. So yeah, so it sucks. It sucks. Right?
So it seems these companies are running sites that produce slander and then running sites that make money by removing the slander.
I mean, there probably are enough people in the world who are annoyed enough with a bunch of other people that they'll go to these sites and go, well, I don't like Geoff Simmons.
And then Geoff Simmons mushrooms everywhere. And if he doesn't notice and doesn't care, it doesn't go anywhere.
But if they put in, you know, Carole Theriault and that goes everywhere and you care about it, then they've got a — yeah, you know, as Graham said, now they know.
And when you Googled his name, cheater news was the top of the image results. So yeah, that sucks. So what do you do? What can you do?
So there's not much you can do, but what you can do is you can fill out a Google gripe form. That's what I'm calling it.
I have a link in the show notes, and you basically request there that Google not list these posts in its search results.
And it mostly works, but it is less effective for images, which is a problem in our Instaland and Facebook world.
But maybe, Graham, this is where your DMCA request to claim copyright on the image is very clever. Now, there is a big but in all this.
This is where an attacker or a slanderer does it continually, day in, day out, constantly flooding the sites with bad shit about you. Well, there are—
Because then everyone would be like, oh, and maybe deepfakes will help with this kind of shit. 'Cause then you could just go, oh yeah, deepfake.
But machines have secrets too. These secrets give humans and machines access to other machines. They're how a database admin accesses a database, or an app accesses another app.
1Password has just launched Secrets Automation, a new way to secure, orchestrate, and manage your company's infrastructure secrets.
So now you can protect all of your company's most vulnerable secrets in one place. Find out more at 1password.com/secrets. And thanks to 1Password for supporting the show.
And welcome back. If you join us on our favorite part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security related necessarily.
Better not be. Well, for the past few weeks, I have been recommending video games. This week, yes. Well, this week it's not a video game.
This is a tabletop game, which I've been playing with my son, and it's got a rather artistic bent. It is called Micro Macro Crime City.
And it's not like any game I've ever seen before, but it's rather fascinating. So, let me try and describe it.
In the box, you get this enormous black and white line drawing of a map, sort of isometric view of a city.
And there's all these little characters walking around the city in their cars and going into shops or drinking in the bars, etc.
And so there's lots and lots of little detail which you may not notice at first, particularly if you've got bad eyesight like me and need a magnifying glass.
And what you soon realize is that there are crimes being committed on the map.
So you might see a body, or you might see a car crash, or you might see someone who's being held up with a gun.
And as you look at the map, you see these little characters and you can see where they've previously been. So you can sort of plot where they've moved throughout the city over time.
And so the idea of the game is to solve mysteries and bank robberies and so forth, because you can see, oh, they met them and they got a crowbar and they poisoned his drink or something like that.
It's really quite fun. There is a demo link which I've included.
So if anyone wants to try before you buy, normally this isn't an online game, but there is a sort of version we can zoom in on the map and see if you can solve the clues.
He's been loving solving the mysteries on this game.
Go and check it out. Lots and lots of fun. And that is my pick of the week.
So I was looking at a story this morning about McDonald's ice cream machines.
And it turns out that I didn't realise this, but in America, McDonald's ice cream machines are famous for how often they break.
So fire up your web browsers and go to McBroken.com.
And what they did, in their own words, they said they reverse engineered McDonald's internal API and they placed $18,752 worth of orders for ice cream every minute at every McDonald's in the US.
And in doing that, they can figure out which of the McDonald's have got functioning ice cream machines.
So they give minute-by-minute updates about whether or not the McDonald's ice cream machine is working in your local McDonald's.
They are these very, very sort of overly engineered things. And what they do is every night, they heat themselves up and they cook whatever's left inside them. And sterilize it.
Oh my God. Yeah, they repasteurize it and then that little whatever remnant there is then gets mixed into the following day's ice cream.
But it, I mean, it's clearly sanitary because you don't get to do stuff in that many restaurants for that period of time and it'd be a gross health hazard.
But they do have to be cleaned every couple of weeks, but they are full of moving parts and they break all the time and it's a problem. There's a whole other story there.
Anyway, mcbroken.com. Cool.
3 months? Yeah, I bet they laugh, you know, everyone laughs listening to this podcast, and that's it until the next podcast. That's how low it is.
So my pick of the week this week is a silly website called Overheard in New York. And this is where you either— you can read snippets of conversations that have been overheard.
So a few that I liked was, you know, there's this distraught backpacker. How can you live in the city? My God, how can you live here? An old woman's like, what?
Distraught backpacker, where are the trees? Where's the ocean? And you can imagine just walking by and hearing someone say that.
Another one was, so this girl says, so what you're saying is he couldn't afford the wastebasket, so he got a wife? And you just hear that, and that's all you hear. Are you with me?
I feel I'm talking to myself.
GIRL 2: I thought love was when you could still feel butterflies in your heart even after he tells you he thinks he's an elf. GIRL 1: I keep forgetting that actually happened.
I don't know how I would have taken it.
Which is a British phenomenon.
I mean, I was sober enough to realize that they were branding each other's asses with cookie cutters.
The boss says, sure, Coworker 1: No, legit, sticking the cookie cutters in the fire and branding each other's asses.
And then coworker 2 pipes up: Can you imagine shacking up with someone with an inverted Christmas tree pointing right up your pooper?
So if you're bored and you want a bit more laughter in your life, check out Sticky Pickles.
What is the best way to do that?
But if you want to follow me, go straight to Twitter, go look for Mark Stockley on Twitter, but don't use an underscore or anything because there's a much more famous person who's got an underscore in their name.
And don't forget, ensure that you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts.
Oh, and while you're there, maybe you'd like to give us a nice review rather than say something horrible about us. You know, just if you like us. Who's saying horrible things?
I think it might have been Thom Langford. I don't know. Someone went up there, said something derogatory at some point.
I just think maybe if you do like us, let's swamp the negativity with lots of good stuff. So go and say something nice about us on our comments. Clean our reputation.
It's thanks to them all that this show is free.
And for episode show notes, sponsorship information, guest lists, and the entire back catalog of more than 224 episodes, check out smashingsecurity.com.
So if you like the show and you listen this far, just go to the review page, say something nice. It'll make both of our days. And huge thank you.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Mark Stockley:
Show notes:
- Smashing Security Christmas LIVE STREAM — Including Mark Stockley and his chickens.
- How a WhatsApp status loophole is aiding cyberstalkers — Traced.
- Google Argentina's domain name bought by man for £2 — BBC News.
- Hacker breaks into Google Palestine homepage in protest of Maps depiction — Firstpost.
- Google Security Rewards – 2015 Year in Review — Google Online Security Blog.
- Microsoft forgets to renew hotmail.co.uk domain — The Register.
- 184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability — Forbes.
- Bugs Allowed Hackers to Dox John Deere Tractor Owners — Vice.
- The Wurzels sing "Combine Harvester" — YouTube.
- The Slander Industry — The New York Times.
- A Vast Web of Vengeance — The New York Times.
- Remove content about me on sites with exploitative removal practices from Google — Google Search Help.
- Online demo of MicroMacro – Crime City.
- MicroMacro – Crime City.
- They Hacked McDonald’s Ice Cream Machines—and Started a Cold War — Wired.
- Mcbroken.
- Overheard In New York.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
The 1Password you know and love, now for all your company secrets
1Password protects secrets like logins and credit cards. Secrets Automation protects secrets in your company infrastructure – like API tokens, application keys, and private certificates – and supplies them when and where they’re needed.
Learn more at 1password.com/secrets
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

