
Pygmy hippopotamus bugs, DEF CON’s data slip-up, and phishing fraudsters have their collars felt.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Naked Security’s Paul Ducklin.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Fashion Captain, Fraud Family, and DEF CON, with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 238. My name's Graham Cluley.
And then it got to the point when lockdown ended and I could have gone to the barber that I'd got past the point of thinking, this is annoying, I need to go to the barber.
And I figured, I'm going to see what happens. So all I can say is, Dr. Brian May, I'm a big fan of yours. I love your hair, but watch out, my friend.
I'm not bragging, but maybe that's enough for our listeners.
Now coming up on today's show, Graham, what do you got?
There are multiple tracks of talks, hacking challenges, competitions, capture the flag, fun for all of the family. Well, the nerdy ones at least, in the heat of Nevada.
And yes, DEF CON is happening in Las Vegas next week. And when I say it's happening in August, so they put it in August. Yes, this is when it happens.
So there are plenty of folks this year who are keen to attend. And there are of course some rules.
DEF CON's telling people they need to bring proof that they are fully vaccinated and they must wear a proper mask at all times.
Would that be enough to lure you to go to DEF CON in Las Vegas this year?
According to the FAQ, that kind of thing isn't acceptable, and neither are scarves, ski masks, balaclavas, bandanas apparently won't suffice.
That specifically is not— oh, I've seen that. I've seen that.
You can attend it via a Discord channel, which is what all the kids love these days.
And I'm guessing it's because they only made so many badges and they're all gone. Ah, smart. And what would DEF CON be without the badge, eh?
You would think it's a fairly slick operation, how you get your tickets and all the rest of it.
But a security wonk called Brandon Forbes, who goes by the name Reznok, he found a problem when he registered for his DEF CON ticket.
He didn't have to log in. There's no sort of registration involved in terms of an account. He made his purchase.
And he looked at that link, curious. And he thought, 3791. Is that my ticket number?
So there are no cookies or tokens in play and saw he could still view his ticket details. So anyone who put in that URL would see his ticket details.
So then just like you've said, he changed the number from 3791 to 3790.
And we've seen quite a few of these over the years. I remember EasyJet and—
But it turns out that, you know, maybe when you get the ticket, there is a certain amount of personal information you have to put in there, isn't there?
Your name and email address to get the ticket back. Yeah. Maybe DEF CON are thinking, you know, who comes to DEF CON under their real name with a real email address? I mean, come on.
This is an indirect non-object reference, and I know. So I'd love to know how many of those names were Mr. Mickey Mouse. So you're quite right, Doug. Mr. Dead President. Mrs. So-and-so.
Mr. Bobby Tables. Yes, little Bobby Tables to you.
And with their kind of mindset, wouldn't they have spotted a problem like this?
But also, any other online service which has used Guest Manager as their booking system presumably was vulnerable to the same flaw as well and is likely to be suffering from the same snafu.
Well, maybe they were waiting to see who would get the data and where it would resurface.
They put in some kind of token system which made it a bit more secure.
And the problem was fixed within 48 hours. And they then just asked the researcher, can you keep quiet about it for a while until we're ready for the public disclosure to happen?
And I actually think that doesn't really paint a very good picture of the typical person who goes to DEF CON because—
They're sequential because he was going backwards. Yeah, because when he went forwards, he didn't get the next person hadn't signed up yet and he got nothing.
But when he went backwards, right? Yeah.
The other good thing is, as far as I know, he didn't get— he didn't do what some researchers can't resist doing and say, oh, I'll write a quick Python script that downloads them all.
He kind of did a few and then figured, I think I can infer from this. Yes. And he didn't go and leech all the data to prove that he could leech some of it.
But yeah, it does cast all those other people who've signed up for DEF CON in rather a bad light that none of them spotted the problem.
But there's a security researcher whose real name I believe is Gilles Lionel, but he goes on Twitter by Topotam77.
And as in topotam, that's he obviously likes hippopotami and He found this flaw, another Windows flaw.
This one didn't get the Nightmare handle like PrintNightmare and HiveNightmare.
He decided to call it PetitPotam, which I presume is a nod to the pygmy hippo because he seems to love hippos.
I think that's much better than these bugs which suggest some kind of Eternal Hell or something, you know, really dark and horrible.
So when the next one came along that involved insecure ACLs on registry hives, instead of just calling it Hivebug, well, let's use Nightmare again.
So at least we didn't get here, SmallNightmare, we got PetitPotam.
And it's sort of not a bug, it's kind of a misfeature that sadly could affect many networks because lots of Windows networks still use NTLM, the LAN Manager Authentication System, which Microsoft itself basically deprecated more than a decade ago saying don't use it anymore, folks.
It was an older, less wise cryptographic age when we designed NTLM.
And in particular, the way it does password hashing makes them vulnerable to brute force attacks because there's no salting.
And it's also vulnerable to, I guess for a similar reason, to manipulate or what used to be called man-in-the-middle attacks, where you trick someone into authenticating with you instead of the real authentication system.
And then you can use the information the client has naively shared with you to kind of finish the login in their name and they don't realize.
And the more modern authentication system in Windows is Kerberos 5, which is what you're supposed to use. You're supposed to turn off NTLM altogether.
But there are so many legacy apps and tools and administration things that need it that kind of a lot of people sort of never got round to it.
This will no longer work in whatever year X. And so, you don't get legacy systems operating.
Remember recently when the pandemic really got going, a whole load of government portals in the US, it turned out they hadn't upgraded the encryption algorithms they were using on their websites.
And they were supporting a hash function that had been deprecated and it was about to be blocked by all the major browsers. And they said, "Oh, golly, we haven't done those updates.
We're sorry.
It's we're a few years out of date." But if you implement this blocking in your browser, which obviously then users just won't be able to get to services that aren't up to scratch, people won't be able to get to government portals.
And they're more important than ever. And they had to delay for a while. I don't even know whether they've got here yet. So that's the problem.
Sometimes it's the kind of client side that shouts loudly. And you say, I am going to refuse any connection unless it uses TLS 1.3.
You think that websites would be in a position to do that now.
And then it turns out that actually a significant proportion either of your paying customers or of people in general would take umbrage at that and say, no, I want to— I'm still using Windows XP and Internet Explorer and I won't be able to get to your website.
And sadly, when those people are a significant enough minority, unfortunately, even a cloud service sometimes can't pull the plug on outdated cryptographic technology and has to let it linger on as a sort of necessary evil.
Because 10 years ago, they said stop using it because the way it was designed, it has these kind of implicit built-in weaknesses about things like how hard it is to hack or crack passwords and protection against manipulator-in-the-middle attacks.
So is it a vulnerability? Well, sort of.
I guess what Microsoft has done over the years to keep NTLM alive, make it ever safer, is they keep adding protections into various protocols on the network that might use NTLM authentication at some point.
But the problem is they obviously haven't been able to go and identify every little place in the network or every protocol where an authentication using the outmoded cryptographic style might be possible.
Well, more importantly, what you need to do, because of course a crook could use what's called BYOB, bring your own bug, and bring an application that's still— or malware that uses NTLM authentication to achieve this result.
Really, you need to stop accepting NTLM authentication attempts anywhere on your network. And Microsoft has a little article that shows you how to do that. It's surprisingly easy.
You just, you can go to your domain controller and say, I don't want NTLM at all.
But for many networks, good luck with that because something somewhere is going to break, might snap, and you might not notice for a little while.
And then suddenly, you know, people can buy tickets to your fantastic conference, but maybe they can't get them issued afterwards, and then you're really stuck.
Delete it.
Or you can redownload it.
I want to download Office 97 because I love that more than this ribbon Office.
I've always wanted to live there for a bit. I think it'd be a cool place to live for a while.
According to Hacker News report, cybersecurity group IB said that this young guy seemed to be tied to the cybercrime syndicate codenamed Fraud Family.
Now, coming back to names and names that we will assign— what was that?
They're more likely— cybercriminals are more likely to be into fraud than into aquatic reptiles, aren't they?
And the whole point is to allow fraudsters to interact with actual phishing sites in real time in order to try and steal banking authentication details.
So here is how it's said to work.
So you get an email, an SMS, a WhatsApp message impersonating a well-known local bank, and it contains malicious links that when clicked redirect expecting recipient to an adversary-controlled payment info-stealing phishing website.
Can you tell it was from the Dutch press release from the cops?
You have a malicious link that you don't recognize, you click through, everything looks hunky-dory, and you start entering your information, and someone's grabbing all that from the other side.
They'd also go to classifieds, Dutch classified advertising platforms, to contact sellers, because they obviously want— this is a service that they're providing.
So they create these phishing kits and then want people to buy them. I mean, I don't know how that conversation goes. How does that work?
I mean, obviously it may be happening on sort of underground websites and there are darkweb marketplaces where that kind of thing is discussed. Okay, but what?
Now, the core crooks don't get the millions. They get, iTunes/Google Play-esque 30%. As Graham said, they get 30% of every ransom.
And they don't have to take the risk of being the people who actually have to infiltrate the network, actually have to stay up late, actually have to sweet-talk the admins.
They just, they go, you do the network hacking, we'll give you the malware, so you don't need those skills. We'll handle the bitcoins.
And I guess, as Graham said, it's the same idea that maybe these guys— it's not quite like those, you know, do you want to learn how to make money selling online?
Buy my training course. It's more like, I don't want to be the in-the-face crook, but I'll sit in the background and take— you take the risk, I'll take some of the money.
And I guess the people involved don't even really have to know each other.
So they can't, even if they want to turn informer, it's kind of quite hard for them to give away the other guys because they're just, you know.
It's not like they're just giving you a phishing web page, is it?
So to quote them here, it says when victims submit their banking credentials, the phishing site sends them to the fraudster-controlled web panel.
This one actually notifies the, you know, the baddies that a new victim is online and the scammers can then request additional information that will help them gain access to the bank accounts, so including the two-factor authentication tokens.
Yes, like the ransomware guys do, and you click it and you actually, you talk to someone in jolly tech support. Yeah, are you having trouble buying bitcoins?
I can advise you, and they can. It's like insane.
If you're having trouble logging in or can't work out what the 3 digits are on the back of your card or wherever, you can begin an online chat with someone who you think is in the bank support department and is actually the phishing person.
So it actually displays this sort of 'Please wait, we're connecting you,' interstitial dialogue while the phishing person is being woken up by some bleeper saying, 'We've got another one who's just come in.' Ingenious.
Oh dear.
Now he has been since released, but I found it interesting in the police press release, okay, thanks to Google Translate, so forgive, but they say, quote, the developer is the most important link in the phishing process.
No phishing without a developer. Phishing panels, by which I think they mean that these frameworks allow other malicious parties to set up phishing websites.
So they're basically saying the developer is the key in this whole market. And I wanted to know what you guys thought about that.
It sounds like they've made it really simple for anyone who wants to make a quick buck to put together quite a sophisticated phishing campaign because normally— yeah, phishers don't manage to get your two-factor authentication code, or if they do, it's already expired.
But this particular system, it would get that and it would be able to bypass multifactor authentication in many cases.
They're the ones who are— without them, there wouldn't be the ransomware that got distributed and everyone would have to invent their own.
And also, I guess, means that somebody who has never coded in their life wouldn't know what HTML looks like, doesn't care, but fancies a go at cybercriminality.
They don't even have to learn how you put a logo on a web page.
The developers at the core of the phishing scamming system will provide that for you in the same way that, you know, in real life you think, oh, I want to build a website.
I'm not going to learn how to load Apache and how to set up httpd.conf files and write HTML and JavaScript. I'll go to a hosting provider and I'll pick a template from a list of 12.
That's a nice one. I'd like the green tinge. I'd like the dropdown menus from the left. Thank you very much. Consider this analogy though, right?
Like literally they are scamming everyone and they're proud of it. And that is why I've gone there.
Do I trust them to actually fix my car for the agreed deal that we're making when I know sweet F.A. about the business?
Like, if you're going there because they might issue you an MOT certificate without actually looking at the car, for example, then you kind of figure, okay, I don't care.
I'm going in with my eyes wide open. And I guess here, for the people joining in, you're paying this amount each month.
If the guys screw you over and you don't make your €200 back in the first month, you're just not going to do it again. But if you do and you actually cash the money out—
You're buying into the phishing campaign you can see that you get woken up. You get, yeah, there's someone online and you can see whether it's working.
So this is all directed at just Dutch residents and Dutch banks.
So this is really people living outside the Netherlands may not encounter this problem, but I think it just goes to show that phishing is still rife.
You kind of feel like it's so old hat.
It's like the REvil guys, they're only interested in $70 million ransoms, like as happened in that Kaseya hack. And it isn't.
There are plenty of smaller-time crooks who figure they don't want to be in that massive spotlight.
They're just— and, you know, if you're a 15-year-old kid, you're just thinking, I want some new trainers.
Was that the Dutch police infiltrated the Telegram groups where they were chatting, you know, where the fraud family and their affiliates were working, and they posted their press release about the arrest of the gang members so everyone would see that they were on to them.
Maybe they'll get some details as to who else has been buying stuff from them as well. I guess we'll have to wait and see whether more arrests will be made.
And then it's going to be really bad. Don't tell mummy!
This August, you are invited to Security Summer School, a brand new webinar series hosted by the 1Password team.
Learn from security experts at top organizations, hear about sizzling security trends, and get quick tips for building a culture of security at home and at work.
You can get exclusive perks like 1Password swag for attending events, the chance to network with top security leaders, and much, much more.
Find out more and enroll now at www.onepasswordsummerschool.com. That's www.onepasswordsummerschool, all one word, .com.
The training is designed by the same minds behind Kali Linux and OSCP. Oh, now you're paying attention. So Offensive Security offer a number of different programs.
There's the OffSec Flex program, which allows you to train on your own schedule.
There's the OffSec Academy offering industry-leading OSCP certification through dedicated one-to-one mentoring and virtual training.
Or if you want to develop your team's pentesting skills in highly realistic simulated networks, Offensive Security experts have got your back.
See, it comes down to this: the skills gap is increasing, meaning it's more important than ever to train your staff effectively and efficiently.
Learn more about Offensive Security at smashingsecurity.com/offsec. That's smashingsecurity.com/offsec.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish. A product.
It is something rather wonderful, which started as a comic strip, and now you can buy it in volumes and read all the tales in one book or a series of books.
It is the rise and fall of the Trigon Empire.
Words and Pictures by Mike Butterworth and Don Lawrence. I remember it fondly when I was reading the pages of Look and Learn magazine in the 1970s.
Look and Learn was a weekly educational magazine which my parents thought— That's what your mum allowed you.
The best bit was the Trigon Empire, where things went a bit crazy and wasn't about how helicopters work and things like that.
So the Trigon Empire stories, they're based on the distant planet of Electon. It's a strange mixture on Electron.
They have futuristic technology, anti-gravity ships and ray guns, but they also have Roman and Greek architecture and legionnaires and great big battles.
I absolutely adored this comic strip as a young boy, and my son, who's 10 years old, loves it as well.
So literally done by hand, like painted rather than hammered and watercoloured, not on computers, right? Like it's all hand-drawn and all hand-painted.
And then there's just— it's a lot of work, the amount of times you can't just adjust things, right? You got to redo them and you got to make the final one has to be super clean.
So a lot of work.
Basically, I think it's been popular in the Netherlands and in Germany, but it's been quite hard to get hold of in English. It's been quite expensive.
Now Rebellion have brought out 3 volumes of The Trigon Empire, affordable. You get all of these stories. It's terrific.
So I will put some links in the show notes, and I strongly recommend The Rise and Fall of the Trigon Empire. Great. And that is my pick of the week.
Duck, what's your pick of the week? It better be good.
I have no connection with them. I don't get any commission. And if I did, I could have earned as much as £8.50. It is the world's best hairbrush. And with my big, I'm challenging Dr.
Brian May hair, I need a good hairbrush. My wife had one of these, and I took to using it when I thought she wasn't looking. And of course, she figured out what was going on.
And one day she said, I'm just nipping out to the shops. And when she came back with the groceries for the day, she said, I bought you a present.
And she presented me with my very own Tangle Teezer. Oh, and it's the best hairbrush you'll ever buy. It's called a Tangle Teezer.
It's got bristles of two different lengths, I presume, because they— although it's a British-made product and it's festooned with a Union flag and all of good, proud jingoistic stuff.
I guess they want to appeal to a market that's not English-speaking, so they didn't want to spell the word teaser like you spell it in English because the pronunciation isn't obvious.
So you have to search for tangle, which is spelled as normal, and teaser is T-E-E-Z-E-R. And tangle— oh yeah, it's just— it's great.
And my wife didn't realize this. She just bought— they only had one in stock where she bought it.
So the one she bought me without realizing it is actually different colours, different sizes. And she bought the turbo, the large-sized one. That's the one to go for. Absolutely cool.
You don't get sparks, you don't get static electricity, your hair doesn't come out.
It's just like— if you thought that's how a hairbrush should work, take it from me, I'm the fashion captain now.
Graham, am I missing out, or are other people just very polite about me not.
But if you decide that you want to look as cool as I do, the Tangle Teezer is your friend. But my wife's one is off limits now. I'm not allowed to touch that. Now I've got my own.
We keep them separate.
So if you have to rush out to fight a virus out into the street and out to somebody else's computer, and you won't catch your hair on something and trip over, perhaps.
Yes, it's full on if you have that bouffant full 1960s, '70s coiffed look. Or a bit like Jason King, no?
It goes — there's enough grab, there's enough weight for gravity to pull it down, so it doesn't just stick out like a geranium.
That wasn't in the —
And the guys would chase after them and a fight was on, and they'd jump in the car and speed off.
And they got this huge reaction and they had to post a video saying, guys, they were our buddies, it was just for fun.
I'll tell you what, I'd wield that Tangle Teezer — lash 'em back with it.
And the column is where people write in essays about their love strikes or fails or something in between the two. Season 1 has been out since 2019.
But Season 2 is just about to land in early August, which is why I'm covering it today. So there's all types of stories.
Maybe there's one about an unlikely friendship, or, you know, past love resurfaces, or a marriage is at its turning point, or a good date or a bad date or anything that.
And I just the way the stories are told. And I sent Graham one, I pointed my favorite one in your direction. Season 1, Episode 3.
That's right, Take Me As I Am, Whoever I Am with Anne Hathaway. What did you think?
I'm keen to watch some more episodes, I have to say.
The acting's good, the storytelling is good, and the whole premise of it is nice because we need a bit of love in our lives.
Yes, we're taking a fricking break. Yeah, we're going to take a few weeks off for a little holiday. Of each other as well. Yeah, most importantly. But we will be coming back.
So it'll only be a couple of weeks, but yeah, it's August, so we thought we'd have a little vacation.
Go and listen to one of them.
So check us out there and make sure that you never miss another episode, including when we come back in a few weeks' time, by following Smashing Security in your favorite podcast app such as Apple Podcasts, Spotify, and Google Podcasts.
And for episode show notes, sponsorship information, guest list, and the entire back catalog of more than 237 episodes, check out smashingsecurity.com.
They're going to be at their cabin. They're going to be camping somewhere. It's all cool.
You listeners, you sponsors, you Patreon supporters, you reviewers. But you know what? I've forgotten somebody very important.
And that is all the guests that have come on the show and given us their time.
These are the people that present story, have a few laughs with us, and generally manage it so that Graham and I don't kill each other.
Which, you know, is a bonus, 'cause that would be the end of the show. So let's see if I can do this.
Thank you, Adrian, Alan, Alex, Andrew, Anna, BJ, Barry, Brian, Charles, Chris, Claire, Dahlia, Dan, Danielle, Dave, Gary, Geoff, Greg, Helen, Iain, Jack, James, Jamie, Javad, Jenny, Jessica, Joe, John, Kevin, Levi, Lisa, Mary, Maria, Mark, Martin, Max, Michael, Michelle, Miko, Nick, Nina, Ollie, Paul, Peter, Phil, Philippe, Rachel, Ran, Ray, Rik, Rich, Robert, Roger, Ron, Rory, Scott, Simon, Steve, Thom, Tim, Tommy, Troy, Vanessa, Vanja, Yvonne, and Zoe.
And you, dear listeners, can see their bios at smashingsecurity.com/guests. See you in a few weeks.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Paul Ducklin – @duckblog
Show notes:
- DEF CON masks and vaccination FAQ.
- Hacking DEF CON 29 — Reznok.
- Tweet by Jeff Moss (Dark Tangent) thanking Reznok.
- PetitPotam proof-of-concept tool — GitHub.
- Windows “PetitPotam” network attack – how to protect against it — Naked Security.
- Fraud Family cybercrime ring under the spotlight as arrests made in the Netherlands — Bitdefender.
- The Trigan Empire — Wikipedia.
- The Rise and Fall of The Trigan Empire: Volume 1 — Treasury British Comics Shop.
- Tangle Teezer — If you want to be a Fashion Captain, like Duck.
- Modern Love trailer — YouTube.
- Modern Love (TV series) — Wikipedia.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Cybercrime is at an all-time high, and it’s not slowing down, so why should you? This August, you’re invited to Security Summer School, a brand new webinar series hosted by the 1Password team.
Learn from security experts at top organizations, hear about sizzling security trends, and get quick tips for building a culture of security at home and work.
Get exclusive perks like 1Password swag for attending events, enjoy the chance to network with top security leaders, and much much more.
Find out more and enroll now at www.1passwordsummerschool.com/
With the skills gap increasing, it’s more important than ever to train your staff effectively and efficiently. Industry-leading Offensive Security provides training for your organization designed by the same minds behind Kali Linux and the OSCP.
Visit smashingsecurity.com/offsec to learn more.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

