
Heating systems are left vulnerable to attack in the high courts, cybercrime unicorns have become a reality (but what are they?), over 15 Terabytes of NFTs are made available for anyone to download … and Carole reveals her Pick of the Year.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mikko Hyppönen.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
Now coming up on today's show, Graham, what do you got?
The likes of Julian Assange, Lori Love, Gary McKinnon. They've all had their day in front of the beak.
Until very recently, if you had a reason to visit the Royal Courts of Justice in London and you took your laptop out or your smartphone and thought, oh, I'll just go and check Twitter or, you know, just go and read my email or something, you might try and connect to the Wi-Fi and you would find a variety of Wi-Fi hotspots available.
Those wireless networks were unsecured and passwordless. So you could connect to those wireless networks if you wanted to.
And, you know, maybe that'd be some way of intercepting their messages as they're about to have their day in court. But no, it appears not.
Because if you did connect to them, you would find yourself at the login page of the Royal Courts of Justice HVAC system. Carole, do you know what HVAC is? I'm sure Mikko does.
Now, if you knew that password, you would be able to access the admin system, which would let you, for instance, I don't know, what sort of mischief could you cause by meddling with a ventilation system or heating system?
Because when Target, for instance, was hacked back in 2013, I think it was, they used a password which they'd stolen from the HVAC supplier to the big retailer in order to gain access to Target systems.
So that can be a problem, especially if default passwords have been used. But you could, even if you just meddled with the heating system, imagine you turned off the heating pumps.
But imagine your water pipes freeze over overnight and burst, that could cause the building to close and court cases to be delayed. Or what if the heat was raised?
So the judges, there they are in their great big British wigs, sweating and sweltering. Oh, I can't cope. People are beginning to put their bikinis on.
It would just be, you know, so if you were maybe someone who didn't want to be extradited, or you knew someone who didn't want to be extradited, then maybe you might hack into this system.
But of course, you wouldn't know the password to log into the boilers, would you?
If you visit their website, you can download some very helpful PDFs which detail the default passwords which they use.
Or you could just use Google because Google has indexed those PDFs as well. So now, no one obviously is dumb enough to never change the default password, right?
Everyone always changes the default passwords, right? They would. Of course they would. Of course they would.
Someone at the Royal Courts of Justice, especially if it was accessible from a public place or from the street outside, maybe the Royal Courts of Justice, where often you get protesters.
Who are campaigning for someone not to be extradited or someone, you know, to be let off whatever they're being charged with.
So isn't it the same thing basically? It's just a more digital version of the same idea.
However, interestingly, the Register also points out that just yesterday, a journalist reported that the temperature at the court was ludicrously cold, and the jurors had been told they could keep their hands, coats, and gloves on if they want.
Now, it's not new, as Mikko has already said, it's not new for HVAC systems to be the weak link in the chain.
We saw the Target breach, for instance, where they managed to then sort of spread laterally through the organization by the HVAC.
And I also remember earlier than that, in 2009, a security guard at a Dallas hospital hacked into computers as well as the HVAC system in order to launch DDoS attacks.
There was a guy, Jesse McGraw, he called himself Ghost Exodus or Phantom Exodismo, and he was the self-proclaimed leader of the Electronic Tribulation Army.
And he used his knowledge as a security guard to bypass physical security, and he ran a password cracker on the HVAC computer.
And he had the ability to change the temperature at this hospital and its environmental controls, which could obviously have affected people's treatment.
He also had potentially access to patients' medical records and all kinds of impacts it could have had.
He ended up being sentenced to 9 years in jail, but the most notable thing about him, it's funny you mentioned Mission: Impossible, actually, Mikko, because he made a video of himself doing this so-called botnet infiltration where he made no attempt to hide his face, but he did wear a hoodie.
And while doing this, he had the Mission: Impossible theme playing on a CD player in the background.
You see, I've spent the pandemic downtime writing a book. I had my book come out last month.
So, nevertheless, I mean, I'm happy to tell you about the book, but you can't read it because it's only been published in my native language of Finnish so far.
But Finnish isn't that hard. Even small children speak Finnish, so you can easily learn it. It's true. You come to Helsinki, you'll see small kids speaking fluent Finnish.
So if you can't learn it, you must be thick. However, it will be published internationally in 2022. So you will be able to check it out.
In that book, one of the topics I cover is everything that we've been doing with machine learning and artificial intelligence on the defense side, the how security companies use machine learning, which then brings us to the obvious question, which is that how are we going to see and when will we see the attackers using machine learning for offensive use.
And when I was thinking about this, I actually went back to my notes from 2016 because in 2016 I invented a new term, which was cybercrime unicorns.
And here unicorns is a reference to unicorn companies.
I guess the way they officially define it is that it's a private technology company, which is valued at over $1 billion, which typically are exactly what you described, early stage companies with massive funding or huge growth wishes.
So it's a unicorn. Airbnb and Uber used to be unicorns, but now they're public, so they're no longer unicorn companies.
So what I was thinking in 2016 is that I wonder if we one day will see cybercrime unicorns, organized online crime gangs, which should be considered to be unicorns because they have wealth of over $1 billion.
And 5 years ago, it was sort of a gag or a word to chuckle. We didn't actually have them 5 years ago.
Unfortunately, they have become a reality and they've become a reality for two different reasons.
Reason number one, the amount of money being made with business email compromise attacks and with ransomware has just skyrocketed, which is a big part of this.
But even more importantly, these online crime gangs keep their wealth in Bitcoin or in Monero or in Zcash.
And 5 years ago, we knew of several online crime gangs which had $10 million of wealth.
Well, if you had $10 million 5 years ago in Bitcoin, if you still have them in Bitcoin, you've become a unicorn automatically because today, I mean, the value of Bitcoin has grown 100-fold in 5 years.
When the enemy can afford to invest money into their attacks, how will we see the change?
And some things we've already seen include that these guys, the professional crime gangs, are becoming more and more organized.
In some senses, they start to resemble traditional real-world crime gangs, organized crime gangs. We know they run professional data centers.
We know they hire lawyers and business analysts.
And I think an especially eye-opening case was the case with FIN7 crime gang, which has now twice created these fake front-end companies to hire pen testers, basically recruiting from our side proposing as a security company hiring security researchers to do penetration tests against companies which have not ordered a pen test.
So of course they will then find ways in which will then be used by the criminals.
So those penetration testers, they aren't aware that they're part of a criminal gang or that they're pen testing companies without the company's permission, I guess.
And I suppose the whole point of setting up a fake company is that you're trying to recruit professionals without them realizing that you're working for criminal organizations.
I imagine if you're working for them, you don't worry about saying, oh yes, I work for this company.
And I, yeah, no, I did do that and the company told me to, you know, and here's some write-ups, but the addresses go nowhere. 404, 404, 404.
They are unicorns.
It's even harder to hire AI and ML experts, artificial intelligence, machine learning experts, and even harder to hire artificial intelligence, machine learning experts who work in cybersecurity.
And this is what worries me. And this is why I believe we are on the verge of starting to see the enemy start to use machine learning in their attacks.
And of course, we don't know, but I've been throwing this idea back and forth here at our labs.
And I think a pretty common consensus would be that the easiest thing for them to do first would be to replace the humans that operate the malware campaigns that we are seeing today.
So if you think about a typical malware campaign, let's say ransomware campaign, there's multiple moving parts. It's made by multiple different persons, but there's an operator.
So let's say they want to send out emails with a malicious link to a website which has an exploit, which then drops a ransomware binary on your Windows computers.
There's an operator which prepares the email and selects the address list which to target and start sending out the emails and then monitors how well do the emails go through spam filters, adjusting as needed so they will go through better and then monitoring how well the exploit works.
Is it being detected by IDS systems at the companies?
And if so, they modify it and then monitoring how well the binary goes through endpoint protection system and compiling and changing it as needed.
All of that could easily be replaced with a short Python script which would do all of this and adjust accordingly and learn how the situation changes.
And I believe this is what will be the first step. I mean, the humans running the operations will be replaced by learning systems which will run these systems automated.
There'll be many of them who used to run these malware campaigns who are going to be kicking around now looking for something else to do.
A lot of people assume AI attacks are happening already and they're not.
I mean, when something like this would happen, of course it would be very visible to us and we haven't seen it yet.
It's basically a game of ping pong where our end, the pong part of this, would be automated, security companies automatically feed us samples, automatically analyze, detect them, create detections and ship them automatically.
So there comes a pong from the criminals and the ping comes right away. Then there's a delay and a pong again. So it's a game of ping pong. Ping pong.
When they automate their end, then it's going to be ping pong, ping pong, ping pong, ping pong. The only thing which will stop a bad AI will be a good AI.
And this change will be so obvious that, you know, we would detect it.
Carole, what have you got for us this week?
And then there was a major acceleration that started in 1634 and then collapsed 3 years later. And some are referring to the whole NFT as a similar blip.
Have you got views, Mikko, on NFTs?
There might be some real innovation there as well.
Because the bubble will maybe pop, likely to pop is my gut. But there's this one guy by the name of Geoffrey Huntley.
And he has pointed the finger at what I was going to call a ginormous fly in the NFT ointment.
So if you're thinking of dabbling with NFTs or you already have dabbled, this might be some food for thought. Okay. So NFTs, should we do a quick refresher for some listeners?
Because it is a crazy term. It's hard to get your head around, I think.
Think of it as a unique token that designates ownership of a digital good. Would that be fair?
If you make a copy of an MP3, it's going to be the same thing as the original. An NFT makes it different from the original.
A blockchain eBay of sorts, and the winner or the purchaser of the NFT or of said digital good has a contract coded and then minted in a blockchain network.
And this is a permanent part of the blockchain. So effectively, there's a digital receipt of purchase. Is that fair?
To know how much detail to go into and try and explain these things.
Also, there's a glut of peeps out there with dollar signs for eyes, jumping on the bandwagon to make a really quick buck. Buy low, sell high, yada yada yada.
Because there's been some articles of huge amounts of money being transferred for digital pictures and digital images.
And so I'm listening and the main takeaways were that people want digital things. So the fact that I have a physical original wasn't that exciting to them.
They wanted digital art, but I don't do that. And they also a series of collectibles.
So each of them original, but also related to each other so that you can build a whole team of stuff and it's worth more value.
Do you see any issues with the concept or things that make you feel a bit like, this seems— this is where I don't feel like it sits comfortably for me?
Although you could always argue that, sure, you have a copy of the original NFT, but your copy is not worth $1 million and the original is.
Because it takes a huge amount of energy to do all the calculations required to generate the certificate for the blockchain ownership of this NFT. Also the valuation, right?
The cryptocurrency is, people are, oh, that was bought for £69 million. And it's, well, that was yesterday. You know, the prices are at the value, you know, at the time of sale.
If you leave it in there and it devalues, then obvious what happens.
So they paid 50 bitcoins for 2 grams of hash.
And then of course there's liquidity issues because just because you've bought something, there's a lot of shady stuff out there and you may not be able to realize the cash from the purchase because there's lots of new kind of players on the market.
Not all are shipshape. But the thing that surprised me the most is that ownership, of course, is not required.
So just like Mikko is on my website looking at my art right now, he could save as, slap it up for an NFT for sale. Now, here's the thing.
There's no guarantee that the artist knows if someone has done this.
And if they do happen to find out by going looking or someone telling them, they have to go through the whole rigmarole of trying to prove that they actually own it and it was taken from them.
So a takedown notice, effectively. All in all, a huge pain in the butt. So, hmm, here is walking with Geoffrey Huntley. Okay, now he's got this FAQ page about him.
It's my press page, and it says a little bit about me. He says, my full name is Geoffrey Huntley. Please do not use Geoff Huntley. Then he goes, hi, I'm Geoff.
The images in lots of cases are not being stored within the blockchain. The image, he writes, these images are not stored on the blockchain contract.
Anyone who finds them can save and have an exact digital copy of what you're trying to buy to sell.
So he has basically created this website, a site of 17 terabytes, all available from a single source.
And he is showing that you are buying the notification of owning a worthless piece of crap, in my view.
On his FAQ page, it says, did you know an NFT is just a hyperlink to an image that is usually hosted on Google Drive, other Web 2.0 web hosts?
People are dropping millions on instructions on how to download images. That's why you can right-click, save as, because they're just standard images.
The image is not stored in the blockchain contract. And the problem is, is obviously web hosts are known to go offline, 404 errors, right?
So this handy torrent contains all of the NFTs.
And collectively go, what the fuck? We destroyed our planet for this. Signed, Jeffrey Huntley. Not Geoff. So, well, interesting.
Plenty of the people here in Finland who have bought the book have bought the ebook, not the paper book. Some of them asked me, could you sign my book?
And of course, physical book, I sign it, I'm happy to sign it. But how do you sign an ebook? There doesn't seem to be any solution to this.
And I'm sort of waiting for someone to come up with something, something along the lines of NFTs, where I could actually somehow sign it with a public key and have the ebook be wrapped up in a contract, which would be stored in blockchain or something like that.
That actually wouldn't be as stupid as many of the things we have here. If you're next to an order of something you have, and he could somehow sign it for you.
So it would actually, you know, show that you actually did meet this person.
And since NFTs are contracts, it could even work so that if someone would then sell a copy of the signed good, part of the price of that resale would go back to the original artist or original author.
So maybe something like that could actually be useful.
Oh, actually I don't love it, I'm gonna sell it on, that you get a kind of tiny bit of that wonga. And I think this is probably a foray into that.
I just don't think they've got it down pat yet. So just one last thing. If users want to check whether their NFT is really on the blockchain, as opposed to being hosted on Web 2.0.
I have no NFTs, but this was recommended by Jeffrey Huntley himself, so make of that what you will. The site is checkmynft.com.
It now effectively looks at the contract definition, so you can also just look at the freaking contract and read the T&Cs before you get involved. Love you all.
Perimeter 81 allows organizations of any and all industry sizes to support IT teams with robust tools to secure and manage your global network with one unified platform.
Securing remote access for cloud and hybrid businesses and organizations, Perimeter 81 provides unified solutions such as zero-trust network access, firewall as a service, device posture check, and more.
Learn more and request a demo at perimeter81.com. That's perimeter81.com. Most companies discover they've been breached way too late. Well, Thinkst Canary fixes this.
Just 3 minutes of setup, no ongoing overhead, nearly zero false positives, and you can detect attackers long before they dig in.
Simply go to canary.tools to find out why its physical, VM, and cloud-based canaries are deployed and loved on all 7 continents.
And what's more, listeners who mail in referencing Smashing Security get a 10% discount on their order. Can't say fairer than that. So go and check it out now, canary.tools.
1Password 8 for Windows is out right now. 1Password 8 for Windows has been reimagined to feel right at home on the world's most popular desktop operating system.
From dark mode and passwordless integration to smart search and secure item sharing, 1Password 8 is the new home for your digital life.
Productivity improvements, enhanced security and privacy features, and a modern design deliver a first-class experience that offers the best of Windows 11.
1Password 8 for Windows helps you manage, remember, and protect your sensitive information more easily and securely than ever before. So what are you waiting for? Find out more.
Try 1Password free for 14 days at 1password.com. And thanks to the folks at 1Password for supporting the show. And welcome back.
And you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily.
A computer program for the Apple Macintosh, for macOS, which I use umpteen times a day, and it's probably the best program I have on my computer.
And I couldn't find one which I really got on with until a few years ago, I discovered Mailmate.
And in its own description, it says, "Mailmate isn't the most widespread, the cheapest, or the greatest looking email client, but I have no aspiration to make Mailmate ever be one of those.
Instead, it aspires to be the most powerful, the most flexible, the most efficient, the most standards compliant, and the most secure email client." And I have to say, I love it.
So if your email's in Gmail or something like that, it can connect to that and you'll be able to meddle with it on your thing.
I'm trying to think of other really clever stuff it can do.
I'll tell you one thing clever that it can do is if, for instance, so I have a form on my website, right, where people can ask me to go and speak at an event, right?
And I get an email to myself from a particular address on my website.
And if I accidentally reply to myself rather than the person I was meant to reply to, it will pop up and say, whoa, whoa, whoa, Graham, you've CC'd this internal address, which you didn't mean to.
So there's all kinds of little itsy bitsy configurations. Or I've got another thing which says every time I send an email, because sometimes I'm a little bit curt in my emails.
I'm not as polite as I should be.
I could make it an hour if I wanted. And so I can go back to my email.
So then it does it. And anyway, it is developed by just one Danish guy.
You can buy it for a one-off fee of $49, but it is so essential to my work life that I actually give him cash every 3 months.
I pay the equivalent of subscription, which is entirely optional, but I choose to do it because I would be screwed if Mailmate ever went away.
Excellent software should be supported, so I'm happy to pay for it.
Look for the Ted Dabney Experience podcast and hit play. Well, it's another podcast.
It's an English language podcast, but it's not really about cybersecurity or InfoSec or any of the fun stuff. It's about retro gaming.
It's about old video arcade games. This is a podcast made in UK by Paul Drury, Tony Temple, and Richard May. Tony Temple is the world record holder in Missile Command.
He actually just wrote a book about Missile Command history and how he made the world record.
And the podcast interviews people who were involved in the early days of the arcade gaming revolution, especially people involved in the early days of Atari.
The name Ted Dabney Experience comes from Ted Dabney, who was one of the guys who started Atari together with Nolan Bushnell. It is really well done.
Production qualities are there, really good interviews, and they have access to people who typically don't give interviews.
So if you are into old gaming, classic gaming, or retro gaming, check out teddabneyexperience.com.
And it's a movie currently available on my instance of Netflix called Ruben Brandt Collector. Have either of you seen it?
Okay, so the psychotherapist suffers violent nightmares inspired by these legendary works of art, and 4 of his patients, expert thieves all of them, offer to steal the works since the psychotherapist, of course, as one would, believes that once he owns them, the nightmares will disappear.
And he becomes a wanted criminal known as the Collector. And there is a detective attempting to find out who this Collector is. Okay? That's basically the premise of the whole thing.
It is so beautifully illustrated. Oh my God. And the animation is to die for. I mean, I—
And you can try and spot them. And some of them are quite obvious, but some are very hidden within the fabric of this. Wonderful, beautiful, just stunning piece of work.
So without delay, get your hands on Ruben Brandt Collector, and it's the best thing I have seen all year and maybe in the last 5 years. I just absolutely love it, love it.
There you go, can't get higher than that. That is seriously a Pick of the Year. There you go.
Mikko, I'm sure lots of our listeners love to follow you online, find out more about what you are up to. What's the best way for folks to do that?
And we also have a Smashing Security subreddit where you can chat about the latest episodes. And don't forget to ensure you never miss another episode.
Follow Smashing Security in your favorite podcast apps, such as Apple Podcasts, Spotify, and Google Podcasts.
And to our tremendous Patreon community, it's thanks to them all this show is free.
For episode show notes, sponsorship information, guest list, and the entire back catalog of more than 253 episodes, check out smashingsecurity.com/podcast.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Mikko Hyppönen – @mikko
Show notes:
- Royal Courts of Justice HVAC systems had unsecured Wi-Fi AP — The Register.
- Tweet by Tristan Kirk, court correspondent of the London Evening Standard.
- Target Hackers Broke in Via HVAC Company — Brian Krebs.
- Former Security Guard Who Hacked Into Hospital’s Computer System Sentenced to 110 Months in Federal Prison — FBI.
- Video by Jesse McGraw (aka "PhantomExodizzmo") — YouTube.
- Cybercrime Unicorns: How Hackers Are Building Empires That Rival Tech's Most Sophisticated, Highly Valued Startups — International Business Times.
- Will we see a cybercrime unicorn? — Comic strip featuring Mikko Hyppönen.
- 'Piracy' website offers NFT art as free downloads — BBC News.
- Someone Made a Pirate Bay for NFTs — Motherboard.
- The NFT Bay.
- NFTs are causing chaos in online artist communities — Polygon.
- Think cryptocurrency is bad? NFTs are even worse — Mashable.
- MailMate.
- The Ted Dabney Experience — Podcast about vintage video games.
- Ruben Brandt, Collector — IMDB.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff
- Support us on Patreon!
Perimeter 81 is the first-ever Cybersecurity Experience Platform, designed around Instant Deployment, Unified Management, Integrated Security, and Full Visibility.
Perimeter 81 allows organizations of any and all industry sizes to support IT teams with robust tools to secure and manage your global network with one unified platform.
Securing remote access for cloud and hybrid businesses and organizations, Perimeter 81 provides unified solutions such as Zero Trust Network Access, Firewall as a Service, Device Posture Check, and more.
Learn more and request a demo at perimeter81.com
1Password 8 for Windows has been reimagined to feel right at home on the world’s most popular desktop operating system.
From Dark Mode and passwordless integration to smart search and secure item sharing, 1Password 8 is the new home for your digital life.
Productivity improvements, enhanced security and privacy features, and a modern design deliver a first-class experience that offers the best of Windows 11.
1Password 8 for Windows helps you manage, remember, and protect your sensitive information more easily and securely than ever before.
Take the 14 day free trial now at 1password.com
Most companies discover they’ve been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in.
Go to canary.tools to find out why its Physical, VM and Cloud Based Canaries are deployed and loved on all 7 continents…
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.
