
Trouble brews with the Tim Hortons app, Mandiant gets in a tussle with a Russian ransomware gang, and should good faith security researchers be at risk of prosecution?
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by The Lazarus Heist’s Geoff White.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security, Episode 278. My name is Graham Cluley.
It's how North Korea became a sort of global cyber threat and the sort of really bizarre activities that North Korea's hackers get up to and the kind of bizarre relationships they have, not just with organized cybercrime, but with organized street-level crime.
It's got hapless philanthropists in Sri Lanka, Instagram influencers in Dubai, shonky Japanese used car salesmen. It's got it all. It really does.
Yeah, it takes some really bizarre— It's a really dumb movie. Probably even gonna be a documentary at some stage, but yeah.
Series 1 stopped last year, and that narrative of that podcast kind of ended in 2017 with WannaCry, which probably needs no introduction to your listeners.
So then there's 5 years more hacking to cover, so a lot of that's in the book. All of the stuff they did with ATM jackpotting, making cash points spew out cash around the world.
Cryptocurrency, the huge, huge, huge cryptocurrency attacks they've been involved in. So all that's kind of in the book, so great.
And then after I finished the book, there's a whole bunch more stuff they did, including the recent Axie Infinity Ronin Bridge $625 million hack that's been attributed to North Korea.
So what's useful is all that stuff isn't in the book.
That very recent stuff isn't in the book, but we're working on Series 2 of the podcast, which is going to be out later this year.
Because whenever we close, you know, you finish the book or you finish the series or whatever, they keep going on doing more stuff that's attributed to them.
So I just wish they'd have a little hiatus while we catch up.
What we're asking people to do is if you email us at with the subject line Lazarus, because we want our email, we want to be able to find our emails.
So you have to use the subject line Lazarus and explain why you want to read Geoff's book.
We will pass your messages on to Geoff, and he will choose a winner who will get a free complimentary copy of The Lazarus Heist book, hot off the presses.
I just think it's a bit weird, because it looks like you're going, 'No, I did not write this.' And then below saying, 'Yes, I did.' There we go. They did run. Yes, they did.
Because I really— that will come as a shock to people who've been looking at my social media as I relentlessly plug myself and the book. But I don't like this stuff.
I'm not a marketer. And I do it through gritted teeth. So after the book's gone out, you can quieten down a bit. You don't have to mention it at every breath.
Now, coming up in today's show, Graham, what do you got?
You have lots of fresh donuts open 24 hours and Tim Hortons coffee, which I think, I don't know if this is true, but the rumor was that they had put MSG in it, which made it very yummy for people.
So you would go on a street in the city and there'd be 5 coffee shops, but only a lineup at Tim Hortons. So that could be total conspiracy theory.
Well, you might think that Canadian companies are composed of lovely Canadian people and they wouldn't possibly do anything bad whatsoever.
And because of that, because Canadian people are so extraordinarily trustworthy, like Michael J.
Fox or William Shatner, you probably would willingly give them your home address, your work location, hand them your vacation plans, because you know you can trust the Canadian, right?
Because they're lovely people. And you'd do so willingly, but I imagine you wouldn't be as happy if you were doing it unconsciously without realizing that you were doing it.
And according to this journalist, James McLeod, this was happening even when he'd told it to track him only when the app was open, right?
So some people want the app to identify his location, because then it tells you where you can get your nearest doughnut.
So even when he wasn't using the app, it was still grabbing his precise location. In fact, it grabbed it over 2,700 times in less than 5 months. Question.
It was logging that. His Android advertising ID, his carrier. It knew they had Bluetooth enabled. It knew how much free space he had on his device and his battery charge at any time.
You know, it's like maybe it could pop up a message if you're running low on battery.
So if the app is allowed to look at available Wi-Fi networks nearby, as soon as you walked into a McDonald's and it saw McDonald's free Wi-Fi or whatever, that's how it would be able to identify if you're in a competitor's place.
And so they were looking at your latitude and longitude, and they knew you've actually entered the building. You haven't just walked past it and picked up the Wi-Fi.
You've actually dared to cheat on Tim Hortons and go into a competitor. The only way to stop it collecting data was to stay completely stationary.
If you didn't move, because you've eaten too many apple fritters.
So it'd say, hey, did you know that our chicken fries or whatever they do are better than KFC's? But it wasn't just that.
They also knew when you were at home or when you left your home or visited your ex-girlfriend's house, or the journalist found that it knew when he'd visited a baseball game, or visited his parents at a rural farm in Oregon, or visited Manitoba for his cousin's wedding.
And it was only when an Android operating system update had been pushed out onto his phone with a new security feature, which occasionally popped up a message saying, Hey, this app you've got here is continuing to grab your location data in the background.
And that's what made him wonder why and why he sent a sort of data access request saying, what information have you actually collected about me?
And he got reams and reams of data, you know, thousands and thousands of lines of JSON, which then when it was analyzed, told him quite a lot.
And he got an independent analyst to look at this data and he said, look, what could you make from this data?
And this chap said, well, I've looked at the data and what I notice is that you head out from work on Fridays about 2 PM. So you leave the office at 2 PM on Fridays.
And apparently the journalist put his hands up and said, well, it is a bit of a joke in the office that I do leave the office early on Fridays, which maybe is a bit of fun, but if you're an assassin, for instance.
They've now updated that information to make it a little bit less ambiguous as to what they're collecting and what choices you have and how you need to check your device settings.
But in the wake of this article, there were 4 lawsuits filed against Tim Hortons. Which seems very American to me. Is that very Canadian, Carole, to launch a lawsuit?
Surely it'd be oh, that's okay, never mind.
Because of course, deleting it might destroy the evidence. They said they're going to when they're allowed to.
The Commission d'accès à l'information du Québec and its equivalents in Alberta. Good skills.
So Tim Hortons have had their hands slapped. Naughty Canadians. What? People can now— Again!
Other websites are available, but I saw this in bleepingcomputer. Headline: 'Mandiant: No evidence' in inverted commas, We were hacked by LockBit ransomware.
This is a story by Sergey Gatlan. This is posted June 6th, 3:54 PM. Keep that in mind, is relevant.
American cybersecurity firm Mandiant, it says here, is investigating LockBit ransomware gang's claims that they hacked the company's network and stole data.
So it's, oh, shock horror, LockBit have hacked into Mandiant.
And obviously hacking into cybersecurity companies, we know, has been a thing, and they try and get hold of their tools and so on.
Then it says the ransomware groups— this is LockBit— published a page on its data leak website earlier today.
So this is the 6th, saying that 350,000 files they allegedly stole from Mandiant will be leaked online.
This is basically the LockBit ransomware group saying, oh, we popped Mandiant, you know, stay tuned here.
All available data will be published, exclamation mark, said the gang's darkweb leak site. Under a timer showing just under 3 hours left until the countdown ends.
Which is why the 3:50 PM timeline a few days ago is relevant, because you would think, well, 3 hours has now passed since the article was posted, 6th of June, 3 in the afternoon.
What happened?
And it seems that Mandiant earlier revealed in a report that the Russian Evil Corp cyber group has now switched to deploying LockBit ransomware.
So basically, Russian Evil Corp have obviously been doing loads and loads of ransomware, loads of cybercrime with the years.
Now, the reason they've switched to LockBit is because, thanks to Russia's reinvasion of Ukraine, the US has now said to victims of ransomware you can't pay Russia because it's under sanctions.
Well, never mind, we'll just hop on the LockBit bandwagon and that way people can still pay us and it won't be obvious that they're paying Russians." Total rebranding, exactly.
So this whole thing has been— the Mandiant hack seems to have been a diversion, a smokescreen for LockBit.
Who are basically now apparently part of the Russian, the REvil group hacking gang. So just smoke and mirrors, this.
I really think this whole thing of ransomware groups hacking and leaking data on these leak sites and, you know, doing timelines and countdowns, and frankly journalists covering that and getting involved in that, is murky territory indeed.
And this article just really, you know, illuminated that for me.
You know, you've got a claim that isn't substantiated and is actually more about the ransomware gang trying to protect their revenue stream than actually the story they were trying to put out to journalists and others.
Fascinating, really fascinating.
Evil Corp are obviously Russian, and as a result, Evil Corp have gone, oh, what can we do other than try and get people another way?
Couldn't America therefore say, new rule, everybody, you can't pay cybercriminals money wherever they might be in the world?
And then the cybercriminals will say, oh, well, unfortunately, we can't charge anyone any longer, we'll stop hitting Americans. Would that not be the logical next step?
I hate to piss on your chips, as they say up in Doncaster, but other people have been thinking along the same lines. And yes, the US, I think, is edging close to this.
The problem is, obviously, for the US government, their own entities, public sector organizations in the US, they can say you cannot pay a ransom.
And we sort of have the same thing in the UK. I don't think, for example, hospital trusts are allowed to or do pay ransoms — obviously, that would be bad headlines.
But to reach out to the private sector and say, OK, we're now going to make it illegal for you to pay these ransoms—
A, do you want to make those companies so that all their data's scrambled and they can't get it back? B, how do you enforce this? How do you police this?
So these sanctions type of measures are a way to do it by the back door.
So you're a private company, you've got your customers, they're gonna— yeah, that would suck. Very true.
This is the interesting thing about this whole sort of sanctioning Russia type thing is suddenly ransomware payments and the legitimacy thereof has suddenly come under a whole new spotlight.
Really, really super fascinating. And of course, then you've got ransomware gangs turning around and trying to obfuscate which ransomware gang you've got hit by.
So traditionally they had no problem saying, hey, you've been hit by Conti, you've been hit by Locky, whoever it was.
Now, I suspect there's going to be a sort of counter movement where you get hit by a ransomware gang, but they don't tell you who it is.
And you can't identify who it is because they don't want you to know it's Russian, because if it's Russian, you wouldn't be able to pay.
So I think that's going to be the new game in town, is lots of affiliates, lots of shadow identities for these ransomware gangs so that you can turn around to the government, US government, and say, hey, we had no idea we were paying Russia.
It was this other gang we didn't even know was Russian. So I think that's probably going to be the new game.
High school student unwittingly hacks into a military supercomputer while searching for new video games and leads the supercomputer to activate a grave national response to his simulation.
Played by Matthew Broderick when he accessed the computer system controlling the United States nuclear arsenal, mistaking the system for an interactive video game.
Do you remember who his girlfriend was? Who the actress was? I've never seen it.
Now, the movie's depiction of the dangers of the computer age, where even nuclear annihilation could be just a few keystrokes away, was not lost on policymakers.
According to one report cited by the DOJ, after viewing WarGames at Camp David, President Ronald Reagan asked advisors and their chair, Joint Chiefs of Staff, whether the plot of the movie was possible.
And apparently the CFAA, America's Computer Fraud and Abuse Act, is sometimes said to be the eventual result of that deliberation. Isn't that amazing?
I mean, really. Yes. Sorry. Bad gag, but a good one. There we are. That's a joke from the '70s.
So they all seem like pretty large camps. And here lieth the problemeth.
A bona fide security researcher looking for, for example, a vulnerability or looking for any wrongdoing may have to take some of these steps in order to be able to prove or disprove a hypothesis, right?
So kind of like you're going to go public with your findings, you want to be damn sure you're right.
And problem is you don't necessarily want to face a jail sentence if you're found guilty of breaking any of these laws.
And to compound the problem, the CFAA's legal lingo is a little wishy-washy in places. And that meant that circuit courts around the US could interpret the laws differently.
So it basically meant you would maybe go to jail in some states, and in others you get a slap on the wrist.
And it seems that these issues, among others, have been in part addressed in a recent redraft of the CFAA.
The DOJ recently announced that the US government is altering how vigorously it enforces a central cybercrime law by amending its charging policy.
Okay, this is all blah, blah, blah to say basically we're not going to go after good faith or ethical or security researchers.
What's your take on this?
It is very difficult because the prosecutors don't want to give security researchers that get out where it's like, oh, I was just doing research, and allowing hackers in through the back door.
So yeah, I applaud the motivation behind it, but applying these things is sometimes somewhat difficult.
And look, as a good security researcher, part of your job is to know where the law stops, what you're allowed to do. So yeah, it's tricky, it's interesting, that one.
He's speaking about these changes at the RSA cybersecurity conference, which I think is happening right now as we speak.
According to SC Magazine, discussion with the information security community did cause Bailey to realize that ethical hackers did have a legit beef with being pursued under the CFAA, but not by federal government.
So basically, this is saying, look, if you can prove that you're an ethical or good faith actor, we'll look the other way. But there's also a civil area in this.
And that means it allows for criminal prosecution as well of hackers who violate the law. Oh, that's interesting, right?
So the CFAA also allows private individuals and organizations to bring legal action against these same researchers.
So for example, if you took someone's username and password to go and expose a company for doing X, Y, or Z, they could say, well, look, you broke the terms and conditions.
So after the DOJ announced its policy, Andrew Crocker, an attorney with the EFF, said it was welcome but insufficient because it does nothing to lessen the risk of frivolous or overbroad CFAA civil litigation against security researchers, journalists, or innovators.
So this is basically investigative journalists and investigators generally trying to go after corruption and kleptocracy and that kind of thing, and the targets of those investigations turning around and suing them.
For libel, but also data protection as well. Increasingly, these SLAPP things are really interesting.
And this makes me think that, you know, if you're a security researcher trying to find out about a company and expose its wrongdoing or its vulnerabilities or problems, it's a similar sort of thing, isn't it, of using private prosecutions to try and shut down legitimate debate.
Doesn't mean there's not going to be a misstep, because of course this is policy, so there's nothing to say that a future administration might reverse it, right?
But I think it's a step in the right direction. Do you guys agree?
There was that chap who was being threatened by the governor of one particular state because he'd gone to a website and simply gone view source in order to look at the HTML of the web page.
And that was considered to be hacking.
I mean, look, wherever it ends up, having a debate about it is at least useful because you can have a discussion about it rather than just passing a law and seeing what happens.
Yeah, interesting. Really interesting. Smashing Security.
Snyk makes it easy for teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and infrastructure as code.
Supported by industry-leading application and security intelligence, Snyk puts security expertise in any developer's toolkit.
Get started right now with a free forever account at snyk.co/smashing. That's S-N-Y-K.co/smashing. And thanks to Snyk for supporting the show.
Bitwarden makes it easy to stay secure and for businesses to share logins with team members and departments.
Bitwarden is transparent and secure using end-to-end and zero-knowledge encryption with source code that can be scrutinized.
Now you can go to bitwarden.com/smashing and try it for free across devices as an individual user, or you can start a free trial of a Teams Enterprise plan.
And the thing I like about this?
A good password manager is robust and cost-effective, as it can radically improve your chances of staying safe online, all without requiring super high-tech expertise.
Go to bitwarden.com/smashing. Start your free password manager trial today.
Kolide is perfect for organizations that care deeply about compliance and security, but don't want to get there by locking down devices to the point where they become unusable.
So instead of frustrating your employees, Kolide educates them about security and device management while directing them to fix important problems.
Sign up today by visiting smashingsecurity.com/kolide that's smashingsecurity.com/kolide.
Enter your email when prompted, and you will receive a free Kolide goodie bag after your trial activates.
You can try Kolide with all of its features on an unlimited number of devices for free, no credit card required. Try it out at smashingsecurity.com/kolide.
That's smashingsecurity.com/k-o-l-i-d-e. And thanks to Kolide for supporting the show. And welcome back. Can you join us at our favorite part of the show?
The part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily. Better not be. Well, my pick of the week this week is not security related. Good.
A couple of weeks ago, Ncuti Gatwa was named the new Doctor Who. And I thought, I've never heard of him. Who on earth is he? Why have they given him the Doctor Who job?
And basically a couple of the teenagers decide to set up their own therapy for fellow students at the school with their sexual and relationship problems. It's quite funny.
It's really well written. Ncuti Gatwa's character is brilliant. He's a great actor. He's going to be a marvelous Doctor too. I've been watching Series 1 of Sex Education.
I think it's been going for a few years now. So I'm really— I'm way behind the curve. But I've really been enjoying it. And that is why it is my pick of the week.
And one I discovered the other day, which is definitely not suitable for work, is the account Forest Friends.
So it's forest as in normal spelling of forest, like the woods, and then friends, but instead of an I, it's a 1. So it's Forest Friends with a 1.
You know the Sylvanian Families toys, the little rabbity type things? Yeah, it's those.
It's cute pictures of little— I don't know if it is the actual Sylvanian Families, but they're little rabbity, cute little things.
It is roll-up funny. I'm not sure how long it's going to last. I presume maybe if it is Sylvanian Families, they'll try and shut it down or something.
But it is, it's a guilty pleasure. And it is, as I say, definitely not suitable for work. But they're roll-up funny, some— Oh yeah, they're spicy.
And all the cakes were in big volumes. So I went to this trusted site that I use all the time. It's called Inch Calculator.
And on here you have all the wonderful cooking calculators available. So you can change it from weights to volumes and different measuring stuff.
So anyone can figure out how to get around a recipe if you don't have the right measurements that they are saying.
Inch Calculator is just a bunch of math geeks that just love to create these calculators to make life easier for people, but then also explain the mathematical process. Right.
And they have it for everything. So they have like body shape calculators and dog chocolate toxicity calculators and tip calculators. It's like an amazing site.
So I think everyone will find something they like there. So inchcalculator.com is the site. It's been around for yonks and it just keeps growing and I think it's great.
And that is my pick of the week.
Let's mention it one more time. So for a free copy— the chance to win a free copy of The Lazarus Heist book.
All they have to do is email us at with the subject line Lazarus and explaining why they want a copy of Geoff's book, and we will pick one out of the hat and Geoff will sign the book to you as well.
Geoff, I'm sure lots of people would love to follow you online. What's the best way for folks to do that?
And don't forget, to ensure you never miss another episode, follow Smashing Security in your favorite podcast apps, such as Overcast, Spotify, and Apple Podcasts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 277 episodes, check out smashingsecurity.com.
Until next time, cheerio, bye-bye, bye-bye.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Geoff White – @geoffwhite247
Show notes:
- Double-double tracking: How Tim Hortons knows where you sleep, work and vacation — Financial Post.
- Report: Tim Hortons collected location data without consent — The Register.
- Joint investigation into location tracking by the Tim Hortons App — Office of the Privacy Commissioner of Canada.
- Mandiant: “No evidence” we were hacked by LockBit ransomware — Bleeping Computer.
- Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act — Dept of Justice.
- DOJ: Congress looked into CFAA updates but effort was stalled by extortion concerns — The Record.
- The (still) unanswered questions around the CFAA and ‘good faith’ security research — SC Magazine.
- Sex Education — Netflix.
- Forest fr1ends — Twitter.
- Inch Calculator.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
A password manager is an important tool for generating and saving secure credentials for every online account. Bitwarden makes it easy to stay secure and for businesses to share logins with team members and departments. Open source with published 3rd party security audits, Bitwarden is transparent and secure, utilizing end-to-end and zero knowledge encryption with source code that can be scrutinized by all.
Learn how Bitwarden can help you do business faster and more securely at bitwarden.com/smashing and start a free business plan trial today.
At Kolide, we believe the supposedly Average Person is the key to unlocking a new class of security detection, compliance, and threat remediation. So do the hundreds of organizations that send important security notifications to employees from Kolide’s Slack app.
Collectively, we know that organizations can dramatically lower the actual risks they will likely face with a structured, message-based approach. More importantly, they’ll be able to engage end-users to fix nuanced problems that can’t be automated.
Try Kolide Free for 14 Days; no credit card required.
Snyk is a developer security platform. Integrating directly into development tools, workflows, and automation pipelines, Snyk makes it easy for teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and infrastructure as code. Supported by industry-leading application and security intelligence, Snyk puts security expertise in any developer’s toolkit.
Get started right now, with a free forever account, at snyk.co/smashing
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

