
A self-proclaimed “super hacker” causes problems in the Magic Kingdom, criminals regret trusting Anom phones, and lawsuits are filed against TikTok.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Anna Brading.
Plus don’t miss our featured interview with Scott McCrady, the CEO of SolCyber Managed Security Services.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
An armful Ransomware, phishing, malware, darknet, LastPass, darknet, LastPass, darknet, LastPass, darknet, LastPass, Smartphones and TikTok Tragedies with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to Smashing Security, episode 283. Carole Theriault.
Now, coming up on today's show, Graham, what do you got?
He's the CEO of SoulCyber, and he talks quite frankly about cyber problems specific to small and medium-sized organizations. Very interesting stuff.
All this and much more coming up on this episode of Smashing Security.
There's so much that we share that it's time we're aware. It's a small world after all. Was that the Shatner version? I couldn't remember the tune at first.
It's a song that will strike fear into the hearts of many.
I've often woken up in the middle of the night in a cold sweat, having a Vietnam-style flashback to the time I found myself at EuroDisney, tormented by that tune.
Do you remember the bad experience I had, Carole, at Disneyland?
I thought, oh, we're going to sit in a little train or something and we go chug, chug, chug. And it'll be just a gentle funicular is what I imagined.
But then it careers inside the mountain in the dark, rollercoastering round upside down at high speed, and you don't know which direction to vomit in.
It is the most unpleasant experience ever.
For instance, one chap who has is someone who's possibly the greatest hacker turned biological weapons engineer that the world has ever seen.
I know he created COVID-19 because he posted a message on Instagram announcing that he was responsible for it. Yes, you remember this.
Despite being a biological weapons expert, he hasn't twigged that COVID-19 is called COVID-19 because it came out in 2019, rather than it being the 19th version.
Although Windows 3, you know, that didn't come out in 3 AD, so it's confusing sometimes, version numbering, isn't it? Companies can be inconsistent.
And he doesn't go into specifics as to how they were rude to him, but he got very upset.
And that is why he plans to release a brand new virus of the coronavirus pandemic, this is what he posted onto Instagram.
I'd tell you, look, it's probably not true because it's been posted on Facebook and Instagram. It's probably the reverse is true, whatever you're reading.
In this particular case, he posts those messages, including some rather racist and homophobic things, not from his own Facebook and Instagram accounts, but instead the official social media account of Disneyland.
What?
Now, it's very hard to know if David Doe or David Doo was really the person who did this. He claims his name is David Doe and David Doo, or David Doo. Probably not both, not Doo Doo.
I mean, it's not the normal behavior of a hacker to post his photograph as well as his name when he does this.
So we have to be a little bit suspicious as to whether he's really the one responsible for the defacement.
It may be an innocent party who he's naming here, but it does provide a potential clue worthy of investigation should law enforcement agencies be so inclined.
I mean, they're probably busy, right? They're probably investigating who created coronavirus or who hacked the Instagram account of Disneyland. You know, maybe the same team.
Maybe the same team are working on it. I don't know.
It's much more likely someone at Disneyland was sloppy with their password. Maybe they got phished. Maybe they used the same password as somewhere else.
Maybe they hadn't enabled multifactor authentication.
And Disney have now secured the accounts and they are conducting an investigation with their security team.
And you can imagine that Disney security team, they're going to be pretty shit hot, aren't they? Well, they probably aren't shit hot.
You can't use words like that on Disney, but they're going to be pretty tough. They're going to go in and try and get to the bottom of it.
So this can happen anywhere, even in the Magic Kingdom. Everyone needs to be on their guard for super hackers like David Doe or David Doo.
Maybe you need to order a hit on someone. Carole, anyone you're thinking of?
That's not going to cut the mustard, is it? So you know what you need?
It can be unlocked with a PIN, just like all our phones are. It has apps on it like Tinder, Instagram, Netflix. Except the apps don't work, and tapping on them does nothing.
So they're more like a sort of wallpaper covering over a secret door.
So if you reset the phone and you type in a different PIN, it opens up the secret door into a separate section of the phone with different apps, like a clock and a calculator.
And the calculator is another front, and opening up that app takes you to another login screen. It's very—
And XMPP works by having each contact use a handle that looks like a sort of email address.
But one of the contacts in the Anom phone, handily for the criminals, for you, Carole, for a customer support channel that you can use if you're having problems with your phone.
But another contact is one called Bot, which works like a ghost contact and hides itself from the user's contact list. So they wouldn't even know it was there. And Bot is sneaky.
It does things like copy users' messages along with any location information it can gather.
So in many cases, that was actually the precise GPS location of the device when it sent the message.
It just sort of hangs out and listens and then sends everything back to the FBI.
And the end-to-end encryption doesn't need to be broken because Bot is inside the walls sending the information back.
But last month the FBI announced hundreds of arrests as a result of the Anom phone, and said that they had intercepted 27 million messages from 11,800 devices.
So it's like big-time drug traffickers, and they seized a load of stuff like weapons, cash, drugs.
One of the drug deals apparently included smuggling cocaine in cans of tuna and hollowed-out pineapples. But other interesting things on the phone. So it allows for PIN scrambling.
So it rearranges the numbers. So it's much harder for someone watching you to work out what you're typing in, which I think all phones should have.
And there was a status bar at the top of the screen which had a shortcut to wipe your phone.
And you could also set a wipe code that you type in from the lock screen, which wipes the phone.
So when the police say, "Hey, what's your PIN?" You say the secret PIN code, and that wipes your phone.
So, I'm surprised they can do anything else but sit there on their phones.
Well, yes, because I suspect— I suspect we all imagine that it's always like, 'Have you got the hollowed-out pineapples?' or whatever.
You know, they're talking about the drugs deal or the smuggling.
For all those people annoyed that the Anom Phone was run by the FBI, here's the new FBI Phone or something. They'll just give it a different name.
And the suit revolves around the blackout challenge videos. Do you know anything about those?
So it'd be on a dark background, you'd have these little lights, a bit like a Christmas tree, basically. Oh, cool. Yeah, it was very cool.
And the suit highlights this For You page on TikTok, saying that it showed a stream of videos selected by an algorithm developed by TikTok that is based on a user's demographic, likes, and prior activity on the app.
So what's interesting is after one of the girls' death, the police looked at her device and told The Guardian that she did not commit suicide.
According to the lawsuit, a police officer showed the videos of the Blackout Challenge and said the girl had been watching the videos on repeat.
So, okay, so right now at this point, I would say to you, what does your brain say? Do you feel TikTok is responsible in some way or not responsible at all?
A 20-hour car ride on TikTok is difficult, isn't it? But then also, kids are so annoying in the car.
So quote, this disturbing challenge, which people seem to learn about from sources other than TikTok, long predates our platform and has never been a TikTok trend.
And it linked to a federal report about deaths from a choking game from 1995 to 2007.
Then they say, we remain vigilant in our commitment to user safety and would immediately remove related content if found.
Our deepest sympathies go out to the families for their tragic loss.
I just think, for God's sake, you know, really, I can't get into it.
Parents are worried about their kids being online all the time.
And in fact, there's a new social media bill that California is currently working on, and it's kind of interesting because of how it's going to approach social media giants.
So the bill is aimed solely at social media companies that make more than $100 million in the previous year.
And their argument is basically this, or one of their arguments certainly, is social media platforms earn substantially all of their revenue through ads.
And the more time users engage with the platform, the more ads the user sees, and the more valuable they become to the advertiser, right?
And ipso facto, addicted consumers are particularly profitable because of their consumption behavior.
For these profit-driven reasons, social media platform companies intentionally invent, design, and deploy features that are intended to make it hard for users to stop using the platform, which makes sense, right?
Let's segue to that a bit, because the Facebook Files basically said that Facebook was absolutely aware that it had a negative impact on teenage users of Instagram, and harmful content had been known to be pushed through Facebook algorithms reaching young users.
They were aware of that, and that included anorexia posts and self-harm photos.
There's one in Minnesota that would prevent platforms from using recommendation algorithms when it's targeting children.
And in the US Senate, there's a sweeping bill called the Kids Online Safety Act, which would require social media companies to create tools that allow parents to monitor screen time or turn off features like autoplay.
But I think that the US Senate bill seems to make it the parents' problem.
There's some social media sites, some video playing sites, YouTube for instance, there's a YouTube Kids, isn't there?
And YouTube just passed it through. And then they couldn't reclassify it.
It was really hard to reclassify it as not for kids, even though the developer was like, 'Hey guys, this is not for kids.' So, yeah, it's all difficult.
They compare it to tobacco companies giving parents nicotine patches to have them halt their kids' smoking.
So you might say, I would like to pay you $10 per month in order to access, I don't know, 20,000 videos or however many it is that you want.
So you buy that requirement and then once you hit that, in order to see more than however many videos, because TikTok, you can just swipe through them really quickly.
If you want to see more, then you're going to have to pay more and then you can control the addiction a bit. And I think that's a great idea.
Until you begin to think, well, hang on, what about people who don't have very much money and might feel like they're being excluded from social media and aren't able to get information because they cannot afford to pay?
I mean, we pay for our cell phone data, don't we? And we don't have a problem with that.
It's not like our cell phones are interrupted when we're on mid-call with an advert, or here are other similar phone calls you might have enjoyed.
Maybe you'd like to listen to other people's calls. There isn't anything like that. So you pay for however much data that you require.
So maybe something like that would be better, but how you'd enforce it and how you'd make sure there isn't some digital divide, meaning that people who don't have the funds can't participate, that's where it really gets problematical.
But ads generally, and what that causes these tech companies to do in terms of targeting, is really, really ugly.
And the answer to that question is they are a valuable but untapped audience. Right? So they're all over it because of money.
So in short, until there's legislation that can catch up with the social media kingpins who seem happy to make a buck, even if it's from a tween, parents might have to do their best to control the content flow, right?
Don't trust social media giants to do the right thing by you and more importantly your kids. No, because they're not going to do it unless they're forced. Just like Graham, right?
The Secure Developer is a conversational and insightful podcast that bridges the gap between dev and sec, hosted by Guy Pagani, one of the guys behind Snyk.
The Secure Developer is a security podcast that developers will enjoy listening to and learning from.
They've already released over 100 episodes, and I think many of you would like it too. So what are you waiting for?
Check out the Secure Developer podcast from Snyk at smashingsecurity.com/thesecuredeveloper. And thanks to Snyk for supporting the show.
Not only does Bitwarden offer enterprise-grade security, conducting regular third-party security audits, and is compliant with Privacy Shield, HIPAA, GDPR, CCPA, SOC 2, and SOC 3 security standards.
This is pretty slick stuff. You can get started with a free trial of a Teams or Enterprise plan at bitwarden.com/smashing.
Or you can try it for free across devices as an individual user. That's bitwarden.com/smashing. And massive thank you to Bitwarden for sponsoring the show.
They make managed security affordable and accessible to all small to medium-sized organizations. Check out SoulCyber's foundational coverage services.
They include ransomware assessment and training, advanced email protection, endpoint detection and response, Active Directory abuse prevention and lateral movement detection, and 24/7 security operations center capability.
As a SoulCyber foundational customer, you also get access to expedited cyber insurance coverage and discounts of up to 30% off your premiums.
Mention Smashing Security and you'll get 1 month free for every 12 months you subscribe to SoulCyber's foundational coverage services.
Visit smashingsecurity.com/solcyber to learn more. That's smashingsecurity.com/solcyber. And thanks to SoulCyber for sponsoring the show. And welcome back.
And you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny storybook that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. It doesn't have to be security related necessarily.
We've spoken about the trolley problem before on past podcasts.
You've got a young person on one track, grandmother on another. Are you gonna pull the lever or not? And it gives you this interesting moral dilemma as to whether you do things well.
Now, if you go to the link I've included in the show notes to a site about absurd trolley problems, it will give you a selection of trolley scenarios.
And they start off— It's animated, so you see the trolley coming down the track, and you're given the opportunity to pull the lever.
So for instance, it may be the trolley's heading towards 5 people. You can pull the lever to divert it to the other track, killing 1 person instead. What do you do?
And it collects statistics. Can I just—
You know, I'll kill 1 person rather than 5. You know, that sort of thing.
But then the questions get— as you go through, it then says, for instance, a trolley's heading towards 5 people, but on the other track is the original copy of the Mona Lisa, which will be destroyed.
What do you do, Carole? Carole, you're an artist. Imagine it is one of your works.
When it was 5 versus 4, I just thought, well, you know, I don't— if I do nothing, I don't have to take any sort of responsibility for it, because I could just turn the other way.
So I always try and find something interesting for pick of the week, especially since you criticised my TV programme choice once, Graham. I haven't got over that yet. Yeah, you did.
I think you said it was a rubbish choice. So yes, I thought I'd have a Google, see what I could find, and I found weirdorconfusing.com. So you can describe it.
So I've dropped it in the chat.
So, okay, so if I click on the link, weirdorconfusing.com, I'm taken to a webpage where it says, 'Sell me something weird or confusing.' And there's a little button, and it's going to take me to a random place to buy something weird or confusing.
Okay, so I'm clicking on it now. And I've been taken on eBay to a book which is called Crafting with Cat Hair: Cool Things You Can Make with the Hair of Cats.
And at this summer at the moment, cats are losing hair all over the place. Also, one for you, Graham, maybe: Subtle Butt.
Sorry, Graham, but it's— You know, we spent a lot of time working together. I just thought this might be handy for you. We— What?
Okay, he's got this YouTube channel and the playlist is called Unfinished London, and he does these short vignettes looking at London's kind of design eccentricities, right?
So videos focus on the unfinished Northern Tube line—why hasn't it been finished? What happened? Or unfinished motorways that just stop, or why does London have so many airports?
He puts tons of work in these, right? They're scripted, punchy, funny, kind of a bit silly as well, but also informative.
I think it's something you could watch with your kid, Graham. Actually, I think he'd find it really good and he'd learn some stuff.
And he does loads of on-site videoing, and he also sources loads of historical visual content to underpin his essay. For example, there's one on why London has so many airports.
It has 6 airports, has more than any other city in the world, apparently.
Yeah, and you know, it's—but isn't it basically to trick Americans into thinking they're flying into London? In fact, no, no, no, you've got another 3 hours to get into London.
And he says there was even a suggestion of an aerodrome in the middle of London on top of King's Cross Station, right?
It would have 6 runways facing in all directions with planes taxiing around the edge like hamsters on a wheel.
And the idea behind it was everyone could commute to central London by plane. So, all kinds of funny, wacky things to learn. Wow.
And there are 13 of these videos currently on this playlist.
And it could be a very entertaining night in for someone who wanted to learn a bit more about London's planning and failures. I like this.
Check it out. So listeners, today we are speaking with Scott McCready. He is the CEO of SoulCyber, a managed security service. So Scott, let's start with you.
What can you tell us about you and how you became the CEO of SoulCyber?
So I was deploying networks and security devices, and I actually ended up spending a bunch of time overseas in London deploying security equipment way back in the early days.
And what they realized was the security devices generated a lot of information and the traditional sort of network operations center didn't have anything to process that.
And so the very first MSSP built was built out of the US in the DC area.
And having tried to get analytics going around these security devices, I got hired by them as a young guy, and that started my managed security services career about 20 years ago.
And through that time, I built out businesses in Europe, businesses in Asia, and then obviously I ran at one of the largest global MSSPs for a period of time as well.
So it's, it's been in the DNA for a while, I guess.
That could be either from a service provider, their telco, or an MSP, a local provider that does break-fix, maybe ships laptops, deploys Gold Images, but there is usually a gap around the high-end 24/7 security analytics.
And so if you deploy even some basic security technologies, somebody has to gather the data that's being created by these technologies, right?
And you want to look at it and analyze it and then hopefully be able to detect when a bad guy is doing something so you can find them and you can stop them.
And that's a very traditional model. There are some gaps in that model, which we'll talk about why SoulCyber's here.
But yeah, you go out and buy— the customer goes out and buys a bunch of security technology.
Once they do all that, they deploy it, then an MSSP will monitor it, and they'll let the customer know when something bad's happening.
And the way I describe it was, I just felt like security, especially for the small medium enterprises, was stuck in the 1990s or the 2000s.
And what I mean by that is, imagine that you wanted on-demand video entertainment, right?
Well, the security model today is sort of like movies from 15, 20 years ago, you'd have to go out and buy 500 DVDs, you'd have to buy a storage network, you would have to buy a computer, you'd have to buy software, you have to buy TV, you have to buy cables, you'd have to string it all together, then you have to take your DVDs and put them onto your hardware.
And then you'd sort of have on-demand video. And then two years later, Blu-rays would come out. You'd have to literally upgrade everything because there's more storage, more space.
That's right. That is literally what we do in security. We tell a company, weave your way through the 3,500 vendors out there. You can consider those your DVDs.
Find the stuff that's interesting to you. Yeah. Build it all, deploy it all. Yeah. And once you're done, wrap a managed security service around it.
And we were like, that just doesn't work very well for mid-market companies. Sure, if you're Bank of America and you've got the tech stack and the people and the time, why not?
So our view was, we just sort of need to bring a security outcome into the 2020s, right?
And so we call it sort of the Netflix of security or your favorite streaming service of security, insomuch that what you get from SoulCyber is you get, just like Netflix, you get everything.
You get all the best top-tier security products, you get it all deployed. You get all monitored, you get it analyzed.
If we detect something bad happening, we'll respond to it for you. And we package that all up in a subscription model. That's just a monthly fee.
There's no install fee, there's no upfront fees. It's just a monthly fee for customers. And so that's really the goal here.
In the same way that Netflix didn't build their content originally, they went out and got, you know, let's go and get some Star Wars, some action, let's get some comedy, right?
Yeah. In the same way, we use best of breed technology.
So the things we use are literally Gartner Magic Quadrant technologies, but we just pull it all together into a seamless solution that gets you an outcome of amazing security.
And that concept seems to really resonate with customers.
But if we're talking about your target market, which is the small to medium-sized business, they don't even necessarily have strong security, you know, knowledge within the firm, let alone, you know, know where to look.
So I really appreciate that point of yours of, you know, having to go out and hunt down the best thing when you're not an expert in the area. It's really frustrating, I imagine.
So if you just take one piece, which is, let's just call it endpoint, there's dozens of endpoint providers.
So a standard model for these midsize organizations would be to do a proof of concept amongst at least 3 that they whittle down from usually 10.
That process for most of these organizations is a 6 to 12 month process to actually get it, you know, go through, do your research, get POC contracts set up, get it deployed.
You have to deploy them independently. So even if they have the security expertise, just the time and the effort is not usually something they want to spend.
They've got a job of trying to be nimble and be fast to make sure their product that they're competing with on a very competitive market is working, right?
And customers are buying it. And so this spending tons of time trying to get your security working is very difficult.
And Carole, one of the other things, this is also really applicable to the mid-market when it comes to cyber insurance.
And so cyber insurance is really a challenge for the mid-market on two aspects.
It's very time-consuming to get cyber insurance, and there's about a 1 in 3 response rate that's negative, that they get denied.
And then two, prices are going up about 50% year on year. And so because of the fact that we pull everything into an outcome, the insurance companies love it.
And so as far as I know, we're the first company in the US anyway, that has a partnership with the insurance industry, where if you're using what we call our foundational coverage, you get pre-approved for your cyber insurance coverage, and you get a 30% discount on the cyber insurance price.
Wow. And the reason is, is they go, well, we know the stuff that we're doing is really top-tier level security, and it's all in one package.
So instead of having to recommend maybe 8 different pieces of technology, you can just use Swole Cyber's foundational coverage, and that's good, and we'll recognize that security effort that you're putting in as a customer, and we'll reward you with making this process easy and making your renewals or your new policy much, much more cost effective.
They recognize is that the threats against them have changed and that it's not uncommon anymore. Ransomware hits about 1 in 3 customers in the mid-market.
So you're, every year you're playing dice with the fact that, you know, this may be your year, right?
So the assumption is if you're not doing the right things around security, you're going to get a breach within the next, you know, 24 to 36 months.
Sure.
So our website has a ridiculous amount of information about what we do, including our pricing. Our pricing is just right out front.
In the same way you wouldn't go to Netflix and say, well, I have to call a salesperson to figure out how much they're going to charge my family, you know, that's silly in today's world.
So our pricing is literally listed on our website. There's contact sales listed on the website. You don't even have to work through sales teams. You can actually do things online.
So we try to make it really simple. So one of the things that is not common in the managed security services space is what I call the business side.
So if you sign, you have to sign a contract, and then that contract gets put in the email or in your contract storage.
And of course, mid-market companies, they're ah, you know, tracking contracts often is in email and places that.
And so what we do is we just take all the information, stick it on the portal.
So you say, well, this is how much you're spending per month, and these are the services you purchased. And if you want more or less, you just click a button.
And so the easiest thing is to pop onto the website. You can check the pricing.
We describe what we do out there, and we're happy to have somebody contact you and walk you through the basics.
A lot of times it's a daunting thing to try to get your security program in place, and we do a lot of consulting just to make customers understand what's happening out in the world.
If there's anyone listening that's just "I need to get this problem taken care of," give us a call, contact us. We're incredibly non-pushy from a sales standpoint.
We try to be really helpful. Again, a lot of our information's on the website, and we can have this problem done and dusted for you in 14 to 30 days.
We get a lot of customers that are "Wow, Scott, I've had this on my plate for 6 months." I know I needed to take care of it.
It was just, I was building out these frameworks and walking through my plan.
And then when they found us, they just, you know, we just worked together and they were up and running in 2 weeks to 4 weeks.
And they're "and it's done." Now they have a good security program in place.
I mean, we're talking security awareness, phishing simulation, really a proper, fantastic ability to get you to some amazing security.
And then on top of that, if you're struggling with cyber insurance, ransomware insurance, if it's getting really expensive, or if you're getting, you know, your application rejected, we can really help with that as well.
If you are a small to medium-sized business and you think you need a little tune-up, or you're excited by anything you heard here, please go to smashingsecurity.com/solcyber.
That's smashingsecurity.com/solcyber, S-O-L-C-Y-B-E-R. And Scott McCrady, CEO of SolCyber, thank you so much for talking to us today.
What's the best way for folks to do that?
And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Google Podcasts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 282 episodes, check out smashingsecurity.com.
I don't know if it's old, Quick Draw with Google, but you draw and then it guesses. But I think it's quite—
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Anna Brading – @annabrading
Show notes:
- Official Disneyland Instagram Account Hacked This Morning! — The Disney blog.
- Disneyland social media accounts hacked, offensive messages posted — Hot for Security.
- We Got the Phone the FBI Secretly Sold to Criminals — Vice.
- Parents Sue TikTok, Saying Children Died After Viewing ‘Blackout Challenge’ — The New York Times.
- Lawmakers Want Social Media Companies to Stop Getting Kids Hooked — Wired.
- How Social Media Tricks Us Into Thinking We Are Paying Attention — Forbes.
- Facebook could be sued for addicting children under California bill — Ars Technica.
- Kids Are Using Social Media More Than Ever, Study Finds — New York Times.
- 2021 Facebook leak — Wikipedia.
- California Parents Could Soon Sue for Social Media Addiction — Gizmodo.
- Absurd Trolley Problems.
- Weird or Confusing.
- Google Quick, Draw!
- Unfinished London — Jay Foreman on YouTube.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Sponsored by:
- Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
- The Secure Developer – A conversational and insightful podcast, that bridges the gap between dev and sec, from Snyk.
- SolCyber – SolCyber delivers Fortune 500 level cybersecurity for small and medium-sized enterprises. If the bad guys aren’t being discriminating about who they’re attacking, how can you settle for anything less?
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.
