
We’re back from our summer break as we ask how did a cryptomining campaign stay unspotted for years, quiz special guest and infosec rockstar Mikko Hyppönen about his book, and ponder what spiders teach us about misinformation.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Lost in Translation, Spiders, and Slapping Tortillas with Carole Theriault and Graham Cluley.
And we're gonna chat all about that during your section, aren't we today, Mikko?
Coming up on today's show, Graham, what do you got?
I found that Finns, they aren't ever in a very bad mood. They're "kuunpirsasin ammutukahu." Yeah, it's like a bear shot in the ass. Is that right?
All of these wonderful— Finns don't apparently get big-headed. They have piss coming up their head. Is that right? Nussekkusipahan?
But Mikko, I've never failed to be impressed by people who speak another language fluently. You're at all impressed with me?
When we tell someone to get the hell out of here, we simply tell them to ski to a—
Google Translate is amazing. It's been around since 2006. We probably all take it for granted by now. It's been around over 15 years.
Hundreds of millions of people are using it all of the time. It's not perfect, of course. Sometimes it struggles with some language combinations.
I see that it's still not handling Klingon, for instance.
Well, I say not so many years ago, 2009. In the before times.
And just like Google, you know, people were suspicious of Google because they give you all these free tools, but of course they're really data mining you and finding out what you're up to and learning all about you.
'Cause we looked at—we analysed the data for where the Klingon antivirus was being downloaded.
Well, the boffins at Check Point have just released some research about some malware they've discovered just recently called NitroCod. What do you—
But NitroCod is apparently a crypto mining— yes, people are still crypto mining— a crypto mining malware campaign which has infected computers in at least 11 countries.
They reckon thousands of computers may have been infected.
And what's interesting about it is that NitroCod has been distributed for years without anyone noticing on free software download sites.
And these weren't download sites you'd never heard of at some dodgy domain.com, places like Softpedia, which is a fairly, you know, well-established place where millions and millions of downloads are happening every day.
And so NitroCod was being downloaded, posing as tools with names like Google Translate Desktop.
And the blurb for this download says that it's the desktop version of the free Google Translate online service that we all know and love. Says that it's 100% clean.
Maybe you're in the European Union, you've visited Europe, and your country has left the European Union, and so data plans are now very, very expensive when you go overseas.
And so you think, I'm turning off my bloody internet while I'm over there.
But you want to translate, you know, 'avez-vous' and 'baguette' or whatever it is into— Well, that was actually in French, wasn't it?
But the weird thing is this: this desktop app actually works. The way in which it works is it runs a Chromium browser inside an app. So it takes you to— What?
Have you noticed there are quite a lot of these so-called apps which actually run a web browser inside a sort of frame. No. Have you not seen this?
People use Gmail, but— and people want the Gmail user experience, but they'd like it in an app for their particular flavour of computer.
And so you install this app and then you find out, hang on a minute, this is so much like Gmail. Oh, it actually is Gmail.
What they've done is they've put a Chromium browser inside the app, which is going to Gmail. What is the bloody point of this? I don't know.
So you still need an internet connection for the darn thing to work. So not really as useful as you might imagine. Quite pointless, really.
And of course, some people choose to download it because they think that's what they really need and it's free. And surprise, surprise, these particular desktop apps are malicious.
They don't really come from Google, of course.
And even though they do translate your words because they're just running Google Translate in a browser inside an app, what they're doing is something rather fishy underneath, which is that after 4 weeks or so of you running it, something like a month after you first install it, it is actually beginning to do the crypto mining.
It's beginning to mine for cryptocurrency in the background, using up your Windows computer's resources.
Chugging away while you're trying to translate, "My hovercraft is full of eels." Thank God you're here, Mikko.
And so the antivirus research labs, the people who are analyzing the malware or the automated systems which are analyzing files, trying to determine whether it's something malicious, Well, they're not running for a month.
They're not doing multiple restarts of the device. They're not going to that extent to see if anything strange ever happens.
I thought crypto mining was sort of a bit 2018.
But if there's money to be made, someone's going to try to make it.
And it's also looking for known virtual machine processes to see if someone's trying to analyze what it does inside of sort of secure bubble.
It's also looking for security products if they're on the computer, because if they are, it thinks, oh, I don't want anything behavioral picking up what I'm doing.
And then it will just simply exploit. But according to Check Point, this has allowed this campaign to successfully operate under the radar for years, and it's been unnoticed.
This Turkish developer, they say, NitroCod, has been popping it out.
I mean, of course, they might notice that, you know, my fan is going crazy on my laptop and my machine is really hot, but they don't really realize what's going on and which app it might be because they didn't install anything recently.
If they installed something a month ago, they're gonna forget all about it.
A piece of malware could do a lookup at a local weather site or something.
And it just reminded me of something I learned last week, which is that Google Chrome, the web browser, actually has a full-blown antivirus program built in.
Oh, yes, it's the Chrome Cleanup, which you can actually access from the address bar by typing in chrome://settings/cleanup, and then it will scan your computer and find malicious programs and clean them up.
Apparently they licensed this from ESET, so it is a real full-blown antivirus product.
Our programs have become so huge, you can just throw in an additional antivirus and no one's going to notice.
Maybe they could claim it's anti-competitive. I don't know.
It was released in early August by Wiley globally in a language all of the listeners can understand, which is English.
I did write the book originally in Finnish, and it came out here in Finland already last year, but now it's published by Wiley, and it's called "If It's Smart, It's Vulnerable." And that wasn't the original title either.
The original name for the book here in Finland was simply "Internet," because surprisingly, nobody had written a book called "Internet" before, so I did.
And I did get a couple of funny-looking screenshots from people who were downloading ebook version of my book, which simply says downloading internet. Please wait.
Anyway, we had to change the title, not just because maybe of the reasons you mentioned, but my international publisher didn't the title.
We went through tons of different English titles. Finally, Wiley simply told me that, hold on, Mikko, there's a law named after you, the Hyppönen Law.
We should use that as the book title.
It wasn't a law that was like, yeah, you're a murderer and we need— It wasn't throttling people with a ponytail or some sort of thing like that? No.
There's plenty of people called Mikko Hypponen, including a convicted murderer.
Can you give us an outline for our listeners that haven't, you know...
How is that a problem for security? What could we be doing about it? However, it's not just about that.
It's actually a combination of the things that I think I've learned over the last 31 years.
So there's lots of topics covered— malware evolution, organized cybercrime gangs, online espionage, cyberwar, future of information security, and then tons of stories because I know people like stories and I've collected the best stories from my career.
And you could actually— didn't you do a TED Talk once?
Yeah, actually, this book project started after I did my TED Talk in 2011 because I was back then contacted by multiple publishers and they were all telling me that, you know, you should write a book, write a book, we'll publish it for you.
All TED speakers publish a book. You should do a book, Mikko.
And I tried for all this time, I tried, but with the travel rate I've been sustaining for the last 10 years, it wasn't going anywhere.
So it did really take a pandemic for me to finish this project.
Maybe when it comes to things like— Well, you talked about Mikko's Law, which is that if it's smart, it's vulnerable.
When it comes to IoT devices, what are some of the maddest things you've heard about there?
Before that, all denial of service botnets were being built from infected computers, and now these attackers were going after something else than computers.
And we were fingerprinting infected devices and we found all kinds of weird things, including heat pumps. So these things people keep in their houses for AC and for heating.
And while doing IP range scanning, we found infected heat pumps from this one company. And we actually were able to identify the company.
So I called them up and I ended up speaking with this—
Nevertheless, I explained to them that, you know, there's this massively large outbreak going around, they've built this botnet, which is right now launching an attack against the root DNS servers of the internet.
So the whole internet has been slowed down because of this attack. And one of the nodes which is doing the attack is the heat pump in your office.
And they were like, oh, well, interesting. And they were like, well, it works fine. They're not going to do anything about it.
Like, why would we care as long as it works and pumps heat, why do I care? And that's when I realized that these kind of problems will not be fixed by the end users.
It has to be fixed by the manufacturers.
Have you been able to work with law enforcement to catch people? Do you talk about that in the book?
I've been involved in multiple cases where we've tracked down people, at least, we believe the right persons behind various different cases.
Then we worked with the law enforcement, and of course we can't arrest people. We're just company, you know, we're civilians.
But there have been arrests and convictions based on the work we've done, and I cover some of those cases in the book. And that is very rewarding.
But then again, I've also learned through these years that when you work with law enforcement with cases like this, it is a very one-way road.
I mean, they're very happy to accept information and evidence and logs and things, but then they don't really tell you what they're doing until something like an arrest happens.
If you know who's behind an attack and maybe the law enforcement in that particular country are turning a blind eye, or maybe the process is taking far, far too long, have you ever thought, you know, there should be another way of dealing with this?
It's, we're not really giving the kind of sentences that we should be giving if we really would like to show the example to potential new online criminals that crime doesn't pay.
Then they get caught again, they get sentenced again.
And me, as not an expert of law, I would always assume that if you are already sitting a probation sentence and you get caught again, now you're going to go to jail.
Turns out that's not the case. There's been multiple cases where they get found again and sentenced again, and they're still not going to jail.
And that's not really giving any kind of an example for potential newcomers. So yeah.
It's the customer whose data has been stolen or computer has been infected from through some provider that they're using. And it can be difficult, right?
Like no one's there to save you.
So there's plenty of young people seeing these criminal hackers as their heroes.
Like these guys are driving around in Rolls-Royces and Lambos and, you know, they want to do the same. And that's not what we want to see happening.
Sometimes what we've seen is cybercriminals who've become so notorious that they actually have a bit of a public image and they can then be the bad boys and they can start a career maybe as a security consultant or maybe as, dare I say, a TED speaker or a public speaker or something like that.
So people— Yes, I know people who end up, they go from the criminal world to the good world, but they're almost trading on their past crimes. What do you think about that?
Do you think, I mean, it's better than them carrying on committing crimes, I suppose, Does it leave a bad taste in the mouth?
That's why we want to rehabilitate all kinds of criminals, including cybercriminals.
So I might not be interested in hiring people with a criminal record, but if they can turn their past into a future career, I'm not really going to hold that against them.
Because I'm sure some of our listeners might pale at the thought of a spider. And if that's the case, skip forward about 12 minutes to the Pick of the Week section.
So let's start with you, Mikko. What's your relationship with spiders?
And is it different from anyone else in your household?
I think my attitude changed a couple of years ago when I saw a photo special in some magazine or newspaper where they had close-ups of spiders and their faces, because spiders have faces and they look...
they look friendly. They don't look scary at all.
About 10 years ago, a friend, we were still at work and a colleague called us in a panic because they wanted to have a barbecue, but they had a great massive huge spider that made the barbecue lid its home.
And apparently when she tells people she's an arachnologist, she often gets told the story about how that one time the spider bit me. And the thing is, Dr.
Scott told Annette, if you don't see a crushed up spider near you or you don't see one on your body, it's very likely the bite mark came from something else because there's an estimated 50,000 known species of spiders in the world and only a very few can hurt humans.
And it turns out that these fears and misunderstandings about our eight-legged friends are reflected in the news, which is probably why we have such fears of them.
And this is from 81 countries in 40 different languages. And the idea was whether or not the article had a factual error or emotionally fraught language.
And the aim was to find out how much misinformation about spiders was actually spreading and what could that tell us about our world today, which feels inundated with misinformation.
So what percentage of articles of this 5,000 they looked at do you think they rated as sensationalistic?
But it's just— so what you've said is they were analyzing stories to find out which of them were sensational, which had a factual error or something like that.
I can just imagine some spider nerd saying, oh, they've called it Arachnus minuscus, and in fact it's Arachnus moroscus. You know, it's a lovely outside, lovely outside.
I thought that when I was reading actually the stuff, because at one point they said they called it an insect and actually it was a rat. So that does happen.
And it's just, of course they're going to be sensational because they're trying to sell newspapers. So you will cyber attack, you know, rather than a cyber infection.
And sometimes you have to use a little— you don't want to be completely and utterly dull and academic. And similarly, some of the details—
I'm just saying that I suspect the spider industry, the spider academic world, is probably similar to the cybersecurity world in being a little bit nerdy and precious about some of this.
Would you say that saying killer is actually he has killed something before 'cause he has to eat?
So 50% of them almost were either rated sensationalistic because they had words nightmare, terror, nasty devil killer, that kind of thing.
And these would often start at a very regional level, where the story would then be amplified by national and then international news outlets.
And I think we can attest to that, because when I used to work for a news blog, we would be looking around for a brand new angle or weird way to explain something.
And we found something in Kathmandu that happened to someone that was related to our news blog, we would have probably tried to report it and say, you know.
Now according to misinformation scientists, this is a defining characteristic of modern misinformation, the magnification of small errors that support a certain narrative.
So basically what we used to call Chinese whispers. That sounds terribly inappropriate now.
But you know that idea that as you tell someone and then they tell someone and they tell someone, the story morphs into something completely new.
Now Mikko, this is fascinating for both you and Graham because the coverage of spiders differed wildly by country, or widely and wildly by country.
In the US, we'll start there where spider coverage was mixed, right? So there was publications with an international or national audience.
They were more likely to sensationalize spider news than the regional ones. Okay, in the US.
Australia, the home to more dangerous spiders than almost any other country in the entire world, publications were consistently accurate, rarely charged with emotion.
So again, to quote the New York Times about speaking about the UK, they have had to close schools many times because of reports of this false black widow, Dr.
Mamola said, noting that black widows are almost never found in Britain or confused notably with the false widow, which has much less venomous bite.
And there were cases of people burning down their houses because of spiders.
Because misinformation land versus, you know, proper information, or our media maybe.
So someone, Javin West, an information scientist at the University of Washington, sees parallels between this, you know, spread of sensationalized spider news and the circulation of misinformation in the 2020 American election.
So it makes sense to us, right? So tiny little news stories get kind of magnified.
And studies show that people often trust their local publications more than national ones because it tells you about recent relevant events in your community.
But as that information goes national, factual errors end up adding to a narrative of misinformation because you want to add sensationalism, as you were arguing earlier, right?
Because you want clicks, you want people to read your article. So what do you do? Do you have any advice on how to avoid falling in a trap of misinformation?
If it says, "Killer guinea pig rampages across London," you instantly think, "No, that's probably not true." Or man dies after being bitten by guinea pig. Probably not true, right?
Or radioactive guinea pig attacks nuclear power station. It's again, not true. So that would be my suggestion.
But of course, the real advice regarding misinformation and fake news and all of that is to double-check the news, check the sources, make a Google search, don't believe everything by first sighting.
And I'm glad to tell you that in my experience, the younger generation is much better to be suspicious of news which might not be true.
When the internet came around, it was the parents warning their children not to believe everything you read online.
Now it seems to be the other way around, and it's the parents who fall for every single goddamn conspiracy theory.
And the password manager we're recommending is Bitwarden.
Millions of users around the world, including many of the world's largest organizations, trust Bitwarden to protect their online information using a transparent, open-source approach to password management.
You can effortlessly manage all your passwords and logins backed by end-to-end 256-bit encryption.
And for the enterprises out there, Bitwarden recently added SCIM support, making it even easier to provision and manage users.
For password security you can trust, get started today with Bitwarden. Learn more at bitwarden.com/smashing.
Take security of your passwords and logins more seriously by visiting bitwarden.com/smashing. And thanks to Bitwarden, they're great folks for supporting the show.
Gigamon is the leading deep observability company.
It offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools, enabling companies to conquer blind spots and overcome the threat of today's sophisticated ransomware attacks.
Gigamon's latest report into the state of ransomware reveals how insider threats are evolving, what impact cyber insurance and blame culture are having on the cybersecurity industry, and why deep observability is the new frontier for tackling the ransomware crisis.
So what are you waiting for? Download the report today at www.gigamon.com/smashing. That's www.gigamon.com/smashing. And thanks to Gigamon for supporting the show.
Kolide sends employees important, timely, and relevant security recommendations for their Linux, Mac, and Windows devices right inside Slack.
Kolide is perfect for organizations that care deeply about compliance and security, but don't want to get there by locking down devices to the point where they become unusable.
So instead of frustrating your employees, Kolide educates them about security and device management while directing them to fix important problems.
Sign up today by visiting smashingsecurity.com/kolide. That's smashingsecurity.com/kolide. K-o-l-i-d-e.
Enter your email when prompted, and you will receive a free Kolide goodie bag after your trial activates.
You can try Kolide with all of its features on an unlimited number of devices for free, no credit card required. Try it out at smashingsecurity.com/kolide.
That's smashingsecurity.com/k-o-l-i-d-e. And thanks to Kolide for supporting the show. And welcome back. Can you join us at our favorite part of the show?
The part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily.
What it is, is I was out. I popped round to a friend's house the other evening, and I was chatting to some other people there I hadn't met before.
And they were telling me about a party game that they'd played.
Or maybe some listeners have already tried this.
Get yourself some tortilla wraps and a quantity of water. And what you do is you fill up your mouth with water, right? So your mouth is full of water, right? Imagine that.
I can't speak while my mouth is actually full of water, so I'm asking you to use your imagination at this point.
And then you take a tortilla wrap and you put it in your hand, and you play with the other hand, you play rock-paper-scissors.
So, you know, rock, rock, rock, scissors, or whatever, you know. And whichever one beats the other one— you know how rock-paper-scissors works.
That, ladies and gentlemen, is what the middle classes are playing in England today. And I thought I would share that with the world.
Have you got tortilla wraps at your place? Mikko, would you play this?
So that's B-Sides Las Vegas, then Black Hat and then DEF CON. And that's like a week in Vegas.
My favorite place to hang out in Vegas is Pinball Hall of Fame, which has 400 pinballs.
I'm a big pinball fan and they've moved, they actually built a whole new facility on the Strip.
So it's actually now close, it's actually walkable from the Mandalay Bay Hotel, which is where the Black Hat is held nowadays.
In fact, my step counter for the first day of DEF CON told me I did 16 kilometers of walking, which was just going back and forth between the different hotels.
So it's quite crazy how big it is. But nevertheless, Pinball Hall of Fame is walkable from Mandalay Bay, that's what all that mattered to me.
Now, my pick of the week isn't going to be Pinball Hall of Fame. It's going to be a DEF CON movie, a movie called DEF CON: The Documentary. Let me read the description from here.
DEF CON is the world's largest hacking conference held in Las Vegas. In 2012, it was held for the 20th time.
The conference has strict no-filming policies, but for DEF CON 20, a documentary crew was allowed full access to the event.
The film follows the 4 days of the conference, the events, and the people, and covers the history and philosophy behind DEF CON.
So that was 10 years ago, and I spent the return flight from Vegas watching this film, and it's great.
It's almost 2 hours going through the history and how DEF CON works, and it interviews everybody who's involved.
Obviously, Geoff Moss, who founded DEF CON, Geoff who wrote the foreword for my book, is of course very much in there.
And this whole project was organized by Jason Scott, which some of you and some of the listeners would know from his work at the Internet Archive, which is the place where you can download this documentary for free.
We'll have a link in the show notes.
And earlier this year, I was part of Oxford Art Weeks and sold some paintings, and that was exciting.
And largely because many of you sent me words of support and encouragement, I thought, screw it, I'm going to enter a few paintings into the Oxford Art Society Open Exhibition.
And one of them got selected, and it was a super big honor. And Graham, you even came, didn't you?
It was so great seeing your art up there on the wall.
And I was very, very impressed by the selection of art which are up there, and very proud as well to see one of your paintings. It was tremendous.
And even better is the first time in 4 years my parents are visiting me in the UK and they're going to get to see the painting of her photo in the show, and she doesn't know yet.
But I would suggest also, and I'll put this in the show notes, the Oxford Art Society has the whole exhibition online.
I wouldn't say it's a super slick user experience, but you can totally see all the art that's there, and you can even buy.
And if you're in Oxford, get your butt down to SJE on Iffley Road and go see more than 200 paintings of Oxford artists. And it's really—caliber's high. It's quite cool.
Your choice.
And maybe, Mikko, if we get a winner, you'll want to send them one of your books as well.
Mikko, I'm sure lots of our listeners would love to follow you online, find out more about your book. What's the best way for folks to do that?
So find us up there and don't forget to ensure that you never miss another episode.
Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Google Podcasts.
It's thanks to them all this show is free.
If you want to see episode show notes, sponsorship information, guest list, and the entire back catalog of more than 286 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Mikko Hyppönen – @mikko
Show notes:
- The 20 Funniest Finnish Expressions (and How To Use Them) – Matador Network.
- Sophos punts anti-virus for Klingon – The Register.
- Helsinki named Klingon-speaking capital of the world – Naked Security.
- Check Point Research detects Crypto Miner malware disguised as Google translate desktop and other legitimate applications – Check Point Research.
- If It’s Smart It’s Vulnerable – Book by Mikko Hyppönen.
- Psychological inoculation improves resilience against misinformation on social media -Science Advances.
- Let’s flatten the infodemic curve – WHO.
- The global spread of misinformation on spiders – Current Biology.
- A Journey Into Misinformation on Social Media – The New York Times.
- Google Looks to Vaccination to Combat Misinformation In Searches – The New York Times.
- Spiders Are Caught in a Global Web of Misinformation – The New York Times.
- DEF CON: The Documentary.
- Smashing Security Painting competition – Carole.wtf.
- Open Exhibition, Summer 2022 – Oxford Art Society.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
- Gigamon – Gigamon is the leading deep observability company. Download their latest report into the state of ransomware to learn why deep observability is the new frontier for tackling the ransomware crisis.
- Kolide – the SaaS app that sends employees important, timely, and relevant security recommendations concerning their Mac, Windows, and Linux devices, right inside Slack.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.