
Australia’s signal intelligence agency calls upon an Eighties popstar to fight terrorism, and a simple act of kindness leads to a woman being scammed for thousands.
All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
Plus don’t miss our featured interview with Max Power of Bitwarden.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
And Canada's seeking international aid because the fires are raging.
Now, coming up on today's show, Graham, what do you got?
Yes, that's his real name, of Bitwarden, who introduces us to Bitwarden's Secrets Manager. All this and much more coming up on this episode of Smashing Security.
I enjoy their company.
But I was reminded of my love for the older lady when I was watching a documentary, a documentary which has come out in Australia called Breaking the Code: Cyber Secrets Revealed.
At the same time, the ASD in Australia in some sort of hot garage, the Garage Girls, as they were called, were working round the clock to crack Japanese messages during World War II.
And there are these old biddies, lovely ladies, who are telling tales of what they got up to, and it is covered in this programme.
The ASD, rather like Bletchley Park, eventually became GCHQ.
So, in the decades since, obviously, the ASD has been working a lot on military situations, and since September 11th, of course, it's been very much focused on the fight against terror.
That's been an additional thing for them to worry about, and they've been looking to invent ways to disrupt terrorist activity. And that's what the documentary is all about.
It's all about the ASD and what it gets up to.
Now, it doesn't really cover anything super dodgy the ASD might be doing against Australian citizens, or what, you know, it is in some ways.
This programme is all about sorting out Johnny Foreigner and keeping an eye on them and any terrorists and any baddies. And anyone who might cause Australia any trouble.
So they go through a number of cases which the ASD has worked on over the years, which haven't previously been made public. I found this really interesting, this talk.
It's a 1-hour-long documentary, and I thought I'd just tell you a couple of the stories which happened during this documentary.
And shouldn't they be able to listen into our end-to-end encrypted messages and telephone calls and everything." That's what it's actually about is, come on, let's not beat around the bush.
It's to present them as really, really good guys who can be trusted.
So they talk about Operation Lost Jackal. Now, when I heard about Operation Lost Jackal, I thought, oh, someone's lost his dingo, right?
It's they've lost their dog in the Australian Outback. I think it's quite clever.
But on this particular occasion, what it is is that the ASD, Intelligence Services in Australia, found out that a 24-year-old man who they call Ali for the purposes of the documentary.
He had been radicalised online and was travelling to Afghanistan to join the Taliban.
He's going to Afghanistan. We don't know how they found out, but they found out.
And they knew he was going over there and they were worried that he was going over there to get trained up and then he might be sent back to Australia on a terrorist mission or he may even be killed by the Taliban.
Who knows what's going to happen to him? And so they don't want that to happen.
And so the ASD operatives, these sort of codebreakers and hackers who work for the Australian services, are trying to find a way to get his mission disrupted so that he won't encounter the Taliban.
Presumably, the Taliban don't show up at the airport at Kabul with a little piece of paper saying, "We are the Taliban, Taliban Taxi Service." Presumably, I don't know.
I haven't been there.
And they decided, what we're gonna do is we know his email address because he's in contact with family members. So we're going to write an email to Ali.
And we're not gonna send it from asd.gov.au or whatever their address is. So they created an email address which appeared Taliban-ish.
I don't know if they have their own version of Yahoo or whatever.
If you watch the documentary, you'll get the actual words.
You need to ditch your phone number and you need to ditch your email address and reply to us telling us what your new phone number and email address are.
Because otherwise, intelligence services may work out who you are and what you're up to." That's quite a clever ruse.
But they knew he wasn't there.
And so they kept on sending messages, and they said that they made the language simpler and simpler and more direct, saying, look, you aren't obeying us. This is really important.
The Taliban bosses are getting really upset with you.
And so the ASD, the Australian officers are sending him messages saying, we're getting really angry with you because we've told you what to do and you haven't done it yet.
And eventually he does respond with a new phone number, with a new email address, and they basically put the fear of God into him.
And they said, you've done it, good, but our senior officials are so angry that you haven't been serious enough. You should return to Australia right now.
"Get on the next plane out of here, because if you don't, if we see you around the place, you're endangering our mission." Because obviously they're on a very important jihad.
And so that's what he did — he got on the plane back.
So that's one of the operations — that was Operation Lost Jackal. And obviously since then, the situation's got even worse.
It's not just the Taliban and things, but there's also Islamic State, or ISIL, who have posed a new challenge to intelligence agencies around the world.
ISIL have embraced technology and social media — they're recruiting, they're raising funds, they're spreading the ideology.
And there was this military operation, Operation Valley Wolf, which was trying to liberate the city of Mosul from ISIL control.
It measures 32 to 40 inches tall at the shoulders and has a length of 1.5 to 2.1 meters, 5 to 7 feet long. Okay, still freaking big.
They're hackers who are working for the government. And they are supporting the military operation on the ground in Iraq, and they're supporting Operation Valley Wolf.
And they're sometimes camping overnight in their basement office so that they can be available whenever required to help the military operation.
And they're working with the NSA in the United States. They're launching cyberattacks at the same time as military maneuvers.
And what they found was that ISIL fighters were using apps that were privacy-conscious. They were hiding their location.
So they weren't, you know, they weren't just using a cell phone. Like WhatsApp?
How are we going to crack all of them?" And they're all encrypted.
We don't have to find vulnerabilities in all of these." What we can do instead is target the way that any app works on a smartphone. And all of these apps require internet access.
So all we have to do— I say all we have to do, but all we have to do as an ASD hacker, someone working for the Australian authorities, is devise a way to disable the smartphone and prevent it from accessing the internet.
They're going to turn off the internet somehow or stop this phone from contacting. Is that the plan?
And clearly losing all cell coverage in a city when you're trying to take it over yourself could also compromise your own ability to communicate.
So a zero-click exploit is something which you can send to a smartphone—
It instantly activates on their phone. And they came up with a number of attacks. There was, for instance, an attack they wrote called Care Bear.
And Care Bear apparently required some fairly advanced IT sophistication to reverse. It wasn't just a case of turning off and turning on the phone again.
So Care Bear was a bit more complicated than that on your smartphone, which meant that you'd have to come out of your bunker as an ISIL warrior and go to ISIL tech support for help, right?
To get them to do something with the phone, which, you know, was going to be beyond—
Your phone is basically just a useless brick.
It was a really destructive payload, which kind of permanently prevented your phone from working, even if you did go to tech support.
So if that was coordinated with an attack being launched at you by coalition forces as an ISIL fighter—
With no user interaction on your smartphone at all, no clicking whatsoever, it would launch a Rickroll payload on the smartphone sent to them by ASD hackers in Canberra.
So, the Australians were making ISIL fighters' phones play "Never Gonna Give You Up" by Rik Astley.
Anyway, it was a really interesting programme, a good documentary.
It is geofenced, but I'm sure most of our listeners will know how to get round that.
Carole, what's your story this week?
Or maybe if you're there with me, I could ask you, "Carole, could you pick that up so I can present it—" Who's the person who's dropped it? Is it Diana Rigg?
Who's dropped her sweater?
I mean, am I really going to be able to help him if he's looking for his car? I'm not sure. I wouldn't know one car from another. I think he's got it under control.
Okay, you only need 2, you only want 2, but you couldn't help yourself because it's such a good deal. Good deal. Yeah.
You see a homeless person on your way home sitting in front of the co-op asking for change. You have none.
Oh, oh dear. Okay, last one, last one. You're at work. You have a very big palatial window in front of your desk, and you spot an injured bird outside. What do you do?
What floor am I on? I don't know. Irrelevant.
And you're saying, wow, Carole, you said that strangely, her name. But I have it from Yogi. I got Yogi to tell me how to pronounce it.
There she was last week, Dhwani's working away and she looks up and she spots an injured bird.
But she doesn't know much about birds, she's not a birder, she doesn't have vet skills or anything like that. But she can tell that the animal's in distress and she wants to help.
But how? Well, she's not an idiot, she's not going to hug it to her breast and feed it with pipettes or whatever. She hits the web to find details of the local bird rescue org.
And the responder's waste no time, asks her to send a form. So they ask her if they can send her a form so that she can register the request by email.
So basically saying bird injured, this is the location, this is what I saw, all that stuff. And she needs to pay a nominal fee of 1 rupee, which is just shy of a cent.
Not a note from her mom reminding her to come for dinner that evening and not one from her boss saying she's got a promotion.
She gets a text saying that ₹100,000 have been debited from her account.
So normally the way it worked was they give me your credit card number over the phone, and perhaps in this case it was just put in your card details here on the little form.
And we're just going to take ₹1. And this, folks, is when she realizes that she's been duped by an opportunistic con looking for people who want to help distressed little animals.
Feels very niche.
It's not actually, it's a toll-free hijacking scam where the scammer gets a phone number that is very similar to a popular toll-free one, perhaps number of the customer support line.
And it's a copycat phone number that will have 1 or 2 digits from the official one, or different toll-free prefix, 888 rather than 800, for example, in the States if they were there.
And then when the customer types in the wrong number, the call goes to the bad guy.
Shame on you, Google. But she's no dumb-dumb. So this happens to her. She's £1,000 out of pocket and she's no dumb-dumb.
She immediately takes action, lodging the complaint online with the cybercrime department. And visits her bank to submit a written complaint right away when it happens.
How did she get the number for the cybercrime? That's the—
I was like, "Jeez." So she also contacted the Mumbai Central Government Rail Police, perhaps because she received this when she was on the train.
Filed the complaint against the fraudsters for impersonation, cheating, and forgery under the Indian Penal Code.
Would she go and send a complaint to them?
But this officer said, you know, that they've written to the bank to obtain details about the account where the money was transferred, as well as to the cell phone companies.
So they're on it.
So advice for do-gooders like you, Graham, who runs after the Diana Rigg who drops her sweater: yes, be freaking careful when you dial phone numbers.
That's the advice from AT&T, right?
Really, don't dial the wrong toll-free prefix, don't hit a number twice, don't hit an adjacent number because they're all waiting for you to do that apparently. Jeez. And, right?
And you're just trying to do a good thing. You're just like, oh, this poor little animal, I'm gonna go out of my way to do something good.
Security, the company operationalizes the world's largest collection of threat intelligence in real time to protect your company from every known cyber threat.
Now available as a cloud-based deployment, Centripetal's Clean Internet service is a revolutionary approach to defending your assets from cyber threats by leveraging dynamic threat intelligence on a mass scale.
The addition of AWS Clean Internet Cloud protects your enterprise whether on-premise, remote or in the cloud, removing the need for a more costly cybersecurity infrastructure.
Learn more about Centripetal's intelligence-powered cybersecurity solutions at smashingsecurity.com/centripetal. That's C-E-N-T-R-I-P-E-T-A-L.
And thanks to Centripetal for sponsoring the show.
Well, if a device isn't compliant, the user can't log into your cloud apps until they fix the problem. It's that simple.
Kolide patches one of the major holes in zero-trust architecture, which is device compliance.
Without Kolide, IT struggles to solve basic problems like keeping everyone's OS and browser up to date.
Unsecured devices are logging into your company's apps because there's nothing there to stop them.
Kolide is the only device trust solution that enforces compliance as part of authentication, and it's built to work seamlessly with Okta.
The moment Kolide's agent detects a problem, it alerts the user and gives them instructions on how to fix it. If they don't fix the problem within a set time, they are blocked.
Kolide means fewer support tickets, less frustration, and most importantly, 100% fleet compliance. Visit kolide.com/smashing to learn more or to book a demo.
That's k-o-l-i-d-e.com/smashing.
Bitwarden's password manager securely stores credentials spanning across personal and business worlds, and every Bitwarden account begins with the creation of a personal vault, which allows you to store all your personal credentials.
These are unique and secure passwords for every single account you access, and it's easy to set up, it's easy to use. I honestly love Bitwarden.
I use it at home, use it at work, use it on the go.
Get started with a free trial of a Teams or Enterprise plan at bitwarden.com/smashing, or you can even try it for free across devices as an individual user.
Check it out at bitwarden.com/smashing. And thanks to Bitwarden for sponsoring the show.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily.
Shout out Connor. About this series of documentaries on Netflix called Connected: The Hidden Science of Everything.
Now, Connected, which is hosted by a chap called Latif Nasser, who listeners may know, he's the co-host of Radiolab.
Connor, who recommended this documentary, which I've watched, he called out a couple of episodes.
So I watched one all about nukes, nuclear bombs, and obviously nuclear weapons, not necessarily a great thing, right, Carole?
And there's another show— Nukes? Yeah, as in nuclear weapons. Yeah, okay. And there's another one about excrement.
And as Connor says, it's not a shit show, but it's brilliant about apparently, for instance, Thames Water, the testing that's done on the Thames.
It's able to determine which day of the week it is by how much cocaine is present in the water supply. For real?
Have you ever seen Connections, Carole? It was shown in the States on PBS. I'm sure they would have shown it in Canada.
And it was all about the different connections, different people, how they were connected, how, for instance, the opening of the Suez Canal directly links to the writing of the musical Aida, and all sorts of things like that.
Anyway, this feels to me like a modern version of Connections, this Connected Netflix TV show.
You can find it on Netflix, and it is my pick of the week.
So I guess he's come on board. So I should go check it out, excellent.
It's a podcast called Unreal: A Critical History of Reality TV. I shared it with you earlier midweek. Did you have a nose? I haven't had a listen yet to it, no.
Okay, well, it's hosted by two journalists, Pandora Sykes and Siren Kale. Both have journalistic chops.
And also, they declare a love for reality TV from when they were preteens, right? And they watch Big Brother together. You remember watching the first Big Brother. We watched that.
I think we were all hanging out during that time.
Later, it became all about people going on because they wanted to be famous. But I think the first series, in the UK at least, was really quite interesting.
This is the one that I thought was just the most— It's called The Swan. Have you heard of The Swan? Oh.
This was obviously a while ago before he met Meghan Markle, etc. And so they were all being duped. So gross.
They said, let's just dupe people and film everything because they signed their lives over because they think we're telling them the truth.
I saw another one where they took a bunch of people and they told them that they were going to put them on a space shuttle flight or the Russian shuttle into orbit.
And they went on astronaut training and then they put them on a plane and flew around the UK for a while, landed them and pretended that they were in Russia.
They changed all the signs and everything and made them think that they were going to— Fuck's sake.
It is obviously horrendous, but obviously most importantly, it was entertaining. Can't look away.
Oh, my God, that's horrible. They weren't allowed to have a family. They would only allow one brief phone call a week. They had to do therapy on TV as part of their contract.
And if you were not open enough with your horror or your trauma, you were out. Points were against you. They would say, "You held back." And at the end, the swans come out, right?
After they do their pageant, there's a queen swan. It's just— anyway, it's just disgusting. But the worst, the worst thing was a lot of this surgery.
You don't go on the show because you're loaded and can afford all this. Because you've got some issues, you know, and you're not good in yourself and you don't have a lot of cash.
But there's things that need maintenance, right? So if you get your lips filled, or you get a lot of Botox or shit like that, you need to go and maintain that stuff.
Otherwise, it starts sagging, it doesn't work. And it's not like these people were being looked after by the show once they got kicked off. Anyway, fuck me.
I'm watching it, I'm listening to this podcast going, "How did we let this happen?" I found it mind-blowing.
And you kind of get this cross of what everyone experienced and why they were doing things.
But anyway, I found it— Basically, Graham, you gleamed at some of these horrible moments, so maybe you should face your reckoning and go listen to it and see if you're embarrassed at what you thought was hilarious not even 15 years ago.
Unreal: A Critical History of Reality TV. It's for BBC Radio 4, and I think they did an excellent job. Find it on BBC Sounds or wherever you get your podcasts.
All right, listeners, today we have Max Power, probably the person with the best name I've interviewed on this podcast. He is product lead for Bitwarden's Secret Manager. Hi, Max.
But before we get to that, perhaps, Max, you can tell us a little bit about you and your current role at Bitwarden.
I've been working in various different product roles over the past couple of years, mostly in for open source projects that were somehow related to dev tooling or cybersecurity.
And since about 1.5 years, we are working on the Secrets Manager, which is super exciting because it's a completely new product and a lot of new stuff we need to conceptualize.
But for the Secrets Manager, we're particularly talking about developer secrets.
So that may be API keys or anything that is development related, such as database credentials and so on.
So let's say, for instance, you are developing a product, you have multiple secrets, you have a Stripe API key, database credentials, and so on.
And in order to operate securely and in order to collaborate securely, you need to share those secrets in some way with your team members. Right.
One of the current ways of doing it is that you set up an env file and share secrets via Slack or other unencrypted channels.
And that's definitely not the ideal way of handling things.
So one very common error is that env files are not added to a.gitignore file and they accidentally get published to GitHub, maybe to a private repo, and then that private repo is open sourced later.
This has happened in multiple instances leading to really huge, huge database leaks affecting some of the largest companies in the industry, amongst others Uber.
But they had a very massive leak of their driver's details. That's right.
There are different reports, but GitGuardian, for instance, publishes a report and they mentioned that around 5 million credentials and other secrets get leaked on GitHub every year.
From writing it on a piece of paper to sending it via text, maybe, right? Or email. We're all guilty of it.
And so, what you're offering is this tool that is super safe and allows employees to share information, particularly, you know, serious information related to infrastructure, right?
So, it's the one secret to a holy grail of potential secrets if your database gets leaked, there's much bigger damage than just this one secret.
So there's a big trail of secrets, which need to be protected pretty well.
Primary target group is definitely for teams, for employees, but there may of course be use cases where you want to exchange secrets with third-party vendors.
There might be some certificates you want to share in a secure way. This is not a primary use case for Secrets Manager, but definitely something that would be possible as well.
So we're trying to simplify building out various integrations and to cater to pretty much any sort of use case.
We have the traditional use cases of development teams that are building a product, but we also have a lot of customers from the IoT and OT space.
So for instance, big factories that have a lot of robots. These robots need secure credentials as well.
And the way we're building things is that we try to cater to all of these different use cases. So we have our SDK, currently built in Rust.
We're working on other languages as well, which make it easy for anyone to build stuff using Secrets Manager.
And then we have our CLI, a completely revamped CLI, not based on the existing Bitwarden CLI, which also simplifies a lot of the process.
And then no one else really understands your use case very well. So that's a good thing. How's the beta been going?
So how long has the beta been going so far and what have you learned from that?
So we're very positively surprised by that. We have gathered a lot of really valuable feedback there. We're aware of a lot of things that we still need to build.
Luckily our internal roadmap was very well aligned with what customers during beta requested.
So a lot of the important requests that customers had are already in preparation and already being worked on, which is of course great to get this confirmation and feedback.
But we of course also got a lot of great ideas that weren't on our roadmap.
And luckily with Bitwarden, we have a super great, very supportive community of people that are contributing either with ideas or contributing actually to our open source repositories.
And as I remember, you have to kind of manage the ideas that go in and make sure they, when they go in, that they work seamlessly and perfectly and don't blip out in any way.
And of course you've got deadlines from everybody, so it's fantastic if you're able to have the time and flexibility to really test everything.
So I love hearing about a long beta phase. I think that's really good.
Before we are sure that we would use it internally, we are not publishing anything.
The beta is very useful in determining what features we should prioritize and also, for instance, determining what is the right pricing approach.
So that was a very big question for us during beta as well, because a lot of the competitors in the landscape have super confusing pricing.
That's also something where we wanted to add a little bit more simplification I love that.
A lot of the people were very happy to have one place for all of their secrets, for their user credentials, their normal passwords and their developer secrets.
We have received a lot of great feedback surrounding how secrets should be organized and structured, which we already had more or less planned anyways.
So the way that we are resembling, for those that are already using the password manager, resembling collections where we have project, just a very neat way of organizing secrets.
And then we got a lot of great feedback also on how granular the access policies should be surrounding secrets, which was very useful and we were already more or less planning.
So there's lots going on.
There's always the question of how much additional functionality and features do we want to add before we launch general availability.
There's still some debate about some minor features that would improve usability.
Of course, my personal approach is that it won't hurt to launch GA as long as we follow up with these features very shortly after, which is currently the plan.
So there are a lot of features like additional SDK languages, additional integrations, improved documentation, and so on, which of course all takes quite a bit of time to build out.
But whether we launch that a couple of weeks after we launch GA, or before, it doesn't make a huge difference for users.
We're taking our user feedback for anything, also for password manager. User feedback is one of the most important things for us.
And that is really one of these beautiful things about the general open source community that we're listening to users and users are providing us with great feedback.
So there's a very nice symbiosis. Yeah.
Therefore, more tech savvy users, there are some decent alternatives that are from the pure perspective of encryption standards and so on. That are very good as well. Yeah.
Yeah, can't argue with that.
Listeners, if you want to take part in Max's Bitwarden Secret Manager beta test, or if you just want to learn more about this service, may I suggest you go to bitwarden.com/smashing.
That's bitwarden.com/smashing. And Max Power, product lead for Bitwarden Secret Manager. Thank you so much for coming on Smashing Security. Thanks, Carole.
I have to ask you one question before we go. I was doing some research on you and I found a Max Power website, Max's Island. Is that you? No.
I was thinking you had a name for an inspirational speaker and look, there's already someone out there with it. Have you seen this? No, I haven't seen that yet.
Smashing Security also has a Mastodon account and you can look up the Smashing Security subreddit on Reddit.
And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Overcast.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 324 episodes, check out smashingsecurity.com.
It's really his fault for not spotting that we've both recommended the same TV show. Bad Mark. It was a good show though, Black Butterflies. Yeah. Yeah, I enjoyed it.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- Australian cyber-op attacked ISIL with the terrifying power of Rickrolling – The Register.
- “Breaking the code: Cyber Secrets Revealed” – ABC.
- Scam Alert: Woman tries helping injured bird, ends up losing Rs 1 lakh to cyber criminals – MSN News.
- Toll-free Hijack Alert (misdial scam) – AT&T.
- “Connected: the hidden science of everything” – Netflix.
- “Connections” with James Burke – YouTube.
- “I wanna marry Harry” reality show – Wikipedia.
- “Space cadets” reality show – Wikipedia.
- Unreal: A Critical History of Reality TV – Apple Podcasts.
- Famous Studios – Famous Studios website.
- Unreal: A Critical History of Reality TV – BBC Sounds.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Zero Trust for Okta. Watch a demo today!
- Centripetal – Centripetal’s CleanINTERNET defends your assets from cyber threats by leveraging dynamic threat intelligence on a mass scale.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

