
Ahoy! There’s trouble in the South China Seas as Filipino organisations fail to secure their systems, we take a close look at Google IP protection, and we take a look at just how so much genetic profile data leaked out of 23andMe.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Cyber sloppiness and why does Google really want to hide your IP address with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 345.
My name's Graham Cluley.
Now, coming up in today's show, Graham, what do you got?
So, I'm going to give you both different words, all right? And I'll let you both shout out letters.
You can play along at home, by the way, but I won't be able to guess what letters you're shouting out, so that won't work quite so well. So, Carole, you go first.
What letter would you like?
And this would prove very handy if you were living in Manila in the Philippines right now, because there's been a report in the South China Morning Post all about passwords.
Because earlier this month, hackers hit the Philippine Health Insurance Corporation with the Medusa ransomware, and they stole a whole load of data and they threatened the insurer.
They said, you've got to pay up $300,000, otherwise we're going to release your data. They refused to pay up. And so the data was released.
And this has been big news in the Philippines.
But it makes sense to me that if you paid for insurance to cover your butt during this type of event, right?
You would want them to pay these things so your information didn't get published.
But maybe they didn't have ransomware insurance.
What we do know is that they didn't have antivirus software because apparently the attack was helped somewhat because the organization hadn't approved a request to renew its antivirus subscription.
So when McAfee or Norton or whatever it was popped up on their screen and said it's time to renew, they obviously said, oh, just ignore for now. We're not going to do that.
But millions of people have been impacted as a result of this data breach, including obviously the people in the Philippines, millions of them, but also people working overseas.
And it's not been the only hack going on in the Philippines.
On Sunday, the homepage of the Philippines House of Representatives, their website was defaced with a drawing of this big troll face and—
And there was another hacker who on Sunday was having a chat up on Twitter or somewhere, and he said that he'd broken into at least 5 major government agencies.
He'd downloaded 500 gigabytes of data with the aim apparently of exposing security weaknesses. Now, he calls himself Diabolox, Diablo X. I think it's Diablo X. Diablo, Diablo X.
Diablo with an X on the end. Diablo X Phantom. And he says he's 19 years old. I guess from the name he's probably 30.
And then they just act like 12-year-old boys and they put pictures of trolls and they call themselves Bitcoin 5000.
They're all 12.
He says he used to work in the government as part of their red team. Trying to find vulnerabilities and look up— and he says, I'm a hacktivist, I'm angry.
These problems have been known about for ages. They've been pointed out to the government, but they've done nothing to address them. And he says he's hacked into these servers.
He says he's hacked—
By raising awareness of these problems by breaking in and stealing all the data, so that somebody can't break in and steal all the data.
And he grabbed all these documents, including material which was related to the creation of a national center of excellence for— well, can you guess what?
And he says he's been able to break into these systems via a number of techniques.
But one of the systems, when he broke into the Department of Science and Technology, was because of its password, which was admin123.
If only it had been 123, that may have been a little bit trickier. But yes, admin123. And so there is this problem with— I mean, I know this isn't really breaking news.
Lots of people still using really dumb passwords, including administrators. And in the last week, we've seen new research from the security outfit Outpost24.
They've released some research where they were specifically looking into login credentials used by IT administrators.
And they say they analyzed 1.8 million administrator credentials. 40,000 were using the password admin.
That was the top one, followed by 123456, followed by 12345678, followed by 1234, followed by password.
So we've all been in the security awareness game one way or another for a very long time.
And I think the reason that it doesn't make any difference is that there's a fundamental misunderstanding about what the problem is.
So I did some research a few months ago and all of the password manager vendors all reckon that their users have got somewhere around 80 to 100 passwords. Right.
So the problem is that people have lots and lots of passwords. In the face of having lots of passwords, what do you do in order to make it so that you can remember them?
Okay, you either write them down, which we've been screaming at people not to do for years, for as long as we've been saying choose strong passwords, or you make the passwords weaker or you reuse them.
And my thinking is that password reuse and weak passwords are inevitable in an environment where people have to remember 100 passwords.
There's a guy called Cormac Hurley who works for Microsoft Research, who does brilliant research around passwords.
And he pointed out that just remembering which password goes with which website, if you have 100 passwords, is more difficult than remembering the order of a shuffled deck of cards.
That's before you have to remember what the password is, just simply remembering the association between a given password and a website.
So cognitively, we're asking people to do the impossible.
If they're not listening to your advice to make strong passwords, they're not going to listen to your advice to use a password manager.
So the people, I bet you, the people who use password managers, which is something like 10% to 20%, it's kind of similar to the people that use MFA.
And I imagine those people already have strong passwords, 'cause they're the ones who are switched on about security.
And it's everybody else that didn't listen to the advice about strong passwords that we need to be talking to. And I think we are talking to completely the wrong audience.
Instead of telling users to choose strong passwords, we need to tell the companies that operate systems where you type a password in not to allow bad ones.
So it's very easy to look up the 100,000 worst passwords when somebody says, right, this is the password I want to use.
Or better yet, here, we recommend you use this password. This is a strong password. It's very easy to do those things.
And it puts the security back in the hands of the people who actually should be in charge of security rather than just random users.
That sounds trustworthy. Maybe the government could run a server where it checks your passwords and make sure that no one else is using it. That'd be fantastic, wouldn't it?
Anyway, stop using admin123, stop using password, especially if you're a sysadmin. And that is my pick of— no, it's not my pick of the week, but that is the end of my story.
And my story today is about the new thing from Google called IP Protection, which is an experimental anti-tracking feature for the Chrome browser.
And as you probably know, Google Chrome is by far the most popular web browser in the world. And it is, of course, made by Google.
And Google, as you know, is a behemoth online advertising company that tracks absolutely everything you do. And in case you've forgotten, let me remind you.
So Google is so keen to know what you're up to that it provides the most widely used web browser in the world for free.
The most widely used website analytics software in the world, Google Analytics, for free. The most popular maps application for free.
And one of the most popular payment services so it can see everything you've bought online.
So before we get into that, we need to do a bit of a dive into online tracking and IP addresses. So buckle up because we're going to get a little bit technical.
For the benefit of any listeners who don't know, an IP address is a unique ID and it's used as your address on a computer network.
So it's normally—normally you see it written as 4 numbers separated by dots, and it works just like your physical address. And the network acts like the postal service.
So if 2 computers want to communicate with each other, they send messages to each other's addresses. And the network makes sure that the messages get delivered to the right place.
So in order for you to use a website, it needs to know your IP address. You can't use a website without giving it a working IP address to reply to.
That's a really important thing to understand.
Now, your IP address is normally assigned by your internet service provider, your ISP, and it keeps a pool of addresses and it gives one to you.
And although they tend not to change very often, it's important to understand that your ISP can and does change your address from time to time.
So let's imagine that there's an IP address and it's tracked signing up for a dating website in January, and then it's used to buy some condoms from an online pharmacy in March, and then it reappears to buy a book on pregnancy in May.
So you can see how a unique ID, even though it doesn't say who you are, can paint a picture about somebody's life and what they're interested in and maybe what's happening in their life.
Anyway, that's the theory, but it doesn't quite work in practice because the downside of IP addresses from a tracking point of view is that they're dynamic.
So you remember I said the ISP can change your address. Well, on any given day, although your IP address is likely to be what it was yesterday, it could be different.
If it's different, what's happened is your ISP has given you a different address, but it's given your address to someone else, which is really going to screw up the tracking.
So not only does your continuity end, but somebody else is picking it up, which messes with the whole profile.
So for that reason, trackers have tended to rely on third-party cookies rather than IP addresses, because IP addresses have that potential to suddenly belong to someone else.
And the way that you overcome the problem with the IP address being assigned to somebody else is by using something called a fingerprint.
So a fingerprint is where the person who's tracking you gathers, let's say, 10 to 15 bits of data about your browser.
So it's IP address, the fonts it supports, the screen size, and a bunch of other stuff.
And if you take all of those together, that makes a really powerful unique signature, which is actually quite resilient. So if one or two of those details change...
So if the IP address changes, but everything else stays the same, the tracker can say, actually, that's probably the same person.
Let's just update that fingerprint with the new IP address.
So as tracking companies respond to the death of cookies, fingerprints are likely to become more popular, and therefore hiding your IP address is a good way to disrupt that form of tracking.
But who, you say, could save us from all of this nefarious fingerprint and IP tracking? Google!
So Google's IP protection uses a proxy. And what that means is that you send your traffic to the proxy, and then the proxy sends your traffic onto the website.
The website replies to the proxy and then the proxy replies to you.
And since millions of people would be using that same proxy and the proxy would have its own pool of addresses, it becomes useless for fingerprinting.
But as you probably worked out, that puts the person who owns the proxy in a really powerful position because although it's hiding your IP address from everyone else, it gets to see everything you're doing, 'cause everything you do gets funneled through its infrastructure.
So it suddenly has a ringside seat on all of your browsing.
How would you feel about that? I don't know about you, my first thought on seeing this new proposal was of course Google would want to do that.
Of course they're going to want to funnel everything through a proxy that they own. But interestingly, Google has an answer to that.
So it actually says in the specification for IP protection that one of the core principles is that it shouldn't be able to track you using this proxy.
And the way it's going to do that eventually in sort of phase 2 or 3 is what they call a two-hop proxy.
And a two-hop proxy puts your traffic through two proxies that are operated by different companies.
So it's saying, well, we'll operate the first one and then the second one will be operated by some sort of CDN.
What's to stop them just having some sort of arrangement with them anyway? The plan for the two-hop proxy is, okay, two different companies.
And what that means is that neither company sees the entire traffic communication.
So one of them sees where the traffic's coming from and one of them sees where it's going to, but neither sees both ends. So it's not useful to them.
Now, I actually interpret this as a good faith effort by Google engineers. I don't think that this is subterfuge. I think this is actually, this is how you would make it.
So I don't think Google needs this information because as I pointed out earlier, it's already in your browser. It's already in your searches. It's already on your phone.
It's already in your web analytics. It's already in your DNS. It's already in your payments and it's everywhere else as well. How many ringside seats do you actually need?
I don't think they need this new ringside seat to work for them as a tracking mechanism, because remember, it's a feature of the browser and they already own the browser.
So what difference does this make? Well, do you remember I said that third-party cookies are going away?
Okay, well, all the browser vendors have essentially agreed that third-party cookies are going away. Third-party cookies are the sort of standard cross-site tracking mechanism.
Well, because Google Chrome is the most popular browser, for most people, third-party tracking cookies are going to go away on a timetable that's dictated by Google, okay?
Because it only changes for people when it decides that Chrome no longer supports them. And Google doesn't have any plans to give up its ad business.
So it's planning to replace third-party cookies with something called Topics in 2024. Have you heard of Topics?
Anyway, so the way that Topics works is instead of sending all of your browser data to Google and then having Google process it into, okay, well, here's all the raw data that means that Graham is interested in X, Y, Z.
What's going to happen is that Chrome is going to rifle through your browser history, which obviously it already knows.
And then Chrome itself is going to decide what topics you're interested in, and then it's going to send that list of topics to Google. So Google doesn't get the raw data anymore.
It just gets the list of topics. Now, that is actually a good win for privacy. Because it means that Chrome is sharing much vaguer and much more generic data.
Yes, everyone's browser is going to be doing it instead.
But also, I mean, Google's ad business is going to continue.
It's not going to switch to topics, it's going to start testing them next year, but it's not going to switch over until it knows it can replace third-party cookies, okay?
But other people's ad businesses don't have the same luxury. So they're going to have to find their own successor to third-party cookies. And those companies don't own a browser.
So they're going to have to turn to other methods. And the obvious methods that they're going to turn to are things like fingerprinting, and IP tracking.
Now, isn't it interesting that Google's newfound interest in privacy isn't going to impact its own advertising model, but it is going to throw a spanner in the works of its competitors if they decide to use IP tracking or fingerprinting.
So when you install an app now on an iPhone, you get a little pop-up that says, this app wants to track you all over the place, do you agree? And of course, you say no.
And famously, it cost Facebook about $10 billion in its first year because everybody said no, right? And so Apple is hailed as this protector of privacy.
And then about a year after it brought this feature out, it went, actually, we're going to introduce our own advertising model into apps.
And when they say we're going to do this for you, it's free, don't trust them.
That's just a little side project they've got on the side there. They're an advertising company. Just remember that.
October 6th, news broke that 23andMe, that's the company that collects genetic material from millions of people for ancestry and genetic predisposition tests.
Okay, so these guys had a massive data breach. According to Wired, at least a million data points from 23andMe accounts seem to be exposed on the breach forums.
And this was reported quickly after. And so we weren't sure what was really going on at the time.
The genetic testing company 23andMe, which earlier this year boasted to its investors that it had 14 million customers, confirmed that the data from a subset of its users had been compromised, and they blamed credential stuffing.
So maybe one of you guys want to define credential stuffing.
So you have— you've had a breach somewhere, so you've got your little database of usernames and passwords, and then you fling them at another service to see if they work to log into 23andMe as well.
So the attacker, once it got into 23andMe using this credential stuffing, and that's what they assume is the way they got in.
Now DNA Relatives allows users to opt in to sharing their info through DNA Relatives of others to see.
So it's kind of basically like you sign up and say, hey, I want to find people that have the same DNA as me. And someone else says, I want to find that too.
And if there's a match, you guys then get to chat. That's how it works.
So they post the initial data sample on the platform breach forums.
They start selling what it claims are 23andMe profiles for between $1 and $10 per account, depending on the scale of purchase, reported Wired.
They claimed that they had celebs inside their bucket list, including Mark Zuckerberg, Elon Musk, Sergey Brin.
Firstly, anyone's DNA set also reveals the information about others who share part of their genetic code with them.
So if my mom decides, hey, this is cool, let me go see if I can find my great aunt, that may impact me because I share some of her genetic code.
So someone sends a sample to 23andMe, the company has genetic information about that person and all their relatives, even if those relatives didn't send a sample or consent to any data collection.
And I said, no, I'm not bloody well doing that. Why do I want to do that?
According to The Washington Post, the type of information genetic testing these companies are collecting is currently not protected by the Health Insurance Portability and Accountability Act.
What a mouthful. HIPAA. As it's better known. This is the USA's national health privacy law, and 23andMe still allows for third-party data sharing in its privacy policy.
However, apparently in the EU, 23andMe, in its own words, says it's committed to the robust data privacy and security protections enabled by GDPR compliance.
I saw this on their website, and this may be why they keep underlining it. Honestly, in every single article I read about this, and let's say there was a dozen.
Every single one had the, "This was not a breach. This was credential stuffing."
So—
You know, we have things like exploit and vulnerability.
Which are English words with a— they have a meaning in common language, but they have a very specific meaning inside cybersecurity. I think 23andMe wasn't breached.
There wasn't a failure in their computer systems. There wasn't a vulnerability in their computer systems.
The computer system did exactly what it's supposed to do in response to somebody with a valid login. To me, this is more about an unauthorized access rather than a breach.
What is the system supposed to do if somebody authenticates correctly other than let them in?
So nobody gets to be surprised about the fact that people are reusing passwords. So there are specifically things you can do to stop reusing passwords.
But more than that, if you— the CEO of 23andMe was out there saying, we have been offering multi-factor authentication since 2019, just never insisted on it.
Yeah, they're basically saying to everybody, if you had enabled MFA, this wouldn't have happened.
So putting the blame firmly on the users, but it's within his power to make it mandatory. Yeah.
In 2019, instead of saying you can use MFA if you want to, he could say MFA is compulsory and credential stuffing basically dies in the face of MFA. You can't do it.
That would have, oh, it's quite good, this IP from Google, isn't it? It'd be quite handy for people. Okay.
To inform them of the breach into the DNA Relatives feature that allowed them to compare ancestry information with users worldwide.
And apparently they're working with federal law enforcement and forensic experts to investigate the breach. But in short, that's how you get from drool to data breach.
Thank you to Smashing Security sponsors Vanta, where you can shortcut compliance without shortchanging security.
Expand the scope of your security program with Vanta's market-leading compliance automation.
Vanta's 5,000+ global customers report saving over 300 hours in manual work and up to 85% of cost for SOC 2, ISO 27001, HIPAA, GDPR, custom frameworks, and more.
And with Vanta's 200+ integrations, you can easily monitor and secure the tools your business relies on.
From the most in-demand frameworks to third-party risk management and security questionnaires, Vanta gives SaaS businesses of all sizes one place to manage risk and improve security in real time.
As a special bonus, Smashing Security listeners get a whopping 20% off Vanta. Just go to vanta.com/smashing. That's vanta.com/smashing.
If you work in security or IT and your company has Okta, this message is for you.
For the past few years, the majority of data breaches and hacks you read about have something in common. It's employees.
Hackers absolutely love exploiting vulnerable employee devices and credentials. But imagine a world where only secure devices can access your cloud apps.
Here, credentials are useless to hackers, and you can manage every OS—even Linux—from a single dashboard.
Best of all, you can get employees to fix their own device security issues without creating more work for IT. The good news is you don't have to imagine this world.
You can just start using Kolide. Kolide is a device trust solution for companies with Okta.
And it makes sure that if a device is not trusted or secure, it can't log into your cloud apps. Visit kolide.com/smashing to watch a demo and see how it works.
That's k-o-l-i-d-e.com/smashing.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they like.
It doesn't have to be security related necessarily. Better not be. Well, my pick of the week this week is not security related. It comes from the other side of the channel.
And in fact, it is made by Canal+. Oh, bonjour, bonjour. Wait, wait, wait. It is a French TV show. I have been watching a crime drama called Paris Police 1905.
So that's obviously the 24-hour clock, so it's just after 7 o'clock. Paris Police 1905 is set in the early part of the 20th century in the Paris arrondissement.
That's how the Parisians say it as well, I guess, is that? Yes. So it's a TV show. It's all very lush. It's made in dans le français, so it is in the French lingo. In La Belle France.
Beautifully shot, slow and moody, means you can have a nap and not miss too much. And let me just give you a quick summary of the plot. It's December 1904.
Orders have been given that the streets around Paris have got to be cleared up of prostitutes because there's public order, there's hygiene, there's syphilis raging everywhere.
And a man's body is found in the Bois de Boulogne. And Inspector Antoine Jouin is entrusted with the investigation. And it's really good, I have to say.
And I've discovered since deciding this was going to be my pick of the week that it's actually a sequel. So there was a Paris Police 1900 a couple of years back. Was there? Yes.
Oh, okay.
And because, of course, it's full of French actors, you don't recognize anyone.
You know, there's no one going to put you off and think, "What's he doing turning up here?" No Thom Hanks? No Thom Hanks. Nothing unpleasant that's going to happen.
And I'll also say, on the BBC version on iPlayer, very big subtitles. So you don't have to put your glasses on to read the subtitles. The subtitles are enormous.
I think you'll like it. Mark, what's your pick of the week?
But if I did, it was a while ago, so we're going to go again. So my pick of the week is the British Hen Welfare Trust. So you know that I am a bit of a chicken fancier. You said it.
And the trust is a charity in the UK that rehomes battery chickens.
So battery chickens are the chickens that are brought up in cages, and when they get to about 65 weeks, the number of eggs that they lay starts to tail off slightly.
And so they're replaced with younger chickens, not because they no longer lay eggs, but because they don't lay quite as many eggs as a younger chicken does.
Now, normally they're taking it easy. Well, no, I mean, life in a battery cage is not what you would call taking it easy.
But what happens to them at that point, typically, they haven't seen any daylight in their lives, they've never scratched in the earth, they've just lived in a cage, and then they're trucked off and they're turned into pet food.
The British Hen Welfare Trust actually takes those chickens and offers them for rehoming.
So instead of going off to become pet food, they become available for people to keep as pets or as working animals. Cool. Yeah.
And so all of my chickens and I've got 5 at the moment, but over the course of time I've probably had 20 because, you know, chickens, they die a lot.
You sign up and they email you when there's a collection in your area. There's one in my area sort of once a year for the place that I go to.
And I go along with a couple of pet crates and I pick up some chickens.
And they ask for a suggested donation, which is very cheap compared to the price of actually buying a chicken.
And what you get is a chicken that is not only very, very good at laying eggs— so I never buy eggs. All my eggs come from my chickens.
But you get to watch what happens to one of these animals if it's no longer kept in a cage.
So when they come to you, they've never seen daylight, they've never seen sunshine, they've never seen rain, they've never scratched in the earth, they've never eaten a worm, they've never eaten a bug.
They really haven't had any kind of life at all. And they've only got about half the feathers that they're supposed to have.
So through stress and through pecking, they look like oven-ready chickens with feathered wings. Yeah.
Basically, and within about 3 weeks all their feathers grow back and their combs go bright red instead of being a dull pink color.
And you can see the minute you take your foot off their neck, they turn into what you would recognize as being a chicken. So it's an extremely rewarding way to get and keep—
You can find them at www.bhwt.org.uk. Brilliant.
I, Carole Theriault, am hosting and producing a brand spanking new podcast called Art Musings. What's that about? Art. It's art. It's great. We chat with local artists.
So I teamed up with a local artist in Oxford called Sally Ann Stewart, and she does fabulous linocut prints and she's very funny and I like her loads.
And she agreed to do this podcast with me. So we chat with local artists. Some are up and coming, some are really at the top of their game.
And we just learn about their process and how they do art and try and figure out how they manage the challenges they have.
We talked to somebody about how do you manage to do art when you have twins who are 5 years old and crazy?
Or, you know, how do you sell yourself when you're kind of shy and don't know how?
Actually, recently we were just recording an interview with the head honcho of Oxfordshire Art Weeks who was talking about how do you describe yourself as an artist, and I had just written an artistic statement that I had to hand in.
So guess what? I did it really wrong, and I actually read my artistic statement that I handed in on air so she can point out how it could be improved.
So there's all kinds of cool stuff, and I'm really proud of it. You guys have heard the first episode.
I've listened to— there's a football podcast I quite like, there's a politics podcast I quite like, not because I'm particularly interested in those subjects, but because I'm interested in the presenters and the way that they talk.
I think it falls into that category. You don't have to be into art to like this because interesting people can make any subject interesting, and I think it falls into that.
I would encourage everyone to give it a listen.
And it would just, it takes so much time to create new shows, right? And choosing everything. Anyway, so I'm proud it's out. It's called Art Musings.
You should be able to find it wherever you get your podcasts. And if you don't know how to do that, just go to artmusings.co.uk. Brilliant. And that's my pick of the week. Fantastic.
What's the best way for folks to do that?
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app. Such as Apple Podcasts, Spotify, and Overcast.
And don't forget to subscribe to Art Musings as well.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 344 episodes, check out smashingsecurity.com.
Our neighbors are getting a new bathroom done and they stopped for a whole hour when we recorded this show and they've just started because we've run a little late.
So yay to cool neighbors!
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Mark Stockley:
Episode links:
- Philippines’ cybersecurity failures exposed as hackers leak state secrets, people’s data – South China Morning Post.
- IT admins are just as culpable for weak password use – Outpost24.
- Google Chrome wants to hide your IP address – MalwareBytes.
- The 23andMe data breach reveals the vulnerabilities of our interconnected data – The Conversation.
- 23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews – Wired.
- Worried about the 23andMe hack? Here’s what you can do – Washington Post.
- Paris Police 1905 – BBC iPlayer.
- British Hen Welfare Trust.
- Art Musings – Art Musings podcast.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Device Trust for Okta. Watch the demo today!
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get 10% off!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


