
A hacker bursts the bubble of inflatable fetish fans, Hollywood celebrities unwittingly record videos in a Kremlin plot, and there’s a particularly devious WordPress-related malware campaign.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Paul Ducklin.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
But first, let's thank this week's wonderful sponsors, Kolide, Push Security, and Vanta. It's their support that helps us give you the show for free.
Now, coming up on today's show, Graham, what do you got?
I'm not sure. But you know what it means this time of the year as the evenings draw in, at least in the northern hemisphere, it means it is party season.
It means it's mince pies and mulled wine, carole singing, ugly jumpers, maybe some fun and games.
And that's one thing nice when the nights draw in, because when you go for a ride, all the kids look at the bike, and you can hear what they're saying.
Daddy, Daddy, I want those for my bicycle.
Have you ever played the Fuzzy Duck game?
You know, that's the sort of bog-standard sort of balloon. Or the ones that look like a sausage. They're quite fun. Some people like to have a lot of fun with balloons.
Friend of the show, Geoff White, author of The Lazarus Heist, used to be a professional body— No, not a professional bodybuilder.
Used to be a professional balloon modeller back in the day.
But I have found it on the internet. So again, I will put a link in the show notes for anyone who wants to see someone having a lot of fun with balloons.
And there's lots of people who like to have fun with balloons. And what they do is they like to seek out other people who enjoy good, clean fun with balloons.
And there is an online community called InflateVids which describes itself as the website for looners.
And they say if you go there, you can every day watch new inflatable and balloon fetish videos.
He claims he's got usernames, IP addresses, email addresses, hashed passwords.
According to InflateVids, Rik at InflateVids, he has posted up on Patreon to his community because he can't use his website at the moment.
He's basically shut down the entire website. He said, rest assured, he said that ID verification wasn't taken. So I've done a little bit of research into InflateVids.
Something which has your date of birth on it before granting you access to their site. I think that's right.
Certainly you have to verify your age before you can upload any balloon videos involving nudity.
So that is not the best way of hiding your passwords. It's not the best way to obfuscate them from someone else coming along and descrambling them.
So they say they're going to fix that and they're going to add some salt in the passwords. That's what you should do.
You should hash and salt or salt and hash actually is the correct order to do these things in the future.
But the problem is that people who were using a particular password for Inflatevids may also be using the same password on other websites that they're members of.
Or maybe just their banking password, or maybe their eBay password, or their email password could be the same.
I'm not taking shortcuts, no cats' names. And now I've got that memorised because it's so secure, why don't I just use it for everything? And I think you just explained why not.
But you may care less if someone broke into your New York Times subscription or something, because you're not putting any information in there.
If you just have the habit of always using a unique password, one that's been randomly generated, maybe by your password manager or something like that, rather than by your brain, then you're never going to accidentally use a dumb password.
Or what may happen is you may create an account on an online site at some point, which seems fairly harmless, and then later use it for some more serious purpose, but you're still lumbered with that daft password you initially chose.
And so if that information got taken, you would be screwed a bit.
So I was looking at this thread where the breach has been sort of announced.
He said we should fight, quote, Russian pigs, not inoffensive people who like inoffensive things, even if it's maybe a little bit strange.
And Thrax, the hacker, was obviously a bit riled by that.
He went and looked up in the database for Inflatayma, found him, then posted his address and even what looks like to be a link to his property in Florida.
I checked out the property listing.
He didn't check, didn't change it. He assumed that everything was going to be fine because he just got something off the shelf.
Obviously, he says that's going to have to change in future.
It doesn't explain how the hackers got in in the first place, but it's how maybe people are now able to find out what their passwords are.
So I don't know if either of you are members of InflateVids or any of our listeners. Bad news is there's no ETA for the website to come back. Rik says it may take months.
I don't know what you're going to do for your inflatable content in the meantime.
His avatar though, Duck, this is just for you, shows him splayed on top of an enormous inflatable football. So seems legit, either that or he's got some sort of other issue.
So there's a lot of this going on. Thrax, by the way, this isn't his first breach. He attacked Fast Company.
He hacked into Fast Company's content management system last year and he pushed out some obscene and racist notifications via Apple News to tens of thousands of subscribers.
So not very nice of him to do that either.
But also, if you're running a website, even if it seems to be harmless fun like InflateVids, I haven't seen any of their videos. Honestly, I haven't.
So I don't really know what goes on, but I assume it's all fairly harmless.
I didn't have the original email, and fortunately you, Graham, rode to my rescue because you, as a fellow WordPress user— I use the hosted WordPress, you I think run your own, which is why you got chosen— you received an email, and fascinatingly, to your privacy@ account, which I presume was done to give it more vibration, that was, in my opinion, surprisingly believable for a phish and led to a web domain that was astonishingly close to the real WordPress one.
Dear user, that's perhaps the only giveaway. They probably wouldn't have written that, but might have.
The WordPress security team has detected a remote code execution vulnerability in your site that allows attackers to add malicious code and steal your data, user details, and more.
And then words to the effect of, because we're working on a full-blown official patch to the product still, what we have done, the official WordPress security team, is we've produced a plugin that you can install in the interim, which will work around the vulnerability.
And there's a download button, download plugin.
It's got their logo. I mean, it looks convincing.
It's come to your privacy email account. So apart from the dear user with a lowercase u and one comma that I didn't like, but that may be a stylistic matter.
It was way, way better than usual. And this is not just some ChatGPT thing that's produced text that meets English grammar rules. It's nicely written.
All you need to do is download, install, and activate the plugin, ensuring a quick and trouble-free protection. That's not quite perfect English, but it's good enough.
You would probably just go to wordpress.org and start right there. However, I can see why people might go, well, let me click the button. I'm only going to the website.
Presumably my browser's patched. I'm not going to get pwned just by visiting the site. I mean, that can happen, but it's unlikely.
You click download plugin and you end up on a site that will seem targeted perhaps to your region of the world, because what these crooks registered is they got the domains en-au wordpress.org.
That's English Australian flavor. en-ca, which was the link that was in the email that Graham got. en-gb, they got NZ for New Zealand, US, and ZA.
It's a clever, it's a clever move, except they didn't actually get en-ca.wordpress.org because that's the real site. What they got was en-ca wordpress.org. It just looks right.
And I have to admit, when I went through to look at that site and I went through with the Tor browser, I took all my due care just to see what was going on.
When I looked at the page, when the page appeared to me, my immediate thought was, wow, this is WordPress's real site.
The crooks have actually tricked WordPress into accepting a plugin that is bogus, that I'm amazed they didn't spot them malware in it, and I'm amazed it's still up.
And then I looked back and thought, no, hang on, they're wordpress.org, and they're not— they won't have registered a separate domain for each region. They do them as subdomains.
And there it was, just that.
I'd have bought Apple shares at the same time, by the way, and mined a few bitcoins, so I don't regret it. Just one of those things I never got around to doing.
I suppose the idea is it's meant to be, you know, a free market.
It's meant to be a place where somebody who's big and rich can't just register duck.com and then say to me, oh, you want paulduck.com? Oh no, no, no, no, you can't.
So you can see why it's kind of liberal.
And I guess the idea is that the powers that be would just rely on WordPress saying, hey, this is clearly domain squatting or clearly the intention of fraud.
But that kind of takedown doesn't happen in minutes or hours or even days, perhaps not even in weeks.
So yeah, you kind of wish that it was easier to control because when you look at it, what were they thinking? Why did the .org registrar allow that domain. It's so obviously bogus.
So there's—
Now, the only obvious screw-up that existed by the time I looked at this, it was a few days after I'd first heard about it, but I didn't have any samples of anything yet, is it seems that the crooks had decided that part of the information they were using was now well known.
So they changed it. And this is another part of the trick that I think you're right, Graham, that if you're privacy conscious, security conscious, would draw you in.
They've included a bogus CVE number, right? It says CVE-2023-45124. And if you go to the MITRE website, or at least when I went there and did, I thought, is that a real CVE?
And I had a look and it's one of those CVEs that this really annoys me about the way MITRE do this CVE allocation is that sometimes their website is almost like your own worst enemy because it says this CVE is real, it's been allocated, but it hasn't been written up yet.
In other words, it exactly matches the story that the crooks pitched you in the email. We're working on a patch for the product WordPress.
In the interim, the CVE has been allocated and here's a workaround, a plugin. And obviously that first CVE, maybe news had got around and people going, oh, that's a bogus one.
Now it wasn't a fake. They hadn't just made up the number. They presumably chose the number that was in some kind of digital limbo where it did exist.
So it was real, but it wouldn't come up and say, oh, that's a bug some security appliance, or that's a bug in some kind of word processing software where you realize they've just stolen the number.
But they did change the patch number in the actual plugin details that I saw.
So there is a discrepancy between the slug in the URL, which mentions the CVE ending 45124, and the one in the body of where you download the plugin that says 46182, if you happen to notice.
It's a capital P halfway through, and they've put it in most places, not absolutely everywhere, but in most places they've put it with a lowercase p.
So the nerd in me might have spotted that because I write WordPress so often.
The other thing they didn't do, presumably they wanted one fake plugin page to deal with en-gb, en-ca, us, I think all the countries they had targeted.
I've put a picture of a real one from the real Canadian English-Canadian community site, and it actually has the name of the country at the top next to the WordPress logo.
And they haven't got that. That's a customization. But all their domains, I think, end up at the same page. So they presumably didn't get it together.
There is something we can all learn from this. If we're programmers or coders and not WordPress users.
And that is that although it says it prevents you getting malware and protects you against attacks, actually what the plugin does, as you've probably guessed, even if you haven't read my article about it, is it actually goes out and installs malware for you so that they can get back in.
And it just goes and downloads a free and open source PHP backdoor available. You can probably guess where it is. It's on GitHub.
Even though it's— you can't imagine why anyone would want to use it for legitimate purposes.
It's advertised on GitHub with, and I'm using big air quotes here, for educational and testing purposes only.
So the crooks can come back in with a password that they set into the code.
Lovely, lovely. You're all up to date. You can help the WordPress community by sharing the word.
We encourage you to share this patch with people you think might be affected by this vulnerability.
So you could actually be doing the bad guys' dirty work for them by getting your friends to install it as well.
But they've added the computer virus part into it by getting you to help spread it to your buddies. And that popup, it just looks fine, doesn't it?
The patch has been installed successfully, your WordPress is up to date, blah, blah, blah.
And in the ratings, they didn't just do what you'd expect and have everyone gave it 5 stars. They put in a few people who didn't like it.
They got a couple of people who only gave it 4 and 2, and they even had one person, no, 1 star, rubbish. It just—
According to Military History Wiki that I found, it's a concept occasionally expressed during war, insurgency, and other conflicts, and it's where one side seeks to prevail by not using superior force, but by making emotional or intellectual appeals to sway supporters of the other side.
Kind of rhetoric, basically, type of rhetoric.
But I would argue that he's won the hearts and minds of many people in the world, including that of celebrities, because actually, some of us know that he used to be an actor before he was the leader.
As if any country would hire someone just on the basis of appearing on a TV show.
And the strapline is, from Ben Stiller to Jessica Chastain, celebrities have embraced Ukraine's president and offer support to the country's war effort.
So that's kind of proof that he's the winner of hearts and minds of the moment, do you not think?
But yes, yes, Carole.
Putin, the smallish man who wrestles big cats and hunts bare-chested, why is he not loved and admired in the same way?
So a group has been working on this, revealed Microsoft just last week, in a rather novel way. And I'm so interested to hear what you guys think of this approach.
So here are the ins and outs of a new cyber campaign.
They have this unknown pro-Russian influence group, and they say they recruited legit bonafide Hollywood actors and other celebs.
So we have names like Priscilla Presley, Elijah Wood, Dean Norris, Kate Flannery, just to name a few, right?
And you're like, well, how did they get them to take part in a smear campaign?
Well, Microsoft thinks that these celebs were directly contacted via video messaging platform such as Cameo.
And Cameo is a website where you pay all manner of people, bonafide people, including a gaggle of celebs and comedians and whatnot to get personalized mini videos from your favorite stars.
Okay, and what you do is you kind of would say to him, hey, hey, hey, okay, here's your $400, can you address it to this person and make this message?
Like maybe I'd say, hey, you know, Graham. Yeah, I would say do it to Graham and say happy birthday for next birthday party or something like that, right?
You could send people little, you know, jokes or something.
And so if your mum, who currently thinks that the world of, I don't know, Thom Selleck or something like that, if she saw Thom Selleck wishing her a happy birthday, she'd think, oh, this is what he's doing now.
This is as good as it's got.
And if somebody wants to make, let's face it, $400 for a minute's work.
So anyway, so the pro-Russian influence group says Microsoft requested that these celebs create a personalized video.
They wanted a message to help encourage someone to seek help for their substance abuse, and this person was to be called Vladimir.
It's a one minute long, maybe whatever they grab, but then they put an overlay over it so it looks like it comes directly from the actor's Instagram page.
So they've overlaid things like emojis and links and the sort of stuff that give it a real feel, says the Register.
Because if you're known to have that particular viewpoint, it's when someone that you wouldn't expect suddenly seems to be Frodo Baggins.
But how weird is it? Why wouldn't you use a deepfake? Is it because the celebrity can't deny that he said it?
It's that WordPress page that I was just talking about and Graham said, "Oh look, they spelled WordPress wrong," which none of us had noticed till halfway through the podcast.
The thing is that nothing is quite as real as something that is actually real.
And there's nothing new with warring sides trying to bash in the reputation of the opposition. But why use Priscilla Presley, for Christ's sake? It's so weird.
So, it's gonna intensify as the war rages on.
If you're working crazy to get everything behind SSO and make sure everyone's using strong passwords and MFA, then Push Security is for you.
Push Security helps you to monitor and secure your entire identity attack surface, including non-SSO identities.
Get notified in real time to vulnerabilities across all your internet-facing identities.
What's more, Push Security then guides your employees to fix simple issues so your team can carry on fixing everything else. Want to check it out?
Well, head over to pushsecurity.com/smashing. That's pushsecurity.com/smashing, and thanks to them for supporting the show.
Expand the scope of your security program with Vanta's market-leading compliance automation.
Vanta's 5,000+ global customers report saving over 300 hours in manual work and up to 85% of cost for SOC 2, ISO 27001, HIPAA, GDPR, custom frameworks, and more.
And with Vanta's 200+ integrations, you can easily monitor and secure the tools your business relies on.
From the most in-demand frameworks to third-party risk management and security questionnaires, Vanta gives SaaS businesses of all sizes one place to manage risk and improve security in real time.
As a special bonus, Smashing Security listeners get a whopping 20% off Vanta. Just go to vanta.com/smashing. That's vanta.com/smashing.
If you work in security or IT and your company has Okta, this message is for you.
For the past few years, the majority of data breaches and hacks you read about have something in common. It's employees.
Hackers absolutely love exploiting vulnerable employee devices and credentials. But imagine a world where only secure devices can access your cloud apps.
Here, credentials are useless to hackers, and you can manage every OS, even Linux, from a single dashboard.
Best of all, you can get employees to fix their own device security issues without creating more work for IT. The good news is you don't have to imagine this world.
You can just start using Kolide.
Kolide is a device trust solution for companies with Okta, and it makes sure that if a device is not trusted or secure, it can't log into your cloud apps.
Visit kolide.com/smashing to watch a demo and see how it works. That's k-o-l-i-d-e.com/smashing.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they like.
It doesn't have to be security-related necessarily.
I have something that is not security-related. Thank you, duck. It does involve coding though.
No, not a raspberry pie you eat.
It's quite well known and you can send anything which looks like an ad coming over your internet connection to a black hole inside the Raspberry Pi so it doesn't get displayed on your computer, on your phone or any of your other devices.
Devices which are on your Wi-Fi. Now, my pick of the week this week is not a Pi-hole. It is something which is just like a Pi-hole called AdGuard Home.
It's a free and open-source piece of software from the folks who make the AdGuard plugin you might have used or the AdGuard DNS service.
It's not just put up there for research purposes only. It is put up there for legitimate purposes. You can run it on your Raspberry Pi.
You connect your Raspberry Pi to your router and it means that you can block ads and tracking and porn and all kinds of other things. You can customize it for different devices.
You can have customizable block lists. You can use some of the many other block lists which are already out there. And it works a treat and it works really well. I have a question.
Ask me a question. What would stop—
It's sending all the traffic through it in order that it gets filtered. So if they were able to also reconfigure my router, then potentially they could do that.
But that's protected with a password. Password. AdGuard Home is protected with a password as well. And I haven't used an easy-to-guess password.
It's one that's just sort of long and randomly generated.
What he can do, of course, is simply turn off Wi-Fi on his device and use his cell phone connection instead to access stuff.
And that, that's a whole other story of how you lock down your smartphone from being able to do things.
Go and check it out. I'm quite impressed with it. I've been running it for a couple of months now.
And I decided I'd buy the tiny little, the little entry-level one because it's really tiny and it fits in your pocket. I think it's called the Garmin Edge.
And it wouldn't be popular with people who like to track everything and have real-time online maps and do all the turn-by-turn navigation that many cyclists do.
I don't really like that because I like to just enjoy the ride, and I usually know where I'm going. I just sometimes get lost along the way. So I used a thing called Connect IQ.
If you're a programmer and you're a cyclist and you've got a Garmin, it is actually user programmable, and you can go and download their development kit, their Connect IQ development kit.
And you have to learn a language called Monkey C, which is— wow, if you already know C, it's pretty easy to pick up.
It's sort of like a scripting language, and you can write your own apps that display what you want while you're riding along.
And I used it to build, even my tiny little Garmin, the screen just fills up with a compass like an orienteering compass.
So it doesn't just give the bearing in like 203 degrees or whatever. It's good looking. You could just glance at it and see which direction you're going.
And I found that this, what you might call approximate navigation, where I know where I'm going, let's say I need to get from Oxford to Bicester, or I need to get from Oxford to the big Tesco, and I want to take a different route, and I know that I roughly need to keep going in a southeasterly direction.
Then when I get off track, I can just glance down at my compass and figure, yeah, I'm going a little bit off course. I need to take a right somewhere here and work my way across.
And so when you put the compass near it, it's like having a compass inside a car.
It's a very complicated thing to have one that's tiny, inexpensive, and that you can, that isn't set up specially, that you can remove so that it doesn't get stolen.
But it's great just having this big thing that just says, you know, well, north's behind you, north's ahead of you, or, you know, you need to turn left.
And I got to write the code myself and do a little bit of graphics.
And the other thing I did with it is I have a particular predilection for the typeface for terminal windows.
I like the typeface that was originally used on the IBM 3270 terminals from the 1970s. And there is a fantastic font called IBM 3270, free open source font.
And I actually adapted that and I used that for the little speedo part. So it actually looks like I'm riding along looking at an IBM 3270.
Yes, and I played that on a green screen, IBM green screen, like with the, yeah. I didn't— yeah, very cool.
Now, I've not chosen dumb things, I've not chosen obvious things, and I haven't chosen expensive things. So I've got 5 things under $50 for you guys to consider. So no saffron.
Yeah, no saffron. Weirdly, none of it you can eat. These are all tools or, you know. So one is an instant read thermometer. I use the ThermoPen.
This is a digital pen that instantly reads out the temperature of whatever you stick it into. So for example, all baked goods need to be at 200 Fahrenheit or 93 Celsius.
You just know that, and you never overcook or undercook a cake again, right? You never overcook your fish.
It's got— it's flat and has a coiled ring all around this kind of spoon-like shape.
It is so quick to do egg sauces, dressing, and even whisking whipping up cream for a hot chocolate. It's just a tiny great tool. Single mold mini and large silicone spatulas.
So you can get them with wooden handles, you can get them with different stuff.
I keep— it's there, there's quite a lot left, I need one bit, one spoon more, but you put your stainless steel spoon in and you come out with nothing.
Okay, not a wood one or ones with all kinds of, you know, handles and all that. Just a marble stick. It's about 1.5 inches in diameter.
Pastry likes cold, and marble is chilled, and it's way better than silicone or wood in my opinion. Just don't drop it, as I have done, so I have a second one now because they crack.
And so instead of, you know, they have things to open jars and they're these big clunky things. Hate those things. There's an answer. There's these things called rubber gripper pads.
It's basically a tiny thin— we're back to latex and rubber, children. It's a little round rubber and you, thin, and you just put it on top of the lid and bish bash bosh, you open.
These are not necessarily exact ones I have because some I've had for a long time. I had no idea where I got them, but you'll see what I'm talking about. So check out the show notes.
These are my pick of the weeks. Thank you very much.
What is the best way for folks to do that?
I can't believe I didn't say Twitter, but I'll say Twitter as well. I am @ducklin. Blog, and you can find me as P. Ducklin on Facebook and LinkedIn as well.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Spotify, Overcast, and Apple Podcasts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 351 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Paul Ducklin – @duckblog
Episode links:
- Fuzzy Duck – Wikipedia.
- Cybercrime author Geoff White demonstrates his NSFW balloon trick at the “Smashing Security” podcast Christmas party – Reddit.
- Rule 34 – Wikipedia.
- We are (temporarily) offline – InflateVids on Patreon.
- Fast Company’s Apple News access hijacked to send an obscene push notification – The Verge.
- Fast Company Hacker on Rogue Apple News Notification: ‘Anyone Could Have Done It’ – Vice.
- The WordPress backdoor with its own backdoor! (And fake CVE numbers, too) – Paul Ducklin.
- Russian influence and cyber operations adapt for long haul and exploit war fatigue – Microsoft.
- How Zelensky became Hollywood man of the hour – The Guardian.
- Nigel Farage wishes Hugh Janus a happy birthday – YouTube.
- Don Johnson – Cameo.
- Hollywood plays unwitting Cameo in Kremlin plot to discredit Zelensky – The Register.
- Winning hearts and minds – Military Wiki.
- AdGuard Home – GitHub.
- Garmin Edge 130 Plus – Garmin.
- Garmin Connect IQ – Garmin.
- The Thermapen.
- Flat Whisk Stainless Steel Egg Beater Mixer Kitchen Tool – Amazon.
- Small Silicone Spatulas – Amazon.
- 3 Pcs Rubber Jar Gripper Pads – Amazon.
- Marble Dough Roller – Amazon.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Push Security – Monitor and secure your entire identity attack surface, including non-SSO identities. Get notified in real-time to vulnerabilities across all your internet-facing identities, and have your staff guided to fix simple issues.
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Device Trust for Okta. Watch the demo today!
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get 10% off!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

