
Is there any truth behind the alleged data breach at Fortnite maker Epic Games? Who launched the ransomware attack that caused a fallout at pharmacies? And what’s the latest on the heart-breaking hack of Finnish therapy clinic Vastaamo?
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Jessica Barker.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name is Graham Cluley.
And he asked me some pretty good questions about cybersecurity when he pinned the medal on me. Yeah.
So I think we're all right. I think we're doing all right.
Now, coming up on today's show, Graham, what do you got?
I don't play video games, Tim. You don't play video games? Jess, do you play video games out there in Vegas?
They used to be called Epic MegaGames in my day, but now they're just called Epic Games. They are the people behind Fortnite, that incredible phenomena.
They just— because I was so bad at it, as I am at all 3D games, they said, what we're going to do is we're going to turn on your auto-shoot thing so you don't have to press shoot.
You just have to point at someone to shoot, they said.
Anyway, Epic Games headlines broke. That it had fallen foul of hackers.
The hackers supposedly had stolen 189 gigabytes of data, including email addresses, names, payment information, source code, the works.
You have rock stars performing at virtual events, within the Fortnite game.
You are in the virtual Fortnite world and there's a concert going on in the world where you can be doing all your Fortnite dancing and everything in front of the stage.
And there up on the stage are the stars or the movie, or— and they also have these massive endorsements by brands.
So the Avengers movies will do a deal with Fortnite to incorporate their characters into the game, or Lego recently have done something with Fortnite as well.
So it's an amazing amount of money slushing around. And so obviously a hack could be extremely damaging.
In this particular case, the people who claimed to be behind the attack were a cybercrime group called Mogilevich. Have you heard of Mogilevich?
There is a chap, I think he's called Semyon Mogilevich or something, and he is on the FBI's— I think he's number 149 in their top most wanted list.
He's way out of reach of the American authorities, and he's dropped, he's sort of plopped down the list. He's no longer causing that.
Anyway, that appears to be who this cybercrime group have named themselves after. There's no reason to believe that it's actually connected with him.
But they posted a message on their website on the darknet claiming that they had hacked Epic Games, because of course that's what these gangs do these days, these ransomware gangs.
They advertise who their latest clients are. In other words, the companies they've hacked, how much data they've taken.
Quite often they talk about their market capital as well as to how much money these organizations have.
This hacking group have said it, but some people actually went to the effort of asking Epic Games and said, so you've been hacked then? And Epic Games said, not as far as we know.
I can understand this because it's not always easy to know if you have been hacked or not, because when it's something digital which has been taken, when it's something that's been copied as opposed to something that's been physically stolen, it's not like the Mona Lisa has left a gap on the wall, right?
Then it's hard to know if it's happened. And in particular case of Mogilevich, they weren't presenting any evidence that the hack had happened.
So Epic Games said, "There's currently zero evidence that these claims are legitimate. We haven't been contacted by this gang. They haven't provided any proof of this.
All we can see is a screenshot which has been posted up on Twitter of their webpage on the darkweb saying that they've hacked us." And—
But are you saying that there was reputable press that were talking about this?
And what Mogilevich did was they said, well, look, if you want proof, you are going to have to hand over $15,000 because we don't want, they said, we don't want to hand over any evidence which could be used by other people to claim that they've hacked Epic Games.
But it's interesting, Epic are being very transparent in their statement, aren't they? Saying, you know, we're investigating. They're not just saying we're investigating, full stop.
They're saying we have no evidence and they've given a bit of detail there. But this whole thing of give us $15,000 for us to give any proof, that's, as far as I know, that's new.
They also claimed last month to hack a subsidiary of Nissan. They also claimed to hack Ireland's Department of Foreign Affairs. And another outfit called Bazaar Voice.
But here's the thing. Here's the thing which has now emerged. A Mogilevich spokesperson.
Now, what— okay, if you're dealing with a ransomware gang, what's the kind of name you expect of a criminal operation? What would the name be of one of their spokespeople?
They're saying, we are a professional group of scammers who pretend to hack big companies in order to trick people.
They say it involves false claims where they pretend to hack major companies to gain attention.
So they're offering to take on board new affiliates.
They're saying, send us a screenshot of your cryptocurrency wallet so that we can see that you've got that much money in the cryptocurrency. What, $15,000? Yeah, yeah.
They're collecting screenshots of potential buyers, people who want to buy the data, their crypto wallets, and they're then using those screenshots, right, that they've been given to pretend— well, what they're doing is they're using them to use as evidence to sell stolen crypto accounts.
So there's other people who want to buy crypto accounts. They're saying, yeah, well, look at all these ones we've got access to. Here are the screenshots.
I'm not the one deploying the ransomware, but I can sell you access to these companies.
So they've got people who are applying again to work with the Mogilevich ransomware gang, if we call it a ransomware gang for a moment.
They're saying, give us the proof that you can access these companies. And then they are turning around and selling the evidence of access for profit themselves as well.
Like layers upon layers.
By the way, they claim that the most money they've made, they claim that they fabricated a data breach at the drone company DJI.
I don't know if you know that, they're quite a popular drone manufacturer.
They're going to incur expenses investigating the false claims, having to get their PR companies or legal department involved.
And in some cases, we've even seen lawyers rush to file class actions, going for compensation for a data breach, which has never actually happened, purely because someone called Pongo has claimed that it has.
When you're working for an organization and there is this apparent data breach, the stress that causes everybody directly and indirectly in that organization can be huge.
And then to turn it around and find it's actually just a scam within a scam.
And if you're a good journalist, she'll be oh, that's interesting, let me do some fucking digging, right?
They're relying on how difficult it can be to see the wood from the trees.
But they have done is they've got journalists to write about them, helping make them famous, and indeed podcasters talk about them.
And then coming up with this insane plan. And then somehow they were able to pull it off in the real world. And what does that say?
Malware, a ransomware attack that has reportedly affected over 67,000 pharmacies and maybe around 130 million customers in the US.
It seems that the BlackCat group are back with an attack on Change Healthcare. I had not heard of Change Healthcare until last week, but hearing a lot about them now.
They connect US healthcare providers with the insurance companies who pay for their services and determine what patients owe.
So in the US, when you're going to get your prescription, often it's a copay thing.
I'm still learning the system here, but copay thing where insurance will pay most of it and you as the patient might pay a small sum.
It says that it manages 15 billion claims totaling more than $1.5 trillion every year. Huge.
And recently, late February, it seems that Change Healthcare was hacked and the attack has been claimed by BlackCat, also known as ALPHV.
The criminals stole data about patients, then they encrypted the company files. And, you know, we know how the story goes. Demanded payment to unlock the files, to decrypt them.
Change Healthcare then responded, as many organizations have to do when they're hit with ransomware, by shutting down most of its network to try and contain and recover from this horrible situation.
And it's especially horrible because it's having a huge impact on people. Many patients saying they can't get their medication at all because of this.
Lots of people saying they are going to a pharmacy thinking they're going to be getting their prescription, and then they're given a choice.
They either pay full price for medication or go without.
I read just before we went to record this in the Washington Post, one patient saying of the difficulty she's been having getting medicine for her bipolar disorder.
She's then told, oh no, you only have to pay us $450, but normally it should only cost her $15.
And so people are in this position where they are not able to afford to get the medicine that they need.
And to make it worse, the communications have been criticized, and it seems that patients are only finding out if their coverage has been affected when they turn up to try and get treated by a doctor or get their medication.
So people aren't—
You haven't been told in advance, no preparation, and you stood there in a pharmacy probably feeling pretty vulnerable.
They're the bit which actually look it up on your insurance records and can tell the pharmacist, yes, this has been paid for by so-and-so, therefore they don't have to pay so much.
Said to be costing hospitals in the US millions, and the American Hospital Association has said this is the most significant attack on healthcare in US history.
And so it's had this huge impact. It's really hit the headlines. There's been lots of people talking on social media, of course, about the impact that it's having on them personally.
And just as we were going to record, I saw Wired reporting that Black Cat have apparently received a payment of 350 bitcoin, equivalent to about $22 million. Wow.
So of course, speculation that because of all of this disruption, they have been paid off.
As we know, it can be a case where ransomware gangs are paid and then there's still a whole heap of disruption, and it doesn't mean things necessarily just ping back to normal.
And the news just in, as we're seeing a return of the debate about whether to ban ransomware payments. So very interesting.
At least that bit of the infrastructure was working.
I read that while writing my forthcoming book, "Hacked: The Secrets Behind Cyberattacks," where I talk about ransomware.
And one of the chapters, of course, is on ransomware, as well as lots of other issues that we're dealing with in cybersecurity and some of these stories that emerge, some of these issues that come out and the impact they have.
So to that we say yay. But what happens if the trust between patient and therapist is broken? And you've already shared some stuff, it could be absolutely catastrophic.
And Vastaamo provided mental or private mental health services to its patients through 25 therapy centers dotted across Finland.
And they even subcontracted their services to the Finnish health system.
And you would think, right, or maybe I'm crazy, but you would think, especially if you worked with the national health system, that you'd have pretty robust security in place.
I mean, therapists, literally the protectors of secrets.
And worse than that, they said that the attackers had stolen patient records, approximately 36,000 confidential psychotherapy patient records and 400 employee records were now in the wrong hands.
And surprise, surprise, we have a trifecta of ransomware discussion today. A ransom was demanded of approximately €450,000 in bitcoin.
And the threat was pay up or these records will find themselves in the public arena.
So if I were a patient, maybe I would be recorded in my notes only via reference number, just in case the information maybe got in the wrong hands, so they might know personal information, but they wouldn't be able to directly tie it to me specifically.
I'm totally bonkers. Graham, you're always right.
The hacked patient database contained clients' personal information such as their full names, home address, email address, social security numbers, name of the clinics where they receive treatments, therapists, and doctor's notes from each session.
So things like, I hate my boss, dad, mother, sibling, spouse. I have addictions to food, drugs, gambling, alcohol. I was mistreated, unloved, unseen. All that stuff.
He published the therapist notes of at least 300 patients, including politicians and police officers, and this was all on Tor. But the hacker didn't stop there.
He also thought it might be fun to approach victims directly because, God, he had all their information, full name, email address, social insurance number, and why not email them directly with extortion demands, you know, saying, hey, pay me €200 in bitcoin within 24 hours.
Or actually, the ransom will go up after that to €500.
Now, Graham, you talked about this on an earlier Smashing Security episode.
Oh, basically advertising his involvement in the crime to anyone who might have been looking for him. And trust me, the Finnish authorities were.
And, boy, did I— I still had an Ethernet cable. I thank God I ripped that cable out so fast.
Now, this accident of his led to the arrest, his arrest by French authorities, who soon extradited him to Helsinki.
And as I speak, Ransom Man is now on trial, and the prosecutors are asking for the maximum penalty of 8 years.
And he stands accused of aggravated computer break-in on nearly 10,000 counts of dissemination of information violating personal privacy and more than 20,000 counts of attempted aggravated extortion and 20 counts of aggravated extortion.
So they've got him. He's got a lot of counts.
Otherwise, your deepest, darkest fears and secrets are going to go out there in public. It's just a horrible scenario to think about putting someone through that.
So this for me is invasion of privacy as serious as it gets, right? I think we all can agree on that. It's even led to suicides.
And then I started wondering whether this hack is worse than the hack on adult hookup site Ashley Madison, which happened what, 8 years ago? I have no idea.
Where victims were effectively ousted online as cheaters.
The last you want is the threat that your information is going to be made public.
So you may not even have chosen to go there on your own.
And then what, you're gonna— how are you gonna recover from something this? It has such an impact on trust, doesn't it? It's, I think it's worse.
I mean, it certainly reminded me of Ashley Madison as you were talking through it in terms of the impact. It just doesn't bear to think about doing this to people.
And presumably, he dipped into the files and he read, you know, what was in those notes, and then to go to that person just is really hard to get your head around someone doing that.
Companies that continue relying on outdated technology put their sensitive data at risk.
Well, this podcast is sponsored by KiteWorks, who enable organizations to effectively manage risk in every send, share, receive, and save wave of sensitive content.
To do that, they've created a platform that delivers content governance, compliance, and protection to customers, tracking, controlling, and securing sensitive content as it moves within, into, and out of organizations, all while ensuring regulatory compliance on all sensitive content communications.
KiteWorks provides the industry's first private content network for protecting risky third-party communications with secure email, secure file sharing, secure mobile, secure platforms, managed file transfer, and governed SFTP servers.
Visit KiteWorks.com to get started today. That's KiteWorks.com, and thanks to them for supporting the show.
Vanta gives you one place to centralize and scale your security program. Quickly access risk, streamline security reviews, and automate compliance for ISO 27001, SOC 2, and more.
You can leverage Vanta's market-leading trust management platform to unify risk management and secure the trust of your customers.
Plus, use Vanta AI to save time when completing security questionnaires. Smashing Security listeners, you get 20% off Vanta.
All you lucky sausages have to do is visit vanta.com/smashing to claim your discount. That's V as in Victor, A-N-T-A.
Well, that's pretty big news since these two companies are leading the industry in creating security solutions that put users first.
For over a year, Kolide Device Trust has helped companies with ensure that only known and secure devices can access their data.
And that's what they're still doing, but now as part of 1Password. So if you've got Okta and you've been meaning to check out Kolide, now's a great time.
Kolide comes with a library of pre-built device posture checks, and you can write your own custom checks for just about anything you can think of.
Plus, you can use Kolide on devices without MDM like your Linux fleet, contractor devices, and every BYOD phone and laptop in your company.
Now that Kolide is part of 1Password, it's only going to get better. Check it out at kolide.com/smashing to learn more and watch the demo today.
That's k-o-l-i-d-e.com/smashing, and thanks to them for supporting the show. And welcome back. Can you join us for our favorite part of the show?
The part of the show that we like to call Pick of the Week.
It could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they like.
It doesn't have to be security-related necessarily.
Okay, we've had decimalisation, so we no longer use pounds, shillings, and pence. You know, we went metric, right? We went decimal. Fantastic. That's happened.
Many countries now, they've dropped the mile. They're using kilometres instead. Tremendous.
But we still have this oddity which is known as time, where we're splitting days up into 60-minute hours, and there's 24 hours of those in a day, and there's 365 days in a— eh, not this year though, because this year was a leap year.
So every 4 years, as we know, we inject an extra day into the calendar. And what do you know? Things go wrong.
Because yes, ladies and gentlemen, even in 2024, 24 years after the Millennium Time Bomb—
In New Zealand, as we hit February 29th, and of course New Zealand gets hit first because that's the first sort of major populated place where the new year comes in, where a leap year comes in, some of their gas stations across the country stopped people to pay for their gas, for their petrol, on Thursday because it couldn't cope with the date of February 29th.
And so they weren't able to process payments, which I think is rather quaint in 2024 that that kind of thing is still happening almost a quarter of a century after Y2K.
And I also noticed that some security vendors and software vendors also failed as a consequence of the leap year bug. Oh! Including, yes, including a company known as Sophos.
I don't know if you've ever heard of them, Carole. No! A number of their pieces of software failed on February the 29th, as did Citrix as well. Some of its software.
Is my nitpick that leap years actually exist and we haven't yet decimalized time, or is my pick of the week that I'm actually tickled by the fact that we're still having these problems?
And let's not even talk about the Linux time bomb, which is, is it 2038? Okay, let's not. I'm giving you warning now. I mentioned it here first.
That's when we're going to have trouble as well with Linux, but yeah.
It's kind of a light sci-fi comedy about an alien who crashes on Earth during a mission to wipe us humans out of existence.
So, you know, kind of premise we've heard before and doesn't necessarily sound necessarily hilarious, but I would highly recommend it.
It's sort of easy to watch, it's escapism, and it's a kind of adult, but not that kind of adult, Mork and Mindy.
But I loved Mork and Mindy when I was growing up, and it's slightly— it's got a slight Mork and Mindy but for 2024 vibe, slight undertone, you know, of darkness, but very funny and kind of wholesome.
So if you're looking for some escapism that might also surprise you so check out Resident Alien. Let me know what you think.
To warn people not to do that, to be more careful. So, this Reddit community, this is all on Reddit.
This is actually a Pick of the Week that comes from fan of the show, CEO of Traced, Ben Jones. It's a Reddit sub called Spotted on Rightmove.
And it's a community that collates wacky properties found on the UK house flipping site, Rightmove.
I don't know if you have I don't know if we have it outside the UK, but you'll see hugely inflated house prices or incredibly nasty bathroom suites, or there's one where it's, is that blood on the mirror?
Right? Or just unusually beautiful or nasty places to live. So one that I saw had this bath, you know, and people talk about the avocado suite being pretty hideous.
This one is basically raspberry ripple ice cream. So it kind of looks like there's blood everywhere across the backs. There's another living room covered with swords of all sorts.
And my favorite, and the title in the subreddit, the title of the thread is, this property is perfect if you want to warm up your lunch while taking a poop.
Oh, because the toilet is literally a foot away from the counter in the kitchen. Yes.
Have fun if this sounds like your thing, and thank you, Ben, for this pick of the week.
What's the best way for folks to do that?
And shameless plug, of course, I have a new book coming soon, which you can pre-order now, Hacked: The Secrets Behind Cyberattacks.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Overcast.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 361 episodes, check out smashingsecurity.com/podcast.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Jessica Barker – @drjessicabarker
Episode links:
- Mogilevich claims it has breached Epic Games – Twitter.
- Fraudster’s fake data breach claims should remind media to be carefu what we report – DataBreaches.net.
- Prescription orders delayed as US pharmacies grapple with “nation-state” cyber attack – Bitdefender.
- US pharmacy outage triggered by ‘Blackcat’ ransomware at UnitedHealth unit, sources say – Reuters.
- Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment – Wired.
- Vastaamo data breach – Wikipedia.
- The CEO who also ran IT, Strava strife, and TikTok tall tales – Smashing Security podcast.
- Ex-CEO of hacked therapy clinic sentenced for failing to protect patients’ session notes – Bitdefender.
- Ex-CEO of breached pyschotherapy clinic gets prison sentence for bad data security – Sophos.
- Vastaamo victims’ lawyer: Some took their own lives after patient record leak – Yle.
- Prosecutors call for maximum penalty over Vastaamo hacking – Helsinki Times.
- Self-pay gas station pumps break across NZ as software can’t handle Leap Day – Ars Technica.
- Citrix, Sophos software impacted by 2024 leap year bugs – Bleeping Computer.
- Resident Alien trailer – YouTube.
- Resident Alien – Netflix.
- r/SpottedonRightmove – Reddit.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Kiteworks – Step into the future of secure managed file transfer with Kiteworks.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get 10% off!
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Device Trust for Okta. Watch the demo today!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
