
Apps can let you spy on strangers in bars, a gang of cryptocurrency thieves turns to kidnap and assault, and have you joined the mile-high evil twin club?
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley of the brand-new “The AI Fix” podcast (co-hosted with Graham!).
Talk about nepotism.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security episode 379. My name is Graham Cluley.
But the good news is that we're joined by a special guest this week. Someone who's been on the show many times before, but under a new guise this week.
It's Mark Stockley of the AI Fix podcast.
You and me, Mark, we're going to discover AI and share some weird stories, and who knows what we'll find on the way.
It's their support that helps us give you this show for free. Coming up on today's show, Graham, what do you got?
So I say to you squares, get with it, Jackson, because the ginchiest thing you ever saw is a 50-something podcaster cooking with gas. Ya dig?
You can imagine me donning my smoking jacket, my espadrilles, my plus fours, hitting the hip happening joints in my hometown.
But the question you also have to ask yourself when you're going out for the night is where to go.
That's the difficult question to answer because you want to go somewhere where there is what I believe is known by the kids as a vibe, somewhere that is hot.
Well, I wouldn't have had a problem if I lived in Dundee in Scotland, where an enterprising student has launched an app for your smartphone, Android and indeed iPhone, and it's called Whoz Out Tonight.
Whoz is spelt with an H. So it's who's out tonight, which is my approximation of a Scottish accent.
It was put together by a fourth-year medical student called Thom Whitelaw, and he developed Whoz Out Tonight so that people could— well, the app can track your location, and it guides partygoers to the best spots in town, it says.
He was describing to the media how he went out with his friends one night in Dundee, and there they are barrelling down the road, and they went to one venue.
They paid £5 to get in, and what did they find?
What do medical students do?
They just used the silence, took the opportunity, spent a few hours, made the app, found someone with the app, 2 AM, £15 well spent.
These are people you've pre-approved. And the map doesn't show how you are travelling to a particular location.
They just want to say when you check into somewhere. And he was asked by the press, how do you stop abuse? And he said, don't worry about that.
We've got inbuilt measures in place to stop abuse.
You want to— I'm going to be responsible for choosing people that I know, and you're responsible for making sure that the right information is shared with them. Got it. Okay.
So in principle, if that data is held securely, if the app has been developed by professional app developers rather than in a bar while they're waiting to find some girls, then everything should be fine, right?
Everything should be okay because they're only going to notify people who you've friended via the app as to where your location is.
If you're not friends of anyone, you would be able to see that there are maybe 80 people checked in at a particular venue, but you won't be able to see who specifically is in that bar.
So you'll be able to see the popularity of a place, but you won't be able to see who is there. I don't know if it tells you what gender they are.
And my bad feeling is, when somebody says to me that my privacy and security is important to them, I get the same feeling as when somebody tells me their call is important to me.
But I imagine they're all so bladdered that they haven't actually had the compos mentis to actually test the security of the app to see if there are any vulnerabilities.
So there is an app called Two, the number 2, Night.
And the chap who's created this app has predicted that demand's going to be really high, because he says San Francisco night scene, he's had problems navigating it.
What it does is his company has set up a network of cameras across San Francisco venues that let app users see how busy events are, not by people checking in, but instead by them looking at the livestream video from particular bars.
I think I do, because if I were a 20-something kid wanting to go out and party, especially if I'm in the States and it's a long drive, you know, it's not an A to B.
I'm not living in New York and it's easy to get to. It's far, you want to check and make sure it's worth its salt.
So working out the ratio and who actually is there, I think it makes a lot of sense.
But it's interesting that you think this is a good idea because they've suffered a real backlash on social media because bar-goers are claiming their privacy is being invaded.
People say, forget that shit, they're saying.
And some of the bars are upset because some of them are saying, we've been listed on this app and we haven't actually signed up for this, but it's advertising that we're members of the network.
That's what they're worried about.
Like, for instance, your partner, or maybe your boss, because you've got a big project to hand in at 8 o'clock the following morning.
Is the tutor gonna spend his time going through every single bar, all the live footage to see if they can spot you?
And so my story today is all about an absolutely horrible individual called Rémy Saint-Félix and his gang.
And that's good news for all of us, but particularly for people living in North Carolina, Florida, Texas, and New York.
Because Saint-Félix is a horrific individual who's just been convicted of a series of violent home invasions and is now facing 7 years to life.
When cryptocurrency was booming, you couldn't go a week without somebody, normally the owner, siphoning off half a billion dollars in bitcoin from some dodgy online exchange or abusing a smart contract to ransack somebody's collection of monkey pictures.
But Felix wasn't like those thieves. Now, crypto theft is never victimless and it can cause significant harm, but it is at least normally bloodless. But St.
Felix and his gang were not bloodless. They targeted cryptocurrency owners and they broke into their homes.
And then once they were inside, they threatened and even tortured the occupants in an attempt to get them to transfer money or hand over passwords. Oh boy, that's really nasty.
And in fact, they'd actually have been much better off staying online, which is where they started. So the origins of the gang start with a chap—now, if you like St.
Felix's name, you're going to love this one.
So the origins start with a chap by the name of Jared Seemongold, who cut his teeth on SIM swaps, working bizarrely with a group of people that he met in Minecraft.
Which is easily the weirdest thing about the whole story. I mean, I thought Minecraft was this sort of charming educational game for kids.
It's the one thing online that I had no problems with my kids spending all day on. But who knew? It turns out it's a gateway to violent home invasions.
I should just let them use TikTok or something. Anyway, so SIM swap is where you trick a phone company into transferring somebody's phone number to your device.
And that allows you to receive their two-factor authentication codes when they log into an online account.
So, you know, you type in your username and password and then your phone says, you know, now you need to type in this six-digit code that appears on your phone.
And so if you've guessed someone's password and you've stolen their phone number through a SIM swap so you can get their 2FA codes, then you can break into their crypto accounts and you can steal their money.
And it sounds like Seemongold was actually quite successful at this. And in one case, he even managed to steal $3 million from a single victim.
But it seems after a year or so of doing this, he started to think about ways to target people that he couldn't hack.
So for example, one of the victims was someone that he had stolen money from online, but he knew there was more money to be had.
So there's this whole group of other people who've got slightly better online security that aren't going to be vulnerable to that kind of attack no matter what.
And so this guy, Semangull, approached St. Felix and two others, and then St. Felix recruited a bunch of other people until they had a gang of about a dozen.
And although the crimes happened in the real world, obviously very little happens in the real world today that doesn't also touch the online world somehow.
So the gang took steps to protect themselves online, and they were using cryptocurrencies, of course, and they liked Monero, which does a much better job of keeping you anonymous than Bitcoin.
Which is only pseudonymous, right? And they use the Telegram encrypted messaging service to plan their crimes.
Because for some reason, criminals always use Telegram rather than Signal. I don't know why.
But if you tell me that you're a Telegram user, I'm basically going to assume that you're either a crook or you're a Russian mill blogger. Those are your only two options.
And in the words of the US Department of Justice, although the members of this violent conspiracy tried to cover their tracks through encrypted communication and anonymous financial transactions, they were not beyond the reach of our dedicated investigators and prosecutors.
And you can say that again.
And they must have been an unimaginable ordeal for the people who were involved.
So instead, I'm going to focus on the criminals because I'm absolutely not above poking fun at awful individuals.
But just so that you know, these were violent crimes with real victims. Now, one of the invasions happened in North Carolina in April 2023.
And it started with members of Felix's gang disguising themselves as construction workers by wearing safety vests and khaki pants.
Anyway, once inside, they coerced the occupants into transferring exactly $156,853 of cryptocurrency. And then after the attack, the criminals had to split the money.
So Castro and Felix both opened cryptocurrency accounts not long after leaving the crime scene.
You'd imagine that criminals who are savvy enough to use Monero and Telegram to cover their tracks are going to use some kind of shady offshore exchange rather than one that the FBI can pick up the phone to, say Coinbase.
And if you've got an account there and you're of interest to the FBI, the FBI pick up the phone and they wave a search warrant at Coinbase and Coinbase goes, here's everything we know about these people.
And as Graham pointed out, you don't get to open one of those accounts without providing some ID.
And so not only did they provide their names, but they also provided their phone numbers, their addresses, their email addresses, and copies of their driver's licenses.
Wouldn't that be a— well, sorry, I don't want to give people ideas, but wouldn't that have been a—
And we all know that phones can be used to track people. Oh yes. So obviously there's no way they'd be stupid enough to go anywhere near the crime scene with their phones, right?
Well, if you're thinking that, you'd be wrong.
If I'd committed a crime and I was going to the scene, I'd probably leave my phone at home. Wouldn't I? I probably would.
And then returned to Florida a few days after.
And then cell tower data put both the phones in the vicinity of the home that was raided in the days before the attack, at exactly the times that camera footage from local residents had spotted a BMW SUV conducting surveillance on the victim's home.
We're going to do it far away from where we live so people can't track it back to us.
But they do go to the effort of getting themselves a car or something with fake plates to conduct surveillance on the house.
It's like, if you're gonna be a genius at one thing, and you're doing crime... crimes, I mean, it seems like an obvious choice to me.
Anyway, so the police don't just have access to phone records. They even also pull details of what money you've spent and where.
Now you'll recall that these criminals were big fans of cryptocurrencies. And so it was natural that they would cover their tracks by buying the things they needed using crypto.
Uh-oh. I'm kidding, they didn't do that. They used a debit card. The day before the attack, Castro used a debit card at the victim's local Walmart to buy safety vests and khaki pants.
And the surveillance cameras at Walmart spotted both Castro and St Felix making the purchase.
And they also spotted a BMW SUV in the Walmart car park that matched the one that was later seen surveilling the victims.
But the real treasure trove was the email addresses that Castro and Felix gave to Coinbase. Oh no.
So Castro's email address was associated with an iCloud account which allowed police to access messages exchanged between the two.
And in those messages, they discussed going to North Carolina, hiring a car, and staying in a specific hotel.
And the police also found a picture of a very distinct pink pistol that one of the victims had identified during the attack. A pink pistol? Why would you photograph the gun?
I just— Pink! Well, yeah, you want to look good when you're doing a home invasion, right?
It's the sort of thing you have to be very careful with if you're sharing your photo stream. I just ignore them.
So evidently, St Felix likes taking pictures, because he was kind enough to photograph the following things for the police. He took a picture of the victim's licence plate number.
He took pictures of the BMW SUV that was seen surveilling the victim's house and visiting Walmart, where the crooks bought their construction outfits.
And the criminals, they had sort of prior information about the account that they were raiding, right. So that's what that screenshot is. Wow.
Now there's one last photograph, and I've saved it to last. 'Cause it's the best one, right. But rather than me tell you what's in it, I want you to guess.
So, based on what I've told you so far, what do you think could be in the last photograph?
So Felix took a picture of himself posing in the hotel where the gun and the keys were photographed while wearing the construction outfit that he'd bought from Walmart and would later wear at the victim's house.
Where someone's gonna sit and where the other one's gonna sit.
And let's be honest, you're both feeling a little weary because, you know, you're nearing the end of your global live podcast show tour for The AI Fix. Okay. Oh, yes, that's right.
Anyway, I'm glad it was autographs. Anyway, Mark has taken to wearing a white microfiber towel around neck to daub his celebrity glow.
Graham, you're sporting a flowery silk pajama suit, and you're sitting in the very cozy seats, smooshed in.
You're both silently fighting for command of the single armrest between you that you're sharing. Mark's knees are probably gunked into his chest because he's quite tall.
He's not that tall. Huzzah, though. Huzzah, the flight has free Wi-Fi. Brilliant.
You know, everything else can go to shit, but as long as you can sit there on your phones to check your latest show stats. Oh yeah, yeah. To see if you've kept your hot position.
Yeah. You guys are happy. And as you connect, you notice there's two Wi-Fi addresses showing up, both official airline offerings, right? Oh. And you're thinking, this is the life.
The airline might have ignored the legroom issue but has splurged to cover, you know, for the data hogs, people like you two. But guys, you'd be wrong.
Because it's something much more sneaky and I would say unusual, an evil twin Wi-Fi network. Dun dun dun. Okay, I'll get real sound effects, maybe. Maybe not, I don't know.
So seriously that just a few weeks later the AFP investigators search a 42-year-old man's baggage at Perth Airport. And what do they find?
A portable wireless access device, a laptop, and a mobile phone from his hand luggage.
So I was going to pause here and ask you guys, a portable Wi-Fi access device, laptop, mobile, not that suspicious really, is it?
I think it's, for instance, it may be that you want to set up your own private little wireless network wherever you are heading to.
Rather than relying on whatever a hotel is gonna provide or whatever a conference centre is gonna provide, maybe. Or your cell provider, maybe.
Do they have sockets in first class?
So basically the allegation from the Australian Federal Police is that this 42-year-old man used this portable wireless access device to create a Wi-Fi network with SSIDs very similar to those airlines operate when they offer in-flight access to the internet or for entertainment or whatever.
And the AFP stipulate this guy set it up at multiple locations to lure unsuspecting users into believing they were legit services and to sign up into the bogus Wi-Fi hotspot.
And the way that this guy did it is once they tried to connect their device, they were taken to a fake web page requiring them to sign in using their email or social media logins.
And then those details were allegedly saved on this man's device.
You will connect to any Wi-Fi network you can find, which could remotely be one which works, and you will enter your details and you will possibly enter your credit card details.
And if it manages to also scoop up your account details for your cryptocurrency exchange or whatever else that they might be able to grab, then, you know, potentially there's— and the kind of people who would use the internet on a plane, which is normally charged at such a ridiculous rate, are probably going to be the high flyers.
Aren't I clever? Anyway. This was free.
And apparently he also targeted the Perth airport Wi-Fi. But the question I've got is, had this guy done this at a local cafe, would anyone give a shit? Would anyone be the wiser?
Do you think the attention of the AFP would have been there? He went to national or international airports and started, you know, doing this on planes.
It kind of seems like a super— I don't know, maybe he was targeting a specific person.
You basically have to put up a website. You can do that at like Wix or something. It's essentially free. You can do it in half an hour.
You send out a couple of hundred thousand emails.
And this guy's out there rubbing his hands together going, if I get on a plane with fake Wi-Fi, I can access as many as 250 people in one go for nothing more than a plane ticket that cost me $1,000.
It's so weird.
It was quote, to connect to a free Wi-Fi network, you shouldn't have to enter any personal details such as logging in through an email or social media account. Really?
Now I've been on many free Wi-Fi networks and I find that they try and hoover up as many personal details as they can.
So I find that a little bit — I don't think that would be an area where you'd suddenly be nervous. That is absolutely a thing.
They're gonna hoover up all your data, and they're gonna steal all your passwords and things like that." But now, pretty much the only danger is that bit where you type in your email address.
And that, or maybe use your social media login, and then that's it. That's it.
Because even if you're on some criminal's Wi-Fi, as long as you're using encrypted email, which you almost certainly are, or you're using an encrypted web connection, which you almost certainly are, actually you're fine and they can't really do anything.
They can't attack your DNS, they can't get into your traffic. You just have errors and warnings coming up everywhere.
So weirdly, the actual danger of this, he could almost have been providing a public service.
If his rogue Wi-Fi was actually a faster connection than the airplane, I would connect to the rogue Wi-Fi. He should just advertise himself. He'll make more money. Yes, be legit.
But every day, employees use personal devices and unapproved apps that aren't protected by MDM, IAM, or any other security tool.
There's a giant gap between the security tools we have and the way we actually work.
1Password calls it the Access Trust Gap, and they've also created the first-ever solution to fill it.
1Password Extended Access Management secures every sign-in for every app on every device.
Includes the password manager that you know and love and the device trust solution you've probably heard of on this podcast back when it was called Kolide.
1Password Extended Access Management cares about user experience and privacy, which means it can go places other tools can't, like personal and contractor devices.
It ensures that every device is known and healthy safely, and every login is protected.
So stop trying to ban BYOD or shadow IT and start protecting them with 1Password Extended Access Management. Check it out at 1password.com/smashing.
And thanks to 1Password for supporting the show. And welcome back, and you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish. It doesn't have to be security-related necessarily.
It better not be. Well, my Pick of the Week this week is not security-related.
It is a service I found online, a website, and I believe it's an app as well on your phone called Suno, S-U-N-O.
And what it allows you to do is just type in a few words and via the power of artificial intelligence, it will create a song for you.
So you can say, I would like to have a barbershop quartet singing about the insurance industry. And out the other end will come a barbershop quartet.
It will write the lyrics, it will do all the music and the backing, and it will do the voice. That's crazy. And this is enormous fun.
Now, I have been able to put this to practical use because I've recently started with my co-host Mark Stockley, a podcast called The AI Fix, and we needed some theme music.
And what better than theme music created by artificial intelligence. And so I got Suno to work on it for me.
And it came up with a few different versions, which we can hear here, but for the purposes of timekeeping, we won't. No, no, we're not going to hear them.
But there are some links which maybe—
And I've got the, well, something which is a little bit similar to the version which we actually have on the show played on a banjo. So that is my pick of the week.
It's a website called Suno, S-U-N-O, enormous fun.
And I've just scraped the surface in how I've described it, but I'd really suggest you go and check it out because it's a great way to make music, but probably really, really bad for genuine musicians.
But never mind.
So if you're intrigued, bewildered, or slightly alarmed by AI, and you want to listen to two other people who are intrigued, bewildered, and slightly alarmed about AI, then I have got a podcast for you.
Oh, and I'm talking, of course, about The AI Fix, which is a brand new podcast from Graham and me. I don't know if we mentioned it. It's about AI and you can get it every week.
It's a great way to stay up to date about AI in a way that doesn't send you to sleep.
So we talk about all the latest news and then we try and teach each other something about some aspect of AI.
So if you want a flavor of what we've talked about so far, in the first 5 episodes, we've established that AI probably doesn't exist.
We've asked whether fitting guns to robot dogs is just wokeism gone mad.
Graham got cross— not gonna surprise you at all, Carole, but Graham got cross about the R in the name Toys 'R' Us.
And I explained why there's a 99.9% chance that AI will wipe us all out.
It's called Putty Pals. Have you played it, either of you? Putty Pals? Putty, P-U-T-T-Y. Oh no, I haven't.
Yeah, I think you might have missed the boat, and maybe Mark can still play, because it was a recommendation I got from a dad who played with his 10-year-old daughter and had a blast.
So I didn't take their word for it, obviously. So I got a copy of my own. I played it with my other half, the Yeti. And it's basically a cooperative puzzle platformer.
That's the term apparently.
Basically a two-player and you are these little stretchy characters called Putty Pals and you have to work together to navigate through weird and wonderful worlds.
It reminds me a bit of is it Lemmings where you had to work together to get things done? Yeah. But you're kind of each managing one of these Putty Pals and you have to work together.
So you have to kind of tie arms to get across a Velcro bridge, all kinds of cute things. It's a tenor. Every world is kind of unique. It's quite beautiful in the art.
It's kid-friendly. Yeah, I bet, Mark, your daughter might like this, I think. It looks cute. I don't know. It's cute and it's fun and it's kind of smart. It sounds fantastic.
I'm sure lots of our listeners would love to find out what you're up to, Mark, and follow you online. What's the best way for them to find out what you're up to?
Follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 378 episodes, check out smashingsecurity.com. Wow. Until next time, cheerio.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Mark Stockley:
Episode links:
- Hoos Out Tonight? Dundee medical student launches new app which reveals ‘hot’ pubs – The Courier.
- ‘It’s completely invasive’: New app lets you spy on SF bars to see if they’re poppin’ – San Francisco Standard.
- Florida Man Convicted in Violent Crypto Theft Spree – Crypto Daily.
- Inside a Violent Gang’s Ruthless Crypto-Stealing Home Invasion Spree – Wired.
- Man charged over creation of ‘evil twin’ free WiFi networks to access personal data – Australian Federal Police.
- Police allege ‘evil twin’ in-flight Wi-Fi used to steal info – The Register.
- Australian charged for ‘Evil Twin’ WiFi attack on plane – Bleeping Computer.
- Suno – make a song about anything.
- The AI Fix podcast – hosted by Graham Cluley and Mark Stockley.
- Putty Pals – Nintendo Switch.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- 1Password Extended Access Management – Secure every sign-in for every app on every device.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


