
There’s a whole new dating scam that could mean you end up out of pocket (or beaten up) after a first date with a glamorous admirer, and a woman in Los Alamos uses an Air Tag to entrap a thief.
Plus – don’t miss our featured interview with Maya Levine of Sysdig.
All this, and a very bad Cockney accent, in the latest edition of the “Smashing Security” podcast by industry veterans Graham Cluley and Carole Theriault.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
She's a product manager there, and this is a company on a mission to make every cloud deployment secure and reliable.
All this and much more coming up on this episode of Smashing Security.
That's the only reason why you would have heard of Los Alamos, I suspect.
As far as I know, there aren't any mutant pigeons or anything as a result of those nuclear tests way back when.
But in the last few days, the headlines in Los Alamos have been shaken by a big story, a saga of thievery. Easy for me to say.
And our story begins when there was a fed-up victim, someone who kept on discovering that their mail was being plundered. Their mail was being stolen.
So they had a mailbox at the local post office, and they were expecting things to be delivered, and they didn't show up.
And they were really determined to find out who was responsible. And so they hatched a cunning plan. And what they did was they decided to mail themselves something.
And what they did was they put in the mail, addressed to themselves, that tiny technological wonder, known as the Apple AirTag.
So it was going to get sent to their mailbox. And then they could find out where their mail went, if again, it was stolen. And so—
And so this woman, she mailed herself this package containing the AirTag, essentially turning her parcel into a sort of like a homing beacon.
So wherever it went, she'd be able to find out where it went, right? And the thieves took the bait. She went to go to her mailbox, there it's not there. Where's the mail?
I should be receiving my— why haven't I received my mail? Is it because the mail service is rubbish or is it because someone has stolen it?
Well, the AirTag provided, of course, the real-time coordinates, and it turned out that the stolen package led police deputies— I love this thing about deputies.
We don't really have deputies, do we? In the UK.
Now, there's a couple of things already a bit suspicious about those names. I don't know if you've noticed.
I'm just always a bit suspicious of anybody who has a surname which is actually also a first name.
The sun was shining, the birds were chirping, and these two unsuspecting individuals were blissfully unaware that their light-fingered adventures were about to come to a screeching halt because these deputies—
So it turns out—
It's a little bit unclear as to whether the mailbox is actually at the home of the person who wanted the AirTag, or whether it is at the post office.
It's unclear what kind of mailbox we're talking about.
So high-value items are being put in the post all the time these days.
These are the days of online e-commerce when you're buying all your technology, you're buying expensive things, they're coming through the post rather than you going to department stores.
They're going to deliver it to a mailbox wherever you've chosen, because you're out at work or whatever, wherever you want them to leave it.
And so it depends on what your particular setup is.
But sometimes it will be the mail service which is doing this, sometimes it will be couriers or whoever it is, but the point is that people are intercepting deliveries.
They're stealing packages because they think, well, once we've done this, we'll sell it on the black market, we'll chuck it on eBay, we'll try and make ourselves some money, and maybe the big tech companies will just take it on the chin.
So maybe some of the information they were able to grab from the post allowed them to commit identity theft, credit card theft, conspiracy as well.
Terry, the man, has also been charged with burglary, as well as credit card theft, identity theft, and so on and so forth.
But I think what we're seeing now is people being more inventive with their use of technology to confront criminals, to deal with these sort of situations where you have things taken from you.
So the sheriff's office, they've been commending this victim, saying, you know, really ingenious, your use of technology.
They said this is really clever and everything, and also what they really appreciate is that she didn't go round to the address and face them face to face.
Because if someone's committing criminal acts, which has been alleged here, then there is the potential that they won't take very kindly to you coming up the drive and saying, 'Oi, what are you doing?' So instead she went straight to the police with the information, who actually went and investigated.
She left it to the professionals.
Half a million dollars is his bail because it's been suggested he's been up to so much not-goodery, whereas Lara has only been hit with a $50,000 bail bond.
But this is the thing, right? AirTags — AirTags, fantastic for tracking lost items, but they can also sadly be used for tracking living humans as well.
And it struck me that if you were stealing post which contained an AirTag, there is a chance that the AirTag will actually give the game away, because they have built into these things these days a method to actually warn people that they are being stalked, that there is an unknown tracker following them.
So if you pick up an AirTag which is owned by somebody else and is not paired with your Apple iPhone, your iPhone after a while will give you a little alert saying, "Huh, seems to be an AirTag near you," and you might even hear the AirTag begin to beep occasionally as well, which makes it a not great device for tracking someone.
So great if you want to stop stalking. Not so good if you want to find something, or if you want to track where something which has been stolen from you has gone.
Do you see what I mean?
They're huge. They're too huge. And then, you know, she's an indoor-outdoor cat. So, you know, she gets caught somewhere. Big AirTag. I don't know. Anyway.
So my son, for instance, right, his mum has put an AirTag into his school satchel thing.
So if I'm driving him around in the car and his AirTag is not connected to my phone, I get warned that there's an unknown tracker following me.
And it's yeah, it's my son next to me.
And although I can say, stop those annoying warnings for a day from coming up because I don't care about the unknown tracker, there's no way to permanently shut it off.
It'd be really nice if there was a way to mark that individual tag as just ignore that one forever. So I don't have to worry about it.
And so again, you begin to think that there's someone tracking you, but in fact it's just a guy in the vicinity.
And wouldn't it be handy if you could say, "Just don't worry about that one." And the other issue with these AirTags is, well, up until very, very recently, this has really been an Apple thing, right?
The Apple AirTag is considered the sort of premier tracking device for lost devices and the rest of it. But Androids didn't really work with it.
And of course, many, many people have Androids rather than iPhones.
But there is, I can tell listeners, there is an Android app which is actually written by Apple and developed by Apple in the Google Play Store called Tracker Detect.
So if you want to find out if someone has left an AirTag in your vicinity, you can open Tracker Detect on your Android phone and ask it to scan for trackers, and it will tell you if there's anything nearby which isn't paired with your devices.
Now of course you've got to prompt it to do that, which is kind of inconvenient compared to how Apple phones just warn you if you're being tracked.
And it also doesn't track other kinds of trackers those ones from Samsung or Tile and others.
But the other good news is earlier this year Apple and Google teamed up to create an industry specification designed cross-platform, cross-industry to detect unwanted location trackers, making it possible to alert users on both iOS and Android if they're being tracked.
They announced this, I think it was in May. It's in the latest versions of iOS and it's beginning to roll out on Android as well for some users. It's not completely gone global yet.
These are for these tags, which you might attach to your cat or put inside your suitcase instead.
Now that sort of warning sounds great to me for people who are worried that they may be being stalked, but it's pretty lousy, of course, for people this woman in Los Alamos who wanted to work out who was stealing her mail.
So it's swings and roundabouts, this. What you gain in one area, you lose in another. This is the problem.
These anti-tracking notifications can inform the thief as well as the person who's being stalked. By the way, my wife says I'm not very good at saying the word thief.
She says I've got some sort of speech defect.
You go online dating, don't you?
So what would you go and check?
Maybe look up her on social media, see if she's left any reviews on any restaurant websites.
See if she— I may be able to get an indication of how she expects to be looked after and maintained if she goes to lots of beauty salons or something like that.
You know, if she's leaving reviews of all sorts, you know, all I would guess.
Reverse image search reveals nothing's fake, for example, in this situation. She doesn't live abroad. She doesn't have a dangerous job. Hang on.
How many fingers has she got, you know?
And she wants to meet you in person, and she's asked you, Graham, to visit, you know, a well-known area in town.
So it's not go down to this dodgy place, or it's in public, you know, nice place. So you get there, right, Mr. Cluley getting there?
Yeah, I'm feeling brave.
Is it called the Godfather Lounge because they've got meatballs stuck inside their inner cheeks and they're talking like Marlon Brando with his cotton wool?
Is it some sort of criminal establishment?
You check the menu at this place, The Godfather Lounge, and it's pricier than Pizza Express, but you know, it's not insane, and you've saved for the situation, and you don't want to come off as cheap because, you know, she's a good 9.8.
So you sit down. You sit down. You ogle each other because she, you know, she's hot.
It's okay. You order your favorite. You're ordering a cranberry juice on ice, right? And she orders a drink you've never heard of.
You know, do you know what a Negroni is or a Sidecar or a Julep?
And she pops off to the loo, right, to check her lippy.
So she dashes off, right? And you're sitting there. And then, of course, you're presented with a bill, as you predicted.
And so looking at the menu, you could kind of work out that it'd probably be about whatever. Let's say you expected to pay 20, 30 quid. The bill is 600 quid. Yeah.
Would you just try and escape, you know, lightning fast, Clark Kent style?
And then cough up an inordinate amount of money when she's just run off, probably to get the next guy in the door.
Our journalist accuses this upscale Mumbai club, the Godfather Lounge, and other nearby high-end drink places of being kind of, I guess, grand poobahs of this scam.
The girls seem to be responsible for luring in the tables, or the victims, the male dates.
Get some hot women to lure men into clubs, then fleece them for all you can.
So typically, we— I think we think of romance scam victims as being women, don't we, as the prime target, not men. Would you agree with that?
And they say, yes, romance scams are definitely on the rise. But 60% of the reports were made from male victims and 40% from women.
However, women lose 2.5 times more money than men do. So men might give you 50 quid and say, go to the movies. Women are they're, let me save you forever.
So you guys in the Northern Hemisphere, if you think you need some love in your life, you better get your skates on or your roller skates on. Not winter yet.
And if you are doing all this and you want to do your due diligence, check the episode show notes.
I'm sharing a few checklists to make sure you're as safe as possible when you're navigating these dangerous dating waters.
Relying on built-in controls or traditional blockers will inevitably lead to more noise than your instant response team can handle.
Well, Smashing Security takes a pragmatic approach to email security, stopping new flavors of phishing and pretexting attacks before reaching the user's mailbox, while searching through everyone's mailbox for similar messages in a campaign.
What gets surfaced to your team are the highest-value cases to investigate, with all the context and reach consolidated into a single view.
Remediations are a breeze with Material Security. So go try it out for yourself at smashingsecurity.com/material. That's smashingsecurity.com/material.
And thanks to Material Security for supporting the show.
Modern threat actors have weaponized cloud automation to accelerate taking only 10 minutes to fully execute an attack in the cloud.
As organizations continue to shift into larger and more complex cloud estates, legacy detection and response frameworks are no longer sufficient at stopping cloud attacks.
Well, Sysdig delivers fast and effective multi-cloud detection and response, or CDR, capabilities to empower analysts against these accelerated and complex cloud threats.
Powered by Falco, analysts gain the visibility, context, and real-time security capabilities traditional EDR and on-prem tooling fail to deliver.
Learn more about how to stop advanced attacks at cloud speed. Visit smashingsecurity.com/sysdig for more information. That's smashingsecurity.com/sysdig.
And thanks to Sysdig for supporting the show. Quick question: do your end users always, and I mean always without exception, work on company-owned devices and IT-approved apps?
I didn't think so. So my next question is, how do you keep your company's data safe when it's sitting on all of those unmanaged apps and devices?
Well, 1Password has an answer to this question, and it's called Extended Access Management.
1Password Extended Access Management helps you secure every sign-in for every app on every device, because it solves the problems traditional IAM and MDM can't touch.
Go and check it out for yourself at 1password.com/smashing. That's 1password.com/smashing. And thanks to the folks at 1Password for supporting the show. And welcome back.
Can you join us at our favorite part of the show? The part of the show that we call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily.
Yeah, you've seen The Boys?
It's also a bit— I find it a little bit— maybe I'm just too old for it.
And I like that bit of it, but there's something else which, other than the sex and the over-the-top gore, which really pulls me out of the drama. And that is one of the actors.
So there's an actor in it, Karl Urban. You may remember him. He played Bones in the Star Trek movies, the modern Star Trek movies. Probably aren't that modern anymore.
And he plays a character called Billy Butcher in The Boys.
And I actually had to search on the internet to find out what this character was supposed to be, because I couldn't work out what on earth accent is that meant to be.
And apparently he's speaking with a Cockney accent, according to the internet, from the East End of London.
There I was filling up the motor, I turn around, the little git had done a runner. There he was, filling up the motor. It's even bad by Guy Ritchie standards.
I've never heard a Cockney accent this ever before in my life, and for that reason, this accent and the fact that it's completely making it impossible to watch this show if it weren't even for the sex and the gore as well.
That is my nitpick of the week. Whoa.
And they're these little wee nodes in front of her ears.
I've been wanting to try these. Let me try. Let me try. Let me try. They are amazing. So the product I tried is by a company called Shokz, S-H-O-K-Z, because we're street.
And they are Bluetooth-enabled headphones that are connected with a thinnish tube at the base of your neck.
And then the headphones curve around the back of your ear, basically a reverse pair of glasses.
And they come, and the node sits right in front of your little ear hole, that wee bone on the side of your face.
And typically sound vibration travels through the air down the ear canal, causing your eardrum to vibrate. We all know that.
But using bone conduction, the sound waves bypass your eardrum and they head directly to the cochlea, a.k.a. the inner ear.
And Beethoven's the one who discovered this because he had hearing loss as he grew older. And apparently—
And the baton allowed the sound vibrations made by the piano to travel through to his inner ear so he could still hear the notes.
They are fab if you don't want to be isolated in an environment, say you're driving or you're running or you're biking or hanging out chatting to boring people like me.
So unlike headphones, which sort of take your attention and isolate you a little bit, so these are just kind of giving you background music and you just—
The one I had had no microphone, right? So, and I think I bought them for about $100, $150, something like that.
I bought them for a friend, but I don't want them for me because I really need a mic if I'm going to be using these.
No, no, I can, but I can just transfer over and I can talk with you and I have to hold my phone microphone to my face.
So they're Bluetooth, they're wireless, but they sit around your neck. So it's a one-piece affair, which I much prefer over the AirPods. I like not having my ears isolated.
Anyway, this sounds cool. Check them out. I'm pretty amazed by them. They're called Shokz, S-H-O-K-Z. I saw them in Best Buy. I was able to try them out there. Quite fun. So there you go.
There's my pick of the week.
I think I saw the brand new ones in the UK for, I think I saw them for £170 when I was looking online today.
So listeners, today we welcome Maya Levine, a product manager at Sysdig, the company on a mission to make every cloud deployment secure and reliable.
Maya Levine, thank you so much for being here on Smashing Security. It's an honor to chat with you today.
I moved into technical marketing engineering and then eventually into product management here at Sysdig.
So it's been a journey all around, but in cybersecurity, and a big focus is cloud security for me.
So you really get to establish relationships with different people.
I remember when that term was brand new, and today I think everyone uses it, right? Everything makes use of it, and it's still growing all the time.
It's like, is it different from a traditional environment, or are there big differences?
I think we also, as an industry, need to be shifting our mindset about the security.
The old secure the perimeter mindset is not really as relevant for the cloud where everything is so interconnected and you have all of these different services and applications that are all talking to each other in different ways.
But do you think that actually people think it's much simpler than it actually is, in terms of an environment? Because you're right, it talks to everything, right?
There's so many different passwords and different identities that can get in and out of it.
But the con of that is that you have all of these things that are happening and maybe deploying and maybe running that you don't even know about.
Before I talk about kind of the techniques, I will say that one major difference and major challenge of being in the cloud is that we're seeing that the average cloud attack takes about 10 minutes to execute start to finish.
So often attacks start with some kind of compromised credentials or identities or secrets or keys. I love the metaphor of attackers are looking for the keys under the mats.
So typically that's how they start is they get some kind of access. Once they're in your cloud environment, then they start what we call enumeration or reconnaissance.
It's basically, what can I access with the current credentials I have? What other credentials can I get access to? They're trying to spread like a virus.
They're trying to get as far as they can, as deep as they can into your cloud assets. And then usually the motivation is financial.
So they'll execute crypto mining or ransomware or phishing, data exfiltration that they'll sell on the darkweb.
Whatever it is, there's usually a financial motivation behind kind of their end goal there.
Does this environment require us to think about security differently than we would have in a traditional kind of network server environment?
And so there's two real elements of security that everybody needs to think about.
There's the prevention part of it, which how can I configure my environments in a strong way to prevent anybody from being able to get in in the first place?
And then there's the detection part of it, which is the harsh reality is you can't prevent everything, right? There's new methods that attackers come up with all the time.
There's vulnerabilities that haven't even been disclosed yet. There's the concept of zero-day attacks, which is things that we don't necessarily know about.
So we do actually need the ability to detect when things are happening that are malicious and that are suspicious in the cloud very quickly.
Within 5 seconds, you really need to be alerted of something happening so that you can take maybe 5 minutes to correlate and then 5 minutes to initiate some kind of response.
The truth is that we need to defend at the same speed that they are attacking. So that gives us about 10 minutes, right, that we need to be able to respond.
But the point here is that if you're being alerted an hour later, even 15 minutes after something happened, that's almost too late to be able to actually stop and make a difference.
And I don't want to pretend that being able to respond this quickly is easy, right?
But we do need to kind of take advantage of automation in the cloud, just like attackers are taking advantage of it for their attacking purposes.
So where possible, try to do automated response actions, make sure that you get all of the data and deliver it to the right people if you do need manual actions happening.
But basically, the speed at which you need to be notified about something wrong and be able to respond to it, that's going to be a huge challenge for people in the cloud.
So, tell us, how does Sysdig approach this that you think is really cool and that you think listeners really need to know about?
Being able to know about something actually in real time and having that information be pushed to whatever the systems are that you use, that's key. That's a big part of it.
I also think that we're doing interesting things around correlation. So a lot of attacks are taking advantage of mismanaged identities or secrets or that kind of stuff.
And if you're following a user's actions, you can often see, really paint the picture of what the attacker did, right?
If they logged in or managed to get credentials of a specific user and then use that user to execute all of these things, being able to put that all together and kind of show you in consequential order, these are the actions that were taken, really helps incident responders be able to understand what happened, what other resources they maybe need to look at, what's the scope of this attack.
What advice would you have for them in that instance?
I mean, I can think of MGM Grand a couple years ago, right there, they had an attack that happened which brought down so many of their systems, and I think it was over $8 million in damages per day for them.
So if you're comparing numbers, right, I don't love saying coming at it with the fear factor, but the truth is, is that if you're not investing in security, you might end up having to pay much more in damages.
But it is, it's a complex thing and I would say not just investing in tools is important, but also investing in your people.
And the complexity of environments that we're asking people to understand just keeps increasing, right?
And so really getting the time to train and learn and understand all of the intricacies of different environments can help.
I mean, I can think of an attack recently that the Sysdig Threat Research team discovered where they were— these victims were— they did everything right.
They had a policy in place to not allow users to create new access keys, but one of the parts of the policy was case sensitive. So they ended up— they wrote the right policy.
They just had a lowercase a instead of an uppercase A. And so the attacker was able to use the user anyway.
So that's just an example that I can think of where even when you're trying to do the right things and you're putting these security things in place, there's all this level of detail that you really need to get into to be able to actually have the prevention in place.
And that's why I emphasize the— you can't always prevent everything. The good news is that on the detection side, often attackers are doing the same kinds of actions, right?
They're following kind of the same playbooks. So we know what to look for, basically.
We have an agent that you can deploy, but we also have an agentless connection method.
So it's pretty easy to test out, and no matter what security vendor that you have, I just wanted to really emphasize how important it is to be thinking about security in the cloud as its own beast, as its own different thing.
It is not the same as your on-premise environment. We've seen many threat actors be able to move laterally from your cloud systems onto your on-premise servers. So yes.
I have to say, I have to commend you because I was taking a look around your site, the Sysdig site, and you are very, I think, generous both in the amount of information you share about how to better protect yourself, both on your blog and other places on the site.
And I thought that was really good. You know, listeners who are listening to this thinking they're interesting, they can actually just go there and read up, right?
And that's Was that a conscious decision on your end to kind of share so much? Because it's unusual, you know, to have actual information rather than marketing spiel.
We can all learn from what was the thing that tripped you up, what was the thing that allowed the attackers to kind of take control of your systems.
And I'm very proud of Sysdig's threat research team, which discovers new attacks all the time and always kind of shares that information.
We had one recently where attackers were targeting people's AI models in the cloud and we called it LLM jacking.
Basically what they did was they managed to get into cloud environments through credentials and stuff.
And then once they were there, they're targeting these LLM models that were hosted by cloud providers, things like Anthropic's Claude.
And then they would sell access to these compromised LLMs and leave the cloud account owner to foot the bill for that. That's new, right? That's using new technologies.
But sharing this kind of thing, I think, is critical for the industry as a whole so we can all learn from it.
I would urge people again to invest in security, invest in real-time detection, and invest in actually narrowing down the amount of permissions that you give the people in your company.
So if those credentials get leaked somehow, the impact is not going to be as high.
That's sysdig.com/smashing. And this was Maya Levine, product manager at Sysdig Security. Thank you so much, Maya, for taking the time to speak with us today.
And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 382 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- Mail Theft Suspect Apprehended Using AirTag – Santa Barbara County Sheriff’s Office.
- Google and Apple deliver support for unwanted tracking alerts in Android and iOS – Google Security blog.
- Apple and Google deliver support for unwanted tracking alerts in iOS and Android – Apple.
- Barclays Scams Bulletin: Men more likely to fall victim to romance scams, while women lose more money – Barclays.
- 3 men trapped by same woman: Journalist on modus operandi of dating app scams – India Today.
- Mumbai club under fire for ‘dating scam’ after man gets Rs 61,000 bill – India News.
- Romance scams in 2024 + online dating statistics – Norton.
- Tips for romance scams – Better Business Bureau.
- What to know about romance scams – Consumer Advice.
- The Godfather club dating app scam in Mumbai – YouTube.
- What accent does Butcher have in ‘The Boys’? – NME.
- Shokz bone conduction headphones – Shokz.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- 1Password Extended Access Management – Secure every sign-in for every app on every device.
- Sysdig – Secure your cloud in real time. Detect, investigate, and respond to threats at cloud speed.
- Material Security – email security that covers the full threat landscape – stopping new flavors of phishing and pretexting attacks in their tracks, while also protecting accounts and data from exploit or exposure.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


