
From family tree to jail cell? A hacker is alleged to have exploited information on genealogy websites to steal millions from public companies. Meanwhile, Kaspersky’s US customers are wondering – what on earth is UltraAV?
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
He'd used his admin username and password, bypassed all the warnings we'd built in. And the problem was he did not speak Klingon. Oh, right. What was he supposed to do?
Hello, hello, and welcome to Smashing Security, Episode 387. My name's Graham Cluley.
So let's first thank this week's wonderful sponsors, 1Password, Vanta, and SentinelOne. Now coming up on today's show, Graham, what do you got?
What if they'd known when the best time was to buy, when the best time was to sell, and maybe, just maybe, some of that financial wizardry could have drifted down the generations, could have trickled down to you, ended up in your DNA.
He claims to have attended Oxford University just down the road from you. But frankly, haven't we all? You know, have we all claimed that? I mean, we've all made claims, haven't we?
But you know, going to Oxford University.
And his profile says that he has a bachelor's degree in philosophy, politics, and economics. PPE. PPE, yeah, because that's what all the politicians do, isn't it? So well done to him.
Doesn't give a year. So, you know, I'm a little bit skeptical.
His approach, though, was a little bit different. Because why study the financials when there's a more direct way of finding out which way the markets may turn?
Yes, what he did was he went to genealogy websites.
Well, he went there not because he wanted to find out about his great-aunt Mildred or how she was famed for a spotted dick recipe, nothing like that, but because sometimes it's a case of move over darkweb, because perhaps the secrets you need to hack into people's email accounts are buried in the past.
Now you're intrigued.
Because it is alleged that Robert Westbrook used information he gathered from genealogy websites to crack open the accounts of high-ranking executives, including CFOs, chief accounting officers, finance directors.
Now, how did this work? Well, according to US authorities—
Things like, what's your mother's maiden name? Things like, what year were you married? Things like, who inherited Aunt Agatha's wooden leg?
That kind of material, which you use as a security question for when you can't remember your password and you need to reset it. So, he didn't have to crack passwords.
He just had to crack security questions and reset passwords.
So he managed to break into these executives' Office 365 accounts, and he's alleged to have set up rules to automatically forward messages containing sensitive information to anonymous accounts under his control.
So he specifically targeted emails containing information about upcoming earnings announcements. So these are publicly traded companies.
There are internal emails, which obviously highly confidential about, here's our upcoming earnings announcement, and he was being forwarded them.
So even if these users reset their passwords later, their emails were still being forwarded out.
At one company, he's said to have attempted to create a rule that forwarded emails if they contained attachments or sent by the firm's president, or if they came from an external auditor.
CEO, that's exactly what I needed for my next plan of attack."
So you'd have Joanna Lumley saying, "You've got mail," in the old days of AOL.
Well, you can imagine the kind of bing bong or the ka-ching every time one of these emails was forwarded to him with some juicy information.
And this insider information, it's alleged, was then used by Westbrook to generate over $3.5 million by making profitable trades on the stock market.
Before, of course, it became known to the general public, you know, the information. So he got a sort of first sight of it before it was public.
So although he tried, it is alleged, to conceal his identity through the use of VPNs and anonymous email accounts and buying things on cryptocurrency and all the rest of it, there are experts at the SEC, the Securities Exchange Commission, who were curious about some of the transfers, some of the timings.
Yes, some of the timings, some of the stock market transactions taking place, and they did some crafty blockchain analysis.
And they were ultimately able, they say, this is the case which the prosecutors are putting forward, able to identify Westbrook as the person who did it.
And there were a number of other things which they found out about him. So he had also subscribed to some services to defeat CAPTCHAs to help him do that.
He'd also apparently bought a whole bunch of books about hacking. I guess they went through his Amazon wishlist. But you know, who knows?
Maybe he's innocent because he hasn't had his moment in court yet.
Maybe he was just so addicted to company quarterly reports, he liked to get them early 'cause they are riveting reading.
And I'm imagining now, especially with the AI tech that we have, you can actually parse that data much more easily.
I was always kind of using that, hey, it's a needle in the haystack if you come near me because I've never organized anything. But actually AI can do that now quite quickly, I hear.
So that's interesting, right? Because, and then there's so much information in email. It's— Oh, huge amount. Huge amount.
I mean, when is the last time you looked at an email that was more than a year old?
So that's one piece of advice is if you're able to do good housekeeping on your email, obviously.
But the other thing is that, obviously, very crafty using these genealogy websites to find out this information.
And it suggests that the executives at these hacked companies weren't adhering to best security practices, because you should never choose easy-to-guess or easy-to-find-out answers to secret "forgot your password" questions.
So if you're Paris Hilton and your passwords are basically the name of your pet chihuahua, that's a piece of personal information.
If you're Sarah Palin, if you remember her— do you remember the good old days of Sarah Palin? Yes, of course I do. When we thought that was as crazy as it would get.
She, for instance, had her email account because she'd used public information to secure it, information which was contained in her biography about when she'd met her husband, town that she was born in, that kind of information.
So instead of that, tell a lie. When you're asked to give your city of birth, say it's UV6DNW01XSB. Or say your mother's maiden name is Xena Warrior Princess.
Don't use those two examples. Okay.
Some of us are really crap at lying and don't remember if we happen to have to lie. We don't remember. Right?
He's going to face all kinds of charges. If convicted of everything, he could face up to 65 years in prison.
I just share my wisdom. Share my wisdom.
This is the year Barack Obama took office, the year Russia shut the oil line to Ukraine. Oh, yes. And Kate Moss kept promoting the smoky eye look.
And we didn't know what. So I suggested we pull together a little tiger team of brainiacs. Do you remember?
And we had a friend of the show, Mark Stockley, and Vanja Svajcer, and you and me. And I think there was someone else who I'm forgetting. Sorry, sorry, sorry.
And we all got together to brainstorm what could we do.
And that was about to launch in theaters across the UK in 2009. So we decided we'd go all out and translate every text string that was displayed in our flagship Windows product.
You know, she could just be writing gibberish. I mean, it's not like I can read it, but we put it all together and we had some dudes put it into the product.
You can't trust the translator, surely. We needed to find a second translator who could read Klingon.
Wasn't that what we did?
We even had a YMCA song to promote it.
But one guy, one guy called support as irate as a swatted wasp, I tell you. And he said he'd installed it across his whole network.
He'd used his admin, you know, username and password, bypassed all the warnings we'd built in. And the problem was he did not speak Klingon. Oh! Right? What was he supposed to do?
How could he get it off his systems?
I think this— I think I can argue that this company is in a pretty tight spot. And it all revolves around Russian antivirus company Kaspersky. The U.S.
Commerce Department announced in June earlier this year its plans to ban the sale of antivirus software made by Russian firm Kaspersky. Yep. Why? Because the U.S.
government placed the blame on its alleged links to the Kremlin. Yeah.
Back in June, a spokesperson for the Commerce Department said that Moscow's influence over the company was found to pose a significant risk to U.S.
infrastructure and services, that the U.S. was compelled to take action due to Russia's capacity and intent to collect and weaponize personal information of Americans.
I mean, there is a counterargument that, of course, they also posed a significant risk to American antivirus companies who were trying to compete with them.
And at the time, Kaspersky said it intended to pursue all legally available options to fight the ban, and denied it engaged in any activity that threatened US security.
And I should note that according to The Register's Iain Thomson, another friend of Smashing Security, his article suggests that US authorities have not provided details to back these assertions and that Kaspersky offered to hand over its source code for checking by US officials, but he writes that the offer was ignored.
So there's that. The US plan was simple in premise: bar loads of Kaspersky software, bar updates, bar resales, and licensing of the product from the 29th of September.
And sellers and resellers who violated this restriction would, of course, face fines from the Commerce Department. So I'm going to pause here.
So Graham, you and I, you know, hail from this AV world. I can't think of a single antivirus outfit who would not panic at this situation.
Because not only can you not sell products, but you can't even send updates. So effectively, you're leaving everybody in a lurch.
And you must be thinking, not only is this cutting off a revenue stream, but also what's going to happen to those companies because they won't be protected with up-to-date antivirus software?
So the plan Kaspersky came up with was to automatically transition US-based users of its consumer-grade products to UltraAV, which was provided by an American vendor.
And this past week, the switch started, right? Kaspersky software being automatically replaced by UltraAV on some Windows systems.
Presumably using the permissions already granted to what Kaspersky was allowed to do, I'm guessing. But some people are not very happy, right?
I found this Kaspersky forum where people are letting off a little bit of angry steam, different versions of, "Why do you use a bottom-level antivirus when we paid for Kaspersky-level antivirus?" And the official-looking answer from Kaspersky says, "Hello, as you may know, the U.S.
authorities have restricted the sales and distribution of Kaspersky products in the U.S., but we remain committed to providing you the utmost cybersecurity.
And as we're forced to limit our cybersecurity products in functionality, we give you an opportunity to let a replacement security solution by our trusted partner, UltraAV."
I mean, it was very good at finding malware, but UltraAV is a bit of a mystery, isn't it?
And I'm thinking, hmm, hmm, I think this is a bit of a red flag. You know, I wouldn't feel very good because AV by its very design has pretty deep access to your systems. Oh, yeah.
I mean, on one side, Kaspersky could say, "Okay, fine. You know, you don't want us there. You got us federally banned. Fine, we're out.
Goodbye and good luck." And leave everyone, those who had not heard about this ban because they're not reading tech press all the time, or people that hadn't taken action yet, you leave them in the lurch.
Can I have my money back, please? And they wrote on their forum, dear customer, greetings. Appreciate you getting in touch.
Unfortunately, we are unable to process your refund request at this time.
We have a 30-day, no-questions-asked return policy for all purchases made through our official online store, as outlined on our website.
So basically people that bought 3-year site licenses or single licenses.
I imagine there's a lot of rival antivirus companies who are rubbing their hands together saying, "We will take on your license. We will protect you. Come to us.
You know, if you've got 6 months of your license still with Kaspersky, we'll give you that for free."
And you'd think a reputable company may have come up with a deal for this to be able to take over those customers in a way that would feel more— I mean, there's always gonna be gripes, right?
There's no way you could do this and not have gripes. I get that.
It's, well, you know what, we don't mind if these customers choose to come to us, but maybe we shouldn't be the chosen one, as it were.
Maybe that's why they've ended up with UltraAV, whatever that is.
It must be in the fine print, you know, comes back to my big adage, always read the fine print.
Discover all your assets and deploy AI-powered protection to shield your cloud from build time to runtime.
On top of that, SentinelOne offers threat hunting, visibility, and remote administration tools to manage and protect any IoT devices connected to your network.
Looking for a cloud-native application protection platform? SentinelOne is your ultimate CNAPP solution. Go to smashingsecurity.com/sentinelone for more information and a free demo.
See what a flexible, cost-effective, and resilient cloud security platform can do for your organization with SentinelOne. That's smashingsecurity.com/sentinelone.
Quick question: do your end users always, and I mean always without exception, work on company-owned devices and IT-approved apps? I didn't think so.
So my next question is, how do you keep your company's data safe when it's sitting on all of those unmanaged apps and devices?
Well, 1Password has an answer to this question, and it's called Extended Access Management.
1Password Extended Access Management helps you secure every sign-in for every app on every device because it solves the problems traditional IAM, ransomware and MDM can't touch.
Go and check it out for yourself at 1password.com/smashing. That's 1password.com/smashing. And thanks to the folks at 1Password for supporting the show.
Whether you're starting or scaling your company's security program, demonstrating top-notch security practices and establishing trust is more important than ever.
Vanta automates compliance for SOC 2, ISO 27001, and more, saving you time and money while helping you build customer trust.
Plus, you can streamline security reviews by automating questionnaires and demonstrating your security posture with a customer-facing trust center, all powered by Vanta AI.
Over 7,000 global companies like Atlassian, Sophos, FlowHealth, and Quora use Vanta to manage risk and improve security in real time.
Get $1,000 off Vanta when you go to vanta.com/smashing. That's vanta.com/smashing for $1,000 off.
And welcome back, and you join us at our favorite part of the show, the part of the show that we call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security-related necessarily. Better not be. Now, Carole, do you remember the old days? Nope.
Well, if you did, you would remember that in the days before Spotify and iTunes and things like that, you used to rip CDs and you'd have hundreds, if not thousands, of MP3 files.
And you would curate them, you would put them into folders, you'd organize them, maybe you'd add— I didn't. You didn't do any of that?
And it's full of crap I don't like at all. It's a complete disaster nightmare.
Wouldn't it be great if you had all the tags and the genres and all of that stuff which you'd normally have to do by hand, if it was magically occurring?
Well, I've had this situation recently where I had some MP3 files and I thought, "Oh, I don't want to have to tag everything, I don't want to have to do this." I found a free and open-source piece of software called Picard, and it links up with a database which knows all about millions and millions of pieces of music called MusicBrainz.
Now, I almost didn't suggest this because MusicBrainz is spelled with a Z at the end, which upsets me, but MusicBrainz, Picard, identifies, tags, organizes your digital audio recordings, helps you organize your music collections, renames your files, sorts them into folders.
It is free. It's available for Windows, Mac, and Linux. And I can report it works a treat. I'm really, really impressed by it.
I'm not making any promises regarding yourself. Anyway, MusicBrainz Picard is my Pick of the Week. Very good.
Real downtime where you want to do something where you don't have to think or you don't have to follow a twisty twisty plot or, you know, you can't even contemplate listening to music because it might get complex.
You just need reality TV. You know what I'm talking about?
But if a new show crops up and I'm feeling it, as I was this weekend, it can be a lovely experience. So my reality TV recommendation as my pick of the week is Culinary Class Wars.
It's a sizzling competition. It's Korean. It's on Netflix. Sizzling competition that will see 100 top chefs going apron to apron in a dramatic battle for culinary excellence.
How could you not watch that? So in these 100 competitors, you've got hidden masters. So people that aren't yet really recognized.
It was glorious for me just to watch this in the background because I don't know any of these chefs. It's in Korea. This is entirely outside my echo chamber. I don't know anything.
I don't know Korean cooking techniques. I don't know squat, but I can just sit there and vegetate. So that is my pick of the week for those of you that need a bit of lazy time.
Culinary Class Wars on Netflix.
I mean, what's going on?
So, yeah, it's great fun.
You can follow us on Twitter @SmashingSecurity, no G, Twitter allows to have a G. And don't forget to ensure you never miss another episode.
Follow Smashing Security in your favorite podcast apps such as Apple Podcasts and Pocket Casts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 386 episodes, check out smashingsecurity.com. Until next time, cheerio. Bye-bye. Bye.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- U.K. National Charged with Multimillion-Dollar Hack-to-Trade Fraud Scheme – US Department of Justice.
- Sophos punts anti-virus for Klingons – The Register.
- Designating Kaspersky Lab Leadership in Response to Continued Cybersecurity Risks – US Department of Treasury.
- Kaspersky says Uncle Sam snubbed its verification proposal – The Register.
- Use Kaspersky Antivirus Software? You’ll Be Migrated to Pango’s UltraAV – PC Mag.
- Kaspersky software replaced by ‘UltraAV’ on some US PCs – The Register.
- Need Instructions on Refunds for those who bought multi-year subscriptions – Kaspersky.
- US bans Kaspersky antivirus software for alleged Russian links – BBC News.
- Who gave you permission to put UltraAV on my computer? – Kaspersky Total Security.
- MusicBrainz Picard – Cross-platform music tagger powered by the MusicBrainz database.
- 100 Chefs Will Slice Through the Competition in Culinary Class Wars – Netflix.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- SentinelOne – secure and protect every aspect of your cloud in real-time.
- 1Password Extended Access Management – Secure every sign-in for every app on every device.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
