
What happens when eager computer enthusiasts unknowingly download a trojanized hacking tool and find themselves on the wrong side of cybersecurity? A former employee’s actions led to chaos and raise urgent questions about the security of cultural treasures. And join us as we explore the alarming trend of social media influencers staging fake kidnappings.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Lianne Potter from the “Compromising Positions” podcast.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security episode 402. My name's Graham Cluley.
Now, coming up on today's show, Graham, what do you got?
Not the biggest number in the world, let's be honest.
There have been times when there have been much bigger outbreaks, but this particular story is about 18,459 PCs which, according to the researchers at cybersecurity outfit CloudSec, have unwittingly become infected with spyware.
The computer enthusiasts who own those PCs have found that they're now compromised.
They can be spied upon, their data can be exfiltrated, their passwords stolen, snapshots can be taken of their screen, their registry can be fiddled with, and all of this can be commanded from a Telegram-based command and control server.
At the bidding of hackers. Nasty, nasty little botnet capable of stealing information.
And central to these things is often this command and control server, you know, which is what the hackers use to send messages to the compromised computers all around the world to get them to do their bidding.
It's a communication channel, effectively. It's not just for sharing pictures of your cat or whatever it is you may be doing.
You know, those sort of things are happening via these messaging systems.
And the hackers have successfully stolen via this spyware browser credentials, system information, Discord tokens to hack into people's Discord accounts, Telegram data from computers around the world.
And the worst-hit computers are in Russia, the United States, India, Ukraine, and Turkey.
So it's not as though it's— you know, sometimes we see attacks where Russian computers aren't attacked, for instance.
So they've gathered a fair haul of data, which of course they will be exploiting. We can expect that to happen. So it's bad, bad news. Now, Carole, your spider sense.
And I'm like, "Oh, so he's dead then." And I had to sit through the rest of the movie thinking, "Well, that's why no one else is talking to him, because he's already dead." So it was completely wasted on me.
But yeah, it does take the fun out of it.
You've got to be current on your Bruce Willis movies before listening to Smashing Security.
So there is a twist in the tale, and that is that there is something that links all the victims of this attack.
It appears they downloaded this software after reading tutorials online about hacking other people's computers, which they may have viewed on Telegram and other channels, or watching YouTube videos that pointed them towards this particular download, which was up on file sharing services like Mega, is on GitHub repositories.
So these guys were downloading the XWorm RAT builder, thinking it would help them hack other people.
Something very handy if you wanted to steal data or plant ransomware.
But the bad news for these people, these 18,000-odd people, was that the XWorm RAT builder that they downloaded was in reality trojanised. So, oh yes, sad trombone.
I mean, they are victims, but they were planning to perpetrate some kind of cybercrime, we assume, themselves.
It turns out this particular malware would detect if it was being analysed, if it was being run in a virtual system, and it would refuse to do its bad stuff because it was trying to avoid detection.
They were told that this was a way to use the RAT Builder for free, downloading it from these sites. But in fact, of course, it did infect their systems with malware.
But the guys at CloudSec, they did do an analysis. What they did was they studied the malware in detail, working out how it operated, looking at Telegram, looking at the botnet.
They also managed to get hold of the images that had been captured from infected devices.
So these were screen captures and they did an OCR on those images — so optical character recognition, it's CSI, this.
So it's quite clever from that point of view.
And then, of course, they could contact those providers, those service providers online and get those URLs shut down to prevent further distribution of the malware.
The other thing which CloudSec did is they found a way to deactivate and uninstall the malware on those 18,459 computers, at least attempt to.
So when they did their in-depth analysis of the trojanised version of the RAT, they discovered that it had an inbuilt command to uninstall itself.
So each machine, when it gets infected by the malware, is given a unique identifier. It's like a 4-digit number.
And then if that computer was online and it received the uninstall command, their computer would be cleaned up. So that's what CloudSec did.
They sent every number from 1 to 9,999 to the botnet telling them to uninstall, which didn't work perfectly.
Because first of all, infected PCs had to be online at the time that CloudSec were sending the messages. But also Telegram rate limits how many messages can send at once.
So you can't send 10,000 all at once. CloudSec had to do them in batches.
Is it right for security companies to clean up people's computers, whether they be potential villains or not, without displaying anything, without popping up any messages?
Because, you know, that thing they've downloaded, they might be stopping the spread of it, you know, going further, because who wants to stop them going to their mates?
It's like, "oh, I downloaded this great tool to do some hacking with. Here, do you want a copy?" And then start moving it along. Yes.
But yeah, yeah, I don't know how I feel about, it's kind of saving the day, but I wouldn't want someone just to access my computer.
What if I was a security researcher and I was also doing that? So, you know.
And they're like, "oh, for goodness sake, you know, we were analyzing this and now you've uninstalled it."
Also, when a regular person or their computer gets hit by a piece of malware and they clean up, they get a message or their antivirus comes along there's a bit of a life lesson which is learned, right?
About—
These particular script kiddies, as they're known, these people who are inexperienced at doing this or begin to dip their toe in, there's two life lessons they're not learning.
They're not learning a lesson which they could have learned about being safer online if they'd had to deal with it themselves.
But they've also not learned the repercussions of getting involved in the murky world of cybercrime and what can go wrong. Because unbeknownst to them, they've been sorted out.
Have they gone broke or something like that?" It'd be interesting to see if they think it's just the company themselves taking it off rather than the security research team just swooping in, saving the day.
What's the moral of the story though? Is it, be careful, wrong ones might do wrong things?
It's more that you should not do that. It's against the law. So, yeah.
Or do we then think that would have taken months and months or years or would have been impossible?
And I mean, sometimes we do see law enforcement doing this kind of thing as well, don't we? Where they're the ones who clean up the computers.
So someone coming into these hacker forums and saying, hey, just a little heads up, what you've just downloaded might not be kosher, so just be careful. It's interesting, isn't it?
I think there'll be opinions on both sides. Lianne, what's your story for us this week?
The other question I was gonna ask you is, have either of you ever been to the British Museum?
And one of the things, I've just come back from a trip away, and one of the lovely things I love about going to London is how most of the museums are completely free, and the British Museum being one of them.
But you can go see— my favourite one is to go see Egyptian exhibits. They're absolutely stunning things there. But, oh, they had a bit of trouble the other week.
Well, the other day, actually.
They had a disgruntled employee who was recently dismissed coming on an evening and shut down several of the systems, including its ticketing platform.
If anyone remembers what happened in Jurassic Park, well—
Well, what happened? Well, how's this like Jurassic Park, Lianne?
But also just giving someone so much access to be able to shut things down.
So I think one of the weakest parts of your security posture is putting someone in charge of the delete button, really.
And so this person was able, even after they were dismissed... You'd think if someone was dismissed, that's different from someone just leaving.
You know, sometimes people have lax offboarding processes, can take a little bit while.
But if you are thinking this person's gonna be dismissed, you need to turn off their access as soon as that meeting is over.
I am king of the IT." Could be a queen.
So, "Well, I'm going to go back in, and I'm going to teach the British Museum a lesson." And you go past Dave on reception with your key card, and he's like, "Oh yeah, I've not heard anything about you being dismissed." Yeah.
And then goes in, and with organizations I've worked in, you know, to get into high-secured areas, you got to use your card again to get into places, logs in.
I wonder whether someone who's just been dismissed the following morning, for instance, they come in and you simply go, "Oh yeah, you know, I've left my card at home or whatever.
Can you just buzz me in?" And they've been working with this guy for months or maybe years.
And so they wouldn't necessarily know this was now an ex-employee, or even if they did know they'd left, they may not know that it was on bad terms.
So you could come across as quite innocent and say, "Oh yeah, I left yesterday, but I'm just returning a few things." Yeah.
"Can you buzz me in 'cause I've got a meeting with Brian?" I want to empty out my locker.
One of the interesting things I was reading around the subject about malicious insider threats, most insider threats do tend to be the non-malicious kind, AKA boo-boos, screw-ups, where people don't mean to do wrong, but they do.
But malicious insider threats, apparently they did a survey, cybersecurity professionals more concerned with that last year than they were of any other type of threat up by 74%, which I thought was really interesting.
Now, normally malicious insider threats are financially motivated, sometimes a little bit of espionage, but actually it's relatively low for grudges to be the reason why.
But I guess the moral of the story is, you know, treat your employees right.
And even through that kind of offboarding process, particularly if it's a negative offboarding process, maybe, you know, you've had discussions with someone saying, "Hey, either you're going to be made redundant or there's been a performance issue or something like that," it's just make sure that they don't have access.
Having your offboarding, please hand in your badge, your laptop, and your vendetta at the end of the day. Thank you.
They market a lifestyle or a persona, gimmick, a fund, whatever.
Like, what kid goes, oh, one day I'll be able to sell my very own vacuum cleaners?
They're living the dream. They're going to expensive hotels. They're flying around the world. They've got luxury cars.
So teacher. Okay, teacher.
I think that's attractive, isn't it?
And I think it's the social alphaness of it all, you know, the fact that there's people there, they're doing stuff, and people are volunteering to follow them and learn everything about them.
It's you're a big alpha dog.
That's becoming ever more important, isn't it, in valuing our social. So I imagine that plays a lot into that.
Parents would not be "Oh, thank God," if they said they wanted to become, I don't know, a lawyer or a doctor, the stuff of when I was a kid.
You've got to build content all the time.
He said, "You know, the scary thing is you never know how long it's going to last, and that's what I think eats us up at night. You know, what's next?
How long can we entertain everyone for? How long before no one cares?"
You see all these YouTubers and they're all just burning out saying, "I'm taking a break from the channel," and things like that.
The people at the top of the tree, the MrBeasts and the Kardashians of this world, they're obviously making an absolute fortune.
You might get a video that gets nearly 200,000 views and it be all exciting for a week, your 15 minutes of fame, but then, you know, your view count starts to drop and then you have to build more content.
And if you can't, it's a hard pill to swallow. But it seems to be all based on greed in a way, right? This insatiable need to secure more followers.
That's why you are driven to do more content. And whether you're 10,000 followers or a million followers, the relevance of you, it seems in this world, is measured on growth.
You're going up or you're going down.
Last month, Instagram model Victoria Rose, better known, Graham, as Woah Vicky.
Okay, the influencer had previously posted a series of tweets claiming she'd been kidnapped and held at ransom in Nigeria. One of the tweets read, I have kidnapped Vicky.
She is with me in Nigeria. I am demanding $1 million for her release. And this, of course, caused widespread panic amongst her followers.
And then during an Instagram Live on Sunday, she confessed that the entire ordeal was made up.
She says, quote, "We kind of got carried away with the joke, you know, and we just have fun and joke.
You know, I don't drink or go to the club, so this is how I find my entertainment." I mean, if I rang up a school and said I'd planted a bomb, then I'd expect the police to come round, right?
And say, you can't do things like that. So why don't the police—
She falsely claimed that a couple tried to kidnap her kids at a craft store in an Instagram video. And she even went to the cops and filed a false police report.
So while some influencers outright lie about kidnappings, about things as serious as kidnappings, some actually find themselves, well, kidnapped.
This week, a financial content creator in India known as The Stock Exploder was on his way to a Coldplay concert. And he's sitting there on a private bus.
And they forcibly remove him from the private bus, saying they're investigating a complaint. One of his followers has suffered excessive losses due to Stock Exploder's advice.
So he followed Stock Exploder's advice and he's now in the hole, right?
These are not Cybercell officers at all, but data thieves. And they want access to his social media empire. So you see, Stock Exploder apparently operates his business on Instagram.
That's where his crews are. Telegram and Instagram are his business places, apparently.
But he runs this through a network of 16 mobile phones with an iPhone serving as the primary server.
And the perps got their hands on two of his phones and managed to link their own SIM cards to his social media accounts to access his follower base.
And the ultimate goal, as the police think, is to defraud the followers. And, you know, poor Stock Exploder. Not only is his business impacted, but, you know, he missed Coldplay.
And that's pretty bad.
And that's the problem with people doing pranks, right? Some people doing pranks on trying to get more viewers by, you know, lying about a kidnapping. So now I'm doubting what—
So what you're saying is because there has been a history of influencers faking things like kidnappings, when someone genuinely gets kidnapped, people are going to think, "Yeah, yeah, right, pull the other one." Right.
This isn't about hiding your browsing habits from coffee shop owners, and it's not about watching Netflix in any other country.
It's great for companies and it's great for self-hosters too. And it's fast, really fast. It's private, it's easy to deploy, zero config, no fuss VPN. Plus it means zero trust.
Every organization can use this.
You'll get 100 devices and 3 users for free with no credit card required. Want to learn more? Visit smashingsecurity.com/tailscale. That's T-A-I-L-S-C-A-L-E.
And thanks to Tailscale for supporting the show.
'Cause 1Password Extended Access Management solves the problems traditional IAM and MDMs can't.
It's security for the way we work today, and it's now generally available to companies with Okta, Microsoft Entra, and in beta for Google Workspace customers.
Find out more right now. Go to 1password.com/smashing, and thanks to 1Password for supporting the show. And welcome back.
Can you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week?
Could be a funny story, a book that they've read, a TV show, movie, a record, a podcast, a website, or an app. Whatever they wish. It doesn't have to be security-related necessarily.
Have either of you heard of Raycast?
So at first I thought it was just a replacement for Spotlight Search, but it's turned out to be much, much more than that. You can use it for pretty much anything.
So you can search for apps, you can search for files on your computer, you can search on the internet, you can manage tasks, manage apps, you can create and install as well custom extensions to tailor this tool to do anything you want.
So I've got, for instance, now keyboard shortcuts to turn my studio lights on and off.
If I'm doing a webinar or something, I can just press a button on my keyboard and it will do that. All through this program, Raycast. I can do window management.
I can place windows around my desktop, you know, say, oh, send that one over to this screen, send that one over there, go on that half of the screen. I can turn on or off my webcam.
I can do translation. I can do dictionaries. I can work out the times between different dates. I can track flights. I can have code snippets.
So if there's a piece of text which I'm often writing, I can just have it as a shortcut. Have a clipboard history.
I keep on finding new functionality and there are all these custom extensions you can add on to it to do more and more things. And it's free forever with—
And then out of curiosity, I thought, oh, they're saying you can try it with those extra little bits for 14 days and then it becomes $8 per month.
And so I've now actually upgraded to the pro plan because I am finding it gives me more $8 worth of value for some additional functionality, like syncing between my devices, like an unlimited clipboard, AI integration as well, if you want to use some AI functionality.
But it's changing the way I use my Mac and my workflow. And it's a really cool little thing. So it is called Raycast. The geek in me is absolutely loving it.
So that's my pick of the week, Raycast. Cool.
I'd like to call myself a gamer, but in actual reality, I just don't have time anymore.
And I came across this really fantastic game, and it's by a company that did a really brilliant game back in 2019, and some of your listeners might have had to play around with it, which was called Untitled Goose Game, where you played a goose and terrorised the neighbourhood.
My pick of the week is a game called Thank Goodness You're Here.
Very northern, and it's a fake town called Barnsworth, which I believe is a bit like Barnsley because I've been to Barnsley myself and it kind of looks like that.
But thank goodness you're here is a beautiful and hilariously funny game. It's almost to me like an interactive story.
Your gaming really involves you going to the fishmongers and having to stamp on all the fish's heads until cigarettes come out of them. That's one of the tasks you get to do.
But what really makes this a really special game. It comes in about— I completed it in 3 and a half hours. Yep, there isn't much game there, but what is there is absolute gold.
When you're just walking around, the joy of it is just to look at the artwork, to look at the inside jokes, to listen to the story.
I've not laughed so much playing a game in so long. It is really brilliant. It is very Northern. You get a choice at the start of the game to how Northern you want it.
I put on max because I can understand the language and the lingo.
And it comes sometimes as a bundle on Steam, so you can buy Untitled Goose Game, which I absolutely recommend as well, as a kind of bookend to that.
But thank goodness you're here is absolutely brilliant and I can't recommend it enough.
It's got a very League of Gentlemen vibe to it as well. Quite a lot of them are from the North as well.
If you like The League of Gentlemen, you know, the early days of Vic and Bob and things like that, I think you'll love this game.
There is some quite rude jokes in it. But yeah, it's excellent.
And this podcast, The We Society, has been going for a number of years. It just launched season 7.
So things like, should we and how do we improve education, or what is the future of democracy? Big things like that. Hate crime, how do we stop it? War on drugs. So big topics.
And Will Hutton has experts and researchers on who share their specific insight on the realities of the situation and then explore, how did we get here? Where are we going?
What should we do? Basically, that's the way I would say it.
So, you know, in a world where lots of headlines are very bad all the time, it's nice to have something where you learn from it, but also that you enjoy and you find a little bit more uplifting.
So it's The We, just W.E. Society with Will Hutton. And that's my pick of the week.
Thank you so much, Lianne, for joining us. I'm sure lots of our listeners would love to find out what you're up to and follow you online. What's the best way for folks to do that?
Do not just put in Compromising Positions. Nothing but the worst things you might see will come up if you don't put in podcast as well. I can't be held responsible.
And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
It's their support that helps us give you this show for free.
For episode show notes, sponsorship information, guest lists, and the entire back catalog of more than 401 episodes, check out smashingsecurity.com.
But it's going to be called Tech Film Noir, and we're going to be going through films, so your Terminators, your Lawnmower Mans and things like that, and putting them in the historical context.
And we'll also be geeking out, so we'll be looking at what kernels they're using as well, do a deep dive into the code.
So it's a good mix of if you like your films and you like your tech, you're going to enjoy Tech Film Noir.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Lianne Potter
Episode links:
- No Honour Among Thieves: Uncovering a Trojanized XWorm RAT Builder Propagated by Threat Actors and Disrupting Its Operations – CloudSEK.
- British Museum forced to partly close after alleged IT attack by former employee – The Guardian.
- Chart: What Do You Want to be When You Grow Up?– Statista.
- Tikked off: What happens when TikTok fame fades – Vox.
- Influencer burnout is real – Vox.
- Influencer slammed for staging fake kidnapping plot because she was ‘bored’ – Mirror Online.
- “Mom influencer” Katie Sorensen sentenced to jail for falsely claiming couple tried to kidnap her kids at a crafts store – CBS News.
- Stock market influencer on the way to Coldplay concert kidnapped by data theft gang – The New Indian Express.
- Raycast.
- “Thank Goodness You’re Here” video game.
- The We Society Podcast – Academy of Social Sciences.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Tailscale – Tailscale is perfect for work or personal projects, making networking simple. Its free plan covers up to 100 devices and 3 users. Get started at tailscale.com and be up and running in less than 10 minutes!
- 1Password – Secure every app, device, and identity – even the unmanaged ones at 1password.com/smashing.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


