
A YouTuber has unleashed an innovative AI bot army to disrupt and outwit the world of online scammers, and a New York Times investigation looks into the intricate web of global money laundering.
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security episode 410. My name's Graham Cluley.
Coming up in today's show, Graham, what do you got?
Back in episode 394, Carole, you were telling me all about how O2, the telecoms company, had created an electronic granny called Daisy. Do you remember her?
So they used her as a marketing campaign to raise awareness of scams, but she would actually speak to the scammers and tie them up on the phone call.
So what O2 did was they posted Daisy's phone number on the web. Daisy obviously is a digital Daisy.
And they put it up on web forums where they thought scammers might lurk, where they may be scooping up numbers, and they waited for her to receive calls from scammers.
And they announced that nearly 1,000 scammers had called her over the course of several months. And she'd wasted their time.
And a major limitation of Daisy was that she could only handle one call at a time.
That actually wasn't an original idea. There was also, have you ever heard of Lenny the telemarketing troll?
Lenny is an automated system which does a reasonable impression of a confused elderly Australian guy with a wheezy voice and a slight whistle while he talks.
He chooses from a select group of sort of open-ended phrases, waits for a pause in the conversation before playing his next clip in an attempt to mimic a normal conversation.
And according to research done by the LennyBot folks, around about 75% of scam callers realise that they're talking to a computer programme within about 2 minutes.
We don't know exactly how successful Daisy was and how much time she would spend at people's— Lenny, equally not that brilliant really at occupying a great deal of time.
Still not too bad.
You know, if you want to have a system which clogs up the scam calls by distracting them with moans about the economy or talking about their grown up kids, it's not a bad way to do it.
They must say, look, if you've gotten nowhere after 12 minutes, hang up, move on, clear the decks with these people. There must be a magic little tipping point.
You know, hang up, clunk.
You might be tempted to hang onto it and see if you can land it, as it were.
O2 realised that Daisy was only dealing with the very tip of the iceberg, and that would require many more resources, perhaps even tens of thousands of Daisies, to really have an impact on these huge scam call centres, these major operations, which are out there scamming many, many people.
But that doesn't mean that the idea of wasting scammers' time is necessarily a bad one.
And earlier this month, someone revealed how they had been using more advanced AI techniques against scammers.
You know, we've all seen these happening, haven't we?
It's not always the elderly people who are falling prey to them, but quite often they are unfortunate victims because they've got savings, maybe they've got a house, you know, they've got their retirement fund or whatever it is.
He wanted to get his own back on these scammers who'd impacted his grandmother. And so what he started to do was waste the scammers' time.
And he filmed himself disrupting their activities by pretending to be a likely victim, by looking like a prospect.
And he got himself a little digital voice box so he could change the pitch of his voice. He could become an elderly man or a woman with a hearing issue.
He could become a Russian guy. Even a competing tech support scammer. These were the kind of disguises which Kit Boga was using.
Or maybe the scammer needs to remotely access Kit Boga's computer to send him some money.
And remote access, of course, would give the scammer full control over the PC and all of its data.
But Kit Boga was prepared for that because he'd set up a virtual machine for the scammers to hack, in quotes, not realizing that their activities were being filmed and they weren't actually going to grab anything useful.
In fact, what he would do is when they asked him to log into his online bank account on the hacked PC, he had an answer for that.
He had created a fake banking website, which he pretended to log into specifically to waste the scammers' time. And it was filled with booby traps.
So if the scammer even took control of the keyboard, and tried to sort of add a couple more noughts or, you know, change the amount of money which was being sent to them or something like that, they would be frustrated.
It wouldn't do what they wanted it to do.
He's Robin Hooding and defending his grannies.
He's teamed up with a cryptocurrency exchange, Kraken, and the AnyDesk app, and he shares information with them live regarding attempted scams which are in process in an attempt to blacklist those accounts and protect other people.
You can install it and it will warn you if you're being scammed and tell in real time your trusted friends and family that Granny is being hacked. So it's not just a labour of love.
It's a full-time job, these guys.
Sometimes law enforcement, sometimes they even manage to hack into the CCTV cameras and the computer networks of the scam call centres as well to observe them and gather information about them.
So it's interesting work, but he's only one guy. Right, Kit Boga?
So what impressed me is he's now revealed how he is using AI in the fight against scammers, because he's taken the principle of Daisy the Granny and Lenny the Telemarketing Troll, and he's developed what is essentially AI clones of himself.
He's created an AI bot army, and he doesn't wait for the scammers to call one of his army of scam-busting bots.
His bots are actively calling up these scam call centres, which are identified through scam emails and pop-up ads and other intelligence which they have, multiple bots call that location simultaneously and tie up all of the available operators.
Wow. This dude thinks he's talking to a grandma. You're like a grandmother to me. Can you help me with that printer driver issue now? Okay, if you go to the target, okay, listen to me.
Carefully, when you visit to the Target store, the bot just pretends to go along with instructions, even pretends to buy gift cards.
At the back of that Target gift card, did you scratch it? Oh yeah, I scratched it already. Okay, now tell me the numbers. Tell me the numbers slowly, slowly. Okay.
At this point, the scammer has spent 2.5 hours trying to get gift cards from a robot. Okay, I scratched it and it's a bunch of numbers.
So these are no longer prerecorded statements about ducks going past the window or, yeah, let me tell you about the economy.
They're reacting to what the scammers are saying to them.
So there's the common garden you've got a virus on your PC, you know, tech support scam.
But there are also scams where people have been tricked into making an unwise cryptocurrency investment or buying gift cards or thinking that they will have their book published.
In one recording, I didn't know about this, everyone apparently has got a novel in them, right?
Everyone has got— there are websites out there which are saying, oh, you know, submit your book to us and we will publish it.
In fact, I'm pretty sure I've received a fair number of emails over time saying, Graham, would you like to write a book about cybersecurity? I've always said, no, not really.
But I wonder now if some of these were scams where if I replied with my PDF, they would say, oh, this is a great book, Graham. We'd love to publish this. It'll just cost you $1,500.
And in one of the recordings up on YouTube, you've got his bot, which is Norman, saying how he's written a horror romance novel about his refrigerator.
101 Pictures of My Refrigerator, it says.
Yeah, sure, Emily. I think we have a bit of a situation on my end. You see, my cat Mr.
Whiskers is helping me on this call, and honestly, my fridge seems to be lying and trying to get my attention. I know it sounds crazy, but I swear it's true.
Can you maybe help me figure out what's going on? And then we can get back to discussing my book, 101 Pictures of My Refrigerator.
And he's discovered the cover. And this poor— I almost feel sorry for the scammer because these conversations go on and on.
These videos you can watch are 30, 40 minutes long of the scammers having all of their time clogged up by AI now. It's not Kit Boga doing it by hand.
And you watch these videos and there's a little counter on the screen showing how much of the scammer's time has been wasted as well as a grand total.
They have little animated graphics of both the scammer and the bot talking to each other. You can see little images of them chatting away.
You can see the words coming up in real time. I mean, it's an amazing operation which they've done this.
And I think if a YouTuber can do this, imagine if the telecoms companies and multinational law enforcement, if they were all chipping in, if governments were chipping in to do something about this on a much bigger scale, because clearly it's using up GPU time.
Kit Boga has sort of waved an old hard drive around, said, look, this is the server which I burnt running this thing. And you've got to keep those things cold, haven't you?
You've got to keep them up and running, those data centers. But surely this would be a good investment for the computer crime-fighting authorities to really get behind to do this.
They did it as a marketing kind of campaign in one company recently, but maybe actually they should think about it seriously.
You remember back in the 2000s when lots of people ran software on the computer to search for alien life? No. There's the— No, the SETI Project.
There was the Folding@home project, which used distributed computing to fight diseases and try and— I think it's folding proteins or something.
It's all to do with fighting diseases. Wouldn't it be great?
I'm not suggesting we should stop trying to fight diseases, of course, but if we have the option of opting in to provide some computing power while our PCs slept to help in the fight against scammers as well, if we could run just a little bit of soft— you don't wanna do that?
But sometimes that's really hard, especially if it's a month-long deep dive investigation.
So this is my amalgamation of highlights from a lengthy New York Times article that was published this past Sunday.
And the question the New York Times journalists wanted to answer was, once the money is stolen from an innocent victim, you know, using whatever scam, right?
Romance scam, crypto scam, phishing scam, doesn't matter. And the victim pays up. Where's the money go? How does it happen?
This is considered dirty money. And having it directly delivered to, say, your personal account or your company would be considered maybe foolhardy, right?
Why have a stinky paper trail end at your account?
Instead, their job is to connect you with money mules.
So people that have bank accounts and crypto accounts and whatnot that they're willing to use to process illegal funds or stolen funds.
Because you want to be able to get the money from one jurisdiction or geography to another.
And you have this matchmaker, the middleman, and you have these money mules, people who are effectively the first step in laundering the money.
Now, how do these three find each other? You know, it's not as if this stuff is legal, right? And the playground seems to be international. So how do they meet up? What do you think?
Okay.
They talk about it being a bit like a hydra because you cut off one, you close down one of these groups, and pops up another one a few days.
And in these groups, they might use somewhat covert language.
You know, so it's something like posting something like, "Our services are down for repairs." That might actually translate to, "Hey, our mules have been arrested," or "The bank accounts are compromised or frozen or unavailable." Okay.
Yeah, and remember, it's the mule's accounts, right? Obviously, probably fake accounts, but these are accounts, bank or crypto.
They are the accounts that are sent directly to the victim by the scammer. So let's say $20,000. You got scammed, Graham, you pay that up.
You would be paying that money to the mule's account.
Look, if it all goes wrong, we have the money to back your— this event.
And if I understand correctly, this is backed by the online bazaar on Telegram, which seems to have ties with legit-ish and established fintech firms in Southeast Asia, such as Huy One.
Now, my point here is that the money transaction seems to be backed, and this greases the whole trust component so that money doesn't stop a-flowing, because everyone makes money if money's flowing, it seems, even in this nefarious world.
So in this case, if it was £20,000, you'd have £3,000 has been paid to everybody else, you get £17,000, and there you go. The vic is out of pocket £20K.
Who do you think is most vulnerable on this chain?
But without them, this whole thing would be infinitely more difficult to run because you have to move money from specific geographies with certain legislations and laws to countries where there's a lot less laws where you can actually do what you want to do.
We will put some money into your account. We would then like you to put some of that money into another account.
Maybe they were scammed and something was stolen from them and they said, oh, you better do what we say and use your account, otherwise—
Let's waste that scammer's time. But really what we really need to get to is to, you know, the actual heart of the operation, which I think also includes the mules.
Anyway, brilliant article in New York Times. Links in the show notes as always.
That's why modern GRC leaders turn to Drata, a trust management platform that automates tedious tasks so you can focus on reducing risk, proving compliance, and scaling your program.
You can stay audit-ready with real-time monitoring, and you can simplify security reviews with Drata's Trust Center and AI-powered questionnaire assistance.
Now, Carole, according to Vanta's latest State of Trust report, Cybersecurity is the number one concern for UK businesses, and of course, Vanta can help you with that.
To help your team not only get compliant, but stay compliant.
Head to vanta.com/smashing to learn more. That's Vanta, V-A-N-T-A, dot com, slash, smashing. And thanks to Vanta, LastPass, for sponsoring Smashing Security.
Do your end users always, and I mean always without exception, work on company-owned devices and IT-approved apps? I didn't think so.
So my next question is, how do you keep your company's data safe when it's sitting on all those unmanaged apps and devices?
1Password Extended Access Management is the first security solution that brings all these unmanaged devices, apps, and identities under your control.
Can you join us at our favorite part of the show? The part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they like.
It doesn't have to be security related necessarily.
And my pick of the week this week, Carole, is a bit security-related because while researching this Kitboga chap and seeing what he's been up to, I discovered that just a couple of days ago in Canada, your home country, Carole, CBC Marketplace broadcast a 40-minute documentary all about the activities of Kitboga and two other very highly regarded scam busters, Jim Browning.
I'm sure many of our listeners have heard of him, and Pleasant Green.
And a CBC reporter actually was calling up victims to warn them before they did something that they would regret.
And it's the usual kind of story where Jim Browning or one of his cohorts has managed to hack into the CCTV networks of some of these scam call centers.
They're able to see what's going on on the screens of the call centers. They're doing all their funny voices. It's a great wake-up call, I think, for many people.
And if you've got people in your life you think may be vulnerable to scams, maybe if they're not prepared to listen to podcasts or read articles about scams, maybe they would be prepared to watch this documentary, which is on YouTube.
So CBC have put it up on YouTube. It's 40 minutes long. It's called Infiltrating Scammer Networks with the World's Top Fraud Fighters. And it's well worth a watch.
And that is my pick of the week.
You want to show them where to go, and it has to show the street names because maybe Google Maps or Apple Maps or something isn't showing them clearly for a walking map.
So this person could go and explore and I could spy with confidence via my Apple Find My app. I'm watching everywhere they go.
You can find Smashing Security on Bluesky, unlike Twitter, which wouldn't let us have a G.
And don't forget, to ensure you never miss another episode, follow Smashing Security in your favourite podcast app. Podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
It's their support that helps us give you this show for free.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 409 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- O2’s AI granny Daisy unveils what she’s learnt from her time on the phone to scammers – and what you can do to ruin their day – O2.
- Lenny – The Telemarketing Troll.
- I Built a Bot Army that Scams Scammers – Kitboga on YouTube.
- Takeaways From Our Money Laundering Investigation – The New York Times.
- Infiltrating scammer networks with the world’s top fraud fighters – YouTube.
- Open Street Map – Open Street Map.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- Drata – The world’s most advanced Trust Management platform – making risk and compliance management accessible, continuous, and 10x more automated than ever before.
- 1Password Extended Access Management – Secure every sign-in for every app on every device.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

