
Graham explores how the Elusive Comet cybercrime gang are using a sneaky trick of stealing your cryptocurrency via an innocent-appearing Zoom call, and Carole goes under the covers to explore the extraordinary lengths bio-hacking millionaire Bryan Johnson is attempting to extend his life.
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
With Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 414. My name's Graham Cluley.
Now, coming up on today's show, Graham, what do you got?
I don't know what I'd do without spending 5 minutes on every video call, either trying to tell someone else that they're on mute or me trying to find the unmute button myself.
Maybe you are, Carole, maybe you are a Zoom ninja. You could reach through your screen and press the unmute button on my keyboard or choose the option for me.
And that would help out people, wouldn't it? Rather than them floundering around trying to find the unmute button themselves.
And it allows you to take control of another participant's screen during a meeting after they've given you permission, obviously.
I'll go in, I'll fix the problem. I'm out of there.
You're absolutely right. If someone isn't quite as au fait as you are with what to do, and let's face it, not everyone knows how to do everything on their computer, do they?
There's always going to be, oh, there's a new version of this that's come out. There's a new version of that. I don't know what to do. I've changed my mouse. I don't know.
You know, we can all have struggles.
You are flattered, very flattered when someone reaches out to you, recognising your status, your position, or maybe your company and how well you're doing in that industry.
Or maybe you're pinged by Bloomberg conferences and they say, you know what?
We'd really like you to speak at one of our events, or we'd like you to be interviewed by one of our reporters. Or maybe, and this frankly is the greatest flattering thing of all.
Maybe someone wants you to come on their podcast, Carole. Maybe you have been contacted by the On Chain Podcast. They've been in touch. You think, finally, I've been recognized.
They want you to be their guest on an upcoming episode. And quite frankly, you are flattered.
So I would never be in this situation. But okay, yeah, I'd be thinking, I don't know. I don't know. Okay, so I say all that. Okay, okay, I'll play.
And before you know it, you've lined up a Zoom call with your potential new investors or the podcast host who wants to chat to you about how amazing you are and about all things cryptocurrency.
Now, I know what you're thinking. You're thinking, are they going to send you a malicious link for the Zoom call?
They are just going to send you the meeting ID number so you can enter into your own version of Zoom and dial into the Zoom call at the scheduled time to have a chat.
What could possibly go wrong? Well, as it turns out, you could be about to lose millions.
And they have been doing precisely this technique to steal millions and millions of cryptocurrency.
What they do is they use that little-known feature hidden within Zoom called remote control.
So the video conference begins, but a member of the crime gang has also joined the meeting. And here's the really sneaky bit. They don't use their real name.
Instead, they call themselves Zoom, and they use that account called Zoom to request remote control of your screen.
And what happens is, a pop-up appears on your screen, the victim's screen, asking you to grant remote control in what looks like a regular Zoom permission request.
So the actual words are, Zoom is requesting remote control of your screen. Approve or decline?
But I do imagine there are many a CEO with a lot of self-importance that would just go, yeah, yeah, yeah, yeah, yeah, let me get on the call and hear more about how great I am.
So, yeah, yeah, yeah, I just want to go on this call because I'm going to make millions and millions by appearing on this podcast.
It's going to be very successful, or I'm going to get some venture capital. This is brilliant.
Now, there's a number of people who've been targeted by the elusive Comet hacking group in this way.
Cybersecurity research consultancy Trail of Bits, their CEO, Dan Guido, he was asked to invite in what presented itself as a Bloomberg Editorial interview, and thankfully he didn't fall for it.
He said that what made the attack particularly dangerous, as I was saying, is this permission dialog and the similarity to other harmless Zoom notifications.
So the fact that people were able to join a Zoom call and call themselves Zoom was in itself really, really risky.
It was a really clever bit of social engineering because people were tricked into clicking approve because they're so used to giving approval to apps to do things.
Another victim a guy called David Z. Morris. He is the author of Dark Markets. That is a newsletter about tech and finance.
He was targeted by the elusive Comet Gang again, this time posing as Orion Capital. Now, Orion Capital positioned itself as a real company. It had a website. It's now been taken down.
They had social media accounts. They had a news agency pumping out news all the time about cryptocurrency. They even had their own podcast.
Where they were pushing all these things out. So if you just did some casual research, you might think they were real.
And when you see other people being interviewed by the podcast who maybe are figures in the world of crypto, cryptocurrency, you may think, "Oh yes, I'd like that opportunity." Now, they could have grabbed that audio from elsewhere.
Anyway, David Z.
Morris, his spider sense was tingling, and he did some reverse image searching kung fu, and that told him that something was wrong because he saw Orion Capital's website, the sort of About Us page where it talked about their staff.
He found those pictures elsewhere on the internet. But his initial thought was, well, you know, it's just a Zoom call, he thought. What's the harm in doing this?
Now, thankfully for him, the call never happened, but he learned from others that if he had joined the call, a common trick which has occurred is that the friendly VCs who've contacted him via Zoom might have pretended that they couldn't hear him, and they then tell him, oh, you know, we can't hear you properly.
Can you give us remote control to change your settings, for instance, in Zoom?
And of course, you're under pressure now because you've got an hour slot in your calendar to talk to these people. The video call isn't working.
Let's use this other software which they're recommending because there's some kind of problem with Zoom. And video calls do sometimes go very wrong, don't they?
Researchers at Smashing Security Alliance, they've been looking into this Zoom attack technique and the activities of Elusive Comet, they're advising everyone, do your due diligence to make sure that you're only communicating with legitimate profiles and not—
How are people supposed to detect that a company is a fraud if they have a podcast?
If you have some kind of disability or problem with your computer, it may be that you have a legitimate need to have that, in which case, obviously, you have to be very, very careful who you approve to allow access to use that remote control functionality.
Now, this was 12 years ago, and I'm sure Johnson had a rollicking good time spending some of his millions. But even that must get dull.
How many Armani suits can a man get excited about?
And this is where the term I've been bandying around, biohacker, comes in. Okay? It seems to refer to extreme anti-aging practices.
I don't think eating 5 a day or drinking just on the weekend would get you anywhere near the label biohacker, right? It's a little bit more extreme.
Among the list were semen analyzations and ultrasound-based blood flow testing.
And he then claimed that Botox and shock therapy lowered his nighttime erection biological age to around 20.
The 45, now 47, but at the time 45-year-old Johnson has achieved metabolic health equal to the top 1.5% of 18-year-olds.
Inflammation 66% lower than the average 10-year-old and reduced his speed of aging by the equivalent of 31 years. Now let's pause.
I'll say right now that Johnson's claims are not universally accepted.
It might be better to see him as a rich guy needing to do wacky shit in front of an audience and win at something. Maybe, maybe, I don't know.
Blueprint, I should mention, is also a company, one that sells health supplements, blood testing equipment, and other products tied to his personal diet and restrictions.
So he's also trying to, I guess, claw back some of that $2 million that he's put in to analyzing himself.
And you would think that if he's as bonkers as he might seem, there would be people that have worked with him, people that have partied with him at Brigham Young, his alma mater, people that dated him, that these people would be spilling some beans, right?
Is there perhaps a different version of the truth than the one Johnson is peddling? But I just couldn't find much dissent, unless there's nothing to hide.
How would one do that, do you think? How would you be master controller of your narrative?
No need for his 4 million-odd subscribers on his social channels to know that he dropped acid with a date. But how to ensure that?
Well, whip out an NDA for her to sign before you drop the stuff.
No need for his people to know that he dumped his fiancée and fired her from one of his startups when he found out that she had stage 3 breast cancer.
It's not going to look good with his whole business, is it, really?
Some had to sign up to 3 separate agreements. And this is a company of about 30 employees.
One was a rather unusual opt-in agreement, which is not a confidentiality contract, but does aim to protect the company from things like lawsuits.
And so this was sent to employees by email with instructions to sign as normal. Allegedly, allegedly. So under this agreement, employees had to attest that they were okay with Mr.
Johnson wearing little and sometimes no clothing. Oh, no underwear.
They also had to agree that his behavior was not unwelcome, offensive, humiliating, hostile, triggering, unprofessional, or abusive.
They also had to attest that they were okay with hearing discussions of sexual activities, including erections. Now we know from earlier that big boners are a big deal in his world.
And it was sent to them under the guise of here's just another thing you got to sign. So imagine having to agree to that prior to said behaviors, sign this, now I'll fart on you.
You can't do anything.
60% of people apparently, according to secret filings that The New York Times saw, suffered at least one side effect.
And he's released a documentary last year about his anti-aging venture where he claims that his age has reversed by 5.1 years.
But an internal range of studies on his health show his bioage had increased by as much as 10 years.
But my point is this, my point is this: employees did not feel they could share the findings or the set of rules they had to live by because they had signed their rights away.
Because as you say, people rarely read them, despite my many reminders over the years. So why wouldn't companies have a crack at it?
And it seems these types of clauses are meant to isolate the employees so they can't even talk with other employees or friends or family about what concerns them, what they're involved in at work, you know, what a sham the whole thing might be.
And I wanted your opinion on something.
So, would you advise people about to sign contracts to maybe try AI, like a general or maybe even legal-focused AI, to isolate sections that might be contentious?
But the problem with sharing these things with the AI sometimes is both the AI may not be reliable, but also that you're sharing potentially confidential information with a large language model, which may learn things from it and spit them out again later.
So I'd be nervous of it, frankly.
I was having some conversations over the last week or so with people in my normal, non-tech life, and it's staggering how many people are using AI for everything in day-to-day life now.
And there seems to be a bit of internal whistleblowing going on that's gaining momentum. The guy also just announced his own religion, though. It's called Don't Die.
Says it'll save the human race, which, you know.
Head to vanta.com/smashing to learn more. That's Vanta, V-A-N-T-A,.com/smashing. And thanks to Vanta for sponsoring Smashing Security.
Do your end users always, and I mean always without exception, work on company-owned devices and IT-approved apps? I didn't think so.
So my next question is, how do you keep your company's data safe when it's sitting on all those unmanaged apps and devices?
It ensures that every user credential is strong and protected, every device is known and healthy, and every app is visible.
And welcome back, and you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security-related necessarily.
My Pick of the Week this week is, well, I wonder if you remember a while back I recommended an e-reader that I'd bought, the Kobo Clara BW e-reader.
And I think you mentioned, Carole, that your mum has a Kobo e-reader as well, but she found the user interface a bit of a challenge.
So it doesn't just work on Kobos, it also works on Kindle, and it is called KOReader, or KOReader with a K. And essentially it makes your e-reader more capable.
So it handles more ebook formats. You can tweak the user interface in a gazillion different ways to be exactly what you like. The pages turn faster.
There's things which you don't like, you can turn off all of these extra things. It's a completely new user interface.
It isn't just tweaking the existing user interface on your e-reader. It's giving you a whole new user interface.
If you have a piece of software called Calibre, which is another freely available piece of software, and set it up correctly, you can even do this wirelessly as well.
So just updating a directory on your computer will automatically update your e-reader as well. Anyway, my experience has been great.
I've been tinkering with my fonts, I've been installing my own, I've been changing the user interface, I've been more easily sideloading books, and it's been great.
And I've been most recently reading a book called Killing Thatcher on my e-reader by Guardian reporter Rory Carroll.
It's a really gripping book about the 1984 bombing by the Provisional IRA of the Grand Hotel in Brighton, where Margaret Thatcher and the British cabinet were staying for a party conference.
Really interesting book.
Talks about the resurgence of the IRA during the '70s, the assassination of Lord Mountbatten, as well as, of course, the background to the Brighton bombing, as well as its aftermath.
So I would recommend that book as well. But my pick of the week is KOReader, and I hope you find it useful. Cool, Carole, what's your pick of the week?
It was named best book of the year by The New Yorker and The Boston Globe. So I dove in without much context. But the author is an addiction psychiatrist and also an addict.
And wanting to learn more about his own addiction, he turned to learning about addiction's history and the century-old struggle to manage and treat addictive behaviors.
It took him a decade to pull this book together. And it's so good because it's woven between snippets of his own personal dealings with his demons that almost destroy him.
He also then looks at conditions and treatments over the decades, some that produced relief, sometimes shamed people, and sometimes made things much, much worse.
Sometimes did all three. So anyway, it's a great work. It's written with heart, compassion, commitment, and worth a look if you or someone you love struggles with addiction.
That's The Urge: Our History of Addiction by Carl Erik Fisher. That is my pick of the week.
And don't forget to ensure that you never miss another episode, follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 413 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- Elusive Comet advisory – Security Alliance.
- Mitigating Elusive Comet Zoom remote control attacks – Trail of Bits.
- Aureon Capital: The Fake VCs who Almost Hacked Me – David Z Morris.
- Requesting or giving Remote Control – Zoom knowledgebase article.
- Has Bryan Johnson’s anti-aging experiment backfired? Biohacker spending $2 million-a-year admits to a costly misstep – Economic Times.
- How Blueprint Founder Bryan Johnson Sought Control Via Confidentiality Agreements – The New York Times.
- Anti-aging mogul Bryan Johnson claims NY Times preparing ‘hit piece’ about alleged use of prostitutes, drugs – NY Post.
- KOReader – document reader for E Ink devices.
- Killing Thatcher: The IRA, the Manhunt and the Long War on the Crown – Bookshop.org.
- The Urge – Our history of addiction by Carl Erik Fisher.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- 1Password Extended Access Management – Secure every sign-in for every app on every device.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


