
Don’t get duped, doxxed, or drained! In this episode of “Smashing Security” we dive into the creepy world of sextortion scams, and investigate how crypto wallet firm Ledger’s Discord server was hijacked in an attempt to phish for cryptocurrency recovery phrases.
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault.
Plus! Don’t miss our featured interview with Drata’s Matt Hillary.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security, episode 417. My name's Graham Cluley.
Now coming up on today's show, Graham, what do you got?
That's governance, risk, and compliance. All this and much more coming up on this episode of Smashing Security.
I was hoping you're going to say in the shed and you've got to lock it and I could pop round any Thursday and pinch it or under the flower pot or something like that.
Well, in the old days, yes, I think many people used banks, didn't they? Or put it under the bed or in their wallet, maybe if it's a little bit of loose change.
But these days, in the case of cryptocurrency, the place where you put it is a portable hardware wallet, often in the form of a little USB device.
And it's a good idea, I reckon, if you have cryptocurrency.
It's better than shoving it into an online cryptocurrency exchange or into a wallet app you've downloaded from some app store onto your phone, because a hardware wallet, or also known as a cold wallet, is offline storage.
The private keys to your crypto fortune, they are disconnected from the internet, massively reduces the risk of your cryptocurrency being hacked or phished or falling prey to malware.
So you are in control of the keys. With hardware wallets, it's you who are holding the private keys. It's not a third party who you've entrusted it to.
You have it on a little device, you control when you plug it in, you control when you access it.
If, as I suspect you inevitably would, Carole, if you lost your hardware wallet.
Now, one of the most well-known USB hardware wallets for those people who aren't using tattoos on their bottoms, it comes from a company called Ledger, and they're one of the good guys.
Their hardware wallets are well regarded.
They're designed to keep your cryptocurrency offline, immune from the hackers, but I'm afraid they've not been having the best time security-wise.
And on that official Discord server for Ledger, a message was posted by an administrator warning that Ledger recently had a security issue and that to protect themselves, users should verify their recovery phrases.
And those, of course, are the recovery phrases you should never tell anyone ever, because if you hand them over, someone else can recreate your cryptocurrency fortune and nab all of your money.
So you've got to be careful. So Ledger are telling you they've had a security issue. Go to this link and verify. You can see where this is going wrong already.
You'd go to the website, you would look at your email, go to your account to see if everything was fine on the actual website.
But imagine all of your eggs were in the cryptocurrency basket and you thought, oh my goodness, I've got to do this right now. And sometimes you just click without thinking.
And of course, in this particular case, if you did click on the link, if you entered your recovery phrase as directed by the administrator from Ledger on their Discord server, bam.
Oh dear, oh dear. You have just handed over all of your money.
What we do know, although it was Ledger's official Discord channel and although the message was posted by an official moderator and admin on that Discord channel, at least from an account of an official moderator or admin.
It wasn't the official moderator who actually posted it themselves. It was a hacker who had compromised the moderator's account.
And of course, a Discord server, it can be a busy place. Lots of people logged in.
And some people you, Carole, would be savvy to this and think, whoa, whoa, whoa, what's going on here? I need to warn everyone.
And so some users did realise what was going on and they tried to post warnings, whereupon they instantly got themselves booted out of the Discord server.
He's crypto's very own legally challenged and utterly irony-free motivational speaker.
He's been in some trouble with the law for various things, but he popped up to mumble some things about, you know, you've gotta stay vigilant.
He says, you gotta stay vigilant 'cause there's lots of scammers out there, he said. And meanwhile, what was Ledger's response?
Well, Ledger, they sort of said something along the lines of, oh, whoops, you know, we had an unsecured account. Don't click on anything. Which, to be honest—
And then I said, look, it's not a problem. I've said sorry. You know, that's it, right?
So Ledger says it's now tightened the security of its Discord server.
And they've said that there was a contractor who was an administrator, someone they were paying to administer the Discord server, who had his account hacked.
They claim, well, it wasn't us who got hacked.
Its e-commerce database was hacked, exposing customers' names, email addresses, phone numbers, home addresses.
270,000 people in all who had bought a Ledger cold wallet to stop themselves from being robbed. Over a quarter of a million.
They now had to deal with the fact that a group of hackers who'd really like to rob them now knew precisely where they lived.
So yes, actual real human beings have been receiving real physical envelopes through the post containing physical letters.
And these letters, which have Ledger's logo on them, instruct them that they need to complete a mandatory wallet validation for a critical security update. And what do they do?
Well, you know all about this, Carole. Phishing.
And the letter says failure to complete this mandatory validation process may result in restricted access to your wallet and funds. So again, people are being duped.
Do they keep them on their keychain, these little USBs or whatever, these little wallets? We keep them in a safe. You keep them in your house.
But, you know, here we've just seen Marks & Spencer hacked, right? And we found out that customer data has fallen into the hands of these hackers as well.
And someone asked me earlier today, I was speaking to a reporter and they said, well, what happens if the hackers decide to exploit this information in a few months' time rather than right now?
I said, oh, absolutely they can. And here we're seeing the Ledger breach from 5 years ago haunting it because the hackers know who has Ledger devices.
They know who to send these letters to.
That could be a good place to put them. Doesn't matter if it's a Ledger moderator in their official Discord or after you receive a letter in the post, just don't tell anybody.
And I have to ask, why is Ledger using Discord as a support portal anyway? It is a video gamer chat room. You know, it's all crazy emojis and memes and neon text.
I don't know if you've ever been in it, Carole.
And a great way to slow down the success rate of these types of scams is, I think, to talk about it and warn folks. So here we are.
So the title's rather clever because, you know, most phishing attacks kind of have this tinge of alarm or fearmongering or urgency, all in the hopes of getting you to react rather than to think, right?
That's basically what the whole game plan is.
And typically the point is to get your credentials, your username or your password, your Ledger 12-word code, or get your banking details or whatever.
It says this is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners.
It provides access to your webcam, messengers, emails, call records, et cetera. It works well on Android, iOS, and Windows. I guess you already figured out where I'm getting at.
Well, some people might actually go and use a search engine, might they, to first think, well, I haven't heard of Pegasus, but let me have a little look.
And once they got past the flying horse, they find out that there's this piece of spyware, and that may give credence to this suggestion that they have been hacked.
And in fact, if they went and researched it even just today, the day of recording, you would hear that The NSO Group, the people behind Pegasus, have to pay Meta $168 million for the WhatsApp spy case where basically Pegasus was in there looking for activists, journalists, investigative journalists, and that kind of thing.
I guess Facebook have basically said, hey, 'You can't spy on our users, that's our job.' Apple also had a case against them, but they dropped it.
So if you went and gone, 'I'm gonna go check out this Pegasus thing,' you would go, 'Yep, this is real.' Yep. So the letter carries on.
'It's been a few months since I installed it on all your devices because you were not quite choosy about what links to click on the internet.' During this period, I've learned about all aspects of your private life, but one is of special significance to me.
It's long enough for you not to necessarily remember what you might have done or not done in front of a device, of which your home is probably littered.
But right now, I'd be okay, if you got something, show it to me. Surely you got to show it to me.
You're filling the gaps to the story that they're putting out there.
Everywhere is going to be a tsunami that will sweep away everything in its path. And first of all, your former life.
So consider this a kind of deserved punishment to stop you. I'm some kind of God who sees everything. However, don't panic.
And then he carries on, once I receive confirmation of the transaction, I will permanently delete all videos compromising you, uninstall Pegasus from all your devices, and disappear from your life.
So then he carries on, you can be sure my benefit is only money, otherwise I wouldn't be writing to you, but destroy your life without a word in a second.
And then it says, I'll be notified when you open my email, and from that moment you have exactly 48 hours to send the money.
If cryptocurrencies are uncharted waters for you, don't worry, it's very simple. Just Google crypto exchange or buy litecoin.
It'll be no harder than buying some useless stuff on Amazon.
Do not contact the police, I have access to all your devices, and as soon as I find out you ran to the cops, videos will be published. Don't try to reset or destroy your devices.
I, as I mentioned above, I'm monitoring all your activity, so you either agree to my terms or the videos are published.
Also, don't forget that cryptocurrencies are anonymous, so it's impossible to identify them using the private address. And it ends with, good luck, my perverted friend.
I hope this is the last time we hear from each other. And some friendly advice. From now on, don't be so careless about your online security.
I mean, do you think this actually works? Do you think people do fall for these things and give the money?
Because I mean, in case we haven't made it clear, the computer isn't infected, is it? The spyware isn't present.
But at the same time, there is nothing on your system at all, right? At all. So the whole thing is this complete ruse. It's not even bespoke to you.
Now, of course, this kind of threat could, I'm sure, with the advent of technology, could be completely tailored to your specific, you know, so with Graham, you would probably say you'd mention chess Doctor Who, I don't know, Peanuts.
Don't think it's just my banking one I have to worry about. We've mentioned this earlier, reputable password managers can be invaluable here.
And, you know, what do you think about running anti-malware programs if you're nervous in this situation? What would you say, oh wise one?
If you think there's a tiny chance that your computer might be infected with some malware, then yes, of course you should run some antivirus software to try and reassure yourself.
And also, if the hacker really knew anything about what you had been up to, then surely they would've included that in the message to make it more compelling.
So they would've said, "I know that you went to this site at this time, and this was your search which you entered," or that kind of thing.
The lack of any corroborating evidence should set your alarm bells ringing.
But as I said, there will be a small percentage of people who are vulnerable to this kind of thing and will just panic, and maybe they've got other bad stuff going on in their life.
And so they might be duped into handing over the money. It's a terrible thing.
If you're leading risk and compliance at your company, you're likely wearing 10 hats at once, managing security risks, compliance demands, and budget constraints, all while trying not to be seen as the roadblock that slows the business down.
That's why modern GRC leaders turn to Drata, a trust management platform that automates tedious tasks so you can focus on reducing risk, proving compliance, and scaling your program.
And you can simplify security reviews with Drata's Trust Center and AI-powered questionnaire assistance.
That's drata.com/smashing-security.
Stolen credentials are the number one cause of data breaches, and well, there's a better way to solve that password problem, and that's with Dashlane.
And by being a listener to Smashing Security, you get savings off both.
Save 25% off a new business plan, or 35% off a new personal premium plan by visiting smashingsecurity.com/dashlane. That's smashingsecurity.com/dashlane.
And of course, Vanta can help you with that.
Head to vanta.com/smashing to learn more. That's Vanta, V-A-N-T-A.com/smashing. And thanks to Vanta for sponsoring Smashing Security.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily.
I had my arm twisted by my lovely wife, and she said, "We're going to go and see a movie." I thought she said ThunderCats, but it turned out it was actually called Thunderbolts.
And I just think, what is the point of watching this for 20 minutes with these things clonking each other? Anyway, this movie I actually thought was all right.
And you know how I know? It was all right. And this is the big news.
She's doing a Russian accent. It's got some Ukrainian actress who's doing an English accent. And it's got David Harbour, who I recognize from something or other.
He's doing a Russian accent. And various other people who I'm sure fans of superhero movies will know. Oh, and it's got Julia Louis-Dreyfus, who I've loved so much.
Since Seinfeld, if you remember her.
Not cats, Thunderbolts. And that is why it is my pick of the week.
It won an award for best series. So, it's a modern-day thriller set in the northeast of England.
It's starring Gina McKee as Jess, a kind of quiet but sharp lone wolf audio forensic scientist. Okay?
And now she has this bright sidekick called Maya, who's learning the ropes from Jess, but also is showing Jess a trick or two of her own.
The answers in the audio file.
Anyway, I've just finished season 2. It landed a few weeks ago, and the story arc carries on, so be sure to start with season 1.
And that is my pick of the week.
This is the company that keeps you ahead of security reviews, audits, and risks. And today we're going to pick Matt's brains on how we can better manage GRC.
Now, most of you know what that is, but for listeners my mom, hi, Mom, GRC stands for governance, risk, and compliance. So, thank you for coming on the show, Matt.
Appreciate the time.
And so, I feel really privileged to be here with you and chatting about this today.
First, maybe just tell us a little bit about you and your responsibilities at Drata.
And we just announced, you know, our recent acquisition of Safebase to help companies build that interface of trust between companies and showcase all of our GRC efforts.
Me, here at Drata, I lead our internal security compliance, IT, and privacy teams. And, you know, I was originally born into the GRC space.
I started my career at the Seattle area working for Ernst & Young. And helping many of those organizations up in the Seattle area on their respective GRC journeys.
You know, later in my career, I knew I needed to add the technical aspects of the hardcore security side of the spectrum.
And so I added security engineering and operations to the mix and loved and thrived in that space.
And I've started several security and GRC programs from the ground up at companies like AWS, Adobe, Instructure, Weave, and MX.
And I've been a CISO at a number of companies prior to joining Drata.
You know, one of the things of just knowing something about a particular space is being able to hopefully distill that down to a set of terms that even a child can understand.
So hopefully I can do that here.
Being transparent and open and vulnerable are those principles that help build trust between human beings. And it's no different at the organization level.
Every organization is trying to build trust in their customers, whether it be a business-to-consumer type of business, or whether it be a business-to-business type of business.
That trust is really what helps build and accelerate our growth as companies. And so we're in the middle of that and helping build that trust.
Now, there are very specific ways and processes that we have to basically follow to demonstrate that we're doing something in a way that our customers would expect.
And so that's where the governance side of things, which is where we define what those expectations are for our companies, where the risk standpoint is, there's a number of bad things, or what could go wrong, as we call them, or things that might impact our companies that we need to identify and treat.
And then last but not least, there's a number of great frameworks that are usually built upon common risks across our companies that allow us to identify, hey, what are some specific controls, or these things that we should be doing to help protect us.
And that's the compliance side.
And there are a number of reports and things that we can engage a third-party assessment organization to come in and help evaluate how we're doing against those controls so that it's not just us saying something.
We actually have another person coming in and observing that we're doing what we are saying we're doing and putting that in a format that we can all hopefully understand and build that trust.
And so if I'm trying to think of my own 7-year-old daughter explaining that to her, she'd be like, okay, I lost you.
And that's being able to showcase all of our efforts publicly so that we can show in that transparent way, hey, we're trying in good faith efforts to do everything that we can on our end to really demonstrate that we're trying to do the things that we should be doing.
And that's where Trust Center comes into play, where we really can, again, allow customers in a self-service way obtain the documents they need, obtain the artifacts they need to then assess and say, yeah, we agree, you are doing the things we expect you to do.
Or— and this is actually, Carole, the thing that I love the most about these conversations is I learn the most when another customer comes in and says, hey, but what about this aspect?
Have you thought about this? And in some cases, they identify stuff that will allow us to improve on our own journey.
Can you tell us maybe about the challenges that organizations are facing today?
And, you know, we published this in our most recent 2025 State of GRC report that's available now.
And these biggest challenges really stem from, you know, the industry pressure on this role. You're right, the stakes have never been higher and they continue to get higher.
And so when you think about GRC professionals that may already be an extremely lean team, already, they're having to continue to effectively meet those demands and pressures along the way.
The next is just the complexity associated with these frameworks, right? Our team members, we are the great influencers in the organization.
We're the great orchestrators of these controls. And so you really have to be someone that other folks want to engage with to help basically meet those standards and find gaps.
And hey, we have a goal to build trust with customers. Here's a requirement, this is where we're at today, how do we want to close that gap?
And it's a fun collaborative exercise across the board and really builds trust.
And last but not least, on the security side, obviously, the addition of AI on both sides of the fence, both the attacker as well as the defender side, has just continued to be a fun challenge to understand.
There's obviously a very small slice or percentage of us that, whether it be due to pressure, whether it be to opportunity, whether it be to rationalization, may do things that may go against what we hope to.
And with AI specifically, on the attacker side, we're seeing more crafty social engineering attacks, both from the email side of things or the deepfake side of things or the password reset as a video deepfake showing up and saying, hey, I'm so-and-so, but they're not.
And there's a number of things there that are kind of concerning to us that we're seeing on the attacker side.
Another one is just more effective profiling and attack path vector identifiers.
In this case, we're seeing many companies come out with well-trained AI models that can effectively simulate a red team and try to find things that they might be able to exploit, which will further embolden both our pen testers that were actively trying to say, hey, come at us, please attack us, let us know what our gaps are.
But also on the attacker side, the real attacker side, to be able to profile and say, tell me everything about this company so that I can create an effective attack path.
And so it's really that great accelerator, a great augmenter to us doing things whatever direction we want to go. And on the attacker side, we're seeing that.
And now on the internal side, the opposite, the fire against fire piece, we're seeing great tools continue to be developed in this space to protect and defend.
One of them is it's kind of, it's nice to be able to offload a lot of that tier 1 triage, whether it be internal team members reporting emails.
And so we have an AI-powered phishing email box.
It's, hey, instead of humans having to spend time during the day reviewing those, we have AI models that are trained to look for, yep, this is actually phishing, or no, actually this one looks pretty legitimate.
Let's have a human take a look at it, right? Another thing that's been really neat is being able to uplevel all of our skills, right?
It's nice to be able to have a resource to ask questions to. Now, I do worry about reliance and the de-skilling of ourselves by overrelying on this tool.
We have to still continue to stay sharp on our side of things.
It's nice to be able to, with super capable CSPM tools today, to be able to give us findings in context and then backed by models to be able to give us even more context with regard to threat modeling, threat intelligence to help anyone who's sitting in that seat seeing configurations that may not be ideal to be able to respond more effectively than we ever have been able to before.
And so it's nice to be able to see that side of defense happen.
And I think that talks to what you're talking about, right? Being able to automate it allows you to take your resources and put them elsewhere.
And that's a very exciting thing for organizations, I imagine, right now.
It's like, oh my gosh, this is really painful as a human to have to do these highly manual things.
Now with programmatic interfaces that have been available for a number of years now, and that's kind of where Drata started, was being able to show up and say, look, I don't want to spend 5 weeks pulling screen prints, 25 screen prints or whatever of encrypted EBS volumes.
I can pull an API and check this every single day of the audit period. We've changed that whole conversation to say, hi, you're control owner of this, so you own this space.
And guess what? Behind the scenes, we're integrated with all of your infrastructure and tools here. It is watching things for you.
And then that way they're able to change that conversation and say, hey, we've got your back.
You're on the same side of the table as us, and hey, we found this gap that was identified last night.
And as a result of these checks, can you give us some information about these two examples so that if the auditors were ever to ask, we know what happened here, or can we remediate this on the fly?
And so it's really not only just meeting, but significantly exceeding wherever we were at before with these capable platforms. Amazing.
I want you to try and give me, let's say, 3 tips so that listeners can do maybe a better job of handling today's governance risk and compliance challenges?
And then third is continue to shift left.
And so starting with a trust center, whether or not you adopt an organization that provides an incredible trust center like Safebase, many organizations start this journey just simply by having a /security note or a /trust or a /compliance note on their main website to start explaining what they're doing.
And again, that transparency is the core of building trust between people. And it's the same at the organization level.
Chances are your company, wherever you may be at on your journey, you're already doing a number of really good things worth sharing.
You're effectively writing a State of the Union related to your security, compliance, and privacy programs. And it's extremely introspective.
And so, but the nice thing there is it's also extremely customer-centric.
Once you have that information out there, customers can then ask key questions that will cause you to drive improvements to share more.
And another one is just around customer due diligence. I learned a lot about the things that we need to continue to improve on our own programs through those conversations.
And the nice thing is you can marry up the requests that come through your trust center with effective deal sizes or interactions with customers to really know and quantify your GRC team members' impact on the business.
Being able to answer such things as hey, as a result of us having a trust center, we influenced the close of over $20 million in ARR in the last 90 days or something that might be a fantastic thing to report of saying we are now a business enabler, we're an accelerator, we're a deal cycle reducer in time.
And so as a result, it's really enabling the business. And so the other part is just it really shifts your GRC program from being reactive to very proactive.
You're able to see what artifacts people are requesting, what questions they're asking, so you really can get ahead of that curve.
And I think many forget we're all on a journey, no one's there, and so we're all on that same side when it comes to building trust and really getting it out there to share what we're doing.
Now, talking about investing in a platform to automate your GRC program elements, we're well beyond the old way of doing GRC with hundreds of integrations with third-party systems.
Our platform is able to integrate and pull full population reviews of controls and make sure we're ready for assessment.
Investments and that trust we believe here, at Drata and even in personal life is it's earned every single day and it's one of those that's earned in drips and then lost in buckets.
And so when you have a tool to help make sure that you're continually doing what you're saying you're doing, it really keeps you in that realm of integrity, continue doing what you're saying you're doing on that journey.
And so having that now is what I'm seeing a number of companies adopt, whether you're at the enterprise side of things where you've invested in this space quite a bit the last 10 years, but are man, I don't know if I want to invest in internal resources and tools to continue doing this, or if I want to adopt a platform that's already doing these things out of the box very well.
Either way, it's going to accelerate your program.
And last but not least, I want to talk about continuing to shift left, both from a code standpoint as well as a process standpoint. This last year, we released compliance as code.
Infrastructure as code is not new, and security scans on infrastructure as code is also not new. But compliance as code.
Being able to see and check things before you deploy to see, is this going to continue to help us meet our compliance requirements before it's actually deployed, really saves you from having to build that one resource for the price of two.
Meaning today, a lot of us are very reactive and saying, hey, you built this resource, but oh, Drata detected it and said that this is not compliant. You have to go rebuild it.
Now you can get it in code, which is awesome. So in CI/CD pipelines, we will do those checks to say, hey, you're going to deploy something that's not going to be compliant.
And they're able to fix some of those uninstantiated defaults or whatever it may be to really get to the point where it is compliant by design. Those are the 3 tips that I give.
Again, Trust Center, start there. Next, invest in an incredible platform to help automate your GRC program.
And last but not least, continue to shift left, not only from a code standpoint, but also a process standpoint to say, man, what are some things that we need to prevent from happening initially?
And this is one of those.
So go and educate yourselves at smashingsecurity.com/drata. That's smashingsecurity.com/drata, D-R-A-T-A.
And last but not least, a warm thank you to you, Matt Hillary, Vice President and CISO of Drata. Thank you for chatting with me.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
It's their support that helps us give you this show for free.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 416 episodes, check out smashingsecurity.com.
As soon as I'm recording, she'll often come in and go, "Meow." Give her credit. Oh, I should. There you go, Wilmington.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- Ledger secures Discord after hacker bot tried to steal seed phrases – CoinTelegraph.
- Binance Founder CZ Warns: Ledger Discord Hack Targets Recovery Phrases – CoinPedia.
- Ledger confirms physical scam letters requesting seed phrase in fake security upgrade – The Block.
- Physical addresses of 270K Ledger owners leaked on hacker forum – Bleeping Computer.
- Criminals are mailing altered Ledger devices to steal cryptocurrency – Bleeping Computer.
- New Hello Pervert Email Attack Warning — ‘I Know Where You Live’ – Forbes.
- ‘Hello pervert’: the sextortion scam claiming to have videoed you – The Guardian.
- “Hello Pervert” Email Is A Total Scam – What You Need To Know – Malware Tips.
- Scam email sent from my own email address – Microsoft Community.
- Thunderbolts* review: ‘The greatest Marvel offering in years’ – BBC.
- Limelight, Exemplar – BBC Radio 4.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Sponsored by:
- Drata – The world’s most advanced Trust Management platform – making risk and compliance management accessible, continuous, and 10x more automated than ever before.
- Dashlane – Protect against the #1 cause of data breaches – poor password habits. Save 25% off a new business plan, or 35% off a personal Premium plan!
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
