
What do a sleazy nightclub carpet, Google’s gaping privacy hole, and an international student conned by fake ICE agents have in common? This week’s episode of the “Smashing Security” podcast obviously.
Graham explains how a Singaporean bug-hunter cracked Google’s defences and could brute-force your full phone number. Meanwhile, Carole dives into a chilling scam where ICE impersonators used fear, spoofed numbers, and… Apple gift cards to extort terrified migrants.
Plus: Nazis, door safety, and the age-old struggle of telling Ralph Fiennes from Liam Neeson.
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
And you think—
Hello and welcome to Smashing Security, episode 421. My name's Graham Cluley.
Now, coming up on today's show, Graham, what do you got?
They had a carpet and it would be full of beer and gum and whatever, because people smoked back in the old days. It's just disgusting. And you would actually stick to it.
So you never fell over.
There is the person of your dreams leaning against the wall in the corner, nonchalantly nibbling on a couple of toothpicks. And you think—
And on the card, of course, is your phone number. Does that at all sound familiar to you?
But you know, what is a fella to do? If he falls for the charms of a cybersecurity podcast co-host and amateur artist who's doing a line dance down at the club, down at Sticky's.
Because an awful lot of people, as you probably know, have Google accounts.
Maybe people created their Google account when they got their Android phone, or when they created a YouTube account, or because they use Gmail for their email.
In fact, it's estimated there are between 2 and 3 billion Google accounts. That's billion with a b-b-b-b-b-b.
And that would be a big problem, losing access to that.
And so you might have given Google your phone number in the past as an emergency backup measure if you ever forget your Google password. Right.
Not sure we always recommend that particular method of multifactor authentication.
I'm gonna enter it again. You text me the code and I'll get back into my account." Okay?
But you would think that if you gave that number to Google for that purpose, just as an emergency backup measure, they would keep it private.
He also sometimes called himself Skull. He is a bug hunter. He finds vulnerabilities. He finds security holes and flaws and stuff. And then he tells companies about them.
And if he's lucky, he gets a payout from those businesses for finding the flaw rather than making millions of dollars by exploiting it for malicious ends.
And this, of course, is a great way for software companies to fix problems. You know, it's worth it for them to run a bounty program.
Hopefully before the bad guys can exploit the flaws. You know, you find the flaw, you fix it, hopefully before the bad guys get it.
And BruteKat found three little bugs in Google systems that when used together transformed themselves into a huge privacy problem. I'm not going to explain to you what it was.
Now, we all know Google does much more than search. People say, "Google me, Google me," and you just think Google is a search company. It's much more than that.
Google has got Google Ads, there's Google Drive, there's Android, there's Gmail, there's Google Chrome, there's YouTube, there's Google Maps, there's Google Gemini, whole heap of things that they do.
And chances are that most of us could name maybe, I don't know, half a dozen or maybe a dozen different things that Google does, but actually they do scores of different things.
Now you understand why we've never heard of it. Sounds really, really boring. It's now part of the Google Cloud Platform.
And most people have never heard of it, but it has heard of you because being part of the Google ecosystem, it knows about your Google account so you can log into it if you wanted to.
And if someone creates a business intelligence report in Google Looker and tries to transfer it, it's one of the things you can do, transfer it to someone else's Gmail address.
So you can sort of say, "Oh, could you share it? Could you chuck it over to this other person who I'm working on this report with?"
So this is the name which you associated with your account when you created your Gmail account. It's not just your email address.
And people do, of course, create Gmail accounts anonymously and with the thought that Google isn't going to spill the beans.
Sure, you don't necessarily want everyone knowing your business. But how does that help someone get your phone number? So they've got your name now. They know your email address.
But how do they now get your phone number? Well, there's a page on Google's website where you can try to recover access to your account.
And it will confirm if a specific account display name like John Smith rather than Sexy Cat 49 is associated with a recovery email address or a phone number.
It's trying to confirm if you really own the account. So, you enter the email address, say, I can't get into this. And it says, well, what's the display name associated with it?
And then Google will show you the last 2 digits of your phone number and it will say, I'm gonna text you at your recovery phone number, the magic code to regain access to your account, right?
So it doesn't show you the full phone number very sensibly, but it tells you the last 2 digits. So if you've got a few different phones, you say, oh, that's going to this phone.
And brute force your way through, trying to think of every possible combination as to what the full phone number might be.
But what BruteKat did, this security researcher, is he discovered he could get through Google's rate limiting protection by using a couple of techniques, including different IPv6 addresses for each request.
So different IP addresses. And it wasn't picking up that he was doing this multiple times.
And what he found was in the Netherlands and Singapore, numbers could be brute-forced in seconds. In the UK, it took 4 minutes.
In the United States, it takes roughly 20 minutes on the computer system which he set up. So not very expensive.
And he could do this by renting a server at a cost of about 30 cents per hour. So he could do this en masse.
They could break into accounts, they could even pretend to be company employees and phish you with fake texts or calls, et cetera.
So we have in the past said you shouldn't use SMS-based multifactor authentication because of SIM swap attacks, but use an authentication app or a physical hardware key instead.
But sites like Google do give you this recovery method with your phone number. So I think it's probably okay to use your phone number for account recovery.
That feels like a reasonable thing, provided the tech companies don't reveal your ruddy phone number.
Back in February, Google fixed two vulnerabilities that BruteKat found, which revealed the email addresses behind YouTube channels.
Again, a big privacy problem because there are YouTube channels.
Again, you may be sharing sensitive information on YouTube and not want certain parties to know who the hell you are.
If you're able to exploit vulnerabilities to find out who someone actually is or get a lead like that, big, big problem.
So I guess the moral is, just because a company is huge like Google doesn't mean their systems are perfect.
Luckily this time it was a good hacker who seemed to have found the hole first. So thank goodness for BruteKat.
According to the IB Times, the immigration crackdown is reportedly driven by directives from the administration. And they name-check Deputy Chief of Staff Stephen Miller.
And he's said to have pushed a policy of mass arrest with a focus on increasing deportation numbers regardless of criminal records.
So ICE officials apparently have been openly discussing their goal of arresting at least 3,000 migrants daily.
And our current gold-toned buffoon sporting chief of the USA wants strong hands to deal with these naysayer protesters and sent in the National Guard to deal with the problem in LA.
Right?
And then we have the governor of California, Gavin Newsom, who slammed this move, posting on X that US Marines shouldn't be deployed on American soil facing their own countrymen to fulfill the deranged fantasy of a dictatorial president.
This is un-American. Right? So messier, messier, and messier.
Protesters were filmed on Monday in Boston, Houston, Philadelphia, as demonstrators entered their fourth day in LA. Okay, messy, messy, messy, messy, messy, messy.
So with all this going on, with all this attention being paid to this, what is a lowly scammer to do? Graham?
I mean, how can a scammer capitalize on this situation and make it, you know, good for them, maybe worse for everybody else?
Maybe I could spam out a message saying, would you like convincing identity documents? Or, you know, something like that, which I could sell people, right?
Maybe I could dress up as a policeman, as a member of ICE, and—Oh, I was going to do something maybe involving a singing telegram.
But no, maybe that's not what people—People don't want one.
This is all according to Newsweek. Ms. Bedi's dream: work at a product company as a UX designer. Okay, fair enough.
They handed over their badge number and name and told Ms. Bedi to verify his office details by going to the ice.gov website and looking up the office in Maryland.
So they knew her port of entry, her academic background, where she was from in India, and where she studied.
The scammer pretending to be the ICE officer kept her on the phone for 3 hours according to Newsweek, warning her not to hang up and not to contact anyone, saying her phone was being monitored.
Newsweek quotes Betty: "I feel completely trapped because they kept me on the phone for 3 straight hours repeatedly warning me that hanging up or contacting anyone would violate my case and make things worse.
I was too scared to risk it." The scammers then told her to buy Apple and Target gift cards.
Especially if you're doing a master's somewhere, you must tweak.
The scammers then told her a police officer would collect the cards the next day. But of course, that never happened because they now had the codes.
They pressured her into paying, you know, these payments to avoid arrest and threatened deportation. And what duped her was how much information they had on her.
Remember she said, you know, they knew her port of entry, academic background. At that point, she must have thought they were officials.
But at the point when they started saying, "Can we have some gift cards, please?" she might just be thinking... Also, she's an international student, right?
What does she really know about the workings of America? She's looking at all this craziness going on TV with immigration in the papers.
And when you read in the news about immigration crackdowns and students being sent home, you're nervous.
And that nervousness is exactly what I think these little scammers are banking on. And even if she twigged it was fake, the guy knew stuff about her, right?
And scared the poop out of her. And it's not someone you'd want to mess with. So by the time they're asking for vouchers, you might just be saying, "I just want to pay and get out."
Way back in March, there were reports of individuals posing as federal immigration agents being on the increase across the country.
Even prompted officials to warn immigrant communities to be aware of their rights and take steps to protect themselves from ICE impersonators.
And a question to you, Graham, how the heck do they do that? How does a frickin' immigrant protect themselves from ICE impersonators? Tell me.
Well, she checked and she verified the phone number, didn't she?
It's and the real pickle is this, you have an immigration service at the moment that's probably not allowed to allocate any resources to finding people that have been duped that are on visas or with immigration status.
So what a perfect target. I don't know. Anyway, it's just yucky.
During that three-hour process, are they not quizzing her and getting more information because they're pretending to be officials?
I don't really have advice here other than, you know, be wary, be careful. Boy.
There are lots of threats out there affecting businesses, but what if you could see them all and exactly how they impact your organization all in one place?
Flare gives security teams real-time visibility into cybercrime forums, Telegram channels, Stealer Logs, and darkweb marketplaces so you're not blindsided by the threats.
Think of Flare as your exposure management platform built to help you detect, prioritize, and respond with lightning speed.
Head to vanta.com/smashing to learn more. That's Vanta, V-A-N-T-A, dot com, slash smashing. And thanks to Vanta for sponsoring Smashing Security.
If you're leading risk and compliance at your company, you're likely wearing ten hats at once, managing security risks, compliance demands, and budget constraints, all while trying not to be seen as the roadblock that slows the business down.
That's why modern GRC leaders turn to Drata, a trust management platform that automates tedious tasks.
So you can focus on reducing risk, proving compliance, and scaling your program.
You can stay audit-ready with real-time monitoring, and you can simplify security reviews with Drata's Trust Center and AI-powered questionnaire assistance.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security related necessarily.
And I don't know quite why, but recently I've been thinking a fair bit about Nazis. Oh.
And so yesterday I was in the mood and I said to my lovely partner, I said, well, you know, maybe we should watch a couple of movies or something.
And so there's two movies which we watched, neither of which I've ever seen before. One of them was Conspiracy, a made-for-TV drama from 2001 with Kenneth Branagh.
Anyway, for those who don't know, this depicts something called the Wannsee Conference of January 1942, where high-ranking Nazi officials met to discuss and coordinate the implementation of the Final Solution.
Not that cheery topic for my pick of the week. Now, the script was based on the only surviving transcript of the conference.
And what it really is is an exercise in how you can get genocidal policies through a bunch of people, some of whom are objecting to what's actually being talked about, under the guise of administrative planning.
And yeah, it is an exercise in how to run a meeting and how not to get any opposition. And get everyone else to basically rubber stamp it.
They're all terrific in it. And having watched that, I thought, well, what other movies haven't I seen which involve Nazis? And I've never seen a movie.
You've probably never heard of it, Carole. It came out in 1993. Called Schindler's List. So just I haven't seen E.T. or Jurassic Park, I haven't seen Schindler's List.
Well, now I have seen Schindler's List. And I think everyone in the world apart from me has seen it before. Now I do have a bit of a problem with Schindler's List.
And what I have come to realize is that I cannot tell apart Ralph Fiennes and Liam Neeson.
And this is the perfect storm where they're acting opposite each other. I find it quite confusing.
But anyway, that's all about— Obviously, it's an extraordinary story about this chap, Oskar Schindler, who saved more than 1,000 refugees.
And that is why Conspiracy and Schindler's List are my picks of the week.
There's a lot of traffic, it's hard to drop people off.
It's perfect, you know, she's close. But after the bus stop, I pull in, put my hazards on to grab her bag, and she opens her door.
His bike was okay, car's okay, he's okay most importantly, and everyone was shocked, right?
Doesn't matter what side of the car you're on, so use the opposite hand. And that, by its very nature, turns you around a bit because you're more facing the door.
And so there's greater chance you will see if there is a bike, for instance, coming up alongside.
It seems to be recommended now in many places of the world.
So, you know, it's easy to do and significantly reduces collisions, both minor, things like mine, or major with pedestrians and cyclists and scooters. Scooterers, people who scoot.
I don't know, scooterers.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
It's their support that helps us give you this show for free.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 420 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- Bruteforcing the phone number of any Google user – Brutecat.
- Leaking the phone number of any Google user – YouTube.
- Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account – The Hacker News.
- Google fixes flaw that could unmask YouTube users’ email addresses – Bleeping Computer.
- ICE Scammers Are On The Rise: What To Do – Newsweek.
- Student visa holder tricked by fake ICE agent scam, loses thousands – Newsweek.
- Conspiracy – IMDB.
- Schindler’s List – IMDB.
- Dutch Reach car door opening method – The AA.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Sponsored by:
- Drata – The world’s most advanced Trust Management platform – making risk and compliance management accessible, continuous, and 10x more automated than ever before.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- Flare – Uncover the latest threats across the dark web and Telegram. Start your free trial today.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

