
In this episode, Graham warns why it is high time we said goodbye to 2G – the outdated mobile network being exploited by cybercriminals with suitcase-sized SMS blasters. From New Zealand to London, scammers are driving around cities like dodgy Uber drivers, spewing phishing texts to thousands at once.
Meanwhile, Carole unpacks a painfully awkward tale of amour fou, as a 76-year-old Belgian man drives 476 miles to meet his dream woman… only to be greeted by her very-much-still-husband at the gate.
Plus: Sky Arts painting competitions get a thumbs up, Mark Zuckerberg never loses at board games, and the scandalous Facebook memoir Meta tried to silence.
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security episode 427. My name's Graham Cluley.
And I'm going to tell you about one of the ways in which they can do that today.
And I'm going to start my story in August last year, where police in New Zealand reported that they had arrested a 19-year-old kid who was suspected of conducting a cybercrime that they said had never been seen before in the country.
I mean, how many times can that happen? As something brand new has never happened in the country before. But that's what they claimed happened.
And the police called their investigation Operation Orca.
You know, we're not all about killing all the time.
But anyway, it's funny how the police come up with these kind of names, because it has absolutely nothing to do with the ocean or killer whales and orcas.
But when it's written in all capitals by law enforcement agencies, it instantly makes their investigation sound way cooler.
I'm sure the police just love to have a cool operation name. And I think Operation Orca—
You know how the bad guys can set up a fake base station, like a fake cell tower.
It's about sending messages to people's phones via SMS. And what happened in New Zealand was they arrested this 19-year-old.
He'd blasted out 700 scam texts in one evening, all pretending to be from banks. And he'd done it from this rig, which he'd built in his car. He'd plugged it all in.
I guess he'd probably plugged it into the cigarette lighter or something like that. And it was a computer in the back of his car whirring away, a proper big computer.
And he's got this antenna and it's blasting off. And what would happen is that this thing would be picked up by people who maybe didn't have a great phone connection.
So if you were in town, or if you were at a crowded concert, or you're in the busy centre of a city, and if you haven't got great connectivity, your phone might say, well, let me see what else is out there.
Let me see what else I can connect to. This isn't Wi-Fi. This was a 2G signal.
So someone could be walking around with a rucksack and sending out SMSs from it. And these things are sold on the internet for not very much money.
You can spend $300, or you can get a really nice one or a powerful one for maybe $20,000, $30,000, something like that. But they don't require deep technical expertise.
So simple to set up, ready to operate. And the way in which these things monetize is they send out spam SMSs.
And similarly, you have your network operator who is stopping as many fraudulent spam SMS messages getting to you as possible.
And they're not only bypassing the spam filter, they're also able to pretend to be someone else because the normal checks which exist to pretend not to be a bank or not to be a government agency don't exist when some criminal has set up an SMS blaster, when he's created effectively the cell tower.
And the thing is that 2G doesn't have all the authentication, doesn't have all the security built into it, which more modern mobile communications do have.
So most network carriers, they don't even support 2G anymore. They don't even, 'cause they don't trust it. They think, well, we don't really want this.
So they're not encouraging anyone to use it, but your phone might still connect to it if it can find a signal. And you receive the spam message.
Maybe it claims to come from FedEx, for instance, tells you to click on a link to verify your details so that they can make a delivery to you.
And you end up on a page which asks you to hand over some personal information or even worse, log in.
And that would be a big mistake because most people use the same password for everything. And now they know your passwords as well.
And it's not just New Zealand. Late last year, police in Thailand, they arrested a 35-year-old Chinese guy who was driving his van around.
He was using SMS Blaster to spam over 100,000 SMS texts per hour to people in Bangkok.
So he was just driving around the city center where, of course, there's lots and lots of people with phones.
His device had a range of approximately 3 kilometers, so about 10,000 feet. 100,000 phishing messages sent every hour. And this is effectively free after the cost of the device.
Whereas even with email spam, there's some cost involved and only a tiny percentage of it is likely to get through.
Hurry up and redeem your gift now." And there was a link, of course, to a phishing site.
People who clicked on it were asked for their credit card information, which then ends up in the hands of the scammers.
And as Risky Business has pointed out, we are seeing a rising tide of SMS blaster attacks. Last week, a Chinese tourist was arrested in Oman.
He was driving around the capital there with an SMS blaster, sending messages, luring the unwary to a phishing page for a local bank.
There've also been reports from Japan and Brazil and Indonesia and Thailand and Qatar and the Philippines, Hong Kong.
And sometimes these guys who are driving around even disguise themselves as tour guides so that they, I've got an excuse.
This is why we're just slowly driving round the city centre.
He was driving around, targeted tens of thousands. He had one of these devices in the back of his black Honda CR-V, driving around Greater London.
And in this case, the messages pretended to be from government agencies. So this problem is really big.
So big, in fact, that there's now a world map updated daily showing the location of the latest reports.
And we're putting that link in the show notes if you want to find out where that's all going on.
Well, because that would improve security, not only against these, but also the Stingrays, the IMSI catchers, and other fake cell tower attacks.
But the problem is that some people will lose connectivity. There's some devices like smart meters and alarm systems, some older devices may still be running on 2G.
Obviously, costs time to upgrade them. So even though phone calls typically aren't using 2G, there are some people who are using it, and it may hit vulnerable populations hardest.
Obviously, there's parts of Africa, for instance, where they may only have 2G. And so for that reason, most countries are phasing out 2G quite slowly over some years.
They're hopefully only going to turn it off entirely when they're confident enough people are using the alternatives.
So the next step is, okay, if the network carriers aren't gonna do anything about this, what can you do? Now, disabling 2G on your phone, great idea.
If you can do that, it's one of the most effective ways to protect yourself from this because 2G is, as I said, an old insecure mobile standard with no proper encryption or authentication.
And on the more recent Android phones, there is an option to do it. You can go into the settings and disable 2G. I suspect many people haven't, but you may well want to do that.
But what if you don't have an Android? Right?
It's designed as extra protection, as you said, against an advanced attack.
So ones which are targeting maybe journalists and political activists, high-profile individuals, or if you're Geoff Bezos, you know, someone who may be of interest to foreign states who may want to hack them.
So if you do this, it's gonna break things. Some things will no longer work on your phone. Some websites will look broken. It will turn off things like link previews.
You won't be able to receive certain types of attachment via messages like PDFs and Word docs. You won't be able to get FaceTime calls.
So that's a big advantage in my opinion, unless someone has called you before.
So if you have had a message in the past from your bank, for instance, because frankly, turning off everyone who you don't know, I get messages from the pharmacy, the doctor, the banks, the water people, you know, all sorts of weird things.
I think it'd be great if we could just turn off 2G because I think lockdown mode is overly strict for most people.
It's undoubtedly more secure, but it always has to be a bit of a balance.
It feels like Apple would be wise to include some more granularity so everyone could turn off 2G you can with Android right now, 'cause lockdown mode is clearly a bit too much, isn't it?
Trust links, be careful, have your spider sense about you, about what you're entering.
But it's tricky if you can't even trust the message, if it claims to come from someone or a company that you know.
Only to be met with the realities of the city.
Okay, honestly, if you were single, right, and there was two identically wonderful in all ways women vying for your attention, and one hailed from La Belle France, right, and sported a "voulez-vous aller à la bibliothèque avec moi?" Yes, "Do you want to go to the library with me?" Good.
And the other was from — let's not upset our listeners now. I'll bleep it out. I'll bleep it out. I'll bleep it out. Who would more likely woo you?
And no wonder, because his wife had passed 4 years earlier.
And this is what happened to Michel, because soon he finds himself speaking to a lovely woman that hailed from his neighboring country, la belle France, and named — how French is this?
Sophie Vouzelot.
And Sophie, by the way, is a catch, right? She's quite a catch.
I mean, in person. I don't know. There's a deep connection between them. Anyway.
He arrives at their house in Saint-Julien, in southern France, near Marseille. He's sitting outside her gates.
This is the moment he's been dreaming about since he met her just a few weeks ago. And he zings the gate's intercom. And a monsieur answers with a bonjour.
And Michel says, "I am the future husband of Sophie Vouzelot." Oh, that's coming on a bit strong. Well, they had an intense connection and they talked a lot.
And there's a response, "Well, I'm the current one."
Now I'm going to translate this video for you so you can figure out what happens because he put one in English with an AI doing the translation.
And I have put it in the show notes because mon dieu, it's crazy. It's not at all accurate.
He says, "What do you mean, who am I? Who are you? Who are you?" And Michel eventually says, "I'm Michel, and you are Fabien, and something is not right." Fabien, of course, agrees.
Michel says, "I think she," meaning Sophie, "played a dirty trick on me." And Fabien says, "Ahaha, not my wife. It's the fake accounts.
You have to be very careful." But Michel sounds quite confused. And I'll paraphrase here, but he says something like, "Look, you two are divorced.
You and your wife are divorced." And Fabien says, "No, the ring is still on my finger." And then says, "You didn't give them any money, did you?" This is still through the gate they're talking.
"Yes," says Michel, "a lot. She said she was pregnant, and she lost the baby and needed money." Oh, boy, oh boy. And Fabien's like, "No, no, she's still pregnant.
Ring's still on my finger." And he stays very cool and compassionate and explains again that this is a scam and advises him to go to the gendarmerie.
He's chatting to some disembodied voice through the intercom system, but who he thinks is the ex-husband of his intended betrothed.
She used to be a model, but she also used to be a former Miss France runner-up. And I'm like, what? I didn't know that stuff still existed. So I do a little searching. And it does.
It really does. There is still to this day a Miss France. I watched a bit of Miss France 2025.
Head to vanta.com/smashing to learn more. That's Vanta, V-A-N-T-A,.com/smashing. And thanks to Vanta for sponsoring Smashing Security.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like.
It doesn't have to be security related necessarily.
It is a channel we have here in the UK. I don't know if it's available elsewhere.
Anyway, the show which I want to recommend, there's two shows. One is called Portrait Artist of the Year, and one is called Landscape Artist of the Year.
And this is my comfort blanket. I can watch so much of this.
What they have is a whole bunch of artists, and they get their little easels out, and they get their paints, and they go and sit out in the rain, or if they're doing the portrait, they maybe lucky enough to sit inside instead.
And they spend an hour competing against each other, trying to do the best landscape or the best portrait of somebody.
And he's doing it alongside thinking man's crumpet, Joan Bakewell, right? Very big fan of. If only I'd been alive in 1968. Anyway, never mind.
But it's a lovely TV show, and I think it's fantastic. Have you ever seen it?
And what I love about it is everyone will be doing a landscape, and you'll get some very conventional ones, some very technical ones, some very precise and photo-like, and other ones which are just abstract bonkers.
And other times they're not using paint at all. It's, oh, I'm just using a piece of thread, or I'm just using some mud. And you know, you never know who's going to win.
But you always, when you watch it, you have your favourites. You have the ones you're not so sure about.
Portrait Artist of the Year and Landscape Artist of the Year. There's also a couple of them on YouTube if you can't find them anywhere else. And that is my pick of the week.
And you may first have heard about the book thanks to Meta's relentless efforts to shut it down. According to Slate, when Wynne Williams publicized the book, Meta saw red.
The day after publication, an arbitrator issued an interim ruling finding that Wynne Williams violated a non-disparagement clause in her severance agreement.
So she's duly restricted from further promoting the book or commenting upon her old workplace.
And in that twist of fate, all this negative attention amped up the intrigue, and the book has done very, very, very well.
And basically, she played an integral role in making Facebook what it is today. So, insert word here. But lordy, does she land a few hard-hitting punches.
Her focus is definitely Mark and Sheryl.
The appeasing of dictators, the gaming of algorithms, targeting of children with ads, political interference, misleading Congress, power games, manipulation.
She even touches upon Zuckerberg's presidential aspirations.
To me, he just comes off as a man-child, and maybe that's the same thing. But she tells this tale of him loving board games, right?
He never watches TV, doesn't movies, doesn't want to watch your art show, right? He likes Settlers of Catan and Ticket to Ride.
And she just goes, "Do you really think people don't let you win?" 'Cause I think he thinks he has a touch of God in him. For fuck's sake.
But the thing you can't help but wonder throughout the book is why, oh why, did Sarah stay for years and years?
She arrived after, and they just gave her what she asked for. So everyone around her was making more money, she claims. She says, why'd she stay there? She does give some answers.
They don't sit perfectly with me. But she does seem to have the writing bug, so I'm sure we're going to see her turn out more stuff. But that said, Graham, delicious reading.
One of those things where you sit there going, "Oh my God."
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 426 episodes. Check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- Teen arrested for ‘smishing scam’ using technology never before seen in New Zealand – RNZ.
- Op Orca — smishing scam smashed – New Zealand police.
- SMS blasting incidents are rising – Risky Bulletin.
- Bangkok busts SMS Blaster sending 1 million scam texts from a van – Bleeping Computer.
- Police warn of SMS scams as ‘blaster’ is used to send thousands of texts – The Guardian.
- Reports of SMS Messages Sent by Fake Base Stations – Commsrisk.
- Keeping your Android device safe from text message fraud – Google Security blog.
- What is Paris syndrome? How culture shock can kill a trip – The Independent.
- Belgian man crushed after driving nearly 500 miles to meet French model he believed was his ‘future wife’ – Fox News.
- French is the language of love: myth, reality, and romance – ICLS.
- Romance scam victim travels 700km ‘to marry French beauty queen’ – BBC News.
- Un homme se présente chez moi pour être mon futur mari… – YouTube.
- Sky Artist of the Year.
- Careless People – The Guardian Bookshop.
- Careless People: We read the book that Mark Zuckerberg doesn’t want you to read – Slate.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Sponsored by:
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
