
In episode 431 of the “Smashing Security” podcast, a self-proclaimed crypto-influencer calling himself CP3O thought he had found a shortcut to riches — by racking up millions in unpaid cloud bills.
Meanwhile, we look at the growing threat of EDR-killer tools that can quietly switch off your endpoint protection before an attack even begins.
And for something a little different, we peek into the Internet Archive’s dystopian Wayforward Machine and take a detour to Mary Shelley’s resting place in Bournemouth.
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley, joined this week by special guest Allan “Ransomware Sommelier” Liska.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
And then there's a banner for the Ministry of Truth. Error 451: Site temporarily unavailable for your own good.
I mean, obviously you've heard some of the past episodes and sometimes things can get rather out of hand. Before we kick off, let's thank this week's wonderful sponsor, Proton.
We'll be hearing about them later on in the podcast.
This week on Smashing Security, we won't be talking about how UK telecoms firm Colt has taken its systems offline after being hit by the Warlock ransomware.
You'll hear no discussion of how the White House says the UK has backed down over its demand for an Apple backdoor.
And we won't even mention how Clorox is suing its IT provider over a $380 million cyberattack by the Scattered Spider gang. So Allan, what are you going to talk about this week?
Now, chums, there is a 46-year-old man from Omaha, Nebraska. Have you ever been to Omaha, Allan?
You, Allan, for instance, you've taken the unusual step of secreting— sorry to be using the verb secrete— of secreting an extra L inside your name.
Which is a little bit unusual, at least for me as a Brit. Why do you have quite so many Ls? Is that like a backup in case you lose the other one? What's the thinking behind this?
Technically, I could chuck in a middle initial, I suppose. I've got two. I'm Graham M.W. Cluley. In fact, I didn't tell anyone my middle names for a long time.
The M in particular, because I used to be sat next to a boy called Marcus, and he spat in my ear once. This is when I was about 7 years old. And I hated the name Marcus ever since.
I used to not tell anyone what my middle name was. Anyway. Back to Charles O. Parks III. Now, he obviously found that a bit of a mouthful.
So he liked to call himself something different online. In fact, he liked to call himself CP3O. So Charles Parks III O. It makes sense. You know, he just sort of rearranged the words.
You can see what he did there. Let me remind you, he's not 12 years old. It's not like the typical Star Wars fan. He's a 46-year-old man. But he's still calling himself CP3O online.
It's kind of cute, I suppose. But he didn't just think of himself as being not that far removed from the well-known droid. He also liked to pose as a crypto influencer.
Have you ever dreamt of being a crypto influencer, Allan?
He said he would share tips to his followers if they wanted to achieve what he called a multimillionaire mentality.
Here's what he boasted online: "Last year, I wanted to make 7 digits or more, and so I spent the first 10 days of the year creating a— we'll just call it a really nice crypto script— that I was able to use at scale.
And after working that 10 days, let's just put it this way, I didn't work the rest of the year." In fact, he said after 4 months, he had purchased himself a luxury Mercedes-Benz AMG S-Class Coupe.
A sweet little motor, I think you will agree.
And it turns out— and brace yourself for this, Allan— it turns out that he wasn't being entirely legitimate.
I've put my mind to this because I'd quite like to be one of these sort of people. One way to have a lot of cryptocurrency is to buy a lot of cryptocurrency.
Now, that only works if you already have a large amount of spare money floating around. Burning a hole in your pocket, right?
Of course, you then still have to sell it at some point if you want it to be worth anything. Yeah, that's one way. That's not going to work for me.
I'm not going to be able to buy a lot of cryptocurrency. I don't have that kind of cash.
Now, another method I thought of is all I have to do is make a machine that can transport myself back in time.
And if I go back in time, I can buy some bitcoin when it was dirt cheap.
Obviously, I'll then be annoyed with myself for not inventing a machine which can bring me back to the future, 'cause I'll then realize I have to go the long way round. Right.
This is the thing.
I don't know if you've ever traveled back in time, Allan, but if you ever traveled back in time, it's a real nuisance because there's another you back there as well.
So you've got to hide yourself. You've got to hide in the shed or something, or maybe find yourself, kill the other you, replace them with yourself.
And that creates all kind of grandfather paradoxes as well. It's going to be all sorts of problems if you go back in time and kill yourself. It's not going to work well.
That's a method of doing it as well. So which of these do you think Charles O'Parks III did?
I know it's hard to believe in the world of cryptocurrency that there may be a scammer out there, but I am going to say he may be the first.
And I think a lot of us have forgotten about this. The other way to get a lot of cryptocurrency is to simply make it. Yeah. All you need is a vast amount of computing power.
Now, unfortunately, the little fly in the ointment about mining an awful lot of cryptocurrency is it's going to cost you an awful lot of money.
It's almost certainly going to cost you much more than the cryptocurrency you managed to generate with that computer power. But never fear, because there is an answer.
Which is to use somebody else's computer. Now, of course, you might have a friend with an enormous supercomputer which you could just ask to borrow it.
But if you don't have a friend with a great big computer which you can mine cryptocurrency on, I know a man who does, which is a chap called Geoff Bezos.
He has a cloud computer network set up around the world doing vast amounts of the computation for millions and millions of people around the globe.
And any one of us can rent computing power from the likes of Amazon and Microsoft to do things for them. And that's what Charles O. Parks III did.
Over a period of 8 months, Parks registered numerous accounts with cloud providers to gain access to their processing power and storage, and he created and used a variety of names, different company affiliations, email addresses, including email addresses with domains from companies he had set up, Multimillionaire LLC and CP3O LLC.
He'd created these accounts, and he was using them to mine cryptocurrency on the cloud computing companies' dime.
Well, the US Department of Justice, they haven't named the companies of which he managed to scam his way and managed to use their computing power to mine the cryptocurrency.
They just said they were based in Seattle and Redmond. But I think it doesn't take Sherlock Holmes, does it, to work out who those companies may have been.
And in that fashion, he managed to gain access to massive amounts of computing process power and storage that he did not pay for. Naughty boy.
He said his goal was to serve 10,000 students simultaneously. In reality, there wasn't a training company. There weren't any students. All there was was a YouTube channel.
On one occasion, he started using a new account at one of these cloud providers within a day of his previous one being banned due to missed payments and fraudulent activity.
So he was doing this at some scale. He was basically defrauding the cloud computing companies in order to mine cryptocurrency.
And all that time he wasn't paying his bills, but he was converting his ill-gotten gains into US dollars. He was buying NFTs.
He was using various methods to launder the cryptocurrency. He was living in the fast lane. He bought that luxury Mercedes-Benz car, expensive jewelry, traveled around the world.
And most recently, he wisely pled guilty, which means that he avoided a possible 20 years in what we like to call the clink. He's now been sent to prison for 1 year.
He defrauded from those cloud computing companies a massive $3.5 million in just a few months to mine cryptocurrency worth nearly $1 million.
So once again, you see the maths don't work.
Mining cryptocurrency isn't the way to do this anymore, but it put money in his pocket because he didn't pay for the cloud computing time.
So this guy, once he was CP3O, crypto influencer, luxury car owner, millionaire mindset guru.
The next he was inmate 46712 running motivational seminars called "How to Mine Crypto with a Bed Frame and a Spoon." And that is where he will spend the next year or more.
And we don't think of these kind of criminal activity as real crimes. And so they get lighter sentences.
He's going to be fined, he's going to have to return money to them. So he's going to find life hard going forward even after he's got out of jail, isn't he?
Don't follow in my footsteps. Maybe he'll be on the public speaking circuit. Maybe he'll start a podcast.
You can pull the lever and send the tram down a different track, killing five sentient robots instead. What do you do? Save the human. Come on. That's what us humans would do.
I asked an AI. Yeah. It said, I don't have enough information to determine if a human life is more valuable than a sentient robot's. Pull the plug. In the absence of clear information.
Pull the plug, Graham. I would default to inaction. Abort. Abort. It's going to save the robot.
And we'd like you to tune into our podcast, The AI Fix, your weekly dive headfirst into the bizarre and sometimes mind-boggling world of artificial intelligence.
And so it is for a lot of organizations where they've really placed a lot of faith in their security because it's really good at stopping advanced attacks, you know, bad guys that are using things that aren't normally detected by your antivirus or maybe get by whatever your outer defenses are.
So, you know, phishing attack that gets through and they execute a script and your EDR alerts on it and sends you a notification, hey, this bad thing's happening.
Or it can sometimes send you the notification saying it happened and I stopped it for you. Right. So there are a lot of really good companies.
But the problem is, and this is from an article in The Register, the bad guys, and they've been doing this for a while, but it's getting a little more attention.
The bad guys have figured out that if they disable the EDR, they can carry out their attacks.
So The Register in particular talks about a tool called RealBlinding, which is a script that runs in memory.
Bad guy lands on the desktop, and before they put anything on the drive in memory, they execute something that kills your EDR before the detections can happen.
And the problem, and I don't know if you've noticed this, Graham, when you've talked to organizations, is a lot of organizations don't have any kind of detection in place for when an EDR is unceremoniously killed on the desktop.
They don't have time to look at the low tier events. They look at the things that are code red, right? But I do think that if your EDR is killed, that should be a code red event.
And I just don't think it is for a number of people. So I know you saw Superman, right?
Maybe we should do something about that. This is kind of that as well. They've killed your Fortress of Solitude. And you don't have a backup plan in place for that.
So what you're saying, I think, is that people need some mechanism which can spot, oh, hang on a moment, this program isn't running and it bloody well should be.
Ring some big alarm bells right now that we could potentially have a problem because the fact it isn't running is in itself potentially suspicious.
And I think the EDR companies also themselves need to do a better job of, hey, if this thing hasn't logged in, I should probably raise that alert level a little bit higher.
And so that needs to change. Right. But also the EDR companies are, of course, in a war with these EDR killer tools.
You know, we've talked about this with antivirus, how you had to keep going deeper and deeper into the BIOS.
They're trying to figure out ways that they can detect the malicious activity that's trying to kill them.
Frankly, there's a very high chance that the security product which you are using on your network at your organization could be impacted by this.
And this script works." And so you can just upload that script. It's very modular.
A lot of these tools are—they're designed to be contributed to them because they're technically red team tools.
So they're supposed to be used by organizations to test against the blue team to see if they can avoid detection.
For anyone who doesn't know, the red team, they're pretending to be the hackers, aren't they? They're coming in and thinking, how can we break all the systems?
How can we cause mayhem here as though we were a malicious hacker? And then of course, those same techniques are being used by the real bad guys as well. Yoinks.
What happens if the EDR is disabled? And then that way you're kind of forced to respond to that and understand exactly what the process would be.
But introducing that as part of scenario to red team does make you think about how you could actually improve your security to be able to detect against that.
With Proton Drive, only you and the people you choose can access your files. Not even Proton can peek.
So whether it's precious photos, sensitive documents, creative work, everything is wrapped in end-to-end encryption.
Your file names, your content, the metadata, all secured by some of the strictest privacy laws on the planet. Getting started is simple.
You can sign up now and get 5GB of encrypted storage for free with zero compromise on security. But it doesn't stop there.
Proton Drive lets you share with total control, with password-protected links and expiration dates, revocable access.
And if you need to collaborate, Proton has got you covered—real-time editing, commenting, version history, all under full encryption.
You can even use Proton Drive to safely store, back up, and share cherished photos without any cost to your privacy. So head to smashingsecurity.com/protondrive to learn more.
That's smashingsecurity.com/protondrive. And thanks to Proton for supporting the podcast.
And welcome back, and you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like.
It doesn't have to be security related necessarily.
I was talking about going back in time earlier. Now I'm going back again because we've all heard of the Wayback Machine from the Internet Archive.
What a marvelous thing that is the Wayback Machine, a terrific way to find out what used to be on the web.
So you can go back and check out old versions of google.com and amazon.com and all those sites, or check out your own website, or indeed content which is no longer available.
Love the Wayback Machine. Love the Internet Archive. It is not my pick of the week this week because the pick of the week this week is The Way Forward Machine.
Because we're used to the Internet Archive helping us go back in time, what you may not know is that a few years ago, they created the Way Forward Machine to celebrate 25 years of the Internet Archive in 2021.
They created a little thing which offers you, they said, a glimpse into the potential dystopian future of the internet, specifically in the year 2046.
And the way to see this is just to go to the URL wayforward.archive.org. Now, Allan, do you want to open a tab and give it a try?
And so it will ask you, just like the Wayback Machine, for a URL, and it will generate that website in the future?
And then there is a banner for the Ministry of Truth, error 451, site temporarily unavailable for your own good.
There's an AI agent there that is telling me how scary all of this is. And then another banner that tells me about the internet restrictions.
So apparently your seditious content has been blocked.
I went also to the Smashing Security page and I was told to access this page, please enter your biometric details, provide retina scan, provide thumbprint.
And again, it was probably mining cryptocurrency in the background.
So the point of this entire page is really about internet freedom and how great the internet should I say is or could be?
I don't know, because it feels like we're on a slippery slope, but it's warning you about where the internet could be going in the future.
And it's a bit of fun, a great way to raise awareness. And I stumbled across this in the last few days and I thought I should share this with the listeners.
So it is wayforward.archive.org. Go and visit URLs to your heart's content and do what you can to prevent the internet going down that particular ugly path.
Hopefully things will be much better in the future rather than worse. Allan, what's your pick of the week?
But besides Bournemouth, as wonderful as it was, is not my pick of the week. Do you know who's buried in Bournemouth?
Actually, my Auntie Liz lived in Bournemouth, and sadly she has passed away, so she may well be buried in Bournemouth. Sorry, I sound a bit too jolly about that. She was lovely.
But anyway, I don't think you mean her though, do you?
And for those of you who don't know, Mary Shelley is the author of Frankenstein, which is one of the most influential both sci-fi and horror books ever written.
And apparently there are rumors that she wrote part of Frankenstein there. Now, I haven't been able to confirm this, but every local Bournemouth resident insisted that it's true.
And the stories about her writing it all in Geneva are wrong, and she definitely wrote part of it in Bournemouth.
And Mary Shelley, beyond Frankenstein, was such an accomplished writer and editor and just such an amazing person. So I had to take a moment to stop by and view her grave.
And I highly encourage anybody who's in Bournemouth, aside from it being a beautiful town with way too many hills... Stop with the hills.
I know that seems a little morbid, but it is worth reflecting on everything she's done and contributed.
Allan, thank you for joining us. I'm sure lots of our listeners would love to find out what you're up to and follow you online. What's the best way to do that?
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of over 430 episodes, check out smashingsecurity.com.
Until next time, cheerio, bye-bye, see you later. You've been listening to Smashing Security with me, Graham Cluley, and my special guest, Allan Liska, the ransomware sommelier.
I'm grateful to Allan for joining me on this episode and also to our episode sponsor, Proton, and to all the chums who've signed up for Smashing Security Plus and support the podcast via Patreon.
Those people include Darren Kenny, Sebi, Dan H, Chris, Ted Wilkinson, William Sabados, Nigel Scott, Just Nate Please, John Morris, Xylar, Fantastic Wolf, Thom Ploger, Mike Hallett, MJ Lee, Sean Dyer, Dimitri, Bree Bustle, and Ask Leo.
If you fancy your name being read out on the credits, that's just one of the joys of joining Smashing Security Plus.
You can sign up for as little as $5 a month, or even get a discount if you sign up for a year in advance.
And you get your name read out every now and then at the end of the show, as well as get early access to Smashing Security episodes and occasional bonus content.
Just go to smashingsecurity.com/plus for more details. Now, I realize times are really tough for many people. You know, our pockets are hardly bulging full of cash, are they?
So don't feel any pressure to become a patron. You can support the podcast in other ways. For instance, you could tell someone about it. You know, spread the word.
Tell them you Smashing Security and you think it's great. Or if you really us, you could also leave a message.
You can subscribe, obviously, in your favorite podcast app, or give the podcast a 5-star review. Wouldn't that be nice?
Anything which gets the word out there makes all of the effort worthwhile.
So thank you very, very much to all of you for your continuing support, and I look forward to speaking to you again next week. Until then, cheerio, bye-bye!
Host:
Graham Cluley:
Guest:
Allan Liska:
Episode links:
- Crypto Influencer Sentenced to Prison for Multi-Million Dollar “Cryptojacking” Scheme – US Department of Justice.
- Ransomware crews don’t care about your endpoint security – they’ve already killed it – The Register.
- Way Forward Machine – The Internet Archive.
- Mary Shelley’s grave – Atlas Obscura.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Sponsored by:
- Proton Drive – Protect your files with end-to-end encryption in Switzerland’s secure cloud — only on Proton Drive.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
*clap, clap, clap, clap, clap, clap* Well done Graham!! While I miss Carole's dulcet tones, you and your guest Allan did a wonderful job to carry on!! Keep on good sir!! Thank you for all your hard work and effort!
Thanks Aryon – glad to know you're enjoying the podcast!