
When “bad actors” stop being hackers and start being… actual actors.
This week, Graham and special guest Jenny Radcliffe play “Hacker or Ham?” (yes, Steven Seagal, we’re looking at you), before diving into a campaign which saw an Iranian gang luring Israeli performers with fake casting calls for a serious film. We unpack why positive lures can short-circuit scepticism just as effectively as fear.
Plus, the UK’s ICO says students are increasingly hacking their own schools.
Meanwhile, Graham heads to 1960s Oxford with Endeavour, while Jenny investigates the Wirral’s mysterious “Catman”.
All this, and more, in episode 435 of the “Smashing Security” podcast.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hacker or ham?
And that comes from me being known as a social engineer specialising in psychology of social engineering scams and cons.
And the thing that everybody remembers is that I'm a burglar. So I do a lot of physical penetration testing, and that's really what I'm known for, so social engineering.
People will often have seen you at conferences and running awareness courses inside companies as well, sort of raising the spectre of social engineering and really helping people get to grips with it.
It was awful.
And I looked to see what else he'd reviewed, and he'd bought some kitchen utensils, which he'd absolutely spent really a very long time telling everyone how terrible they were.
So I didn't feel quite as bad. Let me get the plug in. The book is called People Hacker. 99p very often on a Kindle, I've noticed.
This week on Smashing Security, we're not going to be talking about Shayhalud, a fast-spreading open-source worm that is stealing credentials from developers and publishing their secrets on GitHub.
You'll hear no discussion of how losses are rocketing at Jaguar Land Rover as a cyberattack continues to cause disruption.
And we won't even mention how North Korean spies are using ChatGPT to create fake South Korean military IDs. So Jenny, what are you going to be talking about this week?
Now, chums, chums, I have to say, I absolutely loathe it when people use the term "bad actors" to describe hackers and cybercriminals. How do you feel about it, Jenny?
And there are a lot of actors, thespians, who are out of work, and many of them, I suspect, are out of work for good reason.
And I think there could be a danger that we create a self-fulfilling prophecy if we refer to malicious hackers as bad actors.
Are we, in fact, increasing the risk that actual bad, straight-to-DVD-style actors will view their natural career progression as, well, let's become cybercriminal?
So I don't like the terminology. And that is why I propose we start the fight back. Right now, right here on the podcast.
I think it's important to stop using the phrase bad actors and be able to tell the difference between bad actors and bad actors.
So what I'm going to do with you today, Jenny, is I'm going to play a little game with you, which I call Hacker or Ham. Hacker or Ham.
How well do you know your movies?
And it wasn't really all that long ago, I suppose.
But I think Angelina Jolie is responsible for lots of people of our generation raising an eyebrow and paying more attention to hackers generally, in that movie. For sure.
They're probably saying, is this a decent podcast or is this a pile of cack?
I don't know whether because of the timing or early '90s or something, that was considered wow, he must be a hacker.
Hacker or ham? You've got quite strong opinions on Nicolas Cage.
Whether you agree with him or not.
Maybe you've done a bit of theatre. You've probably done a lot of serving food in restaurants, like most actors.
Perhaps if you're lucky, you've done some TV work as an extra in the background and suddenly you get an email that makes your heart skip a beat.
It is a casting call for a new movie by Academy Award-nominated director Ari Folman.
And the email says they are making a film about the October 7th attack and they want you for an audition. Now, if you're an actor, you're thinking, this is bloody brilliant.
This is what I've been waiting for. You think this is your big break. It's a big name director, it's good for your career, it's a serious subject.
You're not being asked to appear in a medical training video or doing motion capture for some virtual reality adult entertainment or something like that.
This is not going to be a humiliating acting job where you dress up as a beef burger or something.
This is something which, in your country of Israel, people are probably going to want to go and see, or will be taken seriously.
So, a career opportunity of a lifetime for an Israeli actor. So, naturally, you follow the instructions in the email, don't you?
You record a little personal video message explaining why you feel you'd be right for the role.
You send along some personal information which the director is asking for: your ID card, your passport photos, your home address.
Just the usual casting requirements, right, for a job like this? Already I can hear the hairs standing up on the back of your neck, Jenny.
No, I don't want to suggest you have a hairy neck, by the way.
Yes, I mean, obviously, even the thought of even one of those things makes me, as a social engineer, chill.
So according to Israel's National Cyber Directorate, dozens of Israeli actors have fallen for this scam in recent days.
And worst of all, they didn't even get a callback for the movie. Instead, they actually got threatening messages, which essentially said, "Surprise!
This was brought to you by your friends in Iran." And I know what you're thinking.
You're thinking, "Graham, surely professional actors would be more sceptical." Is that what we're thinking, Graham? Well, no, what are you thinking?
Those of us in security are professionally paranoid, but could you just be slightly less gullible? Just a little bit. If we can try and be a little bit more suspicious.
Not highly sophisticated, not the kind of thing which I suspect you talk to companies about and some of the more sophisticated techniques which are really quite clever, how the bad guys can get in or fool their way onto your premises.
Not that kind of thing. But these attackers had done their homework. They knew exactly which emotional buttons to push.
So these targeted actors in Israel, a film about October 7th, it's the kind of movie you can well imagine would be being made.
And Ari Folman, who's an established name in the industry, he's tackled difficult subjects before. And so it adds credibility.
And according to reports, the Iranian state-sponsored hacking group who have been attached to this attack, they are called APT35. They're also known as Educated Manticore.
Or Charming Kitten?
I mean, if you set up a hacking gang, and you're trying to strike fear into the hearts of your victims, do you really want your gang to be called Charming Kitten? I'm not sure.
That was something that made me laugh when you spoke about that. But actually, just one thing that you said. You know the way you say you hate bad actor as a term?
'Cause that's what I, and as someone who works on the human side entirely, I say if it's got through and if they've thought about what you've just said, so they've thought about emotional buttons to push, they've done a little bit of homework.
There's a credible story. And it's also one of the things I talk about all the time. People always say, what's the latest scam? What's the latest social engineering attack vector?
And it's anything, right? Anything that works, anything that's in the news, anything that pushes the right button. That in its own way is sophisticated, right?
And I would argue more sophisticated than banging on a keyboard for 30 seconds and then being in.
I mean, we've seen these attacks recently, a number of well-known named organizations where it appears some of them being hacked because people have rung up the help desks.
Where they were able to fool people into making poor decisions or they tricked them into believing that they were employees who'd been locked out of accounts.
And the consequences have been absolutely huge.
And these companies, they love to say, we got hit by a highly sophisticated attack because they don't want to say to their shareholders, that we were really dumb.
We fell for something which was pretty elementary.
Let's just talk about success and not success, shall we? Because the right script at the right time will get anyone.
Cybersecurity professionals as tension rose between Israel and Iran.
For instance, the hackers were reportedly using AI to help generate more convincing phishing messages, and apparently these messages said there is an urgent need for immediate assistance on an AI-based threat detection system to counter a surge in cyberattacks targeting Israel.
The hackers apparently were targeting Israeli cyber and tech professionals saying, we want to build this AI threat detection system to prevent attacks.
And that was actually the attack in itself. That was the social engineering which was being done.
They're going after actors, they're going after journalists, they're going after academics, and they don't need a zero-day exploit or sophisticated malware.
Just good old-fashioned social engineering will often unlock the door. And I don't want to sound like I'm victim blaming people here.
These actors, as in the theatrical actors, they were targeted by professional hackers who are good at what they do.
And it's not as if Iran is the only country that is targeting people in other nations.
I mean, I find it hard to believe that there's any country which isn't doing this kind of thing.
And yeah, I'm pretty damn confident Israel has no qualms about pulling off similar stunts itself.
So social engineering attacks like this are more likely to work if you let your emotions override your common sense.
And in this case, the attacks were counting on the excitement, I guess, of a potential career breakthrough, which, you know, everyone wants.
But actually, this is quite rare inasmuch as a lot of the time when emotion's used in social engineering attacks, it's a negative one. So it's fear or it's shame or it's anger.
It doesn't have to be true anymore. Truth is hard to find sometimes.
But to use something positive, "Oh, look at this." And we dangle that a lot, a lot of the time professionally as well. So promise of reward is good.
And you say, exciting and probably, although I've not seen the scripts of it, but probably time-bound. You always make it urgent. You don't want someone thinking.
I mean, we do in life want people thinking, Graham, but we don't in an attack.
They were the ones who were delivering these phishing emails so convincingly that professional actors who can normally tell when someone's putting on a performance, they were the ones who got taken in.
A tram is coming down the track towards a single human. You can pull the lever and send the tram down a different track killing 5 sentient robots instead. What do you do?
Save the human. Come on. That's what us humans would do. I asked an AI.
In the absence of clear information, I would default to inaction.
And we'd like you to tune into our podcast, The AI Fix, your weekly dive headfirst into the bizarre and sometimes mind-boggling world of artificial intelligence.
The AI Fix, the future surreal. Jenny, what story have you got for us this week?
And it was basically saying that over half, so 57% of cyber attacks and data breaches in an education setting, that was carried out by someone with access to internal systems was with the students.
And there was this lady, Heather Toomey, who's the principal cyber specialist at the ICO, says, "What starts out as a dare, a challenge, a bit of fun in a school setting can ultimately lead to children taking part in damaging attacks on organisations or critical infrastructure." Now, there's so many things with this that I want us to look at.
I mean, they're talking about since 2022, they've looked at 215 hacks and breaches, and that's where they're getting this 57% figure carried out by children.
And in one instance, Graham, a 7-year-old— What?
But it did feel very— I don't know whether it's just the world we're living in, but that sounds quite 1984.
Anyway, and it's to help them understand the seriousness of their actions.
So they sort of say, we know you're into video games, we know you want to get one over your mates in the games, because that often has been a gateway into eventually hacking and cybercrime.
But the first thing I wanted to talk to you about was, I feel this is part of the problem comes from the curriculum and the way that cyber computing and stuff is taught in schools, because I think it can be quite boring.
I don't know whether it's taught in an exciting way.
You know, if you've got a kid or a teenager who's really good at it, who's enthused and passionate about it, I think the curriculum needs to focus on that.
And really teach them as much as we possibly can. They're going to learn it anyway.
For instance, hopefully most people know you shouldn't go around reading other people's diaries, right?
And just because it's easy maybe to hack into someone's email because they chose a predictable password, doesn't mean it's all right to go in there and read everything which is in there.
And again, it sounds like a practical joke, but it's actually quite a hurtful thing to do.
And it feels like those sort of things are the beginning elements of what could become something which turns more malicious in the future.
And also, I feel sorry for teachers.
But there's one guy and he's trying to keep an eye on all of this. But what made me smile was the idea that people were surprised.
Or maybe I'm just speaking for myself or someone I know.
So, kids are naturally brilliant social engineers, right? They know which emotional strings to pull. They know what stories to tell. They know how to use urgency.
So, we have to get a grip on the curriculum and we have to start teaching our children and our teenagers, "Look, you've got this, kids. These are the pitfalls. These are the dangers.
These are the ethics. This is how you protect yourselves." And look, it can be exciting to be on the right side. And that, that to me, that's the wake-up call.
Don't worry, you're not alone. That's why Adaptive Security exists to stop your staff from doing precisely that.
Adaptive Security is the first cybersecurity company backed by OpenAI, and they provide proper security awareness training that doesn't feel death by PowerPoint.
We're talking real-world examples tailored to your company with phishing, vishing, smishing, and yes, even AI deepfake scams all covered.
If someone tries to ring up accounts pretending to be the boss, your team will be ready. And their phishing simulations aren't just any old click this fake delivery email malarkey.
You can help prepare your team for advanced social engineering attacks via email, voice, SMS, and video, which take advantage of the sort of information attackers could actually dig up about you and your staff.
And now Adaptive's new AI content creator helps security teams instantly generate custom training by just pasting in a news article.
Whether it's a break-in threat or an internal policy update, Adaptive can spin it into interactive multilingual training in seconds.
So if you'd rather your employees didn't become the weakest link, head over to adaptivesecurity.com and then sit back with a nice cuppa knowing that next time a scammer comes calling, your team might just be clever enough to hang up on them.
And thanks to Adaptive Security, Smashing Security for supporting the show. Right, cybersecurity. Bit of a faff, isn't it?
Everyone nods along in the board meeting, then quietly hopes someone else is dealing with it while they go and put the kettle on. Well, that is where Vanta comes in.
Think of them as your mate at school who actually did their homework and then lets you copy it.
They'll help you get things like ISO 27001 sorted without the headaches, and they don't stop there. SOC 2.0, GDPR, HIPAA, even the shiny new ISO 42001. Vanta's got you covered.
Instead of drowning in spreadsheets and tick box questionnaires, Vanta automates the boring bit, centralises your security workflows, even helps you manage vendor risk, meaning you can spend less time panicking about audits and more time worrying about what really matters.
Whether you run out of biscuits in the canteen. And here's the clincher. Because you're a Smashing Security listener, Vanta's offering you $1,000 off if you book a demo.
You can't say fairer than that. So go on, give yourself a break.
Head over to vanta.com/smashing, take the demo, claim your discount, let Vanta deal with all the dull compliance grind.
Vanta, the first ever enterprise-ready trust management platform. One place to automate compliance workflows, centralise and scale your security program.
Learn more at vanta.com/smashing, and thanks to Vanta for supporting the show.
And welcome back, and you join us at our favourite part of the show, the part of the show that we to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security related necessarily. Now, my pick of the week this week is not security related.
I live near Oxford in the UK, and one of the things that Oxford is famous for, aside from Lewis Carroll and the university and not being quite as nice as Cambridge, is Inspector Morse, the famous British TV show that ran in the 1980s and 1990s with John Thaw.
People loved Inspector Morse back in the day. Now, Mrs. Cluley, she loves a bit of detective drama as well.
And so she was watching some Inspector Morse, and then she was watching some of its sequel, Lewis, which has Kevin Whately and co-starring someone we don't like to talk about.
And then she moved on to Morse's prequel. Are you familiar with the TV show Endeavour, Jenny?
So, but I love a detective drama, so do tell.
So it's young Inspector Morse because Morse's actual name was Endeavour Morse. This was the big mystery in Inspector Morse's first name. Anyway.
This is set from the mid-'60s to the early '70s and introduces some characters who later pop up in the Inspector Morse TV show.
Stars Shaun Evans as Morse, Roger Allam as Detective Inspector Fred Thursday, and I have to say, I think it's better than Inspector Morse and considerably better than Lewis, which was the sequel to Inspector Morse.
Sometimes the mysteries are solved in a rather convoluted way.
But I don't primarily watch it for how they solve the mystery, but rather the characters, the beautiful costumes, the attention to period detail, the old 1960s cars, some of the references which they have.
To be honest, I love the look of it. It's a great TV show. It's really well written. It's well acted. And yeah, I've really enjoyed it.
And that is why I'm going to make Endeavour my Pick of the Week.
A mysterious figure dressed head to toe in black has been seen prowling around parts of the Wirral. So the Wirral, for anyone who doesn't know, is very near my city of Liverpool.
It's across the water. So it's across the River Mersey, the Irish Sea. One thing it does have is lots of beaches, right?
And anyway, the thing is lots of beaches and lots of car parks.
And what's happened is people take their dogs for a walk and there is a man, and let's face it, we don't know who this person is, but it's going to be a man.
And obviously now you would, you'd think there would be something more sinister or dodgy about this, but it appears to be not the case.
It appears to be he's doing it for the lulz, right?
I can't really make out that it looks like a cat, but apparently, he meows as well.
And one poor woman, this guy came up and started to say meow repeatedly, which obviously is quite sort of disturbing.
The thing is, the line that one of the people who were interviewed by the paper, and it went, you know, went pretty viral, somebody said, of all the things happening in the world, yes, and the main thing rocking the Whittle is the mysterious catman.
Years ago, before social media, this would have gone down just a legend. It would have become a mythology.
And it sort of made me laugh, even though clearly, you know, nothing bad has happened so far. One guy said, I tried to psst, psst, psst, and he scattered. So he ran away.
Is there, will other people be tempted? I can imagine you guys up there, you're well known for your sense of humour and larking about.
And on the other hand, there was copycats of someone who dressed up as a clown. Do you remember?
The thing that I suppose I'd finish on on this would be, when I talk about social engineering and hacking generally, I talk about motive a lot, right?
And you have to think about the motive. It might be political, it might be financial.
Doesn't seem to be anything other than this is a bit weird and people are freaking out and it's getting attention.
And so that was, that was my mature assessment, Graham, and you went straight to, yes, the filth.
I'm sure lots of our listeners would love to find out what you're up to and follow you online. What's the best way for people to do that?
And then need to watch this space for next year because next year is going to be very busy.
And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app. Such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of 435 or so episodes, check out smashingsecurity.com. Until next time, cheerio, bye-bye.
And also I'm grateful to this episode's sponsors, Adaptive Security Inventor. And of course, to all the chums who've signed up for Smashing Security Plus over on Patreon.
They include Sebi, Heisenberg, Jack Anver Perth, Davon Pam, Xylar, Matthew Hunt, Mark Norman, Snack Madge, Daniel Kromeck, Nigel Scott, Sammy Dozer, Thom Langford, John W, Dr Herbalist, Mark Luxton, Reuben, Richard Maltner, and Steve B.
Well, if you're rather jealous of those fine chaps and chapesses, you may well want to get your name read out at the end of one of the Smashing Security episodes, and you can have that pleasure from time to time.
It's just one of the joys of Smashing Security Plus.
You sign up for as little as $5 a month and you can get your name read out every now and then, as well as get early access to Smashing Security episodes and the occasional bonus content.
If you're interested, just go to smashingsecurity.com/plus for more details. Now, I realize not everybody can do that.
Not everybody can afford it and you've probably got much better things to spend your money on. So there are other ways in which you can support the podcast.
You can like, you can subscribe, you can give 5-star reviews.
Apparently that really tickles the algorithms and boy oh boy, people do love having their algorithms tickled, don't they?
Maybe you can jot down a few lines and post on social media enticing other people to give Smashing Security a listen.
Whatever you do to spread the word I really, really appreciate it. It is enormously helpful and it really makes all the effort worthwhile.
So hope you enjoyed this week's episode and that you'll tune in next week for some more. And until then, cheerio. Bye-bye.
Host:
Graham Cluley:
Guest:
Jenny Radcliffe
Episode links:
- Shai-Hulud Worm Compromises npm Ecosystem in Supply Chain Attack – Unit 42.
- Jaguar Land Rover extends production shutdown after cyber-attack – The Guardian.
- AI-Driven Deepfake Military ID Fraud Campaign by Kimsuky APT – Genians.
- Israel says suspected Iranian hackers targeted actors in phishing attack – Iran International.
- Iranian Educated Manticore Targets Leading Tech Academics – Check Point.
- Children hacking their own schools for ‘fun’, watchdog warns – BBC News.
- Endeavour – ITVx.
- Crowds armed with torches hunt the “cat man” every night – Liverpool Echo.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Sponsored by:
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- Adaptive Security – request a custom demo featuring a real CEO deepfake simulation today from adaptivesecurity.com.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

