
Basketball stars have allegedly joined forces with the mafia to fleece high-rollers in a poker scam involving hacked shufflers, covert cameras, and an X-ray card table.
Meanwhile, researchers have found they could poke around an FIA driver portal to pull up the personal details of Formula 1 megastars.
Plus: Graham’s “Pick of the Week” turns CAPTCHA hell into a delightfully deranged browser game that will make you question vegetables, geometry, and your life choices, while Danny takes a trip to ancient Africa.
All this and more is discussed in episode 441 of “Smashing Security” podcast with cybersecurity veteran and keynote speaker Graham Cluley, and special guest Danny Palmer.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Smashing Security, episode 441, Inside the Mob's Million Dollar Poker Hack and a Formula 1 Fumble with Graham Cluley and special guest Danny Palmer.
And what you're doing on Smashing Security. What brings you here?
I was probably best known for my time at ZDNet, where I was senior reporter for about 7 and a half years up until 2023. I've been freelance from the start of this year.
I've appeared in various publications that people are probably aware of, you know, The Register, The Stack, Computer Weekly, that sort of thing.
Do a bit of consulting on the side as well.
And prior to ZDNet, I was at Computing magazine for a number of years where I was talking about and reporting on things what CIOs were thinking about and talking about, which is where we first came into contact, I believe.
I worked internally at a cybersecurity company for two years doing editorial strategy for them. So yeah, it's the bread and butter of what I do. 95% of it is, yes, cybersecurity.
I've been covering the space for a long time. I think, I like to think about how one of my very first stories for ZDNet back in 2016 was about a ransomware attack.
It hit a hospital, I believe it was, in the north of England. And the ransom demand for that was a colossal total of £500.
Everything's evolved and it's just getting faster, it seems, which leads people like me to write about and explain these issues.
And I hope I can help in that way because I don't have any technical background myself.
You know, my background is a journalist and reporter, but everything I've learned over the years has been covering the space. I've always found it so fascinating.
There's always stuff to write about. People wanted to hear about it.
And as has been discussed plenty of times on the podcast, cybersecurity is, for want of a better phrase, real world, real news now.
And if we all know about the Jaguar Land Rover everything. M&S, the Co-op. It's not just this thing that's at arm's length, it's affecting the real world.
Turns out it was not.
This week on Smashing Security, we're not going to be talking about how a fake Telegram app has infected over 58,000 Android devices with malware, stealing data and seizing control of accounts.
You'll hear no discussion of how food shipments in Russia have been disrupted nationwide after its food safety agency was hit by a DDoS attack.
And we won't even mention how people searching for videos about game hacks, cheats, and software cracks are being targeted by a sophisticated network of malicious accounts on YouTube distributing malware.
So Danny, what are you going to be talking about this week?
Right then, we've got time for a quick word now about one of our sponsors today, Action1. Now, most security breaches still happen because of unpatched vulnerabilities.
And the worst part? Many already have fixes available for them. But patching can be a real pain, right?
If staying up at night worrying about the next cyberattack headline sounds familiar, it's time to try Action1, the patch management platform that just works.
You can start updating Windows, Mac, and third-party apps in under 5 minutes, and Linux support is coming very soon. The best part?
Well, your first 200 endpoints are free forever with no functional limits. This isn't a disguised free trial. There's no credit card required, no hidden limits, no tricks.
All you have to do is visit smashingsecurity.com/action1. Smashingsecurity.com/action1 and get started today.
So if you're looking to automate patching and save weeks or even months doing it, go to smashingsecurity.com/action1 and sign up for patching that just works.
And thanks to Action1 for supporting the show. Now, Danny, Danny, I've got a question for you.
Why ever not?
Every week you'd have to come kneel before me, Don Cluelioni, pay your respect. Well, here's the thing, Danny.
Don't imagine that it is all pretzels and horses' heads on the pillow in organised crime, because sometimes things can get pretty sticky.
As they have done in the United States, where 31 people have just been arrested and charged with running illegal rigged poker games.
Well, I was thinking, well, that sounds interesting. I thought it'd be interesting to hear how they've managed to hack these poker games. I thought, is it online gambling?
What's going on? Turns out it's not online gambling. Turns out this is real-life stuff. IRL, as the kids say.
So I looked into this and it sounds like a remarkably sophisticated cheating operation, and it makes old-fashioned methods like card counting seem positively quaint.
But first, let's set the scene. So this operation allegedly ran from about 2019 until quite recently, and it involved a mixture of people.
So the people organizing the poker games, there were people supplying technology which helps them cheat. There were money launderers.
And in addition, they also had well-known sports stars who were helping them.
There are former and current NBA figures, so these are the basketball stars in America, who were used to attract, draw people in to play high-stakes private poker games against them.
Amongst the people arrested is Miami Heat NBA player Terry Rozier, also known as Scary Terry.
And these poker games took place in private houses and high-end card rooms. So there's no traditional casino involved here.
So this is a combination of celebrities being present. There's secrecy. There's a perceived exclusive high-roller table.
And this is social engineering, where victims assume the games are legitimate, and maybe are more willing to bet large sums. Are you a gambler at all?
So, in a normal poker game across a table, they will have in the casinos a shuffling machine. That's something which randomly mixes the cards before they're dealt.
Presumably that's to stop any shenanigans or if the dealer is crooked and doing a sort of dodgy shuffle. So it avoids the accusations of cheating.
These are machines that you'll find in proper casinos that are meant to ensure a deck has been perfectly randomly shuffled.
But the DeckMate II, in what can only be described in retrospect as an accident waiting to happen, has a curious component, because part of its gubbins inside is an internal camera.
Yeah. Now this normally verifies the integrity of a deck of cards, that it hasn't been tampered with and that it is being shuffled properly.
But back at the Black Hat security conference a couple of years ago, a security researcher called Joseph Tartaro demonstrated that if you could gain access to that camera, you've essentially got — well, it's like having X-ray vision at the poker table.
So normally the device doesn't have that, but it does have a USB port. And it turns out that you can alter the firmware through that USB port.
And the new firmware which you put on can access the camera feed and will then send images of every single card as it's being shuffled via Bluetooth to a nearby phone.
So someone standing around the table has got a phone which is connected to the card shuffler. Because that's easier if you think about it.
It's easier to have some sort of dodgy piece of software on your phone than to have it on the card shuffler.
So if you can just get the feed sent to your phone, then your phone can do more. And maybe your phone has got a better connection to 4G data or Wi-Fi or whatever it may be.
While I suppose in environments like this, which are less regulated—
So it is then transmitting this data, the data doesn't just go to one person around the table. It goes to someone who's offsite.
I'm imagining a guy in a van parked outside, but maybe that's just my cinematic, you know, I've just seen too many heist movies.
And that person who's safely removed from the actual game, they've probably got their proper computer there, which is receiving the full deck in order.
And they're running it through a custom app, which is calculating the optimal betting strategies for each hand.
And that person they called the quarterback. They liked a lot of sporting terminology, maybe because they were doing stuff with the NBA here.
So, they developed a rather elegant signalling system for the people playing round the table.
They would use pre-arranged physical cues, like touching a particular chip, or adjusting items on the table, or scratching their nose, or their buttocks, or whatever it was that they had to communicate.
You know, obviously it's a problem if you have got an itchy bottom or if you have got a cold and you're touching your face all the time.
You know, you could obviously send the wrong messages.
They don't need to be too specific. They just need to give a general direction of, ask for another card or give up now because you're gonna lose.
Obviously being used for naughty purposes, but they put in the work to figure out how to get this whole scheme going.
According to the indictment, they won large sums of money from unsuspecting players — these people who came to these games were losing, in some cases, hundreds of thousands of dollars.
As cards are sort of dealt round the table, they had a special— get this— they had apparently an X-ray table that could see face-down cards.
So they apparently allegedly robbed someone at gunpoint to steal their card shuffler.
I don't know why they stole one, but apparently they stole one which had already been rigged in this particular way. Maybe they're having problems with the supply chain.
I don't know. I suppose you can't go on eBay and buy one which has already been tampered with.
There was this quarterback who was receiving the card information and distributing it through prearranged signals. And they also— all these chaps around the table.
They have colourful names. There's a guy called Juice there. There's another guy who was called Black Tony, another guy called Flapper Poker.
And there was a number of infamous crime families involved. The Bonannos, the Gambinos, the Genoveses. These are all branches of the mafia.
They were taking their cut from these games, which were running from Manhattan to the Hamptons to Miami. It's a pretty big deal, Danny.
So Gambinos, I mean, that's so close to just being Gambolinos, which would— it'd be all be a bit on the nose, wouldn't it?
And some of these people refused to pay their debts.
But of course, if you refuse to pay your debt to these kind of people, they are going to deploy their traditional collection methods, right?
Which quite often may be down a back alley with a bit of lead drainpipe. So, you know, chances are you're going to pay up.
They demonstrated the hack in a real game. They successfully fleeced two unsuspecting players. So there's a new source of income for any journalists who—
But unfortunately for you, the Deckmate 2, the manufacturers have since issued patches and disabled the USB port, maybe with a bit of chewing gum, I don't know.
But apparently those fixes, though, only apply to new units in licensed establishments.
So if you're going for a private poker game and they've got a deck shuffling machine, maybe you'd be a little bit careful.
Or also if you hear the X-ray machine whir up as it hits you with radiation and takes your X-ray in order to find out what's on the cards. So watch out.
There's no sort of we can or we can't, just you're relying on the goodness of their criminal hearts to patch this thing out so they can stop doing their own scam.
I suspect they might not be willing to do.
Look, if you're drowning in vulnerability alerts and spending way too much time figuring out which ones actually matter to you and your software, SecAlerts solves that problem.
They monitor over 100 sources and automatically match vulnerabilities to your specific software versions. But here's the clever bit.
You can build custom queries that filter out all the noise. Want to see only critical Microsoft vulnerabilities with a CVSS of 8 to 10 that have been actively exploited this week?
Done. No more wading through irrelevant alerts. You can push those alerts directly to the people who need them via email, Slack, Teams, whatever works for you.
And set the frequency yourself. One of their clients said it best. They said, "SecAlerts has been an absolute game changer.
We've strengthened our security posture and improved response times significantly." They've got plans for businesses of all sizes, and right now you can try SecAlerts for free for 30 days.
Use the code SMASHING and you'll get 50% off a yearly subscription. Check them out at SecAlerts.co. That's secalerts.co. And thanks to SecAlerts for supporting the show.
Danny, what's your story for us this week?
As I'm sure many people know, cybersecurity and Formula 1 are very linked these days.
Half the teams have a cybersecurity company's name on their car, which is, you know, it's all over the place.
When you see sort of, you know, these big name drivers, they've got the names of companies on their jackets, on the side of the car.
It's always interesting when I was playing Formula 1 games. It's I was going to relax after a day at work, then I'd be stuck behind a car with a security company's name on the back.
It's "oh, I was trying to relax in my evening away from cybersecurity, but apparently not." Anyway, they had a look at the FIA, which is essentially the global body that runs international motorsport.
They looked at the Super Licence and Driver Categorisation Portal, and long story short, they managed to access Max Verstappen's passport, driver's license, and personal information within about 10 minutes.
But essentially, there's a public-facing system because while you do have the superstar motorsport drivers in Formula 1 and the other high-level sports, you can do motor racing as a more amateur pursuit.
But yeah, if you want to sort of do your sports car Porsche racing and that sort of thing, yeah, you do need to be quite rich.
And again, I believe some cybersecurity executives I won't name actually do take part in actual sports car races, which is, uh, I've heard that.
Now, any website you sign up to, you can enter your name and password to sign up, which anyone can do, 'cause anyone could really be involved in this.
But it also gave them the access to tools which could escalate administrator privileges.
So, oh boy, yes, you could get it for people who were responsible for handing out the licenses, you get responsibilities for other people involved in motorsport, and you could get responsibilities that the administrator of the website was able to hand out, which is, as we know, the most important one when it comes to a website.
So they managed to get access to this administrator portal, which gave them an entirely new dashboard to look at.
They could categorize drivers, they could manage employees, update server-side things like email templates and more. What they managed to do was they loaded a driver's profile.
It doesn't say who this driver was, but they managed to— it could have been any sort of sports car driver around the world, but they managed to find the user's password hash, their email address, their phone number, passport, and resume, and other personal information, which is, you know, not ideal.
So, you know, if these were proper baddies, in addition to getting access to data, they could have, you know, people looking at the comments going, oh, this guy's been rubbish, he needs to be demoted, which would be quite demoralizing for people.
But no, they essentially got to a point where they managed to access the details of Max Verstappen. So that's the Formula 1—
They managed to find his passport, his regular driving license, his super license, his password hash, and PII, and his CV as well, which I kind of wonder what that looks like.
Does he have sort of LinkedIn approvals? No, drives car well.
These are things which fraudsters and identity thieves could exploit, or they could contact him pretending to be the website.
If they can change the email template, for instance, which is sent out, there would be the potential for sending out malicious links. And grabbing even more sensitive data.
Information, photos, email addresses, that sort of thing, you know, things for blackmail purposes.
But fortunately, in this case, these are some ethical white hat security researchers. Yes.
They managed to see all this data alongside what they described as sensitive information about internal FIA operations.
They didn't say what that was, and they say they did not actually access any of the passports or sensitive information, and anything they were able to see, they've deleted the ability to get hold of it again.
The good news is they weren't baddies. They took this information to the FIA, who essentially took this vulnerability report and fixed the vulnerability.
And so they got an official response, right? And the blog post was released, you know, in the last week, and the public disclosure of all this to ensure that this is all fixed.
Yeah, it's not as though Formula 1 is short of a few quid, is it? You're right there.
I mean, at the very least, they could give them some free tickets to go and watch a race or something.
So the FIA spokesperson said, the FIA became aware of a cyber incident— good phrase, good phrasing— involving FIA driver capitalization website over the summer.
Immediate steps were taken to secure drivers' data, and the FIA reported this issue to the applicable data protection authorities in accordance with the FIA's obligations.
No other FIA digital platforms impacted in this instance. And then we have the final line of the statement here.
The FIA has invested extensively in cybersecurity and resilience measures across its digital estate.
It has put world-class data security measures in place to protect all its stakeholders and implements a policy of secure by design in all new digital initiatives.
But honestly, Vanta's actually pretty handy. Here's the deal.
If you are spending half your week chasing down evidence for audits or updating endless spreadsheets or trying to prove that yes, you do take security seriously, Vanta automates all of that.
It pulls everything together, keeps an eye on your systems, and basically makes sure you're ready for an audit at any time.
No panic, no last-minute scavenger hunts for screenshots or policies you forgot to upload 6 months ago.
It also plugs into the tools you're already using and uses a bit of AI magic to flag up issues before they become a proper mess.
So if that sounds like something that might save you from a few sleepless nights, check them out at vanta.com/smashing. That way they'll know that you heard about them on this show.
And if you use that link, you'll get $1,000 off, which is nice as well, isn't it? So thanks to Vanta for sponsoring this week's episode. And let's crack on with the show.
And welcome back. And you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security-related necessarily. Well, my Pick of the Week this week, it's a little bit security-related.
There's ones now you have to turn a 3D model of an animal around to make sure it is facing the right way, which apparently a computer is no good at doing.
It is by the ingenious Neil Agarwal, who's written a number of other fantastic online games in the past.
And then every time it shows you a new CAPTCHA and things get worse and worse and more complicated. It is an escalating nightmare of quirky puzzles.
What begins as ticking a checkbox quickly spirals into deciphering warped text or parallel parking a car with arrow keys or drawing perfect circles or building a Minecraft pickaxe or— Oh dear.
You even have to order algebraic equations or assemble IKEA furniture in one of them.
Oh, I don't think it is, you know.
Now there are even some people who have livestreamed their attempts to play this game and see how far they managed to get.
If you this game, you can actually maybe compete with your friends and colleagues to see how far they get as well. Anyway, it's a lot of fun. How far have you got so far, Danny?
I could be here a while.
It's well, this is pretty good chess play.
I guess you get to a certain age and you basically fall into one of two camps. You either like Wars of the Roses or World War II. I think that's how it works.
But I've decided to try and expand my horizons, I suppose quite literally if you turn it in terms of distance. I'm reading a book. It's by former BBC journalist Zainab Badawi.
It's called An African History of Africa: From the Dawn of Humanity to Independence. And it's making me realise just how little about African history I knew about.
It starts off with the dawn of humanity, so humans evolving from apes in Central Africa, starting from there. Then it jumps forward quite a lot to ancient Egypt.
It's a thing where, and as the author points out, it's not really associated as African history by the wider world.
It's sort of its own, the pharaohs, Tutankhamun, all that sort of thing. It's kind of in its own little pocket.
And then I've gone on to read about various other kingdoms, the Kingdom of Kush. I'm only halfway through it, but it's really, really interesting. I feel I'm learning a lot.
It's one of those books where I'm almost staying up very much past my bedtime, so I just want to keep reading, which is a very good thing.
So yeah, I heartily recommend it, especially if you want a perspective on history which is outside of just the regular stuff we always hear about.
I do believe we covered ancient Egypt back when I was in school a long time ago. I think it went ancient Egypt, 1066, Henry VIII, World War II. That's history.
And I think the way many of us were taught, at least in Europe and America, I imagine it was very much a European and American perspective on the world.
So Africa, for instance, we would be thinking of it in terms of, well, what did the Europeans do there?
Mind you, they may not tell us everything that the Europeans got up to in certain parts of Africa as well.
But clearly civilisations were there and extraordinary things were happening in history. And many of us are frankly ignorant of it.
I'm sure lots of our listeners would love to find out what you're up to and follow you online.
You can search me on BlueSky, on LinkedIn. But yeah, those are the key ways to find me.
I've also been doing some sort of, I guess you call it behind the scenes stuff, consultation, that sort of thing, training for people in terms of what to do and not do when you've been hit by a cybersecurity incident.
Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of over 440 episodes, check out smashingsecurity.com. Until next time, cheerio. Bye-bye. Bye.
You've been listening to Smashing Security with me, Graham Cluley.
Well, thanks very much to Danny Palmer for joining us this week, and also big thanks to this episode's sponsors, Action One, Vanta, and SecAlerts, and to all the chums who've signed up for Smashing Security Plus over on Patreon.
They include Panos, Isaac Kim, 636B, Marvin71, Ryan Howells, Andrew Webster, Babar, James Leonard, Ferrell, Rory, Mark Crossley, Jarz Edwards, Veildog, Jack, Rach K, Phil, Colin Gourlay, Kevin Windsor, Chima Orem, Tash L, Gordon, and King Cyril.
Now, wouldn't you like to have your name read out at the end of the show every now and then? If so, you should sign up for Smashing Security Plus.
For as little as $5 a month, you can become a member of our happy little tribe, and you'll gain early access to the episodes with none of the pesky adverts. Ooh!
Just go to smashingsecurity.com/plus for more details. Now, I know not everyone can afford something like that. That's quite understandable.
So don't feel any pressure to become a member of Smashing Security Plus. What you can do though, it's absolutely free, is you can tell your friends about Smashing Security.
You can go up to them and say, "Oi, do you listen to any cybersecurity podcasts?" "No." "Well, maybe you should listen to Smashing Security.
It's the cybersecurity podcast for people who don't like cybersecurity podcasts." Or maybe you could wear one of our lovely t-shirts from our merch store.
Just go to smashingsecurity.com/store. You'll wear it, you'll feel gorgeous. Oh, against your skin, it will feel so lovely. And of course, you're helping to spread the word.
Whatever you're doing, thank you very, very much for listening, tuning in each week. It really means so much to me. Well, I'm going to sign off now, but I'll see you in a week.
Cheerio. Bye-bye.
Host:
Graham Cluley:
Guest:
Danny Palmer:
Episode links:
- Baohuo, the gray eminence. Android backdoor hijacks Telegram accounts, gaining complete control over them – Dr Web.
- Cyberattack on Russia’s food safety agency reportedly disrupts product shipments – The Record.
- Dissecting YouTube’s malware distribution network – Check Point.
- 31 Defendants, Including Members and Associates of Organized Crime Families and National Basketball Association Coach Chauncey Billups, Charged in Schemes to Rig Illegal Poker Games – US Department of Justice.
- How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA – Wired.
- Every Formula 1 driver on the grid just had their passport and license details leaked – but it could have been so much worse – TechRadar.
- I’m not a robot – Neal.fun.
- Can I Beat The CAPTCHA Game? – YouTube.
- An African History of Africa by Zeinab Badawi – Penguin.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Sponsored by:
- Action1 – Keep your systems safe (and your sanity intact) with the patch management platform that just works. The best part? Your first 200 endpoints are free, forever, with no functional limits.
- SecAlerts – SecAlerts makes your job easier by matching vulnerabilities to your software, using information as soon as it’s released. Use code SMASHING for 50% off a year subscription.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Join Smashing Security PLUS for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
