Smashing Security podcast #442: The hack that messed with time, and rogue ransom where negotiators

Industry veterans, chatting about computer security and online privacy.

Graham Cluley
Graham Cluley
@

 @grahamcluley.com
 / grahamcluley

Smashing Security podcast #442: The hack that messed with time, and rogue ransom where negotiators

Time itself comes under attack as a state-backed hacking gang spends two years tunnelling toward a nation’s master clock — with chaos potentially only a tick away.

Plus when ransomware negotiators turn to the dark side, what could possibly go wrong?

All this and more is discussed in episode 442 of the “Smashing Security” podcast with cybersecurity veteran and keynote speaker Graham Cluley, and special guest Dave Bittner.

0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
GRAHAM CLULEY
So Bitdefender ransomware, as we're going to call it.
DAVE BITTNER
That's right.
GRAHAM CLULEY
By the way, I'd suggest a different brand name if you don't want to.
DAVE BITTNER
Well, we've already got Bitdefender coin, so.
GRAHAM CLULEY
Oh yeah, that's true.
DAVE BITTNER
That's how you pay for your Bitdefender ransomware. You pay for it in bitcoin.
Unknown
Smashing Security, episode 442, The Hack That Messed with Time and Rogue Ransomware Negotiators with Graham Cluley and special guest Dave Bittner.

Hello, hello, and welcome to Smashing Security episode 442. My name's Graham Cluley.
DAVE BITTNER
And I'm Dave Bittner.
GRAHAM CLULEY
Dave, welcome back to the show. Always fun to have you on Smashing Security.
DAVE BITTNER
Well, I appreciate it. I'm happy to be back.
GRAHAM CLULEY
Well, I'm really grateful this week in particular because I'm actually on the road right now. I am at the NISC conference in Glasgow, Scotland. Oh.

I'm doing some speaking here and Well, I'm sort of the MC of the event.
DAVE BITTNER
Wow.
GRAHAM CLULEY
I've got my work cut out this week. I'm going to be running here, doing this, doing that.

I love doing events and things, but doing that and getting a podcast out the door, it's always a bit hairy.
DAVE BITTNER
Yeah. Who wasn't available so that they had to call you?
GRAHAM CLULEY
Well, there's at least one friend of the show who is showing up. Geoff White is going to be here of The Lazarus Heist fame.
DAVE BITTNER
Oh, good. Delightful.
GRAHAM CLULEY
He's doing a talk. Yeah. So he hasn't got here yet, but he will be.

But oh, the other thing which is accompanying me is they're actually doing some roadworks just outside my hotel window. So I do apologize.

There is a man with a pneumatic drill who's been at it for hours and is showing no signs of stopping.
DAVE BITTNER
Jackhammers, chainsaws, and leaf blowers are the natural enemies of podcasters.
GRAHAM CLULEY
It's true. It's true. Well, before we kick off, let's thank this week's wonderful sponsors, Danta, Drata, and Material. We'll be hearing more about them later on in the show.

This week on Smashing Security. We won't be talking about how 3 alleged members of the MeduZa stealer malware gang have been arrested by the authorities. What's unusual about that?

It's a Russian malware gang and they've been arrested by Russian authorities.

You'll hear no discussion of how a new wave of mobile malware in Eastern Europe is exploiting Android's NFC payment features to relay and clone contactless transactions.

And we won't even mention how a technical goof revealed the personal information of players of the UK's People's Postcode Lottery to complete strangers.

Now Dave, what are you going to be talking about this week?
DAVE BITTNER
I've got a couple of ransomware negotiators who have turned to the dark side.
GRAHAM CLULEY
Ooh. And I'm going to be telling you about some state-sponsored hackers who tried to hijack time itself. All this and much more coming up on this episode of Smashing Security.

Okay, before we go any further, I need to share a quick word with you about one of our sponsors today, Vanta. You know how everyone's got an AI assistant these days?

Well, imagine one that doesn't just write haikus about zero-day vulnerabilities, but actually does your audit work for you. That is Vanta.

It connects to all of your tools, gathers evidence, tracks compliance, and quietly helps you prove that yes, you do take security seriously. Vanta automates all of that.

It pulls everything together, keeps an eye on your systems, and basically makes sure you're ready for an audit at any time, which means no last-minute panic for screenshots and policies.

It also plugs into the tools you're already using and flags up issues before they become a right old mess.

So if that sounds like something that might save you from a few sleepless nights, check out vanta.com/smashing. And if you use that link, you'll get $1,000 off.

So don't forget, vanta.com/smashing. And thanks to Vanta for sponsoring this week's episode. On with the show. Now, Dave, I've got to ask you a personal question.

Do you ever feel like time is kind of out to get you?
DAVE BITTNER
Oh, every day, more and more.
GRAHAM CLULEY
Because I've been worrying about you. I think many of the listeners to CyberWire and Hacking Humans have been worrying about you as well.

You seem to have this sort of ongoing battle with time.
DAVE BITTNER
What are you saying, Graham?
GRAHAM CLULEY
Well, you know, birthdays are coming around quicker. Your hairline is retreating. Maybe you're a little bit confused as to which podcast you're recording from day to day.

You know, it happens to us all, Dave. Don't worry about it.
DAVE BITTNER
No, no, it's true.
GRAHAM CLULEY
Do you wish you could turn back time a little bit like Cher? You know, when she strode aboard that warship and belted out those immortal words. Would you fancy doing that?
DAVE BITTNER
Well, look, there's the old joke about how youth is wasted on the young.
GRAHAM CLULEY
Yes.
DAVE BITTNER
And I would love to have the wisdom that I have today that has been hard-earned through the years with the lack of an achy body that I had in my 20s.

I'd love to be able to sit down without having to announce it with a, you know, all those kinds of things. I noticed that I have knees.

When I was a young man, I never noticed that I had knees. You know, they just kept to themselves and did what they were supposed to do.

Now they draw attention to themselves, especially when I'm at a conference or something.
GRAHAM CLULEY
Those are very philosophical words, I think. I think that's a lot of wisdom which you've shared with us there.

And if I had one piece of wisdom that I would share with you, it's that no good comes from turning back the clock.

Things can go badly wrong if you do accidentally return to your youth. I can imagine you there, you were in the 1950s, inventing rock and roll, bumping into your teenage mother.

I've seen the movie.
DAVE BITTNER
Yes.
GRAHAM CLULEY
But it hasn't stopped some people from messing around with time from time to time.

For instance, there was a highly organized, state-backed hacking group who for two years was creeping into part of a nation's most critical pieces of infrastructure.

Not a nuclear reactor, not a missile base, not even Amazon customer service trying to get a callback as to why haven't you delivered me this?

You claim you've delivered it, but you haven't in reality. Nothing like that. Something far more sneaky and some would argue even more essential. They went after time itself.
DAVE BITTNER
Hmm.
GRAHAM CLULEY
So let me tell you what these guys did. So there are agencies around the world, and this particular hacked agency, their job was to keep their country's clocks in sync.

So they were generating the official national time. Theirs was the clock which everyone else was judged by.

And it's used for everything from telecoms and stock markets to the electricity grid, defence systems. It's really essential.

You all want to know exactly what the right time is, otherwise you've got a problem, haven't you?
DAVE BITTNER
Yeah, I mean, think about how GPS doesn't work without precise time.
GRAHAM CLULEY
Yeah. So if the time signal goes wrong, if it's messed with, everything from bank transfers to power stations, everything could potentially go kaput, could misfire.

And it's basically the pulse that can help keep a whole country alive. And somebody tried to hijack it.

Investigators say that the attackers spent months in preparation, exploiting a vulnerability in a phone messaging system to compromise employees' smartphones.

And of course, once they did that, they got hold of the workers' login credentials, their passwords, and they quietly slipped into this agency's network.

And over the next two years, starting in March 2022, the hackers allegedly deployed an entire arsenal of something like 42 customized specialist hacking tools.

Each tool had a specific job: probing, escalating privileges, exfiltrating data, burrowing deeper into the internal systems with one goal in sight.

Their goal was to reach the heart of the system, the ultra-precise piece of infrastructure that generated their country's official time.

And if the hackers had succeeded, as I said, the results could have been catastrophic.

Could be network outages, stock exchange mess-ups, power failures, traffic chaos, self-driving cars turning up before their passengers, Netflix thinking it's 2016, your Fitbit thinking you're 137 years old.

Everything could go bonkers.
DAVE BITTNER
Sure.
GRAHAM CLULEY
It's bad enough when we change the clocks, which we've just done here in the UK.
DAVE BITTNER
Yes, us too. Over the weekend. I'm bent out of shape about it.
GRAHAM CLULEY
Because you feel like, hang on, it hasn't gone back an hour or forward an hour. It went back, didn't it? Yes. We're in the fall back. Okay. So we fell backwards.

You know, you feel like, oh, I've somehow lost 14 years or something. I feel like I've woken up in a coma. I'm totally and utterly confused.

Now, officials say the hackers operated mainly between midnight and dawn, bouncing their attacks through servers in the United States and Europe and Asia to hide their origins.

They faked digital certificates to bypass security defenses and antivirus programs, and they used strong encryption because they didn't want to leave any breadcrumbs.

I've left breadcrumbs late at night in the past. It's got me into all sorts of trouble, so I don't think you want to do that.

Eventually, the authorities claimed that they spotted the attack, cut the command and control links, upgraded their defenses, neutralized the threat.

And the good news is they say that they've sorted it out. And they say they have ironclad evidence linking the hack to a foreign intelligence agency.
DAVE BITTNER
Aha.
GRAHAM CLULEY
Yes. I always love a bit of attribution, don't you? Well, I love a bit of finger-pointing in cybersecurity. It's not always reliable though, is it?
DAVE BITTNER
No.
GRAHAM CLULEY
There's been a long history of people pointing the finger in the wrong direction and making mistakes.

But you know, a hack like this, I think there are certain countries who you'd naturally point a finger at. So China, Russia, Iran, North Korea, those sort of people, right?
DAVE BITTNER
The usual suspects.
GRAHAM CLULEY
The usual, they are the usual suspects. And perhaps you're thinking this attack was on the UK's National Physical Laboratory, or maybe the US Naval Observatory's Master Clock.

Or in Germany, they have these PTB atomic clocks. But here's the thing. The country claiming to have been attacked is actually China.

And the alleged attacker, Dave Bittner of Maryland—
DAVE BITTNER
Oh boy, here it comes—
GRAHAM CLULEY
Is apparently the United States of America. The NSA, the National Security Agency, has been fingered by the Chinese as being the culprits. So I put it to you, Dave Bittner.
DAVE BITTNER
Those rascals.
GRAHAM CLULEY
Here I am in old Blighty. I'm not responsible for this. You've been trying to mess around with China's time.
DAVE BITTNER
Sure.
GRAHAM CLULEY
So according to China's Ministry of State Security, the NSA spent two years trying to hack China's National Time Service Center, the institution responsible for generating Beijing time.

And China says that it caught the operation as it was happening and it's gone public. It posted about it, 'cause this is how they make announcements in China.

They posted it on WeChat. So if you're a cyber criminal, you post up on Telegram. If you're China, you post up on WeChat.
DAVE BITTNER
Right.
GRAHAM CLULEY
If you're America, you post up on Truth Social.
DAVE BITTNER
Truth Social, yeah. Yeah.
GRAHAM CLULEY
Everyone's got their place for making these official pronouncements.
DAVE BITTNER
Sure.
GRAHAM CLULEY
It's a bit like the UK announcing one of its nuclear power plants has been hacked by releasing a TikTok video. This is what the world's come to today.
DAVE BITTNER
Yeah.
GRAHAM CLULEY
So the USA predictably hasn't confirmed or denied anything, which initially you think, well, why, if you didn't do it, why didn't you, why don't you say that you didn't do it?

But of course, that's not the way it works, is it? It's always a policy.

Well, we're never going to confirm or deny anything because if we deny some things, then one time when we don't deny it, you're going to know that we're confirming it.
DAVE BITTNER
Yeah. Although I will note that it is routine for China to deny everything.
GRAHAM CLULEY
Yes, they definitely have never, ever hacked anybody.
DAVE BITTNER
No.
GRAHAM CLULEY
And they're quite— they don't say, well, we can't confirm or deny. They just say, nope, not us, not us. It's all propaganda.
DAVE BITTNER
Right. And so I'd shed some question on the reliability of this report in general. But let's proceed as if perhaps it is true.
GRAHAM CLULEY
This is the thing. This sounds like a huge story. And what I think is actually interesting about it is the reaction outside China has been pretty quiet.

It hasn't been written about that much. It didn't really make the headlines.

And there has been a lot of skepticism, just like you've expressed there, a little bit of caution, because I think the media are nervous about just simply reporting China's allegation.

Yeah, there's a long history of Western nations calling out cyberattacks from Russia and China and North Korea and Iran, and it's become almost routine.

To point fingers in those directions and sanctions to be imposed. But now we are seeing China flip this script using the same playbook against the United States.

And it's almost like, well, you know, can we believe you? Have you actually given us the evidence to be convinced?

By the way, I saw that this story actually broke just before I think Donald Trump visited Asia and was over there doing some sort of agreement with China.

So again, you have to wonder, is this some jockeying around which was happening? In the run-up to that event.
DAVE BITTNER
Right. Did it come up in their meetings?
GRAHAM CLULEY
Yeah.
DAVE BITTNER
In our own editorial meeting when this story hit, someone said China says that we're messing with their clocks. And someone's response was, well, China says a lot of things.
GRAHAM CLULEY
Are you saying that it's a case of calling wolf too often? What's the phrase? Crying wolf?
DAVE BITTNER
No, I mean, look, it's all of this is plausible and it's certainly within the, I would say, both the capabilities and the interests of the NSA to do such a thing.

And if we were caught in there with our hands in the cookie jar, then I suspect China would call it out.

But as you point out, they've released no evidence other than the accusation. So all we have is an accusation.
GRAHAM CLULEY
Yeah.
DAVE BITTNER
And not a whole lot you can do with that.
GRAHAM CLULEY
And increasingly, I think cyber attribution, you know, when we are deciding who was behind a particular attack, it has become a game of sort of narratives and credibility.

It is not just about technical evidence.

And it is so difficult with cybersecurity to properly identify who was responsible beyond all doubt, because it could have been Belgium, quite frankly, who are bouncing it off some laptop in Florida before going into China and trying to break into Beijing time.

Quite why Belgium would want to do that or not, I'm not sure, but it's always possible.
DAVE BITTNER
And you also wonder when whoever did this, and let's for argument's sake say it was the NSA, whoever did this got caught, was getting caught part of the plan?

Is it saying to them, yeah, we've been in your system for two years and hey, if we're in your clock system, if we're in your time system, who knows where else we are?

Maybe you need to be looking over your shoulder. We did this at a time of our choosing, at our leisure, and yeah, you caught us.

We find China all over our systems pretty regularly, so I guess this is just a regular part of espionage these days.
GRAHAM CLULEY
So in some ways, what you're saying is it could almost be psychological warfare of destabilizing them.

Yeah, letting themselves be caught, say, we were here, we could be anywhere else as well, which means that of course they then begin to distrust all manner of systems which could have been compromised by other nations.
DAVE BITTNER
Right, right.

There's this old joke about the thief who breaks into someone's house and doesn't steal anything, but just rearranges all the furniture and how, how disconcerting that would be for someone to come home and find, right?
GRAHAM CLULEY
My Auntie Liz once, just before Christmas, a burglar broke into her house and he opened all the presents under the Christmas tree and left them all.

He obviously thought they were all rubbish.
DAVE BITTNER
That's despicable.
GRAHAM CLULEY
It probably did more harm to the family than if they'd stolen something.
DAVE BITTNER
Yeah. Wow.
GRAHAM CLULEY
Maybe my cousin opened them and just blamed it on a burglar. Oh, now see, I'm beginning to wonder.
DAVE BITTNER
Ah, right. See, must have been a burglar. Must have been someone from the US.
GRAHAM CLULEY
Must have been the NSA.
DAVE BITTNER
Right.
GRAHAM CLULEY
Okay, time to hear now from another one of our sponsors, which is Material Security.

Now, your company's Google Workspace is full of valuable data, and cybercriminals, they know that.

One successful attack can expose sensitive files, hijack accounts, and spread across your entire environment before you even spot it. And that's where Material Security steps in.

It's the first detection and response platform built specifically for Google Workspace.

Material Security automatically catches sophisticated email attacks that slip past native controls, cleans up risky file sharing, and locks down accounts showing suspicious behavior, all without agents, rule sets, or extra noise.

It runs quietly in the background using automation and AI to detect, investigate, and remediate threats across Gmail, Google Drive, all your accounts before they spiral into something worse.

One platform, total visibility, less chaos. See how it works for yourself at smashingsecurity.com/material. That is smashingsecurity.com/material.

And thanks to Material Security for supporting the show. Right, let's get on with the rest of the show. Dave, what's your story for us this week?
DAVE BITTNER
Well, my story comes from the folks at the Chicago Sun-Times, and this is about a couple of cybersecurity folks who allegedly decided to switch teams, according to some prosecutors in Chicago.

This story centers on some folks who work professionally as ransomware negotiators.

And according to the FBI, this pair of men, one Kevin Martin, who was a ransomware negotiator at a company called DigitalMint, and Ryan Goldberg, who was an incident response manager for Signia, allegedly they joined forces with a third accomplice to extort businesses for millions.

So the investigators say that they use ransomware to lock down corporate servers, and they hit a Florida medical company and demanded $10 million in ransom.
GRAHAM CLULEY
Crumbs.
DAVE BITTNER
Yeah. Allegedly only one target paid, so they got a paltry $1.2 million in cryptocurrency. I don't know about you, Graham, but that would be a lifestyle upgrade for me.
GRAHAM CLULEY
Yes. I wouldn't have called it paltry. I'd have been quite happy with that.
DAVE BITTNER
Right. And then allegedly they laundered it through some of these mixing services and using multiple wallets.
GRAHAM CLULEY
Yes.
DAVE BITTNER
So the story is calling out the irony, of course, that these gents had built their careers advising companies of how to avoid paying ransoms.

Indeed, you might say that they were experts about this subject. They had spoken at cybersecurity conferences.
GRAHAM CLULEY
Oh, really?
DAVE BITTNER
Yeah. And they're under investigation for launching them themselves. The companies they work for, of course, say they have no knowledge of the scheme and nothing to do with it.

DigitalMint fired the gentleman who worked with them, and Signia says that they have nothing to do with this and they're working with law enforcement, which is good.
GRAHAM CLULEY
But now they've heard about the idea, they might be tempted, you know, to set up a new business. No, no, no, no, no, of course not. Of course not.
DAVE BITTNER
Well, I want to get to that in a second here. Let me just wrap up the story here. So they've both been indicted on conspiracy, extortion, and computer damage charges. Mr.

Goldberg is in custody. Mr. Martin was released on bond. And the prosecutors say that these attacks spanned about 2 years before the FBI caught up with them.

And one of them tried to flee to Paris on a one-way flight but got stopped at the airport.

But I have often wondered, Graham, and I'm curious for your insights on this, your take on this, how many cybersecurity professionals out there in the back corner of their mind have as a backup plan, right?

Just in case the retirement savings doesn't work out, right? In case the Social Security just— they can't meet ends meet, right?

How many of them just have in the back of their minds what I would call nuisance ransomware, right? A few hundred bucks a month, just enough to make ends meet.

Not enough that you would draw law enforcement to your front door.
GRAHAM CLULEY
Oh, I see. Because they'll be dealing with all the people who are asking for millions of dollars. Right. Whereas your plan, Dave, so Bittner ransomware, as we're going to call it.
DAVE BITTNER
That's right.
GRAHAM CLULEY
By the way, I'd suggest a different brand name if you don't want to.
DAVE BITTNER
Well, we've already got Bitdefender coin, so, you know.
GRAHAM CLULEY
Oh yeah, that's true.
DAVE BITTNER
Yeah. That's how you pay for your Bittner ransomware is you pay for it in Bittner coin.
GRAHAM CLULEY
Right. Okay. So you're just going to ask for just a few hundred dollars a month.
DAVE BITTNER
Well, think about— so if I were going to do this, I would say you target, let's say, senior citizens for $50.
GRAHAM CLULEY
Right.
DAVE BITTNER
And it's not going to ruin their lives, not really going to change their lives very much. But let's say you hit up a few people for $50 per day. Well, it adds up.
GRAHAM CLULEY
Yeah.
DAVE BITTNER
And now you can make ends meet. Chances are you're not gonna be tracked down by law enforcement because you're just a low-level nuisance operator.
GRAHAM CLULEY
Right.
DAVE BITTNER
So I just wonder, because obviously the thought has crossed my mind clearly, and now you're telling everybody it's crossed your mind.
GRAHAM CLULEY
It's very interesting.
DAVE BITTNER
Right, exactly. I put a big target on my back.

I doubt that I have the technical capabilities to pull off such a thing, although I'm a fairly quick learner, but I think someone like you, Graham, who has—
GRAHAM CLULEY
Hey, don't bring me into it.
DAVE BITTNER
You have more technical capabilities than I do. And certainly a history of knowing all about cyber threats, perhaps you've done reverse engineering and so on.

I'm just putting it out there as a possibility.
GRAHAM CLULEY
Yes, you are, aren't you? You are putting it out there.

So listen, so when you started telling me this story about these guys who were involved in ransomware negotiations and then they turned a bit rogue, I didn't imagine that they were actually planting ransomware on victims' computers to steal the money.

I thought they were somehow trying to exploit the ransomware attacks which were being brought to their attention.

So people are coming to them saying, we've been hit, can you negotiate for us?

I thought you were going to say that the negotiators were going to speak to the ransomware gang and say, look, I'm negotiating for these guys, right?

How about we do a little bit of a deal? They're going to pay me X, but I'll give you Y. 'But I'll tell them this is a really good deal for them, and you still get some money.' Right.

You know, clearly these negotiators are getting paid somehow, but I wondered if maybe—
DAVE BITTNER
That's a really good— yeah, because the negotiator could say, "Listen, I worked out a great deal for you. Instead of a million dollars, I've got it down to half a million.

Here is the bitcoin account that you need to make the deposit in." Right. And then they make the deposit, and the negotiators come back and say, "Bad news."
GRAHAM CLULEY
Yes.
DAVE BITTNER
"Bad news. We can't trust these ransomware operators. They just ran off with the money. Shall we try to keep negotiating?"
GRAHAM CLULEY
Well, the negotiators aren't being regulated as far as I know, are they? I mean, it does feel a bit of a Wild West out there.

I remember one case, there was a company near Oxford which got hit by a ransomware attack, a genuine ransomware attack.

They brought in their IT team to deal with it, as you would expect. And one of the IT guys went into the email of the chief executive who had received the ransom note.

He changed the email which they had received from the ransomware gang to change the bitcoin address to be one which he controlled rather than the ransomware gang.

And then he was turning up at these meetings inside the company. Should we pay the ransomware guys or not? And he was going, "Well, you know, it's difficult, isn't it?

But maybe you should."
DAVE BITTNER
Right, right, right.
GRAHAM CLULEY
I mean, okay.
DAVE BITTNER
I have no horse in this race, but it's a murky world.
GRAHAM CLULEY
But I've never heard of them actually installing the ransomware as well. I don't know how I feel about these professional negotiators.

It does seem a little bit, a bit like Dog the Bounty Hunter or something. It just feels a little bit unorthodox.
DAVE BITTNER
Well, who watches the watchmen, right? You know, as you say, it's unregulated.
GRAHAM CLULEY
Yeah.
DAVE BITTNER
And with anything in a black market, you roll the dice and you take your chances.
GRAHAM CLULEY
Just like you've taken your chances by announcing your future career plans here on the podcast.
DAVE BITTNER
That's right. That's right. Well, if I need to flee the country suddenly, perhaps you have a spare bedroom I could crash in. What do you say, Graham?
GRAHAM CLULEY
Okay. No worries. Always available for you, Dave. So this episode of the show is sponsored by Drata, and I'm going to tell you why you should check them out.

Look, if you're in security or compliance, you know the drill. You're constantly wearing 10 different hats. Risk management, compliance, budgets. It's quite the handful.

Here's the thing, though. Drata actually helps with all of that.

Basically, they've made a platform that handles all the tedious compliance stuff that normally eats up your entire week.

What Drata does is automate the evidence collection, the compliance tracking, the security questionnaires. It just handles it.

They've got real-time monitoring, so you're always audit ready, which is nice because no one enjoys scrambling before an audit.

And they've even got AI assistance for questionnaires now, which honestly, thank the Lord.

The point is, instead of spending all your time proving that you are secure and compliant, you can actually focus on being more secure and compliant. Crazy, I know.

Anyway, if that sounds useful to you, check them out at drata.com/smashing. That's drata.com/smashing. And if you use that link, they will know that you heard about them on the show.

And thanks to Drata for supporting Smashing Security.
DAVE BITTNER
And welcome back.
GRAHAM CLULEY
Can you join us for our favorite part of the show? The part of the show that we like to call Pick of the Week.
DAVE BITTNER
Pick of the Week.
GRAHAM CLULEY
Pick of the Week is the part of the show where everyone chooses something they like.

Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.

It doesn't have to be security related necessarily.
DAVE BITTNER
Better not be.
GRAHAM CLULEY
Ah, the old days. Well, this week, my pick of the week is not security related. I don't just love chess, you know, Dave. The Beatles. I love all kinds.

I've got wide interests, wide interests. And one of them is a board game called Micro Macro Crime City. So it's a physical board game and it looks really simple.

What you get is this huge printed map full of tiny cartoon people. Now, both you and I, Dave, are going to find this difficult because you do need your reading glasses for this.
DAVE BITTNER
I'll need a magnifying glass.
GRAHAM CLULEY
You really do need a magnifying glass and bright light to use this properly.

But what you have is this giant city in cartoon form, and you can see all these people going about their lives, walking the dog, shopping, robbing banks, that kind of thing.

And hidden within the illustration are dozens of crimes to solve. And you're given a short case file and a clue, and you scan the map.

It's a bit like scanning a great big Where's Wally sort of thing. Piecing together what happened and this character is here. Where was he earlier on?

You can look around and say, ah, he was walking down here and he had a baguette in his pocket or whatever it was. And he— oh, there he is hitting someone over the head with it.

Or you see different things which are going on, or people who are having affairs, or someone who's spying on someone else. It's wonderful.

And you follow these characters through the streets, the parks, the dark alleyways of the city in this charming art form. And what really hooks you is how cleverly it's designed.

You just observe, you reason, you argue with whoever you're playing with about whether that man was carrying a baguette or not, or whether it was a bit of steel drainpipe.

And you think, oh, well, he was there at the murders. Was he at the murder scene 10 minutes later? It's hard to tell.

But it's the kind of game where you suddenly realize you've been hunched over a table for an hour looking at these tiny little pixel-sized clues and wishing you did have a magnifying glass.
DAVE BITTNER
What's the gameplay like? What's— how do multiple players engage with this?
GRAHAM CLULEY
Well, it's sort of collaborative.

It's sort of collaborative where you're playing with your friends, or I suppose you could see on a timer who manages to solve the different cases in a quicker time.

But they have just brought out a mobile version of this as well. Now that's anathema to me, obviously. I haven't downloaded it.

But it is available apparently for the iPhone and Android as well now. Haven't tried that out.

But the original board game version is really family friendly, and it's a different kind of thing to do.

And you can have some great fun trying to work out what has happened and to exercise your detective capabilities. I know how you like to exercise your little grey cells.
DAVE BITTNER
I do.
GRAHAM CLULEY
Well, this is the kind of thing for you.
DAVE BITTNER
This appeals to me. And I have to say, it also reminds me of a scandal that occurred when I was a young lad.

We used to get the Baltimore Sun newspaper delivered to our doorstep every day. In fact, I was a paperboy for the Baltimore Sun.
GRAHAM CLULEY
Oh. Yep.
DAVE BITTNER
Bought my first computer with the money I saved up for from being a paperboy.

Anyway, the city of Baltimore was going to have their annual city fair where people would come together and there were rides and food.

And much like this drawing, there was a drawing like this game has with all the fun things to do at the fair.

And it was one of these drawings where you could spend a lot of time taking it in and looking and seeing what was all there. And the artist put lots of details.
GRAHAM CLULEY
I love it. Yeah.
DAVE BITTNER
Yeah. Until someone discovered that on the merry-go-round, there was a gentleman.
GRAHAM CLULEY
Oh no.
DAVE BITTNER
And it was not a horse he was riding. Let's just say that.
GRAHAM CLULEY
Oh dear. Were you scarred, Dave, by this experience?
DAVE BITTNER
Yes, yes. The hours that I spent looking at that drawing really stayed with me.
GRAHAM CLULEY
Oh my goodness. Anyway, my pick of the week is Micro Macro Crime City. Go and check it out if it sounded interesting to you. Dave, what's your pick of the week?
DAVE BITTNER
Well, Graham, as you know, I have a great love for all things Star Wars.
GRAHAM CLULEY
Ah, yes.
DAVE BITTNER
And so I was very excited to find out that our local mega hardware store, The Home Depot— do you have Home Depots where you are?
GRAHAM CLULEY
Not really, no, no, I don't have those.
DAVE BITTNER
Well, Home Depot here in the U.S. is a giant warehouse of a hardware store.
GRAHAM CLULEY
Are these the stores where you can buy basically anything?
DAVE BITTNER
Almost.
GRAHAM CLULEY
Right.
DAVE BITTNER
The center of their bullseye is being a hardware store.
GRAHAM CLULEY
Okay.
DAVE BITTNER
But you can also buy holiday decorations. So they have Halloween and Christmas and all that sort of stuff.

Well, I was very excited to find that they were introducing for this Christmas season a nearly full-size Star Wars R2-D2, animated R2-D2 model.
GRAHAM CLULEY
Oh, it moves. It's an R2-D2 that moves.
DAVE BITTNER
Yeah. Yeah. He moves. He makes sound effects. His little head turns.
GRAHAM CLULEY
Yeah.
DAVE BITTNER
Does, I mean, it's almost everything you could want an R2-D2 to be, right? He doesn't go roaming around the house by himself, but for the money, it's a really good R2-D2.
GRAHAM CLULEY
How much money, Dave?
DAVE BITTNER
Well, only $300.
GRAHAM CLULEY
Okay.
DAVE BITTNER
Here's the thing. If you want to go to, let's say, Walt Disney World and buy a full-size R2-D2, fully functional R2-D2, the Disney Corporation will sell one to you for $25,000.
GRAHAM CLULEY
What?
DAVE BITTNER
Right?
GRAHAM CLULEY
So I'm off down to Home Depot.
DAVE BITTNER
Yeah, $300 doesn't seem so bad for your little R2-D2. So, of course now I have my sights set on getting one of these things, but they are in high demand and short supply, right?

So I joined a Facebook group dedicated to trying to find these Home Depot R2-D2s as they become available. And they turned me on to an online resource called trackalacker.com.
GRAHAM CLULEY
Right.
DAVE BITTNER
And what this does is it allows you to put in the web page for something that you want to purchase that is out of stock.

And the moment that it comes back in stock on the website, Trackalacker sends you a text message. It says spring into action and buy your thing.

Now I will say I still don't have my R2-D2.
GRAHAM CLULEY
So you're really going to buy one of these things?
DAVE BITTNER
Oh yeah. Oh yeah. I'm really going to buy one of these things.
GRAHAM CLULEY
Well, I've seen a photograph of it. It sort of has Christmas lights all over it.
DAVE BITTNER
Right. You don't have to put those on.
GRAHAM CLULEY
Right. No.
DAVE BITTNER
They know their audience and they know they've made that easy to not include if you don't want. That's optional.
GRAHAM CLULEY
Yes. Okay. Yes, of course. You wouldn't want those on all the time.
DAVE BITTNER
My only question, Graham, is whether or not I'm going to buy two. Two, one for my home and one for my office.
GRAHAM CLULEY
They might breed. Yes, you've got to keep them apart.
DAVE BITTNER
Yes, right. Don't feed them after midnight. Oh wait, that's a different movie.
GRAHAM CLULEY
No one liked C-3PO, did they? Everyone loved R2-D2.
DAVE BITTNER
Yeah, R2-D2 is the robot equivalent of a lovable dog, and C-3PO is kind of a whiny twit. So I did get an alert the other day on my phone, a text message that said they're in stock.

Unfortunately, I was in the car, so I was unable to— I mean, as much as I wanted to slam on the brakes, pull over on the side of the road and buy my R2-D2, cooler heads prevailed and I did not do that.

So the system does work, right? But I was not able to respond quick enough and they were sold out by the time I was able to get somewhere safe.
GRAHAM CLULEY
So it's not just the $300 of buying the R2-D2. You've also got to cover the expense of getting an Uber to work every day as well.
DAVE BITTNER
That's right.
GRAHAM CLULEY
Just in case you get the text message. Yes.
DAVE BITTNER
I'm ready to spring into action at any moment.

So technically my pick of the week is Track-a-Lacker, but my sub-pick of the week is the Home Depot R2-D2, which if anybody happens upon one in stock, please let me know.
GRAHAM CLULEY
I think you've been very foolish, Dave.

You shouldn't really be publicizing these Home Depot R2-D2s when you can't get ahold of one due to lack of stock because Smashing Security listeners, they are going to be racing to buy these and the Micro Macro Crime City game now.

You should have announced this after you've managed to get one.
DAVE BITTNER
True, true. Yeah, cat's out of the bag. But anyway, R2-D2 and Track-a-Lacker are my pick of the week.
GRAHAM CLULEY
Brilliant stuff. Well, that just about wraps up the show for this week. Thank you so much, Dave, for joining us.

I'm sure lots of our listeners would love to find out what you're up to follow you online, what is the best way for folks to do that?
DAVE BITTNER
You can go to thecyberwire.com and you'll find all of the podcasts that I am part of.
GRAHAM CLULEY
Brilliant. And please tune into those. They're all terrific. And of course, Smashing Security is on social media.

You can find us on Blue Sky and you can find me, Graham Cluley, on LinkedIn. And don't forget to ensure you never miss another episode.

Please follow Smashing Security in your favorite podcast app such as Apple Podcasts, Spotify, and Pocket Casts.

For episode show notes, sponsorship info, guest lists, and the entire back catalog of over 440 episodes, check out smashingsecurity.com. Until next time, cheerio, bye-bye.
DAVE BITTNER
Bye-bye.
GRAHAM CLULEY
You've been listening to Smashing Security with me, Graham Cluley. Thanks a million to Dave Bittner for joining us today.

And also thank you to this episode's sponsors, Vanta, Material Security, and Drata. And of course, to the chums who've signed up for Smashing Security Plus over on Patreon.

They include Matt Weir, Michael Crumb, Greg Bailey, Jonathan Haddock, Maya McDonald, Sean, Robert Odegaard, Skidone, Henry Walshaw, Stephen Castle, Dan H., Alexander Hugh Huys, Roy Tate, Jessica Orth, Dr.

Herbalist, Andrew Davison, Frankie Gozikowski, Bobby Hendrix, Ted Wilkinson, John W., Travis West, and Hades.

Now, would you like to hear your name read out at the end of the show from time to time? If so, consider joining Smashing Security Plus.

For as little as $5 a month, you'll become part of our merry band and get early access to episodes without those annoying ads.

Just head over to smashingsecurity.com/plus for all the details to check it all out. Now, of course, I know not everyone can stretch to that, and that's perfectly fine.

There's absolutely no pressure to become a patron. The truth is you can support the show in plenty of ways that don't cost a penny.

You can like, you can subscribe, you can leave a 5-star review— please leave a 5-star review wherever you listen— tell your friends about the show, simply spread the word.

Every little bit helps, and it really does make all the effort worthwhile.

Okey-dokey then, about time for me to turn off the microphone for this week, but I will speak again next week, and I hope you'll be there to listen. Toodaloo, bye-bye.

Host:

Graham Cluley:

Guest:

Dave Bittner:

Episode links:

Sponsored by:

  • Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
  • Material – Email security that covers the full threat landscape – stopping new flavors of phishing and pretexting attacks in their tracks, while also protecting accounts and data from exploit or exposure.
  • Drata – The world’s most advanced Trust Management platform – making risk and compliance management accessible, continuous, and 10x more automated than ever before.

Support the show:

You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.

Join Smashing Security PLUS for ad-free episodes and our early-release feed!

Follow us:

Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.

Thanks:

Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and hosts the popular "Smashing Security" podcast. Follow him on TikTok, LinkedIn, Bluesky and Mastodon, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.