
A teenage cybercriminal posts a smug screenshot to mock a sextortion scammer… and accidentally hands over the keys to his real-world identity. Meanwhile, we look into the crystal ball for 2026 and consider how stolen data is now the jet fuel of cybercrime – and how next year could be even nastier than 2025.
Plus, Graham rants about recipe sites that won’t shut up, and there’s even more love for Lily Allen’s album “West End Girl” album.
All this and more is discussed in episode 446 of the “Smashing Security” podcast with cybersecurity veteran and keynote speaker Graham Cluley, and special guest Rik Ferguson.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Smashing Security, episode 446, a hacker doxes himself, and social engineering as a service, with Graham Cluley and special guest Rik Ferguson.
Hello, hello, and welcome to Smashing Security episode 446. My name's Graham Cluley.
For anyone who doesn't know— I mean, is there anybody who doesn't know rockstar Rik Ferguson? Describe yourself, Rik, to our audience?
This week on Smashing Security, we're not going to be talking about how Europol has seized $25 million of bitcoin and scooped up 12 terabytes of data after shutting down a cryptocurrency laundering hub.
You'll hear no discussion of shady panda, a 7-year-long cybercriminal campaign that saw malicious browser extensions infect 4.3 million Google Chrome and Microsoft Edge users.
And we won't even mention how fake Calendly invites are luring victims to a phishing page that steals Google Workspace and Facebook Business credentials.
So, Rik, what are you going to be talking about this week?
But maybe we can talk about how I think that stuff's gonna evolve and how maybe we're not in an ever-repeating Groundhog Day of cybersecurity, but that things actually do change and what to look out for and how we can try and get ahead of that.
Before we begin, I wanted to tell you about 1Password, who are supporting the podcast today.
It's easy to assume that being small means flying under the radar, but the reality is that small businesses are being targeted more and more by malicious hackers.
Cybercriminals know that lean teams often lack the resources to prevent or respond to a breach. But the good news is even the smallest teams can foil cybercrime.
1Password provides simple security to help small teams manage the number one risk that hackers exploit: weak passwords.
1Password provides centralized management to make sure your company's logins are secure.
It's a simple turnkey solution that can be rolled out in hours, whether you have dedicated IT staff or not.
However complex your security needs may get, 1Password will stay with you every step of the way. Take the first step to better security by securing your team's credentials.
Find out more at 1Password.com/smashing. That's 1Password.com/smashing and start securing every login.
And most days I get away with that quite successfully.
And I guess they are the people who I am addressing today, 'cause I'm going to tell those people what not to do if they want to be a competent cybercriminal.
And also, and this is important, you need to get away with it because otherwise your cybercrime career just comes to an end, doesn't it?
You don't want to be identified. That's my assumption.
Also, the thing is with you, Rik, is because of course you are famed for your mane of hair and your rockstar good looks, I think you're gonna leave some physical evidence behind.
We love it when the cybercriminals, when the malicious hackers really goof up and leave evidence lying around, which makes it so easy to identify who they actually are.
And this is why I want to introduce to you someone called Rey.
Rey, not with an A, but Rey with an E, a bit like that character from Star Wars: The Force Awakens waggling her lightsaber around, Rey is a core member of that infamous hacking group that likes to call itself Scattered Spider Lapsus$ Hunters.
If you do think of it in musical terms, it's a bit like if Emerson, Lake & Palmer teamed up with Crosby, Stills, Nash & Young and Barclay James Harvest, and you end up with this cacophony of 1970s supergroups.
But rather than a band of crooners, Scattered Spider Lapsus$ Hunters is, well, all they've got is not gold records on their walls. They've got compromised Salesforce logins.
That's what they've been stealing lately. They've been causing all kinds of mischief and one of the admins of Scattered Spider Lapsus$ Hunters is this Rey person.
They're an admin on their Telegram and Discord channels where they are chit-chatting away and gobbing off at each other and slagging each other off and also plotting their cybercrimes as well.
And this hacking crew, as I said, they are notorious. Over the past year or so, they've been claiming responsibility for all sorts of corporate breaches.
And we even heard on last week's episode with Dan Raywood they allegedly tried to recruit insiders at a major cybersecurity firm, trying to get data out of them.
Now, Rey was reportedly involved with a ransomware outfit called Hellcat, and they also helped run a BreachForums-style leak marketplace online.
So you've probably heard of BreachForums.
It's a notorious site where data is shared and tools are shared which allow hackers to break into systems, or they sell their data which they've exfiltrated from the companies which they've hacked.
And it turns out that, well, BreachForums, there's more incarnations of it than Doctor Who. There's more versions of it than people who've played James Bond.
And there doesn't seem to be anything which cybercrime enforcement can do to permanently defeat it.
Not to say that they're doing a bad job, and it's great that they dismantle these operations, but it does keep coming back.
And Rey was one of these people who was running one of these sites.
Now, unfortunately for Rey, they recently suffered a bit of a setback, not thanks to cutting-edge digital forensics or a multi-nation police operation, but rather because of their own screw-up.
So let me take you back in time. Back in May 2024, Rey received one of those sextortion emails. Have you received a sextortion email, Rik?
There are horrific tales of how people have actually been recorded on webcams or sometimes been blackmailed to do things on camera and the threats which have then resulted.
That's all ghastly.
But what we're talking about here today is an email which comes in, which claims, "Aha, I've been watching you for a while and you know that I've been watching you because I've emailed you from your own email address and here is one of your passwords," they say, as though that were convincing information.
The truth is your passwords, or at least one of your passwords, is probably out there already.
All they have to do is go to an existing data breach, find your email address, find the password associated with it, and send you an email.
And it's easy to forge the from header so it looks like it's from your own email address.
And people panic about this and they think that they've been hacked and they think, you know, oh, I've gotta send bitcoin and all the rest of it.
So this guy, Ray, who's obviously a bit of a hacker, he received one of these things and he thought it was really funny.
And so what he did was he took a screenshot of it and he posted it up on a Telegram chat with some of his mates.
Now, he's no dummy, so what he did was he partially redacted his email address. So he got rid of the username part, from the screenshot. So it just said, you know, @proton.me.
So that was his ProtonMail email address. Very sensible. Not shown his email address so people wouldn't easily be able to identify who he was.
But what he didn't do was he didn't redact the password.
But that password came to the attention of renowned cybersecurity sleuth Brian Krebs. You don't mess with Brian Krebs.
That's who they're worried about. And this password, it wasn't a dumb password like 'let me in' or '12345678' or something like that.
It linked to one called . So now we've got a strong indication as to what the email address should have been before it was redacted, and we have a password.
And it turned out that that username and password combination had been exposed at least twice in early 2024 when somebody's computer got hit by an info-stealing Trojan horse.
So, we now have that information.
And a security firm discovered that that email address belonged to a member of breach forums who went by the username of O5TDEV, which was part of the username.
Okay, so now we've got that.
And a search for that nickname, O5TDEV, found at least two website defacements archived, which showed that someone called O5TDEV had previously defaced websites saying pro-Palestinian messages during the website defacement, which helpfully said hacked by 05-TDEV.
Okay, so we're beginning to put all the pieces together.
It's always so gripping when he says, here's all the steps I went through. I found this, then I found this, then I put this together. I made this logical leap, which led me to this.
It's incredible.
So he's sharing maybe that his father was an airline pilot, that he has some family connections to Ireland. He even has a connection to the surname Ginty as well.
And they claimed in 2024 to be 15 years old. So a little bit more digging is going on by Krebs and co.
And what was uncovered were hundreds of credentials that had been stolen from a computer belonging to that ProtonMail email address.
And it was a shared Windows PC located in Amman, Jordan, and multiple people were using the same computer and all of them had the same surname, which is Qader. K-H-A-D-E-R.
And the data showed that Ray's full name was likely to be Saif al-Din Qader. So what does Brian Krebs do? He drops him an email.
And so what he decides to do is look a little bit further because the PC also had autofill information on its browser, which suggested there was also someone using the PC, was a 46-year-old man called Zaid Qader, who said his mother's maiden name was Ginty, who worked at Royal Canadian Airlines.
And because Saif hadn't replied, Krebs tried contacting his dad instead.
He responded via Signal saying, "I saw your email.
I don't think my dad will respond to you because he thinks it's some kind of scam that you've sent him." At least you know that he's been educated by his kids.
I've decided to talk to you directly. And he said, look, I've been thinking of moving away from cybersecurity for a while.
And he then says to Krebs, look, I really don't think you should write a story about me because it might mess up the law enforcement investigation into me.
So, next time you get told that these hackers are geniuses, remember that the guys who are fighting the cybercriminals can be really, really smart too, and can uncover the true clues.
Because in this case, this guy was unmasked not through elite counter-hacking, not through surveillance, but he was unmasked because he posted his own password online while mocking a fellow scammer.
And I think there's no richer justice than that, is there?
And it's like, but I'm really proud of it.
This was a while ago. So there were mechanisms were not in place.
So I went to Wikipedia, name of the dog is in the Wikipedia article, put the name of the dog in, and I was greeted with, please enter your new password, at which point I closed my browser and messaged Jonathan Ross directly.
You need to be careful of that stuff.
It wasn't something that dumb. But we have seen situations, someone else in the public eye, some years ago now, Mark Zuckerberg.
And the really bad thing about that was what the password was, because it was just 4 letters. It was D-A-A. D-A was Mark Zuckerberg's password.
But it was reported as a vulnerability in an assessment previously. Whether it had been remediated or not is an open question.
Look, if you are in security or compliance, you know the drill. You're constantly wearing 10 different hats: risk management, compliance, budgets. It's quite the handful.
Here's the thing, though. Drata actually helps with all of that.
Basically, they've made a platform that handles all the tedious compliance stuff that normally eats up your entire week.
What Drata does is automate the evidence collection, the compliance tracking, the security questionnaires. It just handles it.
They've got real-time monitoring, so you're always audit ready, which is nice because no one enjoys scrambling before an audit.
And they've even got AI assistants for questionnaires now, which honestly, thank the Lord.
The point is, instead of spending all your time proving that you are secure and compliant, you can actually focus on being more secure and compliant. Crazy, I know.
Anyway, if that sounds useful to you, check them out at drata.com/smashing.
That's D-R-A-T-A.com/smashing, and if you use that link, they will know that you heard about them on the show. And thanks to Drata for supporting Smashing Security.
Okay, Rik, what's your topic for us this week?
Wherever I was looking, either there had been a gigantic breach or somebody else has suffered a ransomware attack or a combination of the two. Usually they kind of go hand in hand.
Without all the stolen identities and data dumps out there, the ransomware side of things would be less successful than it is today as well. Those two are inextricably linked.
In fact, I did some research beginning of this year. Here's a really big number for you.
We don't really have that in Europe or elsewhere in the world. So I think the actual number would be several times bigger than that if we really had the data to hand.
But almost 2.5 billion, that's conservative value, about $10 billion worth of information on underground forums.
So it shows how prevalent and how widespread and how useful that information is, right?
We haven't spoken about info stealers for a very long time, I think. They were very much a consumer-facing info stealer type thing, right?
Looking for your autofill data, getting stuff out of your web browser, stealing cryptocurrency wallet stuff, stealing email account, social passwords, that kind of stuff.
Well, they're now a part of the malware as a service economy.
They're all out there, you know, using hosted infrastructure where you can just sign up and use it as a service and then go out and do your info stealing and then monetize the proceeds from that, all the stolen data, which leads to the successful ransomware attacks.
So, you know, when we think about this ongoing— we had the French Football Federation was breached very recently. 22 million members. We had the Korean equivalent to Amazon.
We had the return of the Shaihulud worm stealing about 25,000 developer secrets, tokens, and so on. The breach at Asahi, which obviously was ransomware.
As well as having been driven by identity, it ended up in the exposure of a further 2 million people's personal details, as well as the ransomware.
And then, and you know, we saw Scattered Spider being responsible, for example, for breaches of business intelligence providers last year. I mean, SiSense were breached.
Snowflake were breached. And then this year, Gainsight, Salesloft, all part of the Salesforce developer infrastructure.
And I think Gainsight said only a handful of their customers were affected. They must have really strange hands because I've only got 5 fingers on each of mine.
So slightly more than a handful. It's about 200.
But if you think about the Snowflake one last year, which had really serious effects on companies like Santander, Ticketmaster, hundreds of millions of people's details stolen in those attacks.
That only affected about 160 organizations. So they had smaller hands even. So, and that had massive outsized effects. And that was again, down to that same unholy trinity.
And it looks like they're now preparing to go after Zendesk customers as a result, probably of some of the information that was stolen.
And the attack on JLR and any of the other big ransomware attacks that you want to talk about. Are all kind of driven by this economy in stolen data.
So that's the reason we see it in the news happening over and over again is because it's basically the jet fuel to all of these other online criminal operations.
So I have been sitting around because it's that time of year thinking about what might happen next based on all of the stuff that we've seen over the past few years.
I know, let's just release them earlier.
It's going to be pretty much.
I think one of the things that we're going to see is that SaaS OAuth consent, SaaS tokens, Microsoft 365, Salesforce, Slack, all those different offerings are going to begin to rival traditional phishing.
Phishing has always dominated as the precursor to every attack. It's been up in the 90-odd percents for a very long time.
But I noticed some stats recently that said it was now at 40% of consumer-facing attacks was the precursor was phishing.
I haven't looked into the research to back it up, but if that's true, that's an incredible drop from 90-something percent.
And I think what we will be seeing now, and there are strong signals of it, is stealing of tokens rather than credentials, OAuth abuse, that kind of thing, particularly as passwordless authentication is gaining ground quite rapidly now.
And then these will be token hopping campaigns by getting access into a SaaS provider, then moving down into the customers of that SaaS provider and stealing information that way without needing necessarily to get passwords just to get tokens.
They each had particular things that they were good at. And the thing that Scattered Spider are good at is social engineering.
And it's indicative with, you know, with this, the story about Ray is that they are, if any of what he said was true, feeling the heat of law enforcement.
We know there have been arrests of people within and associated with that group.
So I think we'll begin to see a rise of something that I called social engineering as a service, because everything's as a service now, right?
So if you are involved in a group like Scatter Spider and you are a bit worried about attracting attention of law enforcement, you will want to do what ransomware threat actors did a very long time ago and remove yourself from the immediate committing of the crime.
You don't do the breach, you don't steal the data.
They were very foolish to get themselves into the extortion game and run the extortion, but they wanted to keep as much of the money as possible.
I think if the people creating the ransomware had moved themselves away from the finance of the crime as well, law enforcement would not be focused on them at all.
And I think that's what groups like Scatter Spider will consider is how can we monetize our very unique skill set?
Well, we can offer it as a service to other people committing crimes. So I think with the aid of AI voice cloning, they'll be able to create things like scripted call flows.
They'll be able to generate those fake links to authorize apps as a whole package, but along with that particularly unique skill of social engineering on the phone.
So that means you'll have even very inexperienced threat actors who don't stand a chance with threat acting, being able to outsource that capability, get the data and the access that they want, and then carry out the rest of their campaign.
But it will remove the social engineers from the scene of the crime to a large extent.
You know, companies looking to save money using artificial intelligence to do a lot of the tasks which previously they've employed people for.
There will be people who are looking for ways to pay their mortgage or pay their rent at the end of the month.
And the easier it is to get into cybercrime, the more tempting it is going to be for more people to participate in it. And potentially we could see more attacks happening.
I mean, there will be people who are seeing the volume of reports which we're seeing right now in the newspapers and on the TV of companies being hacked and of the huge amounts of money some of these cybercriminals are making.
When we do see those arrests, you know, they make the news because they're rare.
We see a lot of seizure and shutting down of infrastructure and, and great, we need to do it, but that always reappears, that Breach Forums, right? That always comes back.
So I think there is definitely a strong perception that you stand to make a lot of money. So people might look at it and go, well, you know what? I don't have to do it for long.
I just have to do it enough. One payoff.
If I can get the right company, the right ransomware, it's rare, I think, to see people walk away from it once, especially if you end up successful.
Than 2025?
The one that scares me the most of the things that I was thinking about is when I was thinking about JLR.
They had to shut down their production line, not because their operational technology was directly affected by the attack, but I think the impression I get is that they were painfully aware that it could be.
Obviously, I guess they have quite a flat network infrastructure and it's not air-gapped or whatever.
So I think they were painfully aware that that was a potential, so they did a preventative shutdown.
But the catastrophic effects of it is bad enough for JLR, but they got a government bailout, so I guess it didn't hurt that much.
But who it really hurt was the upstream providers, the people that sell things to JLR, the people that make components or seat covers or whatever, right?
Those people were going out of business.
And I think we might begin to see this next year where if you're a threat actor, you do your research work about your intended victim that you want to extort, because they do good research, they do reconnaissance.
You look at your big company you want to extort and you say, all right, who are their key suppliers? Four or five key suppliers. There'll be much smaller organizations.
You go, you break into those suppliers, you encrypt their data, but you don't extort them because they're smaller and they don't have the money.
You go back to the JLRs of the world and you say, by the way, the reason your four key suppliers are out of business is us.
Here's a very polite email asking you to pay a service restoration fee. Once you've paid us the service restoration fee, we will bring your suppliers back online.
Well, imagine one that doesn't just write haikus about zero-day vulnerabilities, but actually does your audit work for you. That is Vanta.
It connects to all of your tools, gathers evidence, tracks compliance, and quietly helps you prove that yes, you do take security seriously. Vanta automates all of that.
It pulls everything together, keeps an eye on your systems, and basically make sure you're ready for an audit at any time, which means no last-minute panic for screenshots and policies.
It also plugs into the tools you're already using and flags up issues before they become a right old mess.
So if that sounds like something that might save you from a few sleepless nights, check out vanta.com/smashing. And if you use that link, you'll get $1,000 off.
So don't forget, vanta.com/smashing. And thanks to Vanta for sponsoring this week's episode.
And welcome back, and you join us at our favourite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security-related necessarily. Well, my pick of the week this week is not security-related.
My pick of the week this week is an online service, and a very important online service, because what do we like to do?
Well, one of the things that we like to do is we like to have a lovely meal, right? But sometimes you get bored of the same old thing. Oh Graham, you're making another baked potato.
Oh Graham, you're making another cheese and cucumber sandwich. Can't you come up with something else?
Well, yes, maybe I can, because what I could do is I could go onto the internet and I could find a recipe. But there is a flaw in that plan.
And the flaw in that plan is when you go to a recipe website, what do you see? You see a whole load of guff.
A whole load of guff about the recipe writer's personal journey, about how they went on this wonderful trip to Italy or wherever it is, or they were traveling around.
I don't care about all that. What I want to know, give me the ingredients. Tell me what the bloody ingredients are and what I have to do with them. I don't want your pop-up ads.
I don't want to join your newsletter. I don't want any of that. Well, this pick of the week solves that problem because this pick of the week is called Just the Recipe.
And you can go to justtherecipe.com.
And if you go there and you paste in a URL of a webpage containing a recipe, it spits back at you just the recipe, the ingredients and the recipe.
Or you can pay a little bit of cash if you want to, you know, to thank them for improving the quality of your life.
And then you get some more features so you can sync it up with your phone and there's an app if you want to.
And then it will tell you when you're down the supermarket so you don't have to print it out. It's available for web, it's available for iOS, it's available for Android.
What are you waiting for? Make your life better and go to justtherecipe.com, which is my pick of the week.
The big flaw with recipes is that you kind of have to know what you want, or you kind of have to know what you can do with what you have. There's a big flaw there, right?
Didn't realize no one else had any idea that was coming at all. So I started to play it and I kind of haven't stopped. It is absolutely phenomenal.
The songwriting, the lyrics, the backstory, the fact that it's a person just processing something that happened to them.
I think the whole thing was written over the course of about 10 days, written and recorded over the course of about 10 days. And it is absolutely the pinnacle of her career.
So I do agree with you though, and it's worth reiterating, it's a bloody good album.
After it had been released, she announced some tour dates that were— all the venues were halls, corn exchanges, sold out obviously in seconds.
And I think this will be finally the album that actually breaks her in the US because she never cracked that market before.
What's the best way for them to do that?
I deleted every post I ever made, but I managed to export them all and import all of those old posts if you ever want to look back through them to Bluesky.
So the entirety of my Twitter existence is now on or of course LinkedIn, which weirdly has become probably more of a Twitter replacement for me than Bluesky has.
And of course you can follow Smashing Security on social media as well, you can find me, Graham Cluley, up on Bluesky or LinkedIn, and you can follow Smashing Security on Bluesky as well.
And don't forget to ensure that you never miss another episode.
Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts for episode show notes, sponsorship info, guest lists, and the entire back catalog of 445 or so episodes, and indeed the Pick of the Week archive if you want to check what's happened before, then go to smashingsecurity.com.
Until next time, cheerio, bye-bye.
And of course, to all those lovely folks who've signed up for the Smashing Security Plus over on Patreon.
They include Sean Puttick, Stephen Castle, Jack Underfurth, Mark Norman, Christo V, Darren Kenny, Ashley Woodhall, Dave and Pam, Jay Lewis, Jessica Orth, Sean, Nigel Scott, Stein, David Smythe, and Daniel Kromeck.
Well, wouldn't you love to hear your name read out at the end of the show from time to time? If so, consider joining Smashing Security Plus.
For the cost of a fancy coffee once a month, you will become part of our merry band and get early access to the episodes without the annoying ads.
All you got to do is head over to smashingsecurity.com/plus for all of the details.
Now, I know that doesn't appeal to everybody and not everyone can afford it, and that's absolutely fine. I wouldn't want you to participate if you can't actually justify it.
There's absolutely no pressure from me. But what you can do is you can support the show in ways which don't cost any cash.
You can like, you can subscribe, you can leave a 5-star review wherever you listen, tell your friends about the show, just spread the word because every little bit helps and it makes all of the effort worthwhile.
So thanks for tuning in once again, and I hope you will join me again next week for the next episode of Smashing Security.
Host:
Graham Cluley:
Guest:
Rik Ferguson:
Episode links:
- Europol nukes Cryptomixer laundering hub, seizing €25M in Bitcoin – The Register.
- 4.3 Million Browsers Infected: Inside ShadyPanda’s 7-Year Malware Campaign – Koi.
- Uncovering a Calendly-themed phishing campaign targeting business ad manager accounts – Push Security.
- Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’ – Krebs on Security.
- Jonathan Ross email goof highlights Twitter security issue – Graham Cluley.
- VIDEO: Mark Zuckerberg’s password choices are dadada-dumb! – Graham Cluley.
- Password to Louvre’s video surveillance system was ‘Louvre’, according to employee – ABC News.
- Just the Recipe.
- West End Girl – Wikipedia.
- West End Girl – Spotify.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- 1Password – Take the first step to better security by securing your team’s credentials.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- Drata – The world’s most advanced Trust Management platform – making risk and compliance management accessible, continuous, and 10x more automated than ever before.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Join Smashing Security PLUS for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


