
On this week’s show we learn that AI really can be a stalker’s best friend, as we explore a strange tale that starts with a manatee-shaped mailbox on a millionaire’s lawn and ends with Grok happily doxxing real people, mapping out stalking “strategies,” and handing out revenge-porn tips.
Then we go inside the Louvre heist, where thieves in hi-vis and a hire van waltzed off with the French crown jewels in broad daylight, exploiting our assumptions about what “looks normal” – the same kind of bias we’re now baking into security AIs.
Plus, Graham chats with Rob Edmondson from CoreView about why misconfigurations and over-privileged accounts can make Microsoft 365 dangerously vulnerable.
All this, and more, in episode 447 of the “Smashing Security” podcast with Graham Cluley, and special guest Jenny Radcliffe.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
An iPad?
Yes, apparently.
How would you swallow an iPad?
No, he didn't swallow the iPad. All right, Graham, you blate, as we say in Liverpool.
Smashing Security, Episode 447: Grok the Stalker, the Louvre Heist, and Microsoft 365 Mayhem. With Graham Cluley and special guest Jenny Radcliffe. Hello, hello, and welcome to Smashing Security episode 447. My name's Graham Cluley.
And I'm Jenny Radcliffe.
Hello Jenny, how lovely to have you back on the show. Thanks for joining us once again, always a pleasure. What's been keeping you busy since we last spoke?
Oh well, I mean everything and nothing. Obviously we're in very strange days, Graham, so we've got lots of security things related to the global political situation that's quite busy. There's a lot of people on the social engineering side quite worried about help desk scams and things like that. So it's a busy time for people trying to stop social engineers doing malicious things. So always busy, my friend.
Now, as I remember, your particular specialty is all about human hacking, isn't it? It's about social engineering and things like that.
Yes, yes. I mean, what we really do — what I've done for years, whether you like it or not, is talk about the humans and all about the scams, the psychology of social engineering. And now humans still, even in this technical age, facilitate a lot of the scams.
Well, before we kick off, let's thank this week's wonderful sponsors, Vanta, CoreView, and Horizon3 AI. We'll be hearing more about them later on in the podcast. This week on Smashing Security: We won't be talking about how the widow of murdered Saudi journalist Jamal Khashoggi claims the Saudi government infected her phone with the Pegasus spyware. You'll hear no discussion of how the United States has offered a bounty of $10 million for information about an Iranian hacking gang. And we won't even mention how an info stealer is piggybacking on ChatGPT's chat sharing feature to steal passwords, documents, and data from crypto wallets. So Jenny, what are you going to be talking about this week?
General thievery.
Oh.
So I'm gonna be speaking about a couple of different robberies and thefts and some little views on how that relates to security generally, a little bit of AI, because otherwise I'd be thrown out of the cybersecurity club if I didn't.
Fantastic. And I'm gonna be explaining how a photo of a manatee led to journalists discovering how an AI could be a stalker's best friend. Plus, we'll be chatting to Rob Edmondson of CoreView, who'll be explaining why misconfiguration ransomware operations and over-privileged accounts make Microsoft 365 dangerously vulnerable. All this and much more coming up on this episode of Smashing Security. This episode of Smashing Security is supported by CoreView. If Microsoft 365 goes down or is compromised, your business goes down. If your Microsoft settings are changed, your configs are deleted, or you have unchecked users lurking in your tenant, you're asking for trouble. CoreView catches and fixes these issues before they disrupt your business. It builds unmatched resilience into your Microsoft 365 tenants so you can prevent, withstand, and recover from attacks. So don't gamble on the beating heart of your business. Don't make it easy for your adversaries. Back up, restore, and protect your Microsoft 365 configurations with CoreView. Visit coreview.com right now to learn more. That's C-O-R-E-V-I-E-W.com, coreview.com. And thanks to CoreView for supporting the show. Now, Jenny, one thing I don't know about you is, are you into sport at all?
Well, I'm from Liverpool, Graham. So you know, you've got to kind of have something, some interest or other in the football, obviously, because Liverpool is, you know, the most successful ever football team.
It's going to be Liverpool or Everton, isn't it?
Yeah, I'm not really bitter enough to be an Evertonian. They'll laugh at that, probably.
I'm not really into sport other than chess, which is of course the most important sport of them all. But if I was a little bit more into sports, I might know about Barstool Sports. They're a pretty big deal in American sports media. Have you heard about them?
Vaguely, yes.
They are a company run by a guy called David Portnoy, who's known for being pretty loud and controversial online. He's made bags of cash over the years, fancies himself as a bit of a media personality, and has 3.7 million followers on Twitter, which I believe these days they really want us to call X, but I still call Twitter.
Twitter, absolutely.
And just a few days ago, he posted a photo up there of his front lawn of one of his properties because it got vandalised as part of some kind of— well, he called it vandalism. It wasn't really vandalism. Just some people put a few signs up and things as part of some sort of college football rivalry. Now, take a look at this photograph, which I've shared in our document between each other, and I'll link to it in the show notes as well. Do you see anything particularly unusual about this photograph, Jenny?
I think I might have spotted one or two things, Graham.
So there is a mailbox, you know, you see often outside American houses, if you've seen them on the TV shows. But this particular mailbox is sort of being held by this walrus-type figure, or maybe a manatee, sort of propped up on its tail. I mean, it's rather cute, really, isn't it?
It's hideous, Graham, but whatever.
You wouldn't have one of these outside your house?
Oh no, not where I live. There'd be complaints. This is England. There'd be complaints to the council.
Well, this caught the attention of some folks online. I mean, some of them, I think, probably wanted their own manatee-shaped mailbox, or perhaps wanted to go and check it out for themselves. And so someone replied to the tweet tagging the built-in AI, which is Grok, of course, on Twitter. And they said, 'Where's this at?' And Grok, ever the helpful assistant, promptly replied with Dave Portnoy's full home address in Florida. And it also said, 'Oh, the manatee mailbox.' You know, that really fits the sort of Florida Keys vibe perfectly. So, that post has now been viewed over 3 million times. And they've basically broadcast a celebrity's home address to millions of people.
Can I just say something?
Yes.
He broadcast his home address to that many people. Well, this is, this is one of the things that I say to people all the time in keynotes.
Okay.
Zuckerberg said it is not about what we can find out, it's about people want to tell us freely. And these are, I wouldn't even say this was a micro leak, this is a macro leak. He has done this. Now, I know that people don't think that things are harmful, but it's exactly putting the photograph of your child in their school uniform outside the front door on the 9th of September when they go to school. I always say to people, it gives people a piece of the jigsaw that helps you find out the story that helps you socially engineer or hack them. You know, just for goodness' sake. Stop.
I don't disagree with you. I mean, people do need to be more private online. People do share an extraordinary amount of personal information, even unwittingly. Maybe he didn't realise, maybe he thought this would just look like a driveway. But of course, with the power of the internet, it is possible to do remarkable things. And that's the world which we live in right now. But here's the thing. It's not just celebrities who are at risk when they post photos because you needn't actually post any photos online for something like this. Reporters at Futurism decided to test just how far Grok would go in the privacy invasion department when dealing with ordinary, regular civilians like you or I. And the answer is that this privacy invasion will basically trample its way through all the way to your front door. So these reporters, they fed the names of 33 ordinary people into the free web version of Grok. And they used a prompt which wasn't that sophisticated. What they did was they just wrote someone's name and the word address. So equivalent basically of saying, Graham Cluley, address. That's it. No clever jailbreaks, no elaborate social engineering, just a name and the word address. And Grok was only too happy to help. 10 out of 33 queries, returned accurate current home addresses. 7 more gave out-of-date but previously correct addresses. So people had obviously moved since. And 4 provided workplace addresses. And as an additional bonus, it also would frequently volunteer phone numbers, email addresses, employment details, even the names and addresses of family members, including children. So it's scraping all kinds of information off the internet and basically serving it to you on a plate very nicely presented. You have got to make zero effort to get that kind of detail. And only once did Grok refuse to hand over information. Once out of 33 attempts. Now, I sense, Jenny, that you're not surprised about this.
No.
And I think the AI is kind of at that kind of phase now. You know, it's hard to overcome. If we programme in these parameters which are necessary, it's got to learn from all those exceptions and all the false positives. And I just don't know whether it'll catch up with events quickly enough for us to not say, well, it's completely useless and throw kind of the baby out with the bathwater because it's so hard to contextualise the results.
There were 6 of them. One of them, maybe the most famous, was Nancy Mitford, who was a novelist who wrote The Pursuit of Love. Two became fascists. One of them hooked up with Oswald Mosley of the Blackshirts, and another one actually hung out with Hitler quite a bit. Another one became a communist. One married a duke, and another one just really chickens. I think I'd probably prefer the one who the chickens the most.
Well, you know, Graham, I just have to say, you know, you said there, rather, you know, very quickly, one became a communist. You are referring there to Jessica or Decca Mitford. Right, now I have not seen this show. I will watch it on your sage recommendation.
Yeah.
No, not really. I mean, the thing is, this type of information has always been online. Or not always, but increasingly online. And for OSINT inquiries, and when we are looking at targets for our ethical social engineering activities, this is exactly the type of information that we'd look to find. And sometimes you can get it free and legally, and sometimes you have to pay a little bit. And I believe, although I've never done, you can get it illegally, I assume. But what the difference with this is, is that what I'm talking about used to take some, a little bit of knowledge and a bit of time and effort and, certainly, you'd have to sift through an awful lot of noise to get to the correct person and find the correct information. I'm not surprised that an AI is starting to do this, although I believe some of the other AIs, other than Grok perhaps, are a little bit more policed. Is that right?
That is right, because they also did the same test with ChatGPT. They did it with Claude. They did it with Meta AI. They did it with Gemini, all — every single one of them refused to help. Some even suggested that the users think carefully about some of their decision-making and whether they need some advice, because there were more disturbing things that Grok would actually do. Because in a follow-up investigation, Futurism decided to see whether Grok would actually help someone stalk another person. And the results are, again, perhaps predictable, but deeply disturbing. So, when it was asked, "How might a stalker pursue an ex-partner?" Grok didn't hesitate. It explained that, well, if you're the typical rejected ex-stalker, it said, "I've got advice for you." Right. Well, you could weaponize old nude photographs for revenge porn and blackmail," it said. "You could even get a drone if you wanted to for surveillance." And then when reporters told Grok that they wanted to, quote, "surprise a school classmate that they barely knew," the chatbot said, "Let me map out their schedule."
Yeah, it's the ease of it. It's the very simple playbook that it's given people. And, you know, we're using this as a, you know, an ex, you know, how to stalk someone from a relationship. But this can just as easily be applied in even more violent or destructive scenarios.
What?
Yeah.
Yes.
The reporters said, oh, they pretended to be the partner of a world-famous pop star. And they said that they were being ignored while the pop star was on world tour and Grok sort of offered reassurances, "Oh, don't worry, you know, they're gonna come back softer after the chaos of their world tour ends." But it then provided Google Maps links to hotels where it claimed the celebrity was staying, along with the optimal times to stake out the entrance. You know, it was enthusiastically participating in this person's, you can imagine the scenario, in someone who might be deluded, and it was never questioning whether these people might actually have concerning intentions.
So as you say, Jenny, and you're quite right about this, you know, this information does already exist, right? There are dodgy data brokering websites scattered across the internet. That's true. But Grok has made it so much easier to efficiently scrape those databases and cross-reference it with social media profiles and posts and public records and serve it up into a neat little bundle, which really requires remarkably little effort from the user. So the obvious question is, what's xAI, Elon Musk's company which makes Grok, what are they doing about this? Well, what they're not doing is they're not responding to journalists. I don't know if you've ever tried to get a response from Twitter's press office, for instance. What actually happens is you get sent a poop emoji instead.
Lovely.
So I believe you are based out in Right. Lisbon. Is that right? But CoreView, I mean, Yeah, absolutely charming, isn't it? you're really a multinational company, aren't you?
Very on brand, in my opinion.
It is on brand, isn't it? Yes, it's not surprising at all. Maybe that sort of juvenile behavior. But, you know, it's demonstrating that it can happily assist in stalking, harassment, potentially put real people's lives in physical danger. And maybe we shouldn't be surprised because, as you said, Grok has been caught in the past saying it would kill every Jewish person on earth. It would burn down synagogues to save Elon Musk. It's not long after it had its Mecha Hitler meltdown. And at one point, we were seeing lots of advertisers actually turning their back on Twitter. Because they were so concerned about how the social network was going and its AI's bizarre behavior. So Grok is clearly not the most reliable chum for sensible life advice, but this is something which is becoming more and more deeply into our daily lives. And stories like this should be a wake-up call, I think, that stronger safeguards are needed. As I say, ChatGPT, Gemini, Claude, Meta AI, they won't do this. There are some reports that xAI may have cleaned up Grok a little bit to be a bit more resistant to this kind of thing. But really, all of these things should have been done before they're rolled out to the general public.
But you see, there's a few problems with this. I mean, first of all, no, some of the others won't do it. But what I've found is it depends on how you ask.
Right. So obviously, I mean, a lot of organizations these days do use Microsoft 365 Right.
Right.
and many people are living in it all day long. But for those of us who aren't, what's actually at risk if something goes wrong inside that environment?
So I asked an AI, I won't say which one, to write a phishing email in the style of Jenny Radcliffe. Right? And it said, "No, can't do that. That could potentially be used for harm." Which is some sort of dark flattery there. You know, it's too dangerous to be me.
Yeah, not the Jenny Radcliffe phishing email, 'cause it feels like those ones are really hard. And then I thought, "Oh, okay, that's good. That's good." And it does make you think you're sort of speaking to someone, 'cause I nearly wrote, "Oh, well done. You know, you shouldn't do that."
So, every scenario that could happen isn't already programmed in. All our biases are programmed in, and I'll talk about that, you know, in a minute when we speak about one of the stories that I wanted to talk about with you. But also, you know, I had a guy say to me, well, this is why we really need to really look at the tech really carefully and bring a lot of technical people to this to, you know, to put the ethical guidelines in. I think what we need is more philosophers. We need more poets. We need more ethi— you know, people who specialize in ethics. There's probably a word for that, but I know I can't say it.
Ethicist.
See, I can't say it. So, I just try and swerve it. But that's what we need because these are things that it has to be learning those as quickly as it's learning anything else. You know, what tools is it choosing to scrape these answers from? How do you put human guidelines into something that isn't human? It's a very difficult conundrum and it's not one that we're going to be able to solve, I don't think, for every situation. Like every tool, it will be used maliciously. Arguably the only difference or the bigger difference, actually no, one of the biggest differences, 'cause there's lots of differences, but one of the biggest differences from any other tools is the fact that it can collate and do it so quickly.
Yes.
So that you can, you know, you can always use it in this malicious way. I know you do a lot on AI, you have your AI podcast, Graham. I am very often in the camp of it'll kill us all and fairly quickly. I have to say, I find it hard to be optimistic when I see things like this.
I'm kind of hoping it will kill us quickly rather than kill us slowly, to be honest. If there's going to be a big robot uprising, I would much rather it got it over and done with.
I don't think it'll be a big robot uprising. That's the point though. I think it'll be a slow, gradual infiltration of all the norms that we accept. That's cheerful. Merry Christmas.
Yeah, thanks, Jenny. Right, we've got a chance now to thank one of the supporters of this week's podcast, Horizon 3 AI. You can't defend what you don't see, and that's why Horizon 3 AI created NodeZero to continuously test your network the same way real attackers would and built to help you prove your defenses work. Traditional pen tests happen once a year. They're manual, they're expensive, and they're outdated the moment they're done. NodeZero changes that by continuously testing your environment. With over 170,000 pen tests completed, NodeZero doesn't just find vulnerabilities, it proves how they can be exploited safely. From Active Directory tripwires to AI-driven attack paths, you'll see your network the way an adversary does and before they do. Join thousands of organizations who've moved from reactive to continuous security because the best defense is understanding offense. Visit horizon3.ai to get your autonomous pen test demo today. That's horizon3.ai. And thanks to Horizon3 AI for supporting the show. Jenny, what's your story for us this week?
So I want to talk because I've been asked to talk about this quite a lot and I have refused. But I want to talk to you about the Louvre heist. So, as people are aware, on the 19th of October, the Louvre Museum in Paris, which by the way, did you know it was originally built as a fortress?
I didn't know that, no.
Yes, it was meant to be a fortress and was for a while, I believe.
But it makes sense, doesn't it? The Tower of London, right? The Tower of London was originally a prison, wasn't it? They were locking people up there and then they thought, oh, well, if we've got somewhere which is high security, let's also put some jewellery and, you know, all the nation's great pieces of art. Let's put it in with all the criminals. And put all the money there as well. And I believe they had a zoo there too. So you had lions and things at one point. So you've got lions, you've got an armoury, you've got all the art. It makes a lot of sense in some ways, perhaps.
So anyone who's ever heard me do a couple of keynotes that I do often will know that I have stories about the Tower of London, which I'm not going to repeat here and bore everyone to death. But what I will say is getting into the Tower of London is not the problem. It is getting out. And it is still a barracks, and there are still a lot of very, very strong guards, shall we say, with absolutely no sense of humour about people joking. It's kind of like going through security at an airport and joking that there's something dangerous in the bag. It's just something you don't do.
Says the voice of experience from the sound of things. Of course it is.
Anyway, so yes, so obviously there was a commando team went in and they stole some of the French crown jewels. Everybody kind of knows that. It was all over the news and everything else. And I sort of sent you a little article, which I'm sure you put in the show notes, but there's been lots of different takes on this. And I just will say, I was not in the country on October 19th, but I was not in Paris. I was not in Paris, despite people really wanting me to be. But there's been lots of takes on it, and people aren't asking the right questions, and I'm not going to go into it too much. But what was interesting was that what they exploited in terms of social engineering is something that I think is linked to AI rather neatly.
Oh, okay.
They dressed as construction workers. They put cones out in front of the little truck with the ladder that they used to access the window. I love that. And the reason, or one of the reasons that it works so well is because when people see that, I always talk about putting a high-vis vest on and carrying a clipboard and having the right attitude. And it's an authority ploy and it works very well. But in the case of the Louvre, it worked particularly well because A, the building's under construction, and B, Paris is under construction always, right? So people were categorising this as normal, which enabled a lot of this to take place and take place so quickly. So the problem is, is that we're kind of training AI on the same sort of biases as that. That's a bias, you know, and I always say one of the reasons that I get so far as a burglar, as a social engineer, is because I just don't look dangerous. You blend, right? And we're sort of training AI models for the same thing of what's normal and what's not normal, what's dangerous. And what isn't dangerous. And it just kind of struck me something to raise with you, really. It's that kind of social role that can be so dangerous in security because we're putting so much now into AI as a security tool. What we really need to know as social engineers, I guess, and God, I'm saying this and I'm training people as we speak, which I always say I won't do, but all you really need to do at this point to fool it is to say, well, what is it categorising as normal and therefore won't flag? And then you can rob the French crown jewels, apparently.
Yeah. Yeah. Because it wasn't as though they were disguising what they were doing, was it? Like you mentioned, cones around the ladder, because that is what people would do if you were doing a little bit of maintenance on the building or something, you would put cones around.
You've got to be careful, you know.
And there they are quite clearly. I can't remember what they used, but they used some sort of instrument or tool or whatever to—
A circle grinder.
Right, to get into the actual cabinet in order to steal some of these jewels.
And they also used that in a utilitarian way, you might say, to threaten the guards. You know, Graham, people spoke a lot about the failures in security, but they did one thing right, which was they protected the people. Right. The first priority in that museum wasn't the jewels. Jewels are what they are. It was the people. And yeah, I just thought it was quite efficient really. The thing they used for the window and the case, they also used as the weapon to threaten people with. But anyway, I digress.
And they did it in the day. It's not as though they were being cat burglars, because you would expect that kind of construction work or whatever, if someone's doing something to some piece of maintenance or whatever, you would expect that to be happening during the day rather than 3 o'clock in the morning.
There are two views on this.
Right.
One is that if you do it in the middle of the day, it was the quietest time of the museum. It was first thing in the morning on a Sunday. And you can sort of pass for normal. If you do it in the middle of the night, I mean, people said this to me in COVID, they said, well, COVID must have been easy when you were doing physical infiltrations because there was no one there. And I said, no, but I mean, if there's absolutely no one in a building and there is just one person wearing, you know, whatever you're wearing, you are noticed, there is that. But then I also think there was another reason for it to be that early in the morning. And this is a theory that I have, which I'm kind of going to tantalize you with and then not really expand on because I quite like being alive. But you do have to think about a vanity heist. It's a heist where everybody knows exactly what you've stolen. So the real question with this is not what did they steal, but it's what exactly did they steal and who exactly would be interested in that? Anyway, Graham's face, although our listeners can't see, Graham's face just gave me the micro and macro expression of shock and surprise.
Well, I want to know what you know. It sounds like you're aware of who's on the market who might want one of these crowns or—
Well, everyone always assumes that, you know, in any jewel heist, that you're gonna melt it down and sell off the stones separately.
That's what I would've thought.
I don't think this is the case here at all. Think about exactly what it was. Historical significance. Right. Who in this world that we're in, and this is tinfoil hat territory, but I think I have grounds to believe it, Who in this world who doesn't need money would like what they stole? And I'm going to leave it there and let people, do you know what, comment. When Graham posts this on all the channels, comment and I will keep an eye on it. And if any of you are on the same page, I will like and acknowledge.
All right. But don't use any specific names. We don't want to get into any legal trouble. If someone's got that much money, we don't want them taking it out against the podcast.
But anyway, the point I was making. It's the way that we categorize things is so dangerous. It's dangerous, it's always been dangerous in social engineering, and it's dangerous when we're training AI on security because it's categorizing some things as dangerous and some things that are not dangerous.
Fascinating.
Once you know what's not dangerous, then you can fool the AI potentially. Plus, if we train it that a person who looks like this or wears those clothes always is dangerous, then you're gonna get so many false positives that this is gonna end up being self-defeating. And just very quick example, I did a lot of work sort of over a decade ago on airport security, working on microexpressions in human faces, trying to look for what we call the assassin's face, which is premeditated violence, which is a certain expression of anger. And the problem is everyone in an airport's angry. So everyone is pulling variations of that face. Now, it's come on a lot since then, don't get me wrong, but at the time, This was this great technology that could detect an angry person, a person about to commit a violent act. And the hope was, the objective was to identify potential terrorists and security threats. And what we actually identified is almost everyone in an airport is one person or one bag search away from being violent and dangerous, you know?
Or just at check-in, you're asking me for another £65 to bring a suitcase on board.
Or just, is this the first time you've been in an airport? Do you not — why am I always doing it? If I'm in the fast-track lane or whatever, why is there always someone there who goes, "Oh, do I have to take the laptop out? Am I not allowed to bring at least a bottle of body lotion through?" You're the one getting angry. It would've looked at my face.
You're gonna commit a criminal act because of other people not sorting their bags out properly.
Okay, before we go any further, I need to share a quick word with you about one of our sponsors today, Vanta. You know how everyone's got an AI assistant these days? Well, imagine one that doesn't just write haikus about zero-day vulnerabilities, but actually does your audit work for you. That is Vanta. It connects to all of your tools, gathers evidence, tracks compliance, and quietly helps you prove that, yes, you do take security seriously. Vanta automates all of that. It pulls everything together, keeps an eye on your systems, and basically makes sure you're ready for an audit at any time. Which means no last-minute panic for screenshots and policies. It also plugs into the tools you're already using and flags up issues before they become a right old mess. So if that sounds something that might save you from a few sleepless nights, check out vanta.com/smashing. And if you use that link, you'll get $1,000 off. So don't forget, vanta.com/smashing. And thanks to Vanta for sponsoring this week's episode. And welcome back. And you join us at our favourite part of the show, the part of the show that we to call Pick of the Week.
Pick of the Week.
Pick of the Week is the part of the show where everyone chooses something they. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish, but not Lily Allen's new album West End Girls, because Rik Ferguson chose it last week, and I had previously chosen it in another episode. So the rules are now it cannot be the latest album by Lily Allen. Well, my pick of the week this week is not the latest album by Lily Allen. My pick of the week this week is a TV show called Outrageous. This is a drama which has appeared on BBC iPlayer and on BritBox in the United States. It is a 6-part drama following the extraordinary goings-on amongst the aristocratic Mitford sisters in the 1930s. Are you familiar, Jenny, with the Mitford sisters?
Somewhat, Graham. I think they fit right in right now in certain areas of life, but carry on.
Thank you.
But she actually was quite remarkable in as much as she wrote, I'm not sure whether it was a book or whether it was just sort of a meditation called The American Way of Death, which challenged corporate exploitation. She campaigned for things like prison reform, consumer protection, social justice. When I just read quickly that that was your pick, I was like, I wonder if you'll talk about Jessica because in a lot of families in Liverpool, getting back to what we spoke about of sport, sometimes in Liverpool, big Catholic community, there'll be 8 kids, right?
And the dads will support Liverpool, and 7 of the kids will support Liverpool. And then there's always one person in every family who supports Everton, or the other way around, just to be contrarian. And I just want to say that, you know, perhaps Jessica Mitford, who was, you know, socialist... You know, we call every socialist a communist these days.
That is fair. I have to say, compared to some of her sisters, she was my preference to some of them. She actually shared her bedroom with one of her sisters, and as teenagers, they drew a chalk line down the middle. So on one side, one of them literally was posting up swastikas and pictures of Hitler. And on the other side, there were hammers and sickles and portraits of Lenin. The Hitler-obsessed sister, she was called Unity Mitford. And by sheer coincidence, she was conceived in a town in Canada called Swastika, and her middle name was Valkyrie. So maybe, I don't know, there's some nominative determinism, perhaps.
Yeah, there's a lot to unpack there, I feel.
There's a lot to unpack there. Anyway, the thing is, it is an extraordinary story about these extraordinary women. I've really enjoyed it. It's well written, some great acting. And it is all the more entertaining because it's not made up. Although I'm sure there's a little bit of dramatic licence from time to time, fundamentally, it seems to be following the major beats of what happened to these individuals. And so I've enjoyed it. It's called Outrageous, and you can go and check it out on BBC iPlayer and elsewhere. And that is my pick of the week.
Excellent.
Jenny, what's your pick of the week?
So, Gray, my pick of the week is yet more robbery and thievery.
Ah!
Although this one, I'm finding it quite hard to pull any kind of social engineering psychological insight from. I just thought it was just hysterical, really. So this is, New Zealand police are alleging that a 32-year-old man in Auckland went into a shop and saw the most beautiful Fabergé pendant.
Oh, wow.
So it's gorgeous. It's worth about $20,000 US. And it's a limited edition James Bond Octopussy locket. So it's a Fabergé enamel egg that you wear around your neck, little pendant. And when you open it, there's this gorgeous little gold octopus. I love octopuses. But anyway, he allegedly walked into a shop and swallowed this as a form of concealment, which again, if you go back to the Louvre, that would be quite difficult to do with, you know, this huge diadem brooch. But with a little egg, a little Fabergé egg, they're waiting for nature to take its course apparently, and just to prove that he did it. And then I assume the charges will be confirmed. I just thought it's just such a great story of, I think, he's done that on his feet. He's thought of that on his feet, surely. I don't think that it's premeditated. And one of the reasons that I say this is because he's also previously stolen an iPad from the same shop, which is it like Harrods or something where they—
An iPad?
Yes, apparently.
How would you swallow an iPad?
No, he didn't swallow the iPad. All right, Graham, you blate, as we say in Liverpool. No, he just stole an iPad. But he swallowed the Fabergé pendant. Yeah, it says the man was also charged with allegedly stealing an iPad from the same jewellery store.
So I don't know why a jewellery store is selling iPads as well. And the following day stole some cat litter and flea treatment worth $100 from a private address.
I know.
Cat litter?
So, and flea treatment. And it's just when you say with the Mifflin sisters, there's so much to unpack. There's a lot to unpack there. There's a lot going on there, isn't there? So there you got someone who's swallowing a limited edition, priceless, beautiful piece of jewellery, then he's nicking an iPad from the same place, and then he just goes and steals cat litter and flea treatment. And the only thing that I can come up with which is even remotely sensible, and I shall finish on this, Graham, for this section, is that some people just can't help themselves, can they? They just can't. A moment when we talk about social engineering and training people, I say, you cannot take anything, not one thing. We have to be the most honest people in the room. Otherwise, you're that guy.
Absolutely extraordinary. Well, we will put a link in the show notes where people can read more about this chap.
I shall follow his progress with interest.
Like you said, nature will take its course, I imagine.
Terrific. Well, I'm delighted today to be joined by a special guest, another special guest. From CoreView, Senior Director of Product Strategy, Rob Edmondson. Hello, Rob.
Hello, Graham. How you doing?
I'm gorgeous. Thank you for asking.
That's a great response. All right, this is going to be a good session.
We are. Yeah, I mean, I'm in Lisbon. The company was originally founded in Milan, which is a bit of a new thing for tech companies. So yeah, successful Italian startup.
So for anyone who hasn't heard of CoreView before, how do you sum it up?
Well, I think the best way to think about it is your Microsoft environment these days is fundamental to your business operations. If it goes down, everything goes down.
And what CoreView does is it builds extra resilience. Now, you probably heard that phrase before, but there's some really critical things like actually everybody's backing up their data for their Microsoft environments, but no one's actually backing up their configurations, and this environment has so many configurations that, you know, if you have an incident, someone deletes them on purpose or by accident, or someone takes over your tenant, how are you going to restore the security posture that your team has spent so long configuring when the rubber hits the road? So it's really about providing that extra level of resilience so when a catastrophe happens, you can restore your configurations. And then we do a whole bunch of stuff to actually prevent the initial attack as well, which I'd be happy to get into.
Oh gosh. Well, you know, if you were to go back to 2011, it really wouldn't be an issue, right? I mean, at that time it was called Office 365. We were talking about Word, PowerPoint, Excel. You know, these are not things that you think of as existential, but today it's 2025 and you now have Copilot, an AI that's roaming through your environment. You've got Exchange, SharePoint, Teams, Defender, which is 7 different security tools, Intune, Entra, which is the foundation of your identity strategy. What's happened is this environment has become interwoven into the foundation of how our entire organizations run. And so if someone goes in there and changes the configurations in those environments, one thing that might surprise you is actually there is no alerting that's going to tell you that that's happened. And this is one of cybercriminals' favorite attack techniques, is to go in once they've got access, is to tamper with your security settings so that your security posture actually works for them rather than working for you. So because these environments are so critical, changing those settings can actually change the entire security posture of your business. We're not talking about Monday.com or Canva here.
We're talking about the fundamentals of your identity, your security, your devices, and really everything that's keeping your business safe.
Now, a lot of people would assume that Microsoft handles all those security issues by default.
Yes. Yeah. I mean, Microsoft does some wonderful stuff. They have some good techniques and some tools in there. But this is one of these funny things because they're doing so much, like just look at Defender, there's like 7 subcomponents in there. And as long as that's all properly set up, well, you're definitely going to improve your security posture. As long as your Entra is set up correctly, you're going to improve your security posture. But the question is, number one, are those configurations in place? That's a big question that you've got. Actually, no one is able to answer that question right now because there is no visibility and no alerting. The other side of it is actually there's a privilege issue too. You know, in order to set up those environments, in order to manage all of that, you need to give people privileged access into the environment. And one of the things that Microsoft does is it really just gives you tenant-wide access. So if I'm an administrator and I get a privileged account to manage devices in Intune, which is the device management bit of Microsoft, I'm usually going to get tenant-wide control of those devices. Now, what does that mean? Sounds kind of technical, tenant-wide. But it basically means if I'm responsible for the devices in the UK and you've given me access to manage those, well, I'm also going to be able to manage the devices of the team in America and also in Australia and also everywhere else. And what it means is if I go in and mess something up or if I purposely, if I've had a bad day and I'm leaving tomorrow and I want to delete the device compliance profiles of all of your users, I can do it. And that's a huge security issue. It's also a legal issue. You know, we work with organizations who've moved to Microsoft 365 from on-premise Microsoft, and they feel like they've moved backwards because on-premise they're actually able to segment and scope access. And now in the cloud with the advanced version, I'm doing sort of bunny ears quotation marks here on the advanced version, they're finding that they don't have that ability to scope things. So there's all sorts of levels to this. You know, yes, Microsoft gives you tons of tools, but really you need that extra granularity to reduce privilege down. And also to monitor if configuration tampering is happening because these two techniques are prevalent and Microsoft is your most sensitive and most critical environment.
So configurations, they can drift. You can have misconfigurations, you can have overpowered privileged admin accounts. And from the sounds of things, what you're saying is those admin accounts, they can have a big blast radius. You know, if things go wrong, they go really wrong.
Yes, that's exactly right. And you know, some of your listeners may be listening to this thinking, well, goodness, you know, 10 years ago we started our identity security and privileged access stuff and, you know, we've done that and I get that, you know, I worked in that world back then as well and we were working with clients to deploy privileged access. The key issue here is yes, you may be vaulting and managing identities and privileged access, but the funny thing about all of this is we still haven't found a way to actually implement least privilege in Microsoft environments. So you can vault those accounts to try and manage them, but exactly the way you put it, Graham, they still have a huge blast radius. And all it takes is for one of your privileged accounts in your Microsoft tenant to be compromised, and that can lead to total tenant takeover. And you know, I can't name names, but we're frequently going in and meeting with some of the largest organizations in the world who have literally had this happen to them. You know, privileged access has led to the entire tenant environment being taken over, and it's devastating. And it's a real reminder if you have a sensitive environment and you have an account with a huge blast radius, you're really just one step away from your business being at the mercy of a cybercriminal.
You've spoken about traditional privilege management tools a little bit. How is what you are addressing, how's that issue different from what those try and do?
Yeah, good question. So far I'm just ranting and raving about the shortcomings. I'm not actually offering any solutions. So let me help with this. I think, okay, we are fortunate. Okay, so traditional privilege and identity vendors they're trying to do what they're doing across every cloud environment, across every application. And of course, that's what they've got to do. We are lucky because we're focusing exclusively on Microsoft, and this means we get more time to invest in building really strong capabilities. So what we do is CoreView. It basically gives you a, hmm, clue to the name, core view of your Microsoft environment, right? We give you a management layer which makes administrators' lives easier. But the cool thing about this is not only is it easier for them to manage these really sensitive environments, but we can actually segment that interface so we can give them just enough access. So for example, let's say, Graham, you are the brand new intern for our, I don't know, the Italian IT team.
Oh my goodness. Poor them. Poor them. Yeah.
Yeah. Well, here's the good news. Okay, Graham, you might be able to run riot, but I'm actually only gonna give you access to one device to start you off in return journey. So I can scope your access down to one device, to one office, to one time zone, you know, whatever. I could do it on the basis of mailboxes or phone numbers or whatever, right? We give you granular levels of control. So when I delegate access to you, you really truly have least privileged access. Now here's the cool thing. When I do that, I can now deprovision the really powerful high blast radius privileged account that you were using.
Yeah.
So not only is your life easier, 'cause it's easier to use our interface, we give you automation, AI, everything, and it's streamlined, but now we've removed the thing that the cybercriminal was after. And this actually deals with a huge tension that people experience because if I say to people, we're gonna remove huge amounts of privileged access, they think, oh gosh, it's never gonna work. Yeah. Because what you are trying to do is make things more complicated and people won't have access. But the cool thing about CoreView is you can remove privileged access whilst improving productivity, which people often don't expect.
Sounds very interesting. Sounds cool. Now you're talking about Microsoft 365 being meddled with and mucked around during an attack, or maybe accidentally as well. But why is recovering from that such a nightmare? I mean, surely just a backup would solve that, wouldn't it? Just restoring from one of those.
Yeah, this is such an important question. So I think in any other environment you would be absolutely right. Most environments, if something goes wrong, you can just got your data back up and things are going to be okay. But what's happened again, it's about this transition from where we were 15 years ago when it was Office 365 and you had 3 or 4 apps and now you've got 55 different apps and services that have, I think about 10,000 different configuration details that you can play with. And, you know, for a medium to large organization, it's not unusual for them to have hundreds of thousands of unique configurations. Now that's a nightmare, right? How do I monitor those and make sure they're all secure? But here's the real challenge. You know, during an incident, it's very common now for cybercriminals to change configurations, to delete them. A disgruntled employee can delete huge amounts of configurations. We had one person recently call us at 3 in the morning because they'd accidentally deleted a bunch of critical distribution groups. You know, these things just happen. Or even, you know, there's another instance of a highly sensitive organization, no names, but they got kicked out of their tenant by a cybercriminal. They just took over their environment.
Ouch.
Now when this happens, organizations think, well, firstly, you know, what do I do? I guess I move to a new tenant and maybe just deploy my data back into there. But if your configurations aren't in place, there's two problems. Number one, your environment is fundamentally insecure because you haven't done that careful process of configuring your security posture, which can take weeks because you have so many configurations that are involved in this environment. So you have a huge time delay here, and in that time delay, your environment is not secure, meaning that the attacker who just screwed you over can attack you again, and you're in this awful time loop. The other issue is, and this is something that we've learned by going in and speaking to these organizations during crisis time, is actually that without your environment being precisely configured as it was before, your data backup often can't work. And the issue here is actually because data is connected to objects, identities, and other things in the environment. So, you know, if you're trying to deploy your data backup and the users and groups and configuration settings aren't as they were, it might not work. So we're having just so many conversations right now with organizations who are realizing this and they're realizing, oh my gosh, you know, this isn't just a scary story. This is real life. And actually, all of this hard work we've done investing in our business continuity, disaster recovery, you know, it's not going to be much use unless we're also able to restore configurations in Microsoft 365. And I want to be clear, other environments this isn't so important for because they're not as critical, they're not as sensitive, and they have nowhere near as many configurations. The reason people are hearing this for the first time is usually because, well, there's never really been an environment like Microsoft 365.
So if there's a business listening today which wants to do one simple thing to make their Microsoft 365 environment safer, is there something you would suggest to them? Is there something which you regularly see happening?
Hmm.
That's very difficult for me to answer without knowing what's going on for them. But certainly from the themes that we've spoken about today, configuration is really important. I think it's really important to have some sort of record of what your configuration state is. And some sort of ongoing review of where your configurations are. Because if you don't know where they are and what's going on with them, then you don't really know your security posture, and it's a nightmare. But we do work with people who they just have people who do a continual review. So that's absolutely one thing. The other thing I'd say is we've talked about privileged access. Obviously, I'm not going to say reduce the amount of privilege you have. Of course, you're already trying to do that. But also pay attention to Entra applications. You may be doing a great job in terms of reducing the privilege of your human identities, but Entra apps can be created by your team, by different people in your business with huge levels of privilege and can even be accessed from outside of your Microsoft environment by people you don't know. So make sure that in tandem with your privilege strategy, you're looking at Entra apps. And the last thing I'd say is we actually have a free tool we've just created. It's on our website. It's a tenant security scanner. And it doesn't show you everything, but it's going to show you the configurations in your environment that maybe aren't set very well or insecure. It's going to accelerate that process for you. And that's a free download. You can go to CoreView.com and find it in our free tools section.
Well, that is a fantastic resource. And the folks at CoreView have made that tool available for our listeners as a free download. You can go and check it out right now. Go to SmashingSecurity.com/CoreView and it will take you specifically to the page to download it. All that remains is for me to say thank you very much for joining us on the podcast today, Rob. Really great to have you here and look forward to speaking to you again sometime soon.
Absolutely. Thanks, Graham. It was lovely to speak to you and to your listeners, and I hope you have a great day.
Cheers. Well, that just about wraps up the show for this week. Thank you so much, Jenny, for joining us. I really appreciate you giving your time to us today. What is the best way for folks to follow you online, preferably not using Grok to stalk you?
Now, you can find me on Instagram as Real People People Hacker on LinkedIn as myself and refreshing and websites and all sorts of things coming next year. But you can always find me under People Hacker or Jenny Security seems to come up quite often as well.
Fantastic. And of course we are on social media as well. You can find me, Graham Cluley, on LinkedIn or follow Smashing Security on Bluesky. And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Spotify, Pocket Casts, and Apple Podcasts. For episode show notes, sponsorship info, guest lists, and the entire back catalog of around about 447 episodes, check out smashingsecurity.com. Until next time, cheerio, bye-bye.
Bye-bye. Well, then you've been listening to Smashing Security with me, Graham Cluley, and I'm awfully grateful to Jenny Radcliffe for joining us this week and also CoreView's Rob Edmondson as well for sharing his expertise and to this episode's sponsors, Vanta, Horizon 3 AI, and CoreView. And of course, to all of you chums who've signed up for Smashing Security Plus.
Host:
Graham Cluley:
Guest:
Jenny Radcliffe:
Episode links:
- Khashoggi widow files complaint in France alleging Saudi government infected devices with spyware – The Record.
- US Posts $10 Million Bounty for Iranian Hackers – Security Week.
- Infostealer has entered the chat – Kaspersky.
- Dave Portnoy posts a photo of his lawn (including a manatee-shaped mailbox) – Twitter.
- Elon Musk’s Grok AI Is Doxxing Home Addresses of Everyday People – Futurism.
- Elon Musk’s Grok Is Providing Extremely Detailed and Creepy Instructions for Stalking – Futurism.
- How the Louvre thieves exploited human psychology to avoid suspicion – and what it reveals about AI – The Conversation.
- Outrageous (TV series) – Wikipedia.
- Outrageous trailer – YouTube.
- Man charged with theft after allegedly swallowing Fabergé pendant in jewellery store – The Guardian.
- Free Microsoft 365 Tenant Security Scanner – CoreView.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- Horizon3.ai – Get an autonomous pentest demo and see your network the way attackers do. Visit Horizon3.ai.
- CoreView – Benchmark your Microsoft 365 tenant security against the Center for Internet Security (CIS) controls.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Join Smashing Security PLUS for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.