
Think your Kindle is harmless? Think again! In this episode, we unpack a Black Hat Europe talk revealing how a boobytrapped audiobook could exploit the Amazon eBook reader – potentially letting an attacker break into your account and seize control of your credit card.
Plus a blast from 2021’s “summer of ransomware” returns to haunt Ireland’s Health Service Executive, as victims are offered €750 each.
And because it’s the last show before the Christmas break, there’s also a Pick of the Week that veers from cosy rom-com comfort to pointy-polygon nostalgia.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast with computer security veteran Graham Cluley, joined this week by special guest Danny Palmer.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
No, doing my writing and reporting on various cybersecurity issues for various publications, going to events, that sort of thing.
I went to Black Hat Europe last week, which was lots of fun. Really interesting there. Lots of talks going on, good catch-up with lots of people. Yeah, it was a good time.
I hadn't been to Black Hat Europe for a couple of years. It was really good.
But if you're just there for the talks, it's all the same things really. It's good.
And it's also at the time of year as well, where there's a lot of reflection on what's happened in the last year or so. Lots of interesting keynotes. But yeah, really good.
This week on Smashing Security, we're not going to be talking about how password manager LastPass has been fined £1.2 million by UK regulators for a data breach that impacted 1.6 million Brits.
You'll hear no discussion of how the Trump administration is reportedly preparing to turn to private businesses to help mount offensive cyberattacks against foreign adversaries.
And we won't even mention how Russians took to the streets for a rare protest that Roblox had been banned. So Danny, what are you going to be talking about this week?
Okay, before we go any further, I need to share a quick word with you about one of our sponsors today, Vanta. You know how everyone's got an AI assistant these days?
Well, imagine one that doesn't just write haikus about zero-day vulnerabilities, but actually does your audit work for you. That is Vanta.
It connects to all of your tools, gathers evidence, tracks compliance, and quietly helps you prove that yes, you do take security seriously. Vanta automates all of that.
It pulls everything together, keeps an eye on your systems, and basically makes sure you're ready for an audit at any time, which means no last-minute panic for screenshots and policies.
It also plugs into the tools you're already using and flags up issues before they become a right old mess.
So if that sounds like something that might save you from a few sleepless nights, check out vanta.com/smashing. And if you use that link, you'll get $1,000 off.
So don't forget, vanta.com/smashing. And thanks to Vanta for sponsoring this week's episode. On with the show. So Danny, do you have any gadgets? In the bedroom?
I mean, I know you're a bit of a Doctor Who fan and you may have got your sonic screwdriver out and jumped aboard the time rotor or things like that.
If I wake up in the middle of the night and can't sleep, I don't know about you, but I don't like to look at my phone too much in the middle of the night because, you know, that's just a way towards misery and just doom-scrolling for hours and hours.
So it's not a recipe for a good night's sleep, but I'm very happy slipping some earphones in, listening to a podcast.
By the way, if you're listening to Smashing Security and you want to help us out, please do listen to our back archive of 447 episodes.
Actually, you don't have to listen to them at all. Just play them while you sleep. It really helps out. But anyway, yeah, you can listen to podcasts while you sleep.
I'm also happy to reach for my Kobo e-book reader to read an e-book, because that won't disturb my wife. It's not like I have to turn the light on.
And it's guaranteed to have me nodding off in no time at all.
Now, of course, Kindles are the most famous and probably the most successful e-book readers.
And I prefer a Kobo though, because I just don't want to be locked into Amazon and I don't fancy giving Geoff Bezos any more money.
They sit on your bedside table, they're connected to the internet, their battery life on these e-book readers, it lasts for weeks and weeks because of the e-ink display, so it's not sapping lots of energy that way.
Just one touch on the screen, you can practically download any book that's ever been written and be reading it within seconds.
I mean, it's amazing the technology and how that works in that way. So these are computing devices. They're in our homes. They are part of the Internet of Things.
But I think most people tend to forget about them as a potential threat because you're too distracted by your computers, your laptops, your smartphones, and all those sort of things.
You might be extending your concern to your internet-enabled doorbell or your routers and other things which you may have inside your home.
But for many people, I think they forget about things like e-book readers and that may be a big mistake because a security researcher with the incredibly glamorous and exciting name of Valentino Ricotta has just revealed to the world how your Amazon Kindle e-reader could be a threat.
He is a reverse engineer at Thales, which is the French defense giant.
Did you see it?
That's half the battle at these conferences is having an interesting name, preferably of a pun, to get people coming to see it.
Once people have bought it though, based upon the name and the cover, they're kind of a captive audience.
And similarly with security talks, the number of security talks which I've been lured to with the, oh, that sounds juicy.
And then you get there and you go, oh my goodness, you know, you're putting a fork in your eyeball trying to keep yourself awake as they're reading off a screen.
There's always a talk I go to, it's like I can tell there's something really interesting going on here, but it's super, super technical because I don't know some obscure type of how to code.
It just goes over my head. Well, there's a story in here, but yeah, can't figure out what it is.
I think it's incumbent upon the security researchers to not just be really, really clever at the technical stuff. They have to be good communicators as well.
If you really understand a subject, I feel that you should be able to explain it to your auntie or to a 14-year-old.
A long time ago when I was in journalism school, yeah, we were told with a story, how do you explain this story to your mates down the pub, basically, which is a— they basically informed a lot of my reporting over the years.
Pubs in one way or another as well.
He's thinking about the amazing things it can do. He says, you can even buy books from the store with my credit card in a single click. Oh, I've mentioned credit cards.
And of course, if you compromise the device, you've pretty much got control over someone's wallet if you manage to gain access to their credit card details.
So what fascinated Ricotta was how the Kindle would actually work in the background, what its gubbins were doing behind the scenes.
And whenever a book or an audiobook appears on an Amazon Kindle, there is a process, a system process, which is running in the background, automatically scans the file to extract the metadata like the title of the book or audiobook.
I find it quite amusing that Facebook renamed themselves Meta, of course, because they've been collecting metadata about billions of people around the planet for years and years and haven't all done that good a job at securing it or not exploiting it in various fashions.
Again, you know, the clue is there right in the name, isn't it? Anyway, the Kindle supports lots of formats.
It supports ebooks, it supports PDFs, it supports images, it supports Audible audiobooks.
And it was in the audiobook format where Ricotta found a problem in the way in which the Kindle parsed that data.
But the code running on the ebook reader is the same. It's all there and it's analyzing these files.
So even those Kindles which can't play audiobooks, they still scan audiobook files to extract the metadata.
And the Audible audiobook file format is kind of a complex multimedia format.
It's sort of a bit like an MP4 video, although there's not a video component, there is an audio component. And there's this metadata as well.
And as this chap, Ricotta, explained, that makes it a wonderfully rich target for security researchers because Kindle's extractor burrows quite deeply into that data and parsing that data in order to try and work out what is what.
And when he took a look at Amazon's custom code for parsing Audible audiobooks, he found what he described as an obvious textbook heap overflow.
Well, what it means is that Amazon's code miscalculated how much memory it would require to handle the audiobook data.
And so if someone were to carefully craft values inside a booby-trapped audiobook data file, the Kindle can be tricked into reading the data, shoving it into memory, but it hasn't got enough room for it all.
And so it overwrites other code running on the Kindle device itself.
And that kind of flaw can be used for code execution, meaning an attacker could make your Kindle run somebody else's code.
Sometimes there've been so many over the years exploits of images which have been sent via messaging services to smartphones where the image handler on your iPhone or on your Android device screws up in its handling of that data file, overwrites some memory.
May have a buffer overflow or something like that, and then code will execute on the device and potentially be nasty. So not a good thing.
Now, this particular exploit, which Valentino Ricotta discovered, it wasn't perfectly reliable, but he said, well, it didn't actually matter very much because if the Kindle actually crashed sometimes, the way in which the Kindle is made is if it crashes, it just automatically restarts itself.
And he says that because Kindles often stay powered on for days or weeks at a time, it can be a problem.
So he did a live demo at Black Hat Europe in London, and he managed to log into a victim's Amazon account from his own browser without knowing the password because he was able to use this technique to steal their Amazon session cookies, which are the tokens that keep you logged into a site, so you don't have to perpetually keep on re-logging back in.
It remembers you are allowed to be there. And that's what he needed to do. And then through a second vulnerability, he was able to ultimately gain complete control of the device.
Now, fortunately, Ricotta is not a bad egg. Mm. He's actually a good cheese. Sorry. He reported the problem to Amazon, which took it seriously enough, they coughed up $20,000 bounty.
Very nice work, I have to say. How lovely is that?
Geoff Bezos, for instance.
Ricotta for his hard work finding this vulnerability. But there's some other interesting sides to this.
One is that, of course, how would a malicious attacker, a hacker, get this attack onto your Kindle?
Are they gonna creep in like a ninja in the dead of night and install it onto your Kindle? No, they're not. But what they could do is, of course, they could publish an audiobook.
And Amazon allows self-publishing. So anybody can publish something up on Amazon. You gotta jump through a few hoops and upload a PDF for a book or something like that.
You know, similar process, I imagine, for an audiobook as well. And Ricotta points out that a malicious book could theoretically be delivered through that entirely normal channel.
So if I were to release, I don't know, an audiobook of Smashing Security, top of cybersecurity gifts to give someone this Yuletide, which I'm sure would be a big seller.
They're just downloading something to their Kindle, which looks entirely legitimate through the official Amazon store.
I think there was something a while back about a book about how to cook wild mushrooms and this AI-generated book.
It's connected to the internet, has access to sensitive information, has access obviously to your payment details.
And yet, as I said, something I think many people have just thought of it as a gadget rather than potentially a security threat as well.
People aren't really considering how you are still accessing the entire internet through that little device in the palm of your hand.
They start with something much simpler, like a misconfigured setting, an exposed service, or a security policy that quickly drifted out of line.
And in large, complex IT environments, those misconfigurations are everywhere and almost impossible to track manually.
And that's why ThreatLocker built Defense Against Configurations, or DAC. ThreatLocker DAC gives you a real-time view of configuration weaknesses across your entire environment.
It runs deep checks across every endpoint, not just your ThreatLocker policies, but your operating systems and application settings too.
All of it appears in one clean dashboard showing what's misconfigured, how risky it is, and exactly how to fix it. So no more discovering problems after the attackers do.
With DAC, you see configuration drift as it happens. You can also check alignment with major security frameworks and see which endpoints don't make the grade.
If you want to stop firefighting, harden your environment, and catch hidden risks before they turn into breaches, you need DAC.
Try it for free for 30 days at ThreatLocker.com and find out what's misconfigured before it costs you. Danny, what are you going to talk to us about this week?
We had the big attack on the American meat processor. So it was sort of the first, for want of a better phrase, big summer of ransomware.
But to sum up, in May 2021, the Irish healthcare service was hit by the Conti ransomware gang and the attack caused significant disruption, which lasted 4 weeks.
And to reiterate, this is against a national healthcare service of Ireland. So it's used by a population of, I think it's 4 million people, the Irish population.
So it's not an insignificant organization. It's obviously a state-backed entity as well, so it's part of the national infrastructure.
You don't want it getting hit by a ransomware gang and the disruption and the very real impact that can have on people's lives.
That caused a massive issue almost 10 years ago now, and it's a good thing we've all learned how to deal with ransomware since then.
Anyway, so it was reported at the time that the ransomware gang initially asked for $20 million, the amount of money a state-backed service has just lying around, obviously.
It doesn't. But it seemed once they realized they hit a national healthcare service, the attackers had a change of heart and provided the decryption key for free.
What good sports, I suppose.
But anyway, despite all this, it didn't work properly, and hospitals and doctor surgeries across Ireland suffered ongoing issues for weeks, even months at the time.
Now, I was reporting on this, and I kept going back every few weeks to check in on how it was going on.
Appointments were canceled, services like blood tests and diagnostics were suffering from delays.
And this being the spring and summer of 2021, this is when the vaccine programs for COVID-19 were in full force.
Attacking a hospital's services during a global pandemic may have been seen as a step too far in this case. But yeah, it was a long-term issue.
Services weren't fully restored until much later in the year.
And then in the next year, 2022, it was reported that the total cost of the incident amounted to over $100 million just because of the restoration and the things that happened, systems being replaced.
Yeah.
And in all of this as well, over 90,000 people had their data accessed as part of the attack, which we're all very sensitive about our personal data, but obviously some of our healthcare data might be our most sensitive data you don't want being accessed and potentially shoved out there on the dark or open web.
So four and a half years on though from this attack, that data breach is still seemingly costing the Irish Healthcare Service money because this week it was reported that the Irish healthcare executive has offered victims who had their personal data stolen in this attack €750 each.
And while that doesn't sound like loads of money, times that by a few thousand, even if it's just a few thousand take this up, that can add up and get expensive.
You know, there have been a couple of times when I've found that I'm on a list or something, but there have been a couple of times when I have ended up ultimately getting an email or something saying, "We would like to compensate you." And I say, "Oh, yes, please." And it turns out that you're being given about £1.70.
It doesn't really make up for having your personal information breached, obviously.
And all the potential for inconvenience and the harm which could have been caused by that, or indeed identity theft and other problems like that.
And certainly I would consider those kinds of things to be worth more than €750. But I have to say, it feels better than the average.
You don't want some random cybercriminal with a picture of an X-ray of your ribs or that sort of thing. I did some research earlier this year about exactly this sort of thing.
Cybercriminals, you know, stealing medical data.
Who knows what they really wanted to do with it, but you know, they're sitting there with brain scans and X-rays and that sort of thing.
And I suppose there's the blackmail element, I suppose, in some cases. But as we know in this day and age, if it's data, it's valuable to someone in some way.
And that's the thing with breaches. Once the data is out there, it's out there permanently.
You can't sort of put that genie back in the bottle, which is a big shame, especially when breaches seem to keep happening.
So they've already started some kind of legal process or some sort of demand already for compensation.
So it isn't necessarily going to be the case that across the board everyone is going to get €750.
The Conti ransomware group has not existed for several years now, at least not in the current incarnation.
As we know, ransomware gangs, they're quite fluid and they all sort of flow into being one and the other.
Unfortunately, this isn't even the end of this tale because according to recent media reports in Ireland, the HSE was hit by another ransomware attack earlier this year.
This was also due to an attack against a third-party supplier rather than the sort of network itself.
It didn't have the massive impact on appointments and delays of things that last one happened. But it just goes to show that ransomware is still such a huge impactful threat.
And we look at all the things that happened this year, even here in the UK, M&S, Co-op, Jaguar Land Rover, which that latter one has had an impact on the UK economy.
I remember when I first started back at ZDNet in 2016, one of my first stories I reported on was a ransomware attack against a local council in the north of England.
Now, I called them up to ask them what was going on.
They graciously actually told me what was going on, which is actually very rare when you're trying to call up an organization hit by ransomware.
But I remember, I think it was something Locky ransomware, sort of an old school one that. And they wanted the grand total ransom demand of £500.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security related necessarily. Well, my pick this week is not security related.
Earlier this week, we saw the horrific news break that legendary film director Rob Reiner had been killed alongside his wife at his home in Los Angeles, and it's utterly ghastly news.
The director of some fantastic movies like The Princess Bride and Stand By Me and A Few Good Men and Misery.
I know that Reiner's movies meant a lot to many people, and the news of his death will have shaken some people a fair bit.
And so I wanted to, especially as this is our last episode before the Christmas break— don't worry, folks, we will be back in the new year— I wanted to leave you with something beautiful as a Pick of the Week.
So my Pick of the Week this week is a movie from 1989 that Rob Reiner directed. It's clever. It's still genuinely funny decades later.
And on the surface, it's a rom-com about two people who keep bumping into each other over the years.
But under the surface, it's a really rather lovely study of friendship and the many ways humans manage to overthink each other.
It is, of course, When Harry Met Sally, but maybe you haven't seen it for a while, and maybe it's one to watch this Christmas. Danny, have you ever watched When Harry Met Sally?
In my defense, I was 5 years old when it came out, so it probably wasn't part of the audience.
And it's a romantic movie, but it doesn't get covered in schmaltz. So it's the right kind of romance. It's warm, it's witty, it's smart. And that's what Rob Reiner was too.
So that is my pick of the week. Go on, go and give it a watch. Danny, what's your pick of the week?
And I've been playing a video game that came out technically last year, technically 30 years ago.
I've been playing the remaster of Tomb Raider, the original Tomb Raider from the 1990s.
Now, it's a massive nostalgia fix for me because when I saved up my pocket money to get a PlayStation, it would have been 2 or 3 years after it came out.
So this would have been some point in the late '90s. The original Tomb Raider was already an old, in inverted commas, game then.
And yeah, it was obviously just the introduction to 3D gaming, I suppose. Before that, it had been sort of Sega Mega Drive, Master System, 2D platformers, that sort of thing.
And it's just been really interesting and fun going back.
And also, the thing as well, where I never finished it back in the day because there was some sort of issue with, I think, my disc or the game itself, where there was a bit where you went between two levels and it just faded to black.
And it turned out this wasn't part of the game. This was some sort of issue with it. Yeah, it's been really interesting.
So they've updated these infamous graphics, have they?
You look at the lions and stuff you fight, and they're basically triangles with legs and that sort of thing.
But what's the cool bit about it as well is that you can push a button on the controller and just switch between the modern graphics and the old graphics.
I found sometimes it's easier to do things with the old graphics because the new graphics, the lighting's a bit more realistic, so sometimes it's too dark to see things.
Unfortunately, seen Lara fall to her death multiple times. I'm not sure how I did this when I was 12 years old, because it's really hard.
And also, yeah, try not to think too hard about how I'm playing a game I first played 30 years ago. But you know, it is what it is.
We will be back in January. So remain subscribed and we'll have plenty of fun episodes during 2026. And thank you, Danny, for joining us today.
I'm sure lots of our listeners would love to find out what you're up to and follow you online. What's the best way for them to do that?
But there's also my website as well, which I now realise I haven't actually updated for a little while. So probably, that's probably a task for me over Christmas.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of 448 episodes, check out smashingsecurity.com. So until next year, cheerio, bye-bye, goodbye.
You've been listening to Smashing Security with me, Graham Cluley.
Thanks so much to Danny Palmer for joining us this week, and of course to this week's sponsors ThreatLocker and Vanta, and to all of those chums out there who've signed up for Smashing Security Plus.
They include John Morris, Jack Underfurth, Roy Tate, Dan H, Marvin71, Alexander Huguhuis, David Ellefson, Ars Leo, Elbow, Mark Luxton, Richard Van Liesum, Jason B, Alvin, Robert Martin, John W, Steve Lupton, and Bravo Whiskey, amongst others.
Now, do you ever listen to this little bit at the end and think, oh, I wish my name were up there? Well, all you have to do is join Smashing Security Plus.
For the cost of a cup of coffee once a month, you can become part of our merry little troupe and get early access to episodes without the annoying ads.
Just head over to smashingsecurity.com/plus for all of the details.
Now, I realize it's Christmas, money might be tight, and you've probably got better things to spend your money on, to be perfectly frank.
In which case, don't worry about becoming a member of Smashing Security Plus.
Instead, you can do me another favor which is you could leave a lovely review up on Apple Podcasts or somewhere like that, or you could just tell some of your friends about Smashing Security.
We will be back in the new year with more episodes and more fabulous guests. I hope you will tune in. Have a lovely Christmas. Enjoy your new year. Look after yourself and each other.
Stay safe. Wrap up warm unless you're somewhere that's already hot, in which case open the fridge door. And enjoy the cool. Whatever it is, let's hope that 2026 is a good one.
All right, cheerio then. Bye-bye.
Host:
Graham Cluley:
Guest:
Danny Palmer:
Episode links:
- Password manager provider fined £1.2m by ICO for data breach affecting up to 1.6 million people in the UK – ICO.
- Trump Administration Turning to Private Firms in Cyber Offensive – Bloomberg.
- Russian ban on Roblox gaming platform sparks rare protest – Reuters.
- Once upon an exploit: how fake audiobook led to Kindle takeover – Cybernews.
- Four years later, Irish health service offers €750 to victims of ransomware attack – Bitdefender.
- When Harry Met Sally – Wikipedia.
- When Harry Met Sally trailer – YouTube.
- Tomb Raider 1-3 Remastered review – you were never going to smooth these games out – Eurogamer.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsors:
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- ThreatLocker – Start your free trial and book a demo of ThreatLocker today to see how you can implement Zero Trust in your environment.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Join Smashing Security PLUS for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

