
Scammers show a lack of imagination after hacking a funeral home, more websites are secretly stealing visitors’ resources to mine for cryptocurrency, and everyone is very confused about the USA’s airline laptop ban.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by The Register‘s John Leyden.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
I don't want to point any fingers or name any names, but unfortunately on this particular episode, one of us has quite poor sound quality, and basically without dropping anybody in it or anything, we've all agreed that next time any of us go to Canada, we will take the proper microphone with us to avoid this happening again.
Anyway, I think the episode still sounds great, lots of good content here, so enjoy the show.
NetSparker is a web application security scanner that can automatically find security flaws in your website and fix them before hackers can exploit them.
If you want to automatically check your web applications for cross-site scripting, SQL injection, and other vulnerabilities, as well as coding errors that can leave you and your business exposed to malicious hacker attacks, you need NetSparker.
Try it now by downloading a demo at netsparker.com/smashing. That's netsparker.com/smashing.
Sign up right now at smashingsecurity.com/intersect. That's E-N-T-E-R-S-E-K-T.
Smashing Security, Episode 49: Hacking Funeral Homes, Cryptomining Websites, and Careful with That Hairspray, with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to Episode 49 of Smashing Security for the 26th of October, 2017.
My name is Graham Cluley, and I'm joined as always by my good chum and co-host, Carole Theriault. Hello, Carole!
And I'm gonna start this week with a story which comes from West Monroe, Louisiana. Where the Griffin Funeral Home has suffered at the hands of hackers.
Because a bunch of hackers broke into the funeral home's email account and began, what?
No, what's happening is that the hackers have been taking over the email system of the Griffin Funeral Home and sending out scams from the organisation.
What was happening was an email was being sent from the owner of the funeral home, Ms. Glenda Griffin, asking for a favour, and it would say, "Good day. How are you today?
Hope my email finds you well. Please, I would like to ask you a favor, so would appreciate if you would confirm that you received this.
Await your response." Not very normal kind of English, is it? Particularly one that would be sent to people who use the services of a funeral home.
And of course, the second message claiming to come from Glenda—
What can we do for you?" "Yeah, you know, we've run out of bodies to offer you, you know, we've done that." "No one's died this week, so—" "Yeah, we'll be in touch if we need your services, surely.
But anyway, what favor can we offer you?" Anyway, was a message claiming that Glenda was in Ukraine with one of her cousins who needed $2,450 to pay for his prostate surgery.
Because that's more—if they pull on the heartstrings, maybe it will lead to the purse strings. And then they'll begin to get some money out of you.
So they tell you a bit of a sob story. Oh, my cousin is sick. He's got prostate cancer. He's been undergoing treatment.
But, you know, maybe you could send us some money and we'll pay you back as soon as we get back home. And of course, this is a scam, right?
There's no one with prostate cancer, you know, in Ukraine waiting for this money. You know, the only people who are prostrate are the people in the coffins, probably.
But what I'm actually most disappointed by is the scammers who I think are failing to take proper advantage of the situation.
I mean, why aren't scammers being a bit smarter about their scams? If they break into a funeral parlor, for instance, why don't they send you a scam related to the funeral parlor?
Wouldn't that be more smart to do that? They could see whose body they were currently processing on the production line, and send a message related to that.
They could say that they found a gold watch or some money in the pocket, or halfway through embalming the body and they found the deeds to a Nigerian diamond mine worth $154 million.
So this is just a blanket spam message. Presumably they've infected her computer to do this.
So, you know, that's the first mistake which happened. But, you know, I just think the scammers are sort of letting the side down a bit. They're just sending regular scams, right?
And people are instantly going to think, well, why is a funeral parlor sending me this? Why are they saying, sorry for not burying your granny, but I'm stuck in Azerbaijan.
It's not really going to fly, is it? Well, you know what?
Maybe you should give them lessons on how to improve it to make our lives much, much more difficult.
And then maybe you won't be— maybe you won't be simply exploiting the vulnerable and the elderly. Maybe there are other people who you can scam instead.
I just think it's a bit pathetic just sending out the same old scam regardless of what email address you've actually broken into.
About 100, you know, and you can use this as a blanket one for any email account you compromise.
And so they kept on being kicked out. Oh, that's a little bit clever.
And I watched a news report about the case, and initially I was baffled because they showed, you know, the staff members crouched around a Gmail inbox.
But then an employee said, "Oh, we've been in touch with Yahoo, but Yahoo haven't really helped." And I was just like, "Well, maybe you rang the wrong guys, people." But it turns out that they've now created an alternative email account for the company on Gmail because they can't use their Yahoo anymore, and they're hoping people will believe their Gmail account is trustworthy rather than the Yahoo one, which they've been talking to people from in the past.
I imagine that Yahoo account is probably going to become something of a dead letterbox.
I've read studies where people say that the scenario presented in these scam messages is deliberately made implausible in order to suck in the more credulous.
It kind of goes against common sense, but that's— if you understand the scam, what they're trying to do is get people on the line who want to believe very improbable things, and scammers will be wasting their time if they end up dealing with people who double-check things.
So the idea is you target people who believe incredulous things because they're more likely to go through the entire process, ultimately giving you $100,000 or something like that.
I mean, once people have paid some money in, then they're much more likely to pay more money in because they're worried about losing the small amount that they've lost.
They get sucked in.
Because people might be more likely— I mean, I don't know how many people have that kind of money lying around willy-nilly.
So here's— well, yeah, maybe you shouldn't be on Yahoo, but protect your email accounts with a strong, unique password. Enable multifactor authentication.
Be careful when choosing your answers to security questions. Don't make them things which are easy to Google and find the answers out that way.
Make sure your emails aren't secretly being forwarded elsewhere or other suspicious apps haven't been granted access to your account, because sometimes even after you change the password, you may find a third party can still access them if they've previously doxxed it in that fashion.
And maybe listen to our previous podcast. Number 14, all about protecting webmail, where we talk about this in depth.
Really good strong advice in there about how to defend your webmail accounts.
Look out for people who are maybe more vulnerable in your family who might be at risk of falling for scams like this, and hopefully they won't end up out of pocket.
What we don't know is whether anyone actually fell for this.
All we know is that the funeral home hasn't been able to regain control of its email account, so it doesn't know who actually is getting back in touch with these scammers and who potentially might be at risk of giving them money as well.
I think they've been slightly creative.
Oh, let's do a CEO fraud scheme. Let's pretend to be a supplier who needs urgent payment. And let's pretend to be the CEO who wants someone in accounts to transfer that payment.
So that's the typical scenario. And then someone says, oh, here, I've got a funeral home.
I mean, chief executive of a funeral home probably doesn't have an accountant who we could send an email to and try and con them to send money to. Let's do something else entirely.
So in actual fact, this might be quite creative. This might be a kind of coffee break project that someone jumped up in over the water cooler in Lagos somewhere.
Which is the odd one out of these four? Okay.
The Pirate Bay, Pulitzer-winning political fact-checking site PolitiFact, UpToBox, which is a Dropbox clone, and the official website of Real Madrid footballer Cristiano Ronaldo.
What they all have in common was they were all running crypto mining code on their sites.
The odd one out was PolitiFact, because PolitiFact was not deliberately running crypto mining software. Okay, and the other ones were deliberately running this.
Pirate Bay and Uptobox admitted running code on their websites as an experiment, an experiment that since has been abandoned.
I think we need to explain to people— I mean, I'm sure many people listening to the podcast are aware of what crypto mining web pages are, but can you just explain what that actually is and why people may not want that?
What it involves is running software that works through a complicated mathematical process to derive code which then has a value.
And you may be entirely unaware that this is happening. Apart from— that was like PolitiFact.
And this is happening.
In the case of PolitiFact, it was spawning 8, at least, instances of JavaScript running this program to generate a cryptocurrency, not bitcoin, one called Monero, which is the same idea but a different currency.
Exactly. There's this impact on the visitors to the website. Have they asked your permission?
Are you happy with them using up your resources in order to put a few pennies into their pocket?
Now, the main program that's being used in this respect is something called CoinHive, and the technology is there as a means for websites, as Graham said, to earn an income without running ads.
Now, that's why Pirate Bay and Uptobox ran the code as an experiment.
Now it's saying that it's released a version of its software called AuthedMine, which has a user consent page.
Now, but I don't think that's going to solve the problem, and I can explain why briefly.
As well as Coinhive, there have been 3 or 4 different variants of this software that have come up. And this is a way for unscrupulous people or anyone to make money.
How prevalent is this technology? It's actually becoming more prevalent.
AdGuard found 220 websites, mostly smut websites, torrent trackers, the kind of slightly shady, illicit end of the internet, were silently launching this technology and mining cryptocurrency.
The technology to mine it is out there. And now Coinhive are saying, we're going to put in consent, but I don't think it stops problem.
I think different versions will come about that allow people to run JavaScript code that generates cryptocurrency.
Someone who can put that code on a website can direct that code to raise funds, essentially, to a wallet of their choice.
So that's the technology, and it can be used for good or ill. How much money are these guys making from doing this? Because we have some kind of answer to that as well.
From the AdGuard study, Sophos found that 220 websites were mining this, and it looked at all the instances of Coinhive on the internet, and it tried to work out how much money was being made based on the value of Monero, which is the main currency generated through this.
And it found that these guys were making $43,000 as of October 10th based on the average time people spent on websites. The last 10 days.
It feels to me a bit like these things are, they're akin to potentially unwanted applications.
They are akin to potentially unwanted applications, and that's why the ad blocking people and security software vendors such as Malwarebytes are giving people the choice to block this technology.
So could sites come up with a different alternative involving micropayments or something like this, short of having a paywall to pay for their work and the cost of running the site?
Now, cryptocurrency really does offer some kind of potential there, but I agree with you, they only should be used with consent.
And the problem here is that it isn't used with consent.
This sort of thing will become more commonplace, at least in terms of people who don't care about the performance of the website or aren't bothered that people are having a bad time visiting websites.
Paywalls aren't working. Paywalls don't really work. This sort of thing is abusing people. People's trust and it is just stealing too many resources.
I wonder if someone, and maybe it would be a browser developer, could say, okay, we're going to help monetize the web for those sites which want monetizing.
We'll build some sort of crypto mining into our browser where it would work with an API with particular websites.
It would do it in a sort of responsible way where you could determine how much percentage of your CPU or resources you were prepared to give and make that a small number so there's not a significant impact on your resources.
And that would then give a little bit of money back to the websites.
I wonder if it needs someone to sort of be there as the sort of the person on the totem pole to say, this is how we're going to do it.
And then everyone could jump onto that model rather than everyone building their own code to do this and then abusing people's permission. I don't know. It's just an idea.
So you may remember earlier this year the Trump administration were forcing passengers that were flying from certain countries such as Cairo, Kuwait City, and Dubai to put large devices like laptops, cameras, and tablets into checked luggage.
To quote the Department of Homeland Security, we have reason to be concerned about attempts by terrorist groups to circumvent aviation security, and terrorist groups continue to target aviation interests.
So 56 routes were affected by this. Now, this rule was imposed to counter the potential threat that larger devices could be harboring explosives.
So this was all back in March, right?
So a few months later, in May, American security officials met with European counterparts to discuss the expansion of this ban to European airports.
And that would be around 400 nonstop flights leave Europe for the United States daily. So this would affect about 100,000 travelers every single day.
I mean, not just that you wouldn't be able to work during your transatlantic flight, but all those kids who wouldn't be able to have iPads. Oh no. And they'd go feral. Horrifying.
And if I don't want to work, I want to watch a movie or something of my choice, and that normally means I need to have my device there. But no one wants to die in a plane explosion.
I certainly don't. But this is the weird part. For years, aviation community has been warning about the dangers of lithium-ion batteries in cargo hold.
Now, the reason for this— large collection of lithium-ion batteries, okay, this is the stuff that powers all these devices that we use— can result in intense fires and the release of explosive gases.
Explosive gases, people.
So two years ago, the Federal Aviation Administration convinced the Civil Aviation Organization to ban cargo shipments of lithium-ion batteries on passenger planes and to require that the batteries shipped on cargo planes be charged to no more than 30%.
Now, I didn't know this at all. Apparently the risk of a battery overheating is much lower if the battery isn't fully charged, which is interesting.
And the other thing is that sometimes when you go through airport security, they want you to turn on the device and it's like, well, tough luck if the battery's run out, isn't it?
Yeah, exactly. So you're sort of gambling even more now, aren't you?
That would take a lot of time, wouldn't it? Yeah.
So, so basically, let's— so to recap here, we've got the Trump administration that was basically trying to— were talking to Europe about saying, hey, maybe all big devices should go in cargo.
And then we've got the FAA on the other side saying, whoa, if we do that, there's a big problem with explosions and intense fires.
So just this week, the FAA have been recommending that the UN agency— this is the agency responsible for setting global aviation standards— actually prohibit passengers from putting laptops and other large personal devices into their checked baggage.
Oh, so we've got contrary advice here. What's interesting is the FAA have kind of been saying this for years now.
They finally come up with some tests to actually show what they mean about this. And this is where it got all very interesting and I decided to cover the story.
So they've done 10 tests of fully charged laptops packed in suitcases. In one of the tests, they use an 8-ounce aerosol can of dry shampoo.
Okay, now this is a product that— I don't know if people don't want to wash their hair, they spray it on and it looks clean, I guess. And this is permitted.
This is an aerosol can, which is permitted in checked baggage. And it was strapped to the laptop.
A heater was placed against the laptop's battery to force it into a thermal runaway, a condition in which the battery's temperature continually rises.
There was a fire almost immediately and an explosion within 40 seconds with enough force to potentially disable the fire suppression system. Oh crikey, that's scary stuff, right?
And here we had the Trump administration saying, hey, no, we want all laptops down there.
So my question is probably the same as yours: why aren't we banning aerosols and all these dangerous products that we can actually have something useful like a laptop?
Now, I am not someone who ever likes to put these devices into cargo.
This is something that, you know, because I like to work on the plane, and I also, I've lost so many bags in my life or had them rerouted. I want to keep my devices with me.
But there are some people that like to have it, you know, maybe they're carrying more than one laptop and they don't want to have to carry that on their shoulders.
Maybe they have a bad back, whatever. But it's pretty, you know, it's pretty scary that we are getting very contrary advice. The resulting threat of this is an explosion, right?
So there's either an explosion in the cabin or there's an explosion down in the cargo hold if there's too many lithium-ion batteries down there.
Well, for goodness' sake, and go and buy it when you arrive in America.
So it seems about in June this year, they started kind of backtracking on the whole cargo hold enforcement and instead decided to go down the route of requiring nearly 200 airlines to meet new heightened security and screening protocols.
Now apparently these are not going to add to the waiting times, but there's going to be more sophisticated protocols to screen people and devices to try and combat this threat.
So I'm not sure what— and I haven't found anywhere where they're kind of explaining what all these screening procedures are, and I guess they can't because obviously then there could be a countermeasure around it.
Right, and some of those trade-offs might mean that a different threat makes you more vulnerable to that threat. So it's a complicated mix.
It's coming up with these rules must be quite difficult because it's not, oh, to be secure you need to do A, B, C, D, E, F, G, right?
It's if you do that, then you have that risk to think about, if you put, you know, laptops and so forth with lithium batteries in the hold, what happens if something happens to them and they expand and release a gas?
If they believe in climate change, of course.
PSD2 is a European directive that requires banks to provide communication interfaces to third parties, and PSD2 is less than 4 months away.
Institutions are under immense pressure to meet its key requirements of open access and strong consumer authentication.
The danger is that when you expose an API to third parties, there's always the potential for fraudulent transactions.
Well, Intersect, our sponsor today, develops authentication and mobile security solutions that make the internet a safer place to bank and shop.
And you can watch a webinar from Intersect which promises to tell you everything you need to know about the secret key to PSD2 compliance.
Sign up right now at smashingsecurity.com/intersect. That's smashingsecurity.com/intersect.
Netsparker is a web application security scanner that automatically finds security flaws in your website and fixes them before hackers can exploit them.
Try it now by downloading a demo at netsparker.com/smashing.
It could be a funny story, a book that we've read, a TV show, a movie, record, app, website, podcast, whatever you like. That's not security related.
Well, it doesn't have to be security related necessarily. No, it's definitely not.
It's just, oh, the packaging and the way the cellophane opened, it's just like, oh, they've thought of everything. And it was wonderful, wasn't it? It was really fantastic.
Well, there's a company now which is trying to bring back those kind of memories. A company called Twelve South, who normally make Apple gizmos like cases for your iPad or stands.
Okay. Well, they have made a candle which makes your home smell like a brand new Apple Mac. Oh, for God's sake.
They say, "With every whiff of our Inspire candle, you'll find strong notes of bergamot, lemon, and tarragon, scent profiles that clear your mind of clutter and stimulate creativity." A unique blend of bergamot and armoise with hints of lemon, tarragon, amber, and musk create a fresh aroma that will liven up any home or office.
We aren't afraid to pay over the odds.
It comes from a team of documentary makers who were embedded for a whole year with a team of murder detectives from my very home city, Manchester.
Now, one of my formative experiences as a journalist was 15 months as a crime reporter. I didn't see what this program shows.
It was a very formative experience, and I learned a lot about human nature as well as the craft of writing during that time.
This program is called The Detectives: Murder on the Streets. It's a 4-part series. It's available through the iPlayer.
Now, I must say that we've already missed one of them, but it's still worth catching this series.
What we're seeing here is we're following the detectives from the point where they investigate crimes from the very first call to the point where they are canvassing the local area around the crime, finding witnesses, talking to charities and others who might be able to help them, local businesses who might be able to help them with the crime, surrounding CCTV footage, which is an important part of many investigations.
But most fascinatingly, it goes into the point where they're identifying suspects and the interviews of those suspects, and then the subsequent forensic examination.
And that's where it gets really good.
Because they're interviewing the suspects and they're showing the police who are in a different station watching the live video of the suspects being interviewed.
It's absolutely fascinating.
Issues around how law enforcement use metadata of mobile phones are being kicked around in the technical press for years now.
Now, metadata, for those who don't know, that involves not the content of calls, but it involves the number that's been called, the duration of a call, the location from which a call has been made, and the date and the timing of the call, of course, or an SMS message.
Now, in this program, they show how an investigation of a case of a local man gone missing hinged on tracking his mobile phone, and I won't give away anything more than that, but it's absolutely central to the case because this guy had gone missing.
He hadn't contacted anybody, he hadn't used his cash card or anything, and it was his mobile phone that was crucial to the case.
The program is called The Detectives: Murder on the Streets, and it's available through BBC iPlayer.
I have to warn people that it may feature scenes of raining and people waiting around and people being in interviews saying no comment and so on and so forth.
So it shows the whole thing and is really interesting.
And I get— I understand why some people do it. They want to up their hits and la da da da da.
But sometimes you go to a webpage and it's a story, suddenly your media player starts blaring and it's a completely unrelated story to what you actually are trying to look for.
You go to the Preferences tab, you can actually add sites that you want to allow to play media automatically.
And so I am giving Apple a very huge dramatic hat tip for that, because that is something that I hope everyone is going to copy.
When I read about this, I started looking around, and it turns out that Google has plans to do this, but it's not there yet. So there was this extension, this Google extension.
I think it was an article in the Next Web. This is about last year sometime. It basically was an extension that allowed you to block media.
But it turns out that it's not being maintained and it hasn't been updated in a while, so that's just something I can't recommend anyone install, so I don't want to install it either.
But I found a new article that says Google is planning to follow in Apple's footsteps, although they didn't word it that way, and introduce the new autoplay policies and controls in January 2018.
So that's only a few months away for the rest of the— for Chrome users. So keep your eyes open for that.
For any of you out there who hate the autoplay of media, either jump over to Safari or keep your fingers crossed that Google get it right in January and they turn it off by default and allow you to turn it on when you want it on.
John, if people want to follow you online, what's the best place to do that?
You can find plenty of stories there from myself, from my colleagues, including my San Francisco Bay Area colleague Iain Thomson on many aspects of security.
Or if you wanted to chat, then I can be reached through Twitter as @JLeyden. Excellent.
There's no G, not because we're northerners, but simply because Twitter wouldn't allow us to have that many characters. And we're also on Facebook now.
You can go to Smashing Security. Smashingsecurity.com/facebook, and that will take you automatically to our group.
And if you did want to buy a t-shirt or a mug or a sticker, we have a store which you can visit via our website.
Until next time, from all of us, cheerio, bye-bye, goodbye, adios. I've got a plane going overhead. I don't know if you can hear that.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
John Leyden – @jleyden
Show notes:
- Local funeral home gets hacked in the middle of the night leaving employees without access
- Local business' Yahoo! account hacked
- Smashing Security: 014: Protecting webmail
- Stealth web crypto-cash miner Coin Hive back to the drawing board as blockers move in – The Register
- Cryptocurrency mining affects over 500 million people. And they have no idea it is happening.
- Laptops and tablets have been banned from being used on 56 routes to the US
- Laptop ban: How it works, what devices are forbidden on flights
- Questions and answers on proposed ban on laptops in luggage – The Washington Post
- Inspire Candle – Twelve South
- BBC Two – The Detectives: Murder on the Streets
- This Chrome extension blocks audio and video autoplay on any website
- Autoplay blocking is coming to Chrome
- Smashing Security on Facebook
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Entersekt develops authentication and mobile security solutions that make the internet a safer place to bank and shop.
Join Entersekt’s webinar, which promises to tell you everything you need to know about “The secret key to PSD2 compliance”, by visiting www.smashingsecurity.com/entersekt
Netsparker is a web application security scanner that can automatically find security flaws in your website and fix them before hackers can exploit them.
If you want to automatically check your web applications for cross site scripting, SQL Injection & other vulnerabilities and coding errors that can leave you and your business exposed to malicious hacker attacks, then you need NetSparker.
Try it out now by downloading a demo from www.netsparker.com/smashing
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.
