
How to protect yourself from Bitcoin hackers, why you should think twice before giving Amazon the keys to your house, and how a private investigator tried to hack Donald Trump’s tax returns.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mikko Hyppönen from F-Secure.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name is Graham Cluley.
And the purpose was that she wanted to put it on my Wikipedia page. So my Wikipedia page has me telling you how to say my name.
He's a Legolas lookalike and he's Chief Research Officer of F-Secure. And the closest thing to a rock star we have in this business, isn't he?
And then I had to, well, it was cut away violently against my will at the Hack in the Box conference in Malaysia 5 years ago.
I mean, they had this charity auction at the end of the conference where they were auctioning off t-shirts and stuff for some goddamn children's cancer hospital or something like that.
And they just told me, yeah, now we're gonna auction off your ponytail. What do you do? You're gonna be a jerk and walk off, or you just submit.
And I submitted and they cut it off and they got, I think, $2,000.
First hit I have in my email is from 1st of April, 1997.
So I had to use an external provider.
Solomon's, I was on VirusL, which you may well have been on as well. I think we both joined the industry about the same time.
I joined in January '92, and I think maybe you've got a couple of months on me.
I was hired in this very company in June 1991, but originally I was just a coder doing database stuff, and then I migrated into malware a little bit.
This is our episode 57 of our podcast, Mikko, and I heard just last week that you guys at F-Secure have launched your own podcast, haven't you?
This episode of Smashing Security is supported in part by NetSparker.
NetSparker is a web application security scanner that can automatically find security flaws in your website and fix them before hackers can exploit them.
If you want to automatically check your web applications for cross-site scripting, SQL injection, and other vulnerabilities and coding errors that can leave you and your business exposed, then you need NetSparker.
Try it out now by downloading a demo from www.netsparker.com/smashing.
This allows IT to say which users have access to which applications at which time and also enforces two-factor authentication.
So even if credentials are compromised, hackers can't get access to those corporate services.
Find out more about OneLogin and download a free guide to identity access management at smashingsecurity.com/onelogin. On with the show.
I don't know if he's any relation to the Prince of Denmark.
And he is facing up to 5 years in prison and a quarter of a million dollar fine because he tried to get into someone's tax account in order to view their tax records.
So he managed to get hold of Trump's Social Security number and other personal information to open an online application for federal student aid.
I don't know if that was for Trump University or not. And he did this before the US election in September 2016. And once he'd done that, once he'd created—
I mean, it's not very difficult to get hold of the Social Security number of anybody these days, is it? There have been so many data breaches and so forth.
He did that, and he tried to use an IRS service to obtain Trump's tax information.
Now, you may well remember that the hacking magazine 2600 offered $10,000 for the first person to access Donald Trump's tax returns.
Well, they sort of turned the tables and said, wasn't there a porn baron?
I wonder if that's correct.
It made me wonder, how difficult is it to get hold of anybody's Social Security number rather than just if you're a special person like Donald Trump?
Well, it's not difficult at all, is it? Because we saw that huge hack of Equifax. I don't know, Equifax is a consumer credit reporting giant.
They're the kind of company who can stop you from getting a loan or being accepted for a mortgage.
Problem is that you don't have to personally, as an individual, be a customer of these services.
It's that you are dealing with businesses like mobile phone companies or credit card companies who are checking out your creditworthiness.
So Equifax have details of hundreds of millions of people and a lot of information on every single one. A lot of personal, highly personal information that got exposed to hackers.
And it's not like I can't do business with Equifax because they've already got my details whether I like it or not.
So this thing which keeps on repeating in newspapers about blaming the users, how users clicked on the wrong link or opened up the wrong attachment.
Many of these cases of data leaks actually have nothing to do with two-factor authentication.
Which means that when Equifax offers you a 90-day credit fraud alert, that's not necessarily going to be long enough, is it? Because that information could be exploited in future.
So right now it's about 90 days since Equifax first alerted people to the hack. So anyone who decided, "Yes, I am gonna turn on that fraud alert," you probably want to renew it.
To make sure that any credit company, you know, which wants to verify your identity before letting you open an account or let an imposter open the account, lets you know that that's happening and then you can give it permission.
But there's one other way in which you can protect yourself and that is by placing a security freeze on your credit file.
And that's a good piece of advice. And don't just freeze your credit file at Equifax, do it also at Experian, TransUnion, the other big credit companies.
And like I said, if you need to unfreeze it temporarily to apply for some new line of credit in future, then do it. It does cost a few dollars.
If you get fraud while you're doing payments online and it was done with your credit card, you can always call your bank and get it changed and get a new credit card.
But the key part is read your credit card bills.
And you can set a limit on that, which might be different from your household credit card as well.
And maybe then you've got a little bit more control as to how it could potentially be exploited.
Because even if you can claim the money back, that can take a while and you might be left in the lurch without some pennies in the meantime anyway.
I was talking earlier about Larry Flynt's, not a million-dollar, but $10 million offer for information leading to Trump's impeachment.
If you're offline for a week and you come back and you look at what's happening, it's crazy. Bitcoin is at $17,000.
It's just - fact is that bitcoin has been exploding this year, but both Ethereum and Litecoin has been growing faster than bitcoin. So take that.
And of course, in our field of cybersecurity, we do run into cryptocurrencies all the time because real-world criminals love cash and online criminals love cryptocurrencies.
But of course, it doesn't mean that they are evil. They're just a tool. I mean, we all use real-world cash as well. Real-world cash isn't bad or good. It's just a tool.
Exactly in the same way, cryptocurrencies or virtual currencies can be used for good and bad. The more valuable they are, the more interesting they are as a target to hackers.
So it's an easy forecast to make that we will be seeing more hacks against, or attempted hacks against cryptocurrency exchanges, against individuals who are known to hold large amounts of cryptocurrencies.
But the other danger is, of course, that we've got lots of people now who are being attracted to invest in cryptocurrencies because they've seen all the headlines about bitcoin, for instance.
And so I think come Christmas, it's going to be a discussion around the dinner table amongst many people thinking, oh, what's all this bitcoin thing?
You know, how can we get on board that bandwagon and they might not know how best to protect themselves.
At the very simplest level, there's the risk of phishing attacks, and I've seen some of those happening claiming to come from bitcoin exchanges, as well as the bitcoin exchanges themselves being hacked and exploiting vulnerabilities.
So what are the best ways for people to protect their investments in these?
But if someone steals your bitcoins, that could be potentially millions, and there's no way to get the money back. These transactions are irreversible.
That's one of the key features of bitcoin. We will not be able to track the money. We will not be able to get the money back. You really should be taking this very, very seriously.
And phishing attacks will only work if someone is able to get your credentials to a service where they can take coins away from.
And that's why I recommend storing your coins in physical wallets or physical hardware wallets, things like the Trezor or Ledger.
There's a couple of other brands which are actually making USB devices built for exactly this purpose.
And they've hopefully been built with strong encryption in mind. I must admit I've got a Trezor. I don't have very much investment in bitcoin, but I have a few.
There's a couple of others, but these two seem to be the biggest names in the business and they've been tested many, many times.
Of course, nothing's 100% secure, but the fact is that as long as it's not on your computer, as long as the coins are not on your computer or even worse, at an exchange, anything else is much more secure.
Whether it's a piece of paper with the private keys printed on it or a hardware wallet.
Gox, the biggest exchange at the time. And then we learned that many, many people who had bought bitcoin or other currencies from Mt.
Gox, they never moved the money away from the exchange. And this is like going to an airport and changing your pounds to euros and leaving them there. That's a bad idea.
So you want to move them away from an exchange because exchanges are prime targets for hackers.
So move your money away from exchanges and move it from your computer to a hardware wallet.
But the acceleration and the speed at which they've grown has been so considerable.
And what you have to watch out for is when the price does begin to go down and you want to get your money out, how easy is it going to be to get it out of those exchanges?
Some have limits.
Some I saw, I think one of the sites, Coinbase, I think put out an alert in the last few days just reminding people, you know, if lots of people try and take out money at the same time, we are going to struggle to manage that with our infrastructure.
So there's sort of a coded warning there.
That's the initial coin offerings, and there's tons of really, really shady tiny operations collecting massive investments through these ICOs.
So I would be really, really careful about that.
And one last thing, and I'll add a link to show notes, is that one neat way of investing, if you want to invest into bitcoin without worrying about it getting hacked from you, is to buy physical coins.
Most of these physical real-world bitcoins are thought of as gimmicks, but they actually are quite nice in the sense that you can take them, they hold real virtual coins inside, and you put them in a safe and then they can't be hacked because they are physical.
So, you know, there's a company called Denarium and a couple of others which make these, and I'll add a link to show notes.
Oh, I wonder if I put any money in. And so I logged into the account.
It turned out I hadn't, but some people had at the beginning of this year given me some bitcoins just because they liked my blog or whatever.
And it turned out they'd given me 3 pence. So I now have 97 pence in that particular, which is a great increase, I have to say. It's a fabulous increase.
I had a fairly similar experience because I was looking at my password manager and I realized I had saved a password for an exchange called bitcoin.de 4 years ago.
And I had no recollection that I had ever used them. So I looked into it. I had to change my password twice because it had been hacked twice since I last used it.
But turns out I never bought any bitcoin on the service. But whoever signed up for them 4 or 5 years ago was given 0.01 bitcoins for free. Which is $170 right now. That's free money.
We know drivers and packers aren't lazing about sipping flat whites, don't we?
Just this week, in fact, UK paper The Mirror reported that Amazon drivers were forced to deliver 200 parcels a day while earning less than minimum wage.
And staff were reported to have so little time for food or toilet stops that they snatched hurried meals and urinated into plastic bottles in the van.
UK news reports say that 1 in 5 UK packages go missing because of theft from the doorstep. So Graham, you get a lot of packages delivered at your place.
So that sort of warns me if anyone's coming up the path.
Wouldn't it be an absolutely terrible idea to get these people who are paid very, very little money, who want to use a proper lavatory rather than a plastic bag, into my house while I'm not there?
Fowler recently tested the $250 internet-connected lock that is designed to give Amazon drivers access to your home so they can drop stuff off inside.
Now, a lot of people are complaining, and there's lots of videos online of people seeing packages being stolen.
However, aren't you worried about the Amazon driver in your house when you're not around?
And if no one is home, the delivery person taps an app that grants them one-time access to unlock your door, and he places the package— or she places the package inside and then relocks the door.
The moment the door's—
However, the experience was not problem-free. Setting up the Amazon Key on your door is really finicky.
I mean, obviously doors come in lots of shapes and sizes, and our journalist here had to fork out $100 for a new strike plate, which was an Amazon recommendation, in order to make sure that the Amazon Key could work properly.
He chose one of the 3 smart lock options that work with the Amazon Key.
And from time to time, he wrote, his Kwikset Convert Lock makes a screech that would alarm a hyena and flash a warning in the key app about jamming.
And this actually happened to him when one of his drivers was dropping off a package. The door started screaming at the driver and he basically, thank God he stayed.
I guess he gets fired if he leaves and the door is not closed properly, but he couldn't close the door.
Which is annoying. You know, it's annoying when they say it's going to be delivered between 12 and 6. I'm like, oh, well, I'll just sit around. I'll wait for you.
But the big thing about all this is that it can't be accessed by any other businesses.
So in other words, you can't give access to Walmart or UPS or even a local cat or dog sitting company unless they're trading in the Amazon marketplace.
So Amazon's basically wanting to become the operating system of your home.
And add this to the Echo, the Dot, the Alexa, which, you know, is being adopted way faster than ever thought it would happen. Most people I know have one in their house.
But with all the market cap they have, you would think that Amazon would be able to build instead of this some sort of a, I don't know, teleportation system or something, you know, beam the goods to your home.
Companies use hundreds of applications every day, with the average worker having to remember about 40 passwords.
Unless you use a product like OneLogin, passwords go into spreadsheets, into emails, and end up on Post-it notes.
OneLogin allows IT to say which users have access to which applications at what time, and also enforce two-factor authentication.
So even if credentials are compromised, hackers can't get access to those corporate services.
And by connecting to Active Directory, access to all of these services is deprovisioned as soon as someone leaves the organization.
OneLogin has customers like Airbus, Royal Mail, BSI, and Dun & Bradstreet.
Find out more about OneLogin and download a free guide to identity access management at smashingsecurity.com/one-login. That's smashingsecurity.com/one-login.
NetSparker is a web application security scanner. It can automatically find the flaws in your website security and fix them before hackers can exploit them.
You can try it out right now. Download a demo from www.netsparker.com/smashing. On with the show.
And welcome back to our favorite bit of the show, the bit of the show we like to call Pick of the Week.
Could be a funny story, a book they've read, a TV show, a movie, a record, an app, a website, podcast, whatever they like. Doesn't have to be security related necessarily.
And my pick of the week this week.
He loves watching videos of people playing computer games. And he heard that many, many years—
Yep, son, you might think this is impressive, you should see my CGA Tetris ripoff.
Anyway, so he's always said, "Oh, Dad, Dad, do you think we—" So it was all snowy this weekend and he said, "Do you think I could write a computer game, Dad?
I'd like to write a computer game like you used to." Just his way basically of getting screen time with me approving. Smart kid.
And I said, "Yes, you can." And we went to this site called code.org and it is terrific. And it's not just for 6-year-olds.
You can do this at any age, but there is a great easy learning path if you are young or if you feel intimidated by coding.
They have something called the Hour of Code Challenge, which is basically a sort of drag-and-drop visual programming language, a bit like Logo, if you remember pushing a turtle around, and it's really groovy.
So for instance, we wrote a little Minecraft game where he goes around and there are sheep spawning, there are creepers appearing at nighttime.
He wrote a Star Trek game where there's stormtroopers who he has to avoid. And he's telling it, you know, when I press the up arrow, move up, and when I do this, score 10 points.
And the last thing we did was yesterday morning, we made a Flappy Bird game.
And it's— this is awesome because you get these fantastic results within about half an hour to 45 minutes. You've got a game which you can then play.
You can send it to your friends as well and say, "I have written a computer game."
And at first it's things like, you know, setting it up and they begin to get into for-next loops and they have events.
So when something happens or when you bump into this character, what should happen? And over time you actually begin to get into more sophisticated programming as well.
But these are the basic building blocks, which not just kids, but anyone who wants to learn about programming. I know I should have a go. Yeah. Carole, I even got Mrs.
Cluley to have a go. And she actually did some programming, much to her amazement. And found it quite fun. The site is called code.org.
It is completely free and it's worth checking out. And my son is having a blast and I think many other people of other ages would have great fun with it as well.
Some of you might know that outside of computer security stuff, my hobby is retro gaming, especially games from the early 1980s, late 1970s, and especially arcade coin-operated video games.
So there's this great blog run from UK from a guy called Tony Temple called Arcade Blogger, arcadeblogger.com. I'll put a link to show notes. It's a really good resource.
It's mainly just stories of finding really hard-to-find old machines and restoring them to their original glory and tons of pictures and stories about arcade raids and going and finding old barns full of old game machines and getting them saved.
It's a really good blog and I recommend it.
There's a great story with tons of photos saving these games from the ship where they had been for decades.
I think it was the first one to have a separate sound chip or something like that. It was a groundbreaking game at its time and it's really fun still today.
There's a gaming museum in the city of Tampere in Finland, roughly 200 kilometers north from Helsinki, which is a permanent museum of gaming of all kinds, including home video games and arcade games.
And my Space Invaders and Defender are actually donated to that museum. So next time you're in Tampere, visit the Video Game Museum.
I think we just finished the show right now because you're not going to be able to top Mikko's pick of the week.
You guys might know my husband is a bit of a film buff.
And a few days ago, we were putting up the Christmas tree, stuffing our faces with mince pies, and he suggested to put on a Christmas movie.
So anyway, I asked him what I always ask him when he suggests a movie to us, and I say, is it like The Happiness of the Katakuris, which is a crazy Japanese musical comedy horror film?
You know, it's a great film, but you need to be ready and you have to be in the proper headspace for it.
So it's a 2010 Finnish dark fantasy horror thriller film about people living near the— now I'm trying to get this right— Korvatunturi.
Basically, you follow a young brave boy who's treated basically as a bit of a nuisance kid in the film, but who turns out to be our hero.
And for one thing, he delves into ancient books to discover the real Santa Claus— not a lovely jolly bearded man, but a horned beast who whips misbehaving children and boils them in a cauldron.
Do I need to say adults only? But it's a great way to enjoy maybe the darker side of the holiday festivities.
I could actually see the mountain. However, Korvatunturi is actually right on the border between Finland and Russia, and you can't actually go there. It's border area.
You have to have special permission if you want to summit the Korvatunturi Mountain. So I actually did not summit it, but I've seen it.
Thank you, Mikko, for joining us. Thank you. And if you know someone who might like the show, please tell them about it.
And if you've got no friends at all, go to iTunes and leave us a nice review, not a nasty one.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Mikko Hyppönen – @mikko
Show notes:
- Mikko Hypponen has his ponytail hair cut. – YouTube
- Cyber Security Sauna podcast
- Louisiana man admits misusing Trump's Social Security number
- One of Your Equifax Hack Protections Expires Soon
- How to protect yourself in the wake of the Equifax data breach
- Larry Flynt offers $10 million for info that could get Trump impeached
- Cryptocurrency Market Capitalizations
- Physical Bitcoins from Denarium
- TREZOR Bitcoin Wallet
- Ledger Wallet
- Amazon drivers forced to deliver 200 parcels a day with no time for toilet breaks while earning less than minimum wage
- Amazon wants a key to your house. I did it. I regretted it
- Black Friday Delivery THIEVES: 1 in 5 UK packages missing as thefts SURGE before Christmas
- Code.org
- The Arcade Blogger
- The Happiness of the Katakuris
- 'Rare Exports: A Christmas Tale' Trailer – YouTube
- Smashing Security on Facebook
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Netsparker is a web application security scanner that can automatically find security flaws in your website and fix them before hackers can exploit them.
If you want to automatically check your web applications for cross site scripting, SQL Injection & other vulnerabilities and coding errors that can leave you and your business exposed to malicious hacker attacks, then you need NetSparker.
Try it out now by downloading a demo from www.netsparker.com/smashing
OneLogin provides Single Sign On for customers like Airbus, Royal Mail, BSI, and Dun and Bradstreet. With hundreds of apps being used in the typical workplace, and the average user having to remember about 40 different passwords, we all know that if we don’t have a product to remember passwords they end up in spreadsheets, stored in emails, or left on post-it notes. And that is a security nightmare. OneLogin allows IT to say which users have access to which applications at what time and also enforce two factor authentication. So even if credentials are compromised, hackers can’t get access to those corporate services. And, by connecting to Active Directory, access to all of these services is de-provisioned as soon as someone leaves the organisation.
Learn more, and download a free guide to identity access management, at www.smashingsecurity.com/onelogin
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
