This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Graham Cluley
Hey, it's Graham here. Just before we begin the show, just wanted to say that we had a bit of a problem recording this one. In the first few minutes of the podcast, Maria, who's our special guest, her audio is slightly defective. Please bear with it. We had some technical problems. We even had a power cut during the course of the recording. Her bad audio only lasts maybe 3 or 4 minutes, and after that, everything should be good. And we still think it's worth putting out. So bear with it and enjoy the show.
Carole Theriault
Smashing Security is supported by Recorded Future, the real-time threat intelligence company whose patented machine learning technology
Unknown
Smashing Security. Episode 36: Flash, Clunk,
Carole Theriault
continuously analyzes technical, open, and dark web sources to give organizations unmatched insight into emerging threats.
Unknown
Flush and Hacking Security Researchers with
Carole Theriault
Sign up for the free daily threat intelligence update at recordedfuture.com/intel. That's recordedfuture.com/intel.
Unknown
Carole Theriault and Graham Cluley.
Graham Cluley
Hello, hello, and welcome to another episode of Smashing Security, number 36. Indeed, my name is Graham Cluley, and I'm joined by my good buddy and co-host, Carole Theriault. Hello, Carole, how are you?
Carole Theriault
I'm good. I just wish I was 36 again, actually.
Graham Cluley
That was some time ago, wasn't it? Back in the '90s.
Carole Theriault
It's going to be one of those.
Maria Varmazis
It's one of those.
Graham Cluley
It's going to be one of those. And as you've just heard, we are joined by a special guest today, and it is Maria Varmazis, information security and technology blogger. Hello, Maria. Welcome to the show.
Maria Varmazis
Hi, great. Thank you so much.
Carole Theriault
Maria, I am so glad. We never have enough women on this show, and I am thrilled to bits that you're here. Thank you for joining, because I know you have recently had a baby, so you're not getting a lot of sleep these days, are you?
Maria Varmazis
I'm about as sleep deprived as most people in our industry.
Graham Cluley
When you say recently, do you mean this morning or what?
Maria Varmazis
No, no, heavens no. No, no, 3 months ago. So I just came off maternity leave about a week ago, so I'm dusting off everything going, what the heck happened? I just want to cry. Happened the day I was in the hospital. It was amazing.
Carole Theriault
Yeah, you're represented most every week.
Maria Varmazis
So, oh wow, the nurses were going, I think something happened and I'm gonna have to change all my passwords again. And they're wheeling in my baby in the bassinet and I'm going, oh my God, I can't get away from this anywhere.
Graham Cluley
Well, thank heavens you weren't having it in the British NHS because that could really have been a problem, couldn't it? Anyway, thank you for coming on the show. And I agree with Carole, we need more women on this show. In fact, we've had shamefully few.
Maria Varmazis
But you don't count at all is what we're saying.
Graham Cluley
Well, obviously there's been you, Carole. She doesn't count? No.
Maria Varmazis
You two cancel each other out and you become a gender-neutral thing. I don't know.
Graham Cluley
Now, listen, guys. Each of us is going to choose something which has tickled our security nostrils over the last week and got our attention. My story this week is, well, let me start off by saying this. What do you think is a security researcher's biggest nightmare? What do you think would really terrify them?
Maria Varmazis
Running out of booze.
Graham Cluley
Booze, yeah.
Carole Theriault
Being hacked.
Graham Cluley
Being hacked, meeting a member of the opposite sex. All of those sort of things definitely are a concern for those of us in the infosecurity world. But Carole, you have put your finger on it. Because a senior threat analyst at Mandiant, which is of course a division of security firm FireEye, was hacked in what appears to have been a revenge attack. Now, I'm not gonna name him because he's probably embarrassed enough as it is and is worried that his future career prospects are scorched. But he was targeted by hackers as part of a campaign which they're calling #leaktheanalyst. And a bunch of hackers who call themselves Hey Maria, you're a bit geeky. You'll be able to handle this. 31337.
Maria Varmazis
OMG!
Graham Cluley
Which I think is meant to mean elite. It's a bunch of elite hackers.
Maria Varmazis
It's like 1996 all over. I know.
Carole Theriault
I think this dates the hackers. This dates the hacker operation.
Maria Varmazis
A little bit. Yeah, mid-30s.
Graham Cluley
They've given away some information about themselves there. Anyway, they took information from this Israeli researcher And they made it available for anyone to download from the net. It's still available to download, including his email archive, megabytes and megabytes of that, passwords, contacts database, details of private communications with potential recruiters. Slightly awkward, isn't it? Cloud drives, his calendar.
Carole Theriault
It's got to be kind of dull though, right?
Maria Varmazis
Dull?
Carole Theriault
Yeah. I mean, the guy's just emailing, saying, I'll be home for dinner. And yes, boss, I'll get that for you right away.
Maria Varmazis
Yes. Who's getting donuts for tomorrow's meeting?
Carole Theriault
Oh, can I have a job with recruiters? I mean, it's not, you know.
Graham Cluley
Well, no, it could be fairly juicy if you were talking about a particular hacking campaign or a piece of malware. And if you were the hacker who was being analyzed by this analyst, that may be useful. Furthermore, you may be able to find communications as they claim to have done about some of their clients and the situations that they found themselves in. They even managed to track the poor guy's location because his, I said poor guy, he really was, because he had a Microsoft Surface and it was being geotracked. And so they were able to pinpoint where in Israel he was from day to day. And to add insult to injury, the hackers even defaced their victim's LinkedIn page, replacing his picture with a photograph of a hairy bottom.
Carole Theriault
Sorry, what?
Graham Cluley
A hairy— bottom.
Carole Theriault
Did you see this picture?
Graham Cluley
I have seen it, yes.
Carole Theriault
Do you think it is her student?
Maria Varmazis
Can I see it?
Carole Theriault
Maria?
Maria Varmazis
I haven't seen it. I'm curious.
Graham Cluley
Link's in the show notes.
Maria Varmazis
Link's in the show notes. Noted.
Graham Cluley
And they described him— You know, normally where you have your job title is, you know, information security expert or something like that. What they wrote was, asshole fucked up analyst at fucked up Mandiant.
Carole Theriault
I have no idea.
Graham Cluley
Now, the profile has since been deleted, perhaps understandably. He's decided to remove his LinkedIn presence, but not very good, really, is it? And so the bad guys, they posted up on Pastebin and they provided a link where you could download all of this data, which they'd grabbed in the screenshots and the evidence that the accounts had been compromised. And they posted their little manifesto. And they said, for a long time, we, the— get ready, Maria— 31337 hackers—
Maria Varmazis
OMG!
Graham Cluley
Tried to avoid these fancy ass analysts whom trying to track— it's not great grammar, to be honest— whom trying to trace our attack footprints back to us and prove they are better than us. In the #leaktheanalyst operation, we say, fuck the consequence. Let's track them on Facebook, LinkedIn, Twitter, etc.
Carole Theriault
That's very famous.
Graham Cluley
Let's go after everything they've got. Let's go after their countries. That's a bit bold.
Maria Varmazis
Their tiny speakers.
Graham Cluley
Let's turn into tweeters. Yes, very good. Let's trash their reputation in the field. If during your stealth operation you pwned an analyst, target him and leak his personal and professional data.
Carole Theriault
Oh, hey.
Graham Cluley
So basically they're declaring war on the good guys.
Carole Theriault
Yeah, but the girls are safe. It's personal. It's his personal and professional data. So we're cool.
Maria Varmazis
There are no female analysts. Yeah, well, or we're all safe because they don't know we're there.
Carole Theriault
We might be the next doxing.
Graham Cluley
Hackers are sexist?
Maria Varmazis
No!
Carole Theriault
I would never dare.
Graham Cluley
Well, now, if you were to peruse the documents which they've now leaked from this guy's computer, it appears—
Carole Theriault
It's like reading someone's diary.
Graham Cluley
Why would you do that?
Maria Varmazis
Really?
Graham Cluley
Well, in preparation for this podcast, perhaps. But I didn't— Am I the only one with a moral fibre? Listen, I didn't look through his emails, right? I didn't do that. But there were certain—
Carole Theriault
Oh, well, good for you.
Graham Cluley
There were certain documents and presentations related to some Mandiant/FireEye customers, such as the Israeli Defense Force.
Maria Varmazis
Oh!
Graham Cluley
And those have been leaked out as a consequence of the hack. Right? No?
Carole Theriault
Okay, so I take back what I said earlier. I, yes, I was assuming perhaps it was his personal email archive, but of course it wasn't. So yes.
Maria Varmazis
Customer data, yikes.
Carole Theriault
Ooh.
Graham Cluley
Yeah. Now, the hackers say that they have hacked Mandiant's internal network and they've compromised client data and that they might, 'Leak that in the future.' Yeah.
Carole Theriault
That seems weird that you'd say that beforehand if you did actually have it.
Graham Cluley
I know. I'm a bit suspicious. Because you think, well, why haven't they leaked it already? If they want to cause embarrassment, if they want to give this guy some pain and get him in trouble, you probably would have done that as well, wouldn't you?
Carole Theriault
Unless they're wanting ransom.
Graham Cluley
Well, they don't seem to have asked for anything like that. It appears to be more a sort of personal attack in a way. They just don't like their stuff being researched.
Maria Varmazis
I would think someone who has the capability to target somebody and was in an internal network would actually lie low and see how much they can get away with.
Graham Cluley
Yeah.
Maria Varmazis
I mean, just see how long it takes for them to be discovered on the network, you know.
Graham Cluley
And we don't know how long they were— they did compromise this guy's account. Certainly from the geo data where they were tracking his lovely old Microsoft Surface, it does appear that that may go back some time. I don't know if that's an archive which is available to anyone, you know, whenever they log in, but it does appear that there was some old information in there. The obvious danger is, has client data been compromised? FireEye have issued a statement. They've told Gizmodo, "We're aware of the report." So they basically confirmed that the hack has happened. "We're investigating, we've taken steps to limit exposure, but there's currently no evidence that any corporate systems at the company have been compromised." They say, "Customer data, keeping that secure is a top priority. And to date, they've only confirmed the exposure of business documents related to two separate customers in Israel." One imagines one of those is the IDF. And they've addressed the situation with those customers directly. That's an awkward phone call to make, isn't it? Oh yeah, we might have doxxed—
Carole Theriault
How do you start? Hi.
Maria Varmazis
On my short list of people to not piss off, the IDF is definitely one of them.
Graham Cluley
You're right.
Maria Varmazis
Oh my goodness.
Graham Cluley
So what are the morals from this, folks?
Maria Varmazis
Get off the internet. Just delete everything and go home.
Carole Theriault
Bury your head in the sand, right?
Maria Varmazis
And also, schadenfreude is a dangerous thing.
Graham Cluley
It is. And anyone can be vulnerable, right? I think none of us can imagine that just because of our jobs or our roles or the fact that we're working in security 24/7, that somehow we couldn't be targeted. The truth is that everyone makes mistakes. I remember years and years ago, I was working at a security company and they were holding an antivirus conference and experts from all around the world were bringing in their presentation from rival firms. And one of these guys gave me a floppy disk there, that's dated me. And he said, "Here's my presentation." I said, "Thank you very much." I shoved it in my computer 'cause it was my job to collate everyone's presentation. And the antivirus on my computer went zoop, zoop, zoop because it contained a virus on the floppy disk.
Maria Varmazis
Was it the Morris worm? How far back are we going with this?
Graham Cluley
How dare you? How dare you? But I had to go back sheepishly to this antivirus expert and say, "Um, your peer has given me a virus." A fairly well-known name in the industry. And the truth is that he'd been using exactly the same computer to analyze viruses as he'd been using to write his presentation. And, you know, so people make mistakes.
Carole Theriault
I don't think that's the stake here though. I don't think that's what's going on here.
Graham Cluley
No, no. I think what may have happened here, from the examination, 'cause one of the things which fell out of this were passwords. And it does appear that this particular guy may have been reusing passwords. It's possible that his password leaked out from the old LinkedIn data breach, but also that he had a formula for passwords. You know how sometimes people think, well, you know, I will have different passwords, but what I'll have is I'll have a sort of base word, a base password, and then I'll add on the first two letters of the domain or something like that.
Carole Theriault
Graham, you and I years ago wrote a video about how to— recommending people do that. I don't know if you remember.
Maria Varmazis
I remember.
Carole Theriault
Yeah, we did. Yes, yes, we did. And you're the star of the show and I'm behind the camera.
Graham Cluley
Links in the show notes. That video doesn't say that. The video we have is one where we say, make up a random sentence and take the first letter of every word. That's what the video is.
Maria Varmazis
Okay. Okay.
Carole Theriault
It was a while ago. We'll go watch it, but I have a feeling you may be wrong. Anyway, I don't remember.
Maria Varmazis
We digress.
Graham Cluley
We digress.
Carole Theriault
We digress.
Graham Cluley
Yes.
Carole Theriault
Settle the fight.
Graham Cluley
Anyway, even the advice we gave in that old video doesn't really scale for the number of passwords which you need today. You know, my advice is use a—
Carole Theriault
Exactly. No, I agree.
Graham Cluley
Use a password manager to remember your passwords, to keep them secure, and to generate passwords as well.
Maria Varmazis
So many people use their own personal mental cipher thinking nobody can ever crack this. But I mean, come on. As you were saying, with all the passwords we need nowadays, there's no way you can make that even sane. So yes, please.
Carole Theriault
But on the other hand, though, a lot of people don't trust password managers. There's a lot of doubt in putting, storing stuff in the cloud and trusting a third party to do it. You don't have to use a cloud-based password manager though. You can use a local one.
Maria Varmazis
Yeah. I mean, I like cloud-based ones. I personally use one, but I completely get that there are problems with them for sure. And people understandably are skeptical.
Graham Cluley
But there are also problems with storing your passwords locally on your computer. You know, it's—
Maria Varmazis
There's no perfect solution.
Graham Cluley
Right. That's the thing, isn't it? So anyway, this guy, looking at some of his passwords, he works at Mandiant, which is a FireEye company. Some of the passwords have the word fire in them. You think, seriously, guy, you know, are you doing this? But hey, all security researchers out there, make sure that you're practicing what you preach.
Carole Theriault
Yeah, and I think actually it's an idea that many people just assume that they will not be targeted. And I think that's, you know, that's a fairly likely probability you won't be targeted if you're just— but, you know, in this industry and with this LeakTheAnalyst operation, I wonder what your advice would be, Graham, for other analysts out there? Are you saying literally just make sure your passwords are good and strong and unique?
Graham Cluley
Well, and have layered security and enable two-factor authentication and all the— I mean, we have, for instance, talked in the past about different ways in which you can protect your email account. All the variety— we'll link to a past podcast in the show notes. Oh my word, we've got a lot of show links today, haven't we? But we'll put some of those things in where you can learn some of the techniques which you can use to harden the security, to better protect yourself from these kind of attacks. Ultimately, I'm afraid it's your brain, isn't it? It's your mouse finger which might be clicking or making a mistake, or it's your decision as to whether you are going to choose a strong password or a weak one. And I think some people think, oh, because I'm a bit nerdy, somehow I don't have to worry so much as my auntie Jean.
Carole Theriault
I know someone exactly who's very savvy in security, and they insist on using the word password as their password.
Graham Cluley
Really?
Maria Varmazis
How did you know?
Carole Theriault
Advertises it.
Maria Varmazis
When did I tell you that? Just kidding.
Carole Theriault
But yeah, and I think it's an arrogance of, I'll never be targeted. Give me a break.
Graham Cluley
Wow.
Maria Varmazis
So everyone's a target, even if you're not a security analyst. I mean, not to be completely tinfoil hatty, but you know, it's having worked at security companies before, you know, even the marketing intern can be a target. And you know, definitely people who are high visibility targets like an analyst know that they really need to practice what they preach. But that goes all the way down, doesn't it?
Graham Cluley
Maria, what have you got for us this week?
Graham Cluley
Okay.
Maria Varmazis
So the petition from web developer Juha Lindstedt, I hope I didn't mispronounce his name, says open sourcing Flash and the Shockwave spec would be a good solution to keep Flash and Shockwave projects alive safely for archive reasons. Don't know how, but that's the beauty of open source. You never know what will come up after you go open source.
Carole Theriault
So well, yeah, and this is a good wake-up call for everybody who may
Maria Varmazis
Hooray. All right. So the reaction of much of the security community is paraphrased beautifully by Carole's reaction.
Carole Theriault
have been a bit lax as of late on their own personal security whilst
Maria Varmazis
Please just let Flash die already. It is due to die in 2020. That's not nearly soon enough, but let's make this happen. Well, to paraphrase from Monty Python, Flash, it's not dead yet. I'm not gonna even try and make a dead parrot joke, but there we go. So as many of us have heard, and no doubt many of our listeners would know, Flash is finally going to kick the bucket.
Carole Theriault
they're sitting there telling everyone else how to behave, right?
Maria Varmazis
Adobe announced in 2020, since supposedly is expiration date for the much maligned plugin and video player and interactive thingamajigger. However, I mean, what else do you want to call Flash? Attack vector.
Graham Cluley
Put us out of our misery by putting it out of its misery.
Maria Varmazis
Amen to that. There is an ongoing effort from at least one web developer on GitHub to keep Flash alive. Why? And that is the reaction of many people around the internet. And just in case people want some stats from a lovely Gizmodo article quoting, I believe, our sponsor Recorded Future, they ranked Adobe Flash Player as the most frequently exploited product in 2015, comprising 8 of the top 10 vulns leveraged by exploit kits and noted the existence of over 100 exploit kits and known vulns. So yeah, it's a problem.
Carole Theriault
8 out of 10.
Maria Varmazis
Yeah. It's a, did better on tests than I am. So there we go. So boom, boom. So I mean, I've gone back and forth in my head on this whole thing because I love open source projects. I worked with a lot of the guys on Metasploit, which is a very wonderful open source project. And I've seen firsthand how wonderful the open source community is and what amazing things they can do. But open source is of course a double-edged sword. You open up that source code to the world and there's a real possibility that a lot of people are not going to be working out of the goodness of their heart to fix Flash. And they're just going to go to town and find all sorts of problems that they couldn't find before. So we're going to have an even more vulnerable Flash, if that is even a thing that you can imagine. It is quite a target.
Carole Theriault
Yeah, I know. I'm just, I don't know. I kind of, I kind of like the archival reason. I like that. I think that does make some sense that people should be able to research this information and see how it was working. Specifically Zombocom and Homestar Runner and Egon's World. Yeah. And Newgrounds.
Graham Cluley
I'm quite nostalgic about a lot of those retro kind of computer things. It would be a shame. Hey, I've got an idea. Could we, hey, look, huddle up, right?
Carole Theriault
Good guys.
Graham Cluley
Get together, right? Because how about we open source Flash? And so all the hackers and the bad guys, the malicious hackers, can spend lots of time and continue spending lots of time exploiting Flash, but the rest of us agree not to ever use it. Because the danger of closing down Flash is that the bad guys will then put all of their attentions on exploiting something we are using. But if we just keep it there and they don't hear that we're not actually using it, yeah, because they're all idiots.
Carole Theriault
Brilliant.
Maria Varmazis
Yeah, I'm sure this will work with no problems at all, right?
Graham Cluley
Good.
Maria Varmazis
Yeah, it's perfect.
Carole Theriault
So basically, how many people use Flash now though?
Graham Cluley
Maybe everybody. Yeah, still, because it's everywhere, because too many websites still have a tiny, yeah, teeny wincy little bit of them.
Maria Varmazis
Literally everyone who watches hentai stuff on the internet. Yeah, Flash. So those guys can be really pissed when it goes away. I'm just saying.
Carole Theriault
Well, it's like, how much warning do you need? I mean, we've known it's going to, you know, it's the longest death in history.
Maria Varmazis
Quite the death rattle for Flash.
Carole Theriault
You know, it's taking longer to die than XP.
Maria Varmazis
Yeah, it's taking way too long in my opinion and many other people's opinions. However, as the petition says, you never know what could come up after you go open source, exclamation point. And I mean, okay, fair enough. It could become more secure with more eyeballs on it. In theory, that is possible, but you know, open source projects are not always necessarily known for continuing after a certain point, you know, having a lot of support. People tend to drop them. And I don't know how interesting this is as a problem for a lot of people. I mean, Flash has been around for forever, but that said, what do we do when Flash goes away? What do you do with all those Homestar Runner videos? And it's not just videos, I should say. It's really the interactive content, the stuff you click on, because videos are not really the problem. It's the interactive stuff. And there are a lot of people who've attempted to solve this problem, basically making interactive videos from early 2000s workable. But since the Flash backend is closed, you can't really do much with it. So there really hasn't been a good solution and there's really no viable alternative right now. So that is actually a legitimate issue if there's stuff that you want to still use once Flash goes away.
Graham Cluley
So one thing that I've seen suggested is that the browser plugin of Flash is killed off. That's completely zapped because that's obviously the most common attack vector, but maybe there could be an open source desktop player instead. And so if you had something which you really wanted to run to check it out, you still could, but the exposure is greatly reduced.
Maria Varmazis
That does sound like a good solution to me.
Graham Cluley
It would be a program which you have running on your desktop and you load a file into it. You say, this is the Flash file which I want to run.
Maria Varmazis
Right. Yeah.
Graham Cluley
Something like that.
Maria Varmazis
Yeah, if you're an internet archivist and those people do exist and you really want to access that eBaum's World thing from, you know, the stick figure fighting game from 2002, you can. And you know, and that way we don't lose all that ephemera from the early 2000s, really.
Carole Theriault
And I also like the idea, I think I'm a little less cynical about open source and I think, yeah, sure. There's a few bad apples out there, but I think, you know, you don't know what'll come up and it could be amazing. They could actually make it much, much more secure and usable. Absolutely possible. That's the thing. It is a complete unknown. I mean, it really could happen and that would actually be kind of exciting. However, I mean, as I said, I kind of go back and forth on this one because I can see their point of view. I can save $30 grand by not updating my system and carry on using Flash and just change it to this new open source version.
Maria Varmazis
Correct. And that's not an outcome we want to see, at least those of us in the security world.
Graham Cluley
Okay guys, I'm gonna put you in the hot seat, right? Should we kill Flash or not? Thumbs up or thumbs down? Come on, are we gonna save it?
Maria Varmazis
I'm giving a thumbs up or thumbs down, but you can't see 'cause I'm over the microphone. No.
Carole Theriault
I think you're not giving us the option of kill it for everyday users, but throw it into the open source community to see what they can do with it.
Maria Varmazis
But is that actually— That's not killing it. It's not dead yet. Maybe getting better.
Graham Cluley
I like this open source desktop player thing, which will mean that people will still have to update their websites and fix their websites and stop being reliant on Flash. But the exposure is reduced in the browser, which is the primary attack vector.
Carole Theriault
Why wouldn't they just say to download it? They would just say, go download this tool.
Maria Varmazis
Are people going to do that? I mean, we're talking about reducing the attack surface, right? If we get rid of the Flash browser plugin that definitely needs to go.
Carole Theriault
Yes, that's ridiculously
Maria Varmazis
I don't think anyone's really fighting for that. I mean, maybe they are, but I certainly am not. That certainly won't mitigate the issue.
Carole Theriault
And does interactive ads— actually, this is a question I don't even know the answer to. Interactive ads in videos, right? high. That is So are they all Flash reliant as we know, right now? Because that was probably what's causing the big delay in them being wiped out. like 100 meters.
Maria Varmazis
I imagine a lot of them are not. I mean, to me, the thing that has killed off Flash in a lot of websites right now is mobile. There's a lot of mobile devices no longer support Flash. So that has done a lot for killing Flash more than anything else. I doubt that those are Flash-based. I'm sure there are in some corners of the world, but I imagine many of them have moved to HTML5 or other options. I mean, do we still see the mortgage ads with the dancing person where you punch the number? I mean, that sounds like 10 years ago. But I mean, there are other problems with ads that we could probably do 50 shows on that alone.
Graham Cluley
All night long. I put up that video,
Carole Theriault
Yeah, yeah, yeah, yeah.
Graham Cluley
Right, enough chat. I've decided we're gonna kill it. Flash is gonna die. There you go. Someone had to make a decision. that's the obvious thing.
Maria Varmazis
Okay, it rests in peace.
Carole Theriault
It's in room 101.
Graham Cluley
There's the answer. Pull the lever. Clunk, flash. Clunk, flash, actually.
Maria Varmazis
Bye, Flash.
Graham Cluley
Boom, boom. Oh dear. Carole, take us away from this madness. Give us a totally sane topic to chat about today.
Carole Theriault
Well, I'm going to talk about hacked billboards. So today, Wednesday, the day of recording, we've seen reports of a giant billboard in Wales' capital, Cardiff, its main shopping street. It's been hacked. So the billboard seems to have been accessed by a hacker via remote control, and then they took control of the screen to display rather shocking images to the shoppers of Cardiff.
Graham Cluley
Right, yeah.
Carole Theriault
Okay, now this has only just happened. There's not a lot of info right now that's just come out at the time of recording, but a message posted by an anonymous user on the community site 4chan— okay, I'm putting little marks around community site 4chan.
Maria Varmazis
Paragon of internet citizenry.
Carole Theriault
Anyway, now this was posted late Monday evening, and it read, I live in Cardiff, Wales, UK. Earlier today I was walking to work and looked up at a giant 300-foot TV screen on the side of the building. That's what he says. 300 feet. I think—
Graham Cluley
I'm surprised they've got 30-inch TVs in Wales.
Maria Varmazis
Wait, that's where they filmed Doctor Who, right?
Graham Cluley
So it is. Yeah. 300 feet must be a mistake. I don't think we can rely upon this person, but anyway, carry on.
Carole Theriault
Yes, yes, yes, yes, yes.
Maria Varmazis
Okay, so a big—
Carole Theriault
Let's— we're going to replace that with big TV screen on the side of the building. I noticed that TeamViewer was running in the background and I took a photo of the username and password. I just tried remote controlling it and it worked! What should I use this for considering that it's probably unattended all night long?
Graham Cluley
All night long, Lionel Richie.
Carole Theriault
Yeah, that's his—
Maria Varmazis
That's what, yeah.
Carole Theriault
So there were many suggestions, some were as mildly funny as yours was and some were truly distasteful.
Graham Cluley
What a surprise.
Carole Theriault
They included swastikas and the sign saying, "Big Brother is watching you," and a warning, "This is a Sharia-controlled zone, no alcohol, no gambling, no porn," and a kind of peppy Donald Trump mashup thing.
Maria Varmazis
Any Rickroll suggestions?
Carole Theriault
Not that I saw.
Maria Varmazis
That's disappointing.
Carole Theriault
So, you know, we've seen this before. This is not the first time a billboard has been hacked. I think last May, Liverpool One shopping center has a screen, it got hacked, and it was hacked with a rather helpful message saying, "We suggest you improve your Smashing Security. Sincerely, your friendly neighborhood hackers."
Maria Varmazis
That's nice.
Carole Theriault
Yeah. In April, a giant LED screen in a busy Delhi metro station started streaming Pornhub clips. And in March, Mexico City digital board located near one of the busy roads showed porn for a few minutes. And probably the worst one was the 2015 Atlanta billboard. Remember, it was in a really swanky neighborhood in Atlanta, and it displayed goatse.
Graham Cluley
Oh, God.
Carole Theriault
Well, any listener who doesn't know what I'm talking about, you are a very lucky human being. Do not go and research this.
Maria Varmazis
Don't Google.
Carole Theriault
Do not think this is a double bluff.
Graham Cluley
There won't be links in the show notes.
Carole Theriault
There will not be any links in the show notes.
Maria Varmazis
Very quick way to get blacklisted.
Carole Theriault
Actually, I don't think that is my favorite. My favorite, remember, it was like late 2000s and there was like zombies ahead. It was in Austin. It was construction signs in Austin.
Graham Cluley
Zombies ahead.
Carole Theriault
Movies ahead. And yeah, there was something. Yeah, I love that.
Maria Varmazis
Signs are very easy to hack. Yeah.
Graham Cluley
Yeah. There was another one saying Dalek invasion. I liked that one because obviously fantastic.
Carole Theriault
The reason I wanted to talk about this was to kind of crowbar in some security chatter about TeamViewer. Now TeamViewer, for those who don't know, is a tool that allows people to remotely access computers and desktops and allows for file sharing and all these things. And they're used to, in some cases, to display messages on, you know, people use them when they're doing presentations to share screens. But people also use them for these big digital screens. So TeamViewer, many of us in the industry would say, it's been designed to be easy to use, not necessarily very strongly secure. And there is a great article that I found from, and it was published last year, but it was published from How to Geek. And it has loads and loads of little tips on how you can make your TeamViewer instance much more secure. Now, a few big ones that we can share is make sure you exit TeamViewer when it's not in use. Don't just leave it hanging around, you know, turned on but silent. Use obviously strong passwords, and there is gonna be a link in the show notes for how to do that, right, Graham? Sure thing.
Maria Varmazis
Dusting that one off.
Carole Theriault
Yeah, yeah, there'll be 800. Good luck finding any of the links. Turn on two-factor authentication for TeamViewer, and I was just talking to my other half, and he didn't even know that two-factor authentication existed for TeamViewer. That may be something that's less known.
Graham Cluley
Divorce him.
Maria Varmazis
Yes, that would be a good reason.
Carole Theriault
Strong measures.
Maria Varmazis
Why are you leaving him? Because—
Carole Theriault
And of course, make sure it's updated. You know, obviously, I think that's less— You know, I think most people would make sure of that now. But just as a little reminder, let's do that because we're going to be relying on digital screens much more. I mean, I think the end of the poster is near, right?
Maria Varmazis
Right. But so sort of devil's advocate on this one. Yeah. The folks setting up these giant screens, they don't give an F about any of this stuff generally, is my guess.
Carole Theriault
Well, until they get— until they have their big boss coming down them going, what the hell?
Maria Varmazis
Yeah, but these aren't these the guys that usually are up there on the billboards, the old pasteboard guy? I don't know, I'm just thinking, you were mentioning the Austin sign hack. Yeah, I mean, do you know how to hack those? You literally just walk up to them and open the panel in the back with a flathead screwdriver, and there you go. That's how you get out.
Carole Theriault
That's the construction sign ones.
Graham Cluley
Yeah, yeah, that's for the road signs, but I think the advertising billboards are a little bit more complicated than that, aren't they? Or are they not?
Carole Theriault
Well, I don't think you can go up to them as much. Well, maybe you can.
Maria Varmazis
Maybe you can. Yeah, usually there's a ladder. I mean, is it really that hard? I don't know. I mean, so I'm just thinking, so exit TeamViewer fully when you're not using it. Maybe there should be a way for TeamViewer to self-time out on some sort of application like this.
Carole Theriault
Absolutely.
Maria Varmazis
Yeah, like assuming that the person's gonna know to do that. I don't know, that seems like a giant leap to me.
Carole Theriault
There's another one about making sure it doesn't start up when you basically boot up Windows either, right? So don't just have it auto-start along with Windows. So yeah, I mean, I'm not saying TeamViewer is responsible for all these things, but these remote access tools need to be properly configured in order to try and stem the flow of attacks like this because they seem to be growing. You know, it's quite fun for a young hacker to be able to hack something that's so, you know.
Graham Cluley
Yeah, and don't display your TeamViewer username and password on the billboard, right? Don't have that popping up on the screen.
Carole Theriault
That must happen because you're sharing your screen, right? And I was thinking about that, like, how do you—
Maria Varmazis
How does that happen?
Carole Theriault
Yeah, how do you turn that off and how do you manage that? They may not even be aware that that's happening.
Maria Varmazis
Well, it's like when you have a press conference and you have the Wi-Fi username and password behind the reporter kind of thing, like, come on.
Carole Theriault
Yeah, I don't know.
Maria Varmazis
That's just bad password hygiene, bad overall hygiene.
Graham Cluley
I suppose it is. Well, guys, I think it's time to find out who's sponsoring the show this week. Let's find out who the sponsor is.
Carole Theriault
Graham, who's our sponsor this week?
Graham Cluley
Our sponsor is Recorded Future. You know them, they're cool, they do all kinds of cool things. Like? They look on the web, they look on the dark web, they peruse the internet in its darkest corners, and they work out what are the new emerging threats and vulnerabilities from the world of hacking and cybersecurity. And then they bundle it all up, they wrap it up in a beautiful ribbon and send it to you in a free email.
Carole Theriault
If you want to be ahead of the game, I guess you get their free daily email.
Graham Cluley
Of course you do. But first of all, you've got to sign up for it, otherwise they won't know to send it to you. They're not that clever. Go to recordedfuture.com/intel. And thanks to Recorded Future for supporting the show. Smashing, and welcome back to the show. And in this segment, we are going to choose our picks of the week. Yes, our pick of the week could be a funny story, a book we've read, a TV show, movie, record, an app.
Carole Theriault
I think we should have a choice of pick of the week and tip of the week. I do think we should maybe pick tip.
Maria Varmazis
Pick the tip. Tip to pick.
Carole Theriault
Yeah, sometimes people can give good tips. Sometimes there's a good pick.
Graham Cluley
That's what she said. I have to say, Maria, I thought having a woman on the show would actually raise the tone a little bit. And I'm not sure that's happened.
Carole Theriault
Why would that happen?
Maria Varmazis
Who gave you that idea? Graham, you know me.
Graham Cluley
I thought we would get out of the locker room and it would just be a little bit classy.
Maria Varmazis
Listen, Trump's president, anything is possible now. You know, kidding. Anyway.
Carole Theriault
Pick of the
Graham Cluley
Pick of the week. Maria, could you say, "Pick of the week"? Ah, excellent.
Maria Varmazis
There you go.
Graham Cluley
Very keen.
Maria Varmazis
Yes.
Graham Cluley
So I've just got a quick one for you all. There is a podcast, it's ridiculously popular. I mean, it's—
Carole Theriault
week, pick of the week. Yeah, if you listen to podcasts, you've heard of this podcast, but you— Yeah, it's a good one.
Graham Cluley
It's Reply All from the guys at Gimlet Media, which is a great weekly podcast. I think they do it most weeks, and it's all about the weirdness of the internet and things like that. And their latest episode, which we'll link to in the show notes, is all about tech support scammers. Now, when I saw it was about tech support scammers, I thought, okay, they're going to do the usual thing where a scammer calls them up and they keep them on the phone for ages and it gets more and more ridiculous. But no, they've been rather more inventive than that. It's almost brilliant. It's a great episode.
Maria Varmazis
And so what do they do?
Graham Cluley
Well, I don't want to give too much away because it's rather beautiful, but basically they almost form a relationship with the scammer. You know, it's like they're calling up regularly for chats and—
Carole Theriault
But they also do a bit of journo-ness, right? So they go and do a bit of digging and they find out lots of information, which is quite interesting.
Graham Cluley
They find out more about this particular company which is doing the scams and the people who are working there. And it ends on something of a cliffhanger, which will make you want to tune in, I think, to the next episode, which hasn't been released at the time of recording, but I'm looking forward to it to find out what happens next. But I would recommend it. Carole has an endless appetite
Carole Theriault
Yeah, I agree. Total hat tip for that. I loved it as well.
Graham Cluley
Go and check out Reply All, and the episode is called Long Distance. And as I said, we will have a link in the show notes. for dark and sad, is Got a lot of those this week.
Carole Theriault
Yeah, it's the mot du jour.
Graham Cluley
what we're saying. So Maria, what's your pick of the week?
Carole Theriault
Pick of the week.
Maria Varmazis
My pick of the week is speaking of cliffhangers. It's a fascinating documentary I saw a few weeks ago while in the throes of newborn haze. It's the documentary called Tickled. Because I heard you guys talking about the Red Pill documentary a few weeks ago, and I'm just, Graham loved that one.
Graham Cluley
Loved it.
Maria Varmazis
Hard pass on that one for me. Just, just frankly, no thanks. I'm on Reddit too much. I know what that's about. No thanks, pass. But the documentary called Tickled, which is all about, quote, competitive endurance tickling, is, as the tagline says, not what you think. And Carole and Graham, you both have seen it, I believe, so you can back me up on this.
Graham Cluley
It's a great documentary. You recommended it to me, Carole.
Carole Theriault
Yeah, I watched it maybe a few months ago off Netflix, and I called Graham the next day in the morning saying, you must watch this, you must watch this, you must watch this. And I forced them to watch it that night just because I thought it was that good.
Maria Varmazis
Did you get Graham to watch it? No, just kidding. But that's the thing. You think it's a sex thing, and it is, but it's not. And that's not what this is. No, I just gave it away, but it's not crazy people. Some super crazy people. And it's kind of dark and sad, and there's really no conclusion to the main documentary, which is a little frustrating because you're, you're dark and sad maybe, but also I sort of, you know, curl up on a Friday night with a bowl of popcorn.
Carole Theriault
I think it's
Maria Varmazis
And popcorn.
Graham Cluley
And popcorn. Stuff in her face. Bit of darkness, bit of sadness, bit of popcorn.
Carole Theriault
delicious, delicious TV.
Maria Varmazis
Delicious. Have you seen the follow-up documentary called The Tickle King?
Carole Theriault
No.
Maria Varmazis
Okay, so this is— you have to— I'm giving you walking orders. Go watch The Tickle King because that's the follow-up.
Carole Theriault
I love documentaries like that.
Maria Varmazis
Basically, when they started airing the Tickle documentary at film festivals, a lot of the guys in the documentary started showing up and real-life trolling these events. Yes. And it's all this drama and it's kind of— so yeah, if the Tickle documentary is not enough for you, which it's, you know, it might not be, you know, if as fascinating as it is, go watch The Tickle King afterwards. Back to back, it's awesome. Really fascinating. And yeah, great, great watch.
Graham Cluley
Sounds good, I'll check it out. Thank you very much.
Maria Varmazis
No problem. And it's not the red pill.
Graham Cluley
Girl, what's your pick of the week? So mine, mine's a bit weird because I did this pick because of its weird factor. I mean, this is just too weird. So this is a Tokyo-based artistic design studio called We+. So this is a shock dummy face or something?
Carole Theriault
No, no, okay, look, look, let me look. I want you guys to watch the video, okay? There's a little promo video, it's on Mashable. Just watch this and you'll see what I mean.
Maria Varmazis
Okay, all right, let's watch it.
Graham Cluley
Let's go click it.
Carole Theriault
Now do you see how do they—
Maria Varmazis
No, nope, I'm noping out of this. No, no thank you. That's enough internet for me today.
Carole Theriault
So let me explain to listeners. So basically, say for example it was 10 to 2, you would have to have your left eye kind of facing upwards and left and your right eye facing upwards and right. Right? And how do you do that? So they took— they have 3 different face clocks which you can choose from that are available. And then they did movies of the faces moving their eyes in, you know, around the clock face. And then they of course mirrored two together to try and get the difference.
Maria Varmazis
It's—
Carole Theriault
The thing was, okay, okay, and there's some, you know, blah blah about how this is important, about how time controls our lives, that I just thought was just snooze fest. No, it's just, you know, sometimes just come on. However, I have to say, I would people to go look at it just to see if they actually can tell the time quickly. So I think there's, there's a game in here, right? Just stop the video and say what time is it?
Graham Cluley
I haven't seen— I cannot recognise this. I mean, you've explained to me how it works with the eyes moving. I can't read the times on any of these.
Maria Varmazis
It's just a human whose brain has been replaced with a goldfish and they're going pop, pop, pop. And it's just really disconcerting. And I don't want to tell time with that.
Graham Cluley
Who would want one of these?
Maria Varmazis
And their eyes are all bug-eyed and stuff. I'm not okay with it.
Carole Theriault
See, I have a number of cool clocks in my house that, Graham, you have a problem with because you feel that they're—
Graham Cluley
You have one particularly bad clock, which is absurd in every fashion and not very easy to— But actually, is it easier to tell the time from than this?
Carole Theriault
Yes, and I think better looking as well. I think I'd find it creepy. It's a bit like, you know those paintings in haunted houses where they follow you, the eyes follow you, Scooby-Doo style.
Maria Varmazis
You take the mask off and it's Mr. Weekends.
Carole Theriault
So go be weird. If any one of you want a top pick for being weirded out, go check out this little product and video on Mashable.
Maria Varmazis
That's my top clock that you have. Then you can't just use that.
Carole Theriault
Okay, so my clock is where the hand don't move, the hand stays steady, and there's a cog that turns around the hand, and the cog has the face on it. So the 1, 2, 3, 4, 5, and it kind of chugs along on a cog and it turns. And as it goes, you can tell what time it is.
Maria Varmazis
Does it have a cog?
Graham Cluley
I hope you're following this at home, folks.
Maria Varmazis
I heard cog 4 times.
Graham Cluley
This mental picture that's being drawn up. Carole, is it possible you've got a link we could put in the show notes?
Carole Theriault
Yes, let's add them to the show notes.
Graham Cluley
Or just take a photograph and chuck it up on the internet somewhere and people can see that.
Maria Varmazis
Put it on the tweeter link.
Graham Cluley
I think that just about wraps it up. It's been quite a show. We've had a few interruptions. Hopefully they didn't crop up in the edit too much. We had a power cut at one point. That was very exciting. But we've made it to the end. Thank you so much, Maria, for joining us.
Maria Varmazis
Oh, my pleasure. Thanks for having me.
Graham Cluley
It's been wonderful.
Carole Theriault
You were great.
Graham Cluley
She's been super, hasn't she?
Carole Theriault
Yep.
Graham Cluley
Thank you at home for tuning in. And if you like the show, or if you've got some—
Carole Theriault
Carole, you were great too.
Graham Cluley
Yeah, yeah.
Carole Theriault
If you—
Graham Cluley
No, I was great.
Maria Varmazis
Do you want to say I was great?
Graham Cluley
Because you're not. Right. Well, on that note.
Maria Varmazis
Just kidding. We love you a little, maybe.
Graham Cluley
If you've got any comments to make on the show, go sign ransomware like iTunes, where you can leave us some feedback. Just remember to click the 5-star button while you're doing it. Whether it's good feedback or negative feedback, we don't care. Just 5 stars, 5 stars. Go to www.smashingsecurity.com and you can follow us on Twitter @smashingsecurity, no G on Twitter.
Carole Theriault
And thanks as always for listening.
Graham Cluley
Yeah. Until next time.
Maria Varmazis
Toodaloo.
Graham Cluley
Bye-bye.
Carole Theriault
Bye.
Maria Varmazis
Okay, bye.
Graham Cluley
Thanks for making us laugh, Maria.
Maria Varmazis
Oh, no problem.
Carole Theriault
Yeah, because I'm not funny.
Graham Cluley
Yeah.
Maria Varmazis
Oh, that was so much fun!
Graham Cluley
Oh wow, fun!
Maria Varmazis
Oh gosh, I just dropped something on the floor.
Carole Theriault
Graham's not very funny.
EPISODE DESCRIPTION:
A security threat researcher is badly hacked in a revenge attack. Some people want to save Adobe Flash, but is that wise? And a poorly-secured electronic billboard starts displaying offensive images...
All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.