Listen early, and ad-free!

095: British Airways hack, Mac apps steal browser history, and one person has 285,000 texts leaked

September 12, 2018
0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Carole Theriault

And this data dump contained over 280,000 text messages which were sent and received by one of Paul Manafort's daughters.

Graham Cluley

So, hang on, one of his daughters sent and received 280,000?

Carole Theriault

Yes!

David Emm

Is she a bot?

Unknown

Smashing Security, Episode 95: British Airways Hack. Mac apps steal browser history, and one person has 285,000 texts leaked with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security Episode 95. My name is Graham Cluley.

Carole Theriault

I'm Carole Theriault.

Graham Cluley

And we are joined this week by— well, he's sort of a new guest and he's not a new guest because we tried to get him on a couple of weeks ago, didn't we?

Carole Theriault

Yes, we had some sound issues, if I remember correctly.

Graham Cluley

So David Emm from the Global Research and Analysis team at Kaspersky Lab. What on earth were you doing in that wind tunnel? Why couldn't we hear you properly?

David Emm

Well, you know, the things I do for work. No, we had a hardware problem, Graham, and problem with any of the microphones I tried. Hopefully this is much clearer.

Carole Theriault

Now I want to ask about David's name. So I've never heard the name Emm before. It's spelled E-M-M, right?

David Emm

It is.

Carole Theriault

And is that well known? Is that something that you run across often, or—

David Emm

It's a pretty unusual name. I mean, there's a cluster of Emms around the Salisbury region, which is where my dad was from, and one or two dotted in other places of the country.

Carole Theriault

But were you guys hiding from cops, you know, so I can just see the cops asking, what's your name? Uh, David Emm.

David Emm

Yeah, yeah, yeah. Well, I don't— not as far as I know.

Carole Theriault

Oh, we don't know of a checkered past.

David Emm

As far as I know.

Graham Cluley

Well, I would imagine if M was going to hang out anywhere, it might be not that far away from Terry O.

Carole Theriault

Jesus. MetaCompliance, the security e-learning experts. Make learning best practice engaging and fun through stories, realistic scenarios. The MetaCompliance guys provide animated e-learning and even games like phishing drills to test your knowledge. Plus, these guys get passwords, they get GDPR, they get security, and they've won awards for security awareness. Smashing Security listeners, you guys can get 10% off by visiting smashingsecurity.com/metacompliance and entering the code SMASHING. That's smashingsecurity.com/metacompliance. MetaCompliance.

Graham Cluley

Okay, well, there's been some bad news potentially for fans of the Mac App Store, the default place where Mac users tend to download their programs after they've been vetted by Apple.

Carole Theriault

Talking about their problems.

Graham Cluley

Well, there are problems, Carole, because lots of people imagine that apps which are downloaded from the Mac App Store are safe because they've been tested.

Carole Theriault

Oh, because you have told them that repeatedly over the years, saying to people, you should definitely go to the App Store because things are vetted and it's more likely that they're safe.

Graham Cluley

Well, it's true that at least someone has looked at the programs, whereas if you get them from any Thom, Dick, or Harry website, there's no guarantee that anybody's had a third-party look at them. But it doesn't mean that the Mac App Store is entirely safe. And in the last week or so, there have been a number of apps which have been booted out from the Mac App Store after being found scooping up users' private data, such as their browsing history in the background. Naughty, naughty, naughty.

Carole Theriault

You need to have a lot of access to do that.

Graham Cluley

Well, you would think so, wouldn't you? And some of the Mac App Store's highest-grossing paid utilities, ones top of the charts, are making some pretty grand promises. So these aren't obscure apps which are doing this. There are apps which say, oh, we'll keep your Mac safe, we'll get rid of annoying pop-up ads, we'll discover and remove threats on your Mac.

Carole Theriault

Pretending to be security firms or security apps that actually they're there snaffling up?

Graham Cluley

Well, just hold your horses.

Carole Theriault

Oh, is this a popcorn moment?

Graham Cluley

Because—

Carole Theriault

Okay, I'm ready.

Graham Cluley

Okay, they're bragging about how great they are at keeping your Mac secure, but what they're less keen to brag about is the fact that they are also snaffling up this data, such as your browser history, and uploading it to their server. Now, a couple of researchers, a guy called Privacy First—

Carole Theriault

A guy called Privacy First?

Graham Cluley

Yeah, I imagine—

Carole Theriault

Names are getting wacky.

Graham Cluley

It's a bit like Reality Winner, isn't it? Anyway, some guy who's calling himself Privacy First on social networks. He spotted the problem initially, but he found it hard to get Apple to take any action about these apps.

Carole Theriault

Okay.

Graham Cluley

He then worked with another Mac security researcher, someone who we've spoken about before, I believe, Patrick Wardle. He and Privacy First— how am I going to talk about him?

Carole Theriault

Mr. First?

David Emm

PF.

Carole Theriault

Called PF.

Graham Cluley

He and PF wrote up their findings. Whereupon others uncovered more data-slurping Mac apps, and Apple ended up booting out apps such as Dr. Cleaner, Dr. Cleaner Pro, Dr. Antivirus, Dr. Unarchiver, Dr. Battery, and Duplicate Finder out of the App Store.

Carole Theriault

How did they get there in the first place?

Graham Cluley

Well, they were put there by the developers, of course.

Carole Theriault

No, but how did they get through the testing, the vetting?

Graham Cluley

Well, somehow or another, the vetting wasn't sufficient, whether it was the case that the apps actually knew that they were being vetted by Apple and didn't perform this browser snarling functionality or not, I don't know. But what was most interesting to me is who was the developer of these data grabbers?

Carole Theriault

Do we know them?

Graham Cluley

Let me stroke my beard here, right? As if I could grow a beard.

Carole Theriault

That'll take 10,000 years.

Graham Cluley

David, have you ever had a beard or a mustache or anything like that which you've twiddled?

David Emm

Oh, a mustache a lot of years ago.

Graham Cluley

Did you?

David Emm

Just very briefly.

Carole Theriault

I bet you looked very handsome, David.

David Emm

I got rid of it pretty quickly.

Graham Cluley

Very sensible in my experience.

Carole Theriault

I like a mustache. I do.

Graham Cluley

You've married a very hairy man, to be honest. He doesn't find it difficult to shave.

Carole Theriault

Magnum P.I. was unavailable.

Graham Cluley

So who was the developer? None other than security vendor— David's panicking a bit now that it might be Kaspersky. It's not Kaspersky, it's Trend Micro.

Carole Theriault

Shut the front door.

Graham Cluley

Yeah. No, no, no, no. Okay. What? What?

Carole Theriault

I don't believe it.

Graham Cluley

It was, it was Trend Micro. Trend Micro, who of course write a number of security products, both for corporations and consumers. They put some code—

Carole Theriault

They're a big anti-malware player, like top 5 in the world.

Graham Cluley

Oh, totally. Totally. Trend Micro put some code into their consumer products, which they say was designed to help the software determine if users had recently encountered online threats. And yet that code was also incorporated into products which were not security-related.

Carole Theriault

Hmm.

Graham Cluley

Now, people didn't really like the idea that Trend Micro might be snaffling up people's browser history. Hmm, surprising that. Trend Micro went into panic mode and issued a statement. They said, look, this was a one-time data collection done for security purposes to analyze the browser history, work out if someone had recently encountered adware or other threats, and thus to improve the product and service. So you could argue that in short, what they were trying to do was they were improving the user security by compromising their security.

Carole Theriault

Okay. Did, I'm guessing, did their agreements say that they were doing this? Their terms and stuff?

Graham Cluley

Well, this was the thing. They were at pains to point out that not only was the data collection occurring once per installation, and wasn't actually including the full browser history, but also the users had agreed to this because they had approved the software license installation. And there, buried away in the small print, was this little bit which said, look, we're going to take some of your data to analyze this. Which raises an interesting question, isn't it? Because it's often the spyware and the adware and nastiness like that, which takes advantage of people not properly reading the EULA, right?

Carole Theriault

I'm depressed now.

David Emm

People don't read EULAs, you mean?

Graham Cluley

I know, it's a shock, isn't it, David? Yeah, apparently not. Are you in the habit of reading a EULA?

David Emm

Yeah, yeah, generally, but there are exceptions, of course, because as all of us know, sometimes those things are not just half a page long. Sometimes they're just a bit longer. Well, I think it gets even worse because even in situations where this is down to a manageable size, and I'm thinking here about the permissions that apps ask for, people don't even read those either.

Graham Cluley

That's right. I mean, when you install, for instance, an app on your Android device, it will say, you know, are you happy with it accessing the microphone and your location, even though it's an app to produce a flashlight, for instance, and people just go, "Yeah, yeah, yeah, just give me the app," don't they?

David Emm

Exactly.

Carole Theriault

Well, it's not like a lot of this stuff is done super clearly a lot of the time, right?

Graham Cluley

No, but—

Carole Theriault

I think there's a lot of trickery involved in trying to get access to as much data as they can. This is not all companies, but a lot of apps do that.

Graham Cluley

Yeah, I mean, some apps will actually exploit vulnerabilities or weaknesses to waltz past this permission screen. I know with a new version of macOS 10, which is coming out soonish, they'll warn you more about what the actual apps are trying to do. But fundamentally, I think relying upon your users to read the license agreement, well, legally that might get you out of hot water because you have kind of told them. But in all honesty, you haven't really told them, have you?

David Emm

I think also comes back to your earlier point about something in the official app store, that there's a sort of inbuilt feeling because people like us tell them, look, stay on the beaten track. You're more likely to be safe if you download from a reliable source like that. And that people lower their guard because of that. And also, you know, we've got to face the fact that although we work in this industry and therefore we're attuned to this stuff, other people aren't. They're looking for this or that or the other functionality, and they're not necessarily savvy about whether XYZ functionality is needed for what they're doing.

Carole Theriault

Totally. And, you know, lots of people don't even know how to read legal mumbo jumbo, and it's not always easy. You know, I often read and have to read it out loud really slowly, and who's going to take the time to do that?

Graham Cluley

And furthermore, we're talking about Macs here, right? And I think there's still this perception amongst many users that you've helped build— what, what, I've helped build what?

Carole Theriault

You have often said if you want better security, choose a Mac.

Graham Cluley

No, I haven't. What I've said— no, that's completely inaccurate. I'm gonna pick you up on that one. No, what I've said is if you want less attacks, less arrows being thrown at you get a Mac, because there is much more malware.

Carole Theriault

It's kind of the same thing.

Graham Cluley

No, no, no, it's not at all. There's much more malware and spyware for PC, so I do believe if you're running a PC, you're perhaps more likely to get infected by things and something nasty happen to you. But that doesn't mean that you can forego protection and sensible practices on your Mac as well. I wasn't suggesting that. I just, look, Apple has a reputation for being safer. That's true.

Carole Theriault

This is a screw-up. And I think the screw-up actually is more than just having a bad app in the App Store. It's that companies that we are supposed to trust and want to build a relationship with and use their services, you know, maybe they're giving themselves a bit too much license and a bit too much access to stuff.

Graham Cluley

I heard—I read something online, therefore it must be true—that the number of—if you were to read all the EULAs of the software you run during the course of a year, it would take around about 80 days.

Carole Theriault

Well, it does, it feels creepy. I said that last week, but it still feels creepy.

Graham Cluley

To read all of them. Is that possible? It does. And I think it's not good for the security industry as a whole. I mean, it's a statistic from the internet, so I think it probably is believable. Cybercrime is a bigger problem than ever before, but we don't need incidents like this corroding users trust in security firms, do we? We want people to— we want people to install security software.

Carole Theriault

We want people to have a bit of freaking honor.

David Emm

Well, I'm guessing, I'm guessing, to be fair, that this is probably more to do with a dropped ball than it is with sort of malice aforethought. Hopefully that's the case. Yes, hopefully that is the case. So I'm guessing these are now kicked out of the App Store.

Graham Cluley

Trend has issued an apology. We'll link to it in the show notes. They've done a few other things as well. They've deleted the functionality from the apps. They've also deleted their logs of the data which they collected. Good. And they've— including, they've also removed the feature from the non-security apps, which shouldn't have had that feature in it in the first place. And I think that's the other story here, which other software manufacturers can learn a lesson from. It's not only that you need to get positive, explicit consent from your users as to what you're going to do and what private data you might be extracting from them, so they actually consciously acknowledge that that's going to happen. But you also shouldn't be fattening up your products with unnecessary code. If you've got a shared code library, which appears to be what was happening in this case, if you're incorporated into programs which aren't planning or don't need that functionality, rip that code out. Don't leave it there because it increases the threat surface, the chances of there being a bug or some unexpected functionality which was the case in, for instance, the Unarchiver. Why would that need to check your browser?

Carole Theriault

You know what, I don't know.

Graham Cluley

It doesn't need to.

Carole Theriault

Because why not, right? Big data is big money. And I agree with your point, don't get me wrong, I totally agree with your point. But I think a lot of this stuff is being inflated because systems are faster, they can handle bigger programs, and they can just slap it in because why not? Because they can get more data.

Graham Cluley

Well, I certainly hope in this case that they were purely collecting the data for some sort of security reason. I haven't seen anything to suggest they were using it monetize it in some fashion or do advertising or sell it on to somebody else.

Carole Theriault

So basically you're saying everybody screws up once in a while.

Graham Cluley

Everybody screws up once in a while, Carole.

Carole Theriault

Okay.

Graham Cluley

As I believe we all know. Is that right?

Carole Theriault

I don't know. I don't remember the last time I've screwed up.

Graham Cluley

Well, you certainly remind me of the times when I screw up quite often. David, do you ever make any screw-ups?

Carole Theriault

Oh goodness, not.

Graham Cluley

David, what's your story for us this week?

David Emm

Well, I've been following this story to do with the British Airways hack of data.

Graham Cluley

Oh yes.

David Emm

380,000 people's data that's out there in play.

Carole Theriault

The sophisticated hack.

David Emm

Well, yeah, we'll see how sophisticated in the end, no doubt. What certainly seems to be the case at the moment anyway is that rather than somebody digging into BA's backend systems and hacking into that, they were actually collecting it in real time from the forms that were being filled in. So this was done, it seems anyway, through a script on the website.

Graham Cluley

And this was a web page where people were making the payments for their upcoming flights. Exactly.

David Emm

And that seems to be the data that's gone. You know, that's what BA is saying. It's credit card numbers, including, you know, the magic CVV number, the 3 numbers on the back of the card. Names, email addresses I've read. No doubt we'll get clarification on this at some point, but at any rate, this is not a case, as we've seen in the past, of people hacking a backend system and guess what, you know, people's usernames and passwords and so on are not being secured properly. This is a question of somebody doing it at the point at which it's being input. You know, not only when you carry out security audits have you got to look at the sort of traditional aspects of that, including web servers and making sure you're up to date and your password policies are good and all of that. But also you've got to make sure that any scripts that you've got running are also okay. And of course, it's often the case that companies are running third-party processes. A third-party process is being used to— for payment or to deliver ads.

Graham Cluley

Yes.

David Emm

And where it's a third-party script, then you've got another issue because it's not yours. And therefore, you know, it becomes harder to verify the integrity. And so in that case, you've got to make sure that you are limiting the scope of what it can do.

Graham Cluley

And I remember this being a problem earlier this year. Do you remember tens of thousands of government websites and all sorts of things all got seemingly hacked simultaneously? And it's because they were all using this accessibility plugin designed for people who were, I think maybe were visually impaired or something like that. And that plugin got hacked. And suddenly all these websites which were pulling down the JavaScript from that site were themselves hacked en masse. So I guess one of the clues by which we know this is the way in which this occurred with the British Airways hack is they not only got the payment card regular details like your number and your expiry date, but they also got that magic 3-digit CVV number on the back, which isn't normally stored by businesses, is it? Exactly. They don't store it, but it is input on the webpage. So if that webpage has been compromised with a malicious script, there's the opportunity for the criminal to grab it.

Carole Theriault

Yeah.

Graham Cluley

So this is a pretty big hack and one of the biggest and most high-profile hacks which has occurred since GDPR came into effect.

David Emm

Exactly. It will be interesting to see, you know, what the outcome of that is. And I know certainly, Graham, you talked about one of the issues to do with legal challenges to this and legal firms trying to round people up about getting compensation. Now clearly the ICO has something to say about this, and you know, they're pointing the finger at BA and there's culpability there. That's even worse.

Graham Cluley

So there is a US law firm which has just set up a UK branch called SPG Law. They actually set up the day after the BA breach was announced, and they instantly released a press release saying that they were launching a £500 million class action suit over the British Airways hack. What that actually means is that they are saying that they believe victims can claim up to £1,250 each. So multiply that by 380,000 and you get your £500 million. Now, I think they were being rather opportunistic, and obviously they got their name in the press and all the rest of it, because I'm not sure we necessarily want law firms instantly jumping into these things and offering to help people get compensation. I think that may not always work to the advantage actually of the consumer.

David Emm

Where there's a blame, there's a claim. Yeah, but you know what I mean?

Carole Theriault

Do you know what? I would be super, super peed off if I were one of these. As soon as I heard of this hack, I was like, oh my God, did I book a flight? Did I book a flight? Because I use BA a lot. And I was so relieved that I wasn't, you know.

David Emm

And although BA is saying that they won't see anybody out of pocket with this, that's great. But actually, the thing is that how do you link the two together? So if in 6 months or a year's time somebody gets hit with some kind of fraudulent activity, how as the victim of that do you tie it back into this? Because at the end of the day, your details could have ended up in play from other kind of attacks other than the BA one.

Graham Cluley

Yes.

Carole Theriault

So the answer there is that you've got to change your details right now. Really?

David Emm

Yeah, absolutely.

Graham Cluley

A lot of the banks actually have already cancelled people's cards if they believe they were compromised by this incident. So they are reissuing cards. And it's good to see the banks do that. I feel a bit sorry for the banks as well. You know, the banks have taken this on the chin. Oh no, it's BA's incompetence here, right? Why should the banks have to?

Carole Theriault

Geez. Yeah.

David Emm

I was going to say, I think also, you know, while all of us, especially in our industry, put our hands to our face when this happens, actually BA came out, proactively chased this down, said, look, this has happened. Here's who's affected. We're contacting people. How often have we seen the case where actually maybe months later or even years later, we're hearing about a breach that happened way after anybody had any chance to do anything about it.

Graham Cluley

Well, this is GDPR in action, isn't it, David? They are— they've got a scare on. They know they have to notify people quickly. They know that potentially they could lose— is it 4% of their gross worldwide turnover?

Carole Theriault

Yeah, 4% of the annual turnover.

David Emm

Or €20 million, whichever is the higher.

Graham Cluley

Right. So it's a clouty fine, isn't it, potentially?

Carole Theriault

Well, that's a lot less than the money they'll have to pay out if everyone demands compensation.

Graham Cluley

Ah, I think a lot of these class action suits never come to anything very much. But we will have to see, I suppose. But BA, I suspect, are no longer everybody's favourite airline, are they? Do you remember that? They used to say that in their ads.

David Emm

I do remember that.

Graham Cluley

And also they said, "We'll take more care of you."

Carole Theriault

"Fly the flag." We'll take more care of you. Fly the flag. Do you know what? I like BA.

Graham Cluley

You like BA?

Carole Theriault

I may not use their website as easily anymore, but I don't mind a BA flight.

Graham Cluley

You just don't want them bumping the drinks trolley into you next time you're on the plane, do you? You're a bit worried now.

Carole Theriault

Bumping the drinks trolley. I'm trying to—

Graham Cluley

Does that refer to something? Everything's an innuendo, isn't it? David earlier was talking about intruding on people's back end, and now BA drinks trolleys. Crow, get your mind out of the gutter.

David Emm

Proud of the aisle.

Carole Theriault

So my story all hinges around Paul Manafort and his family. Now, for those of you outside the US political news orbit, tell me how you frickin' do that. Okay, no, so Paul Manafort was Trump's former campaign manager who was raided by the FBI, charged, and found guilty of 8 charges of fraud. And he's, I think he's sitting in jail waiting for his sentence. I think it's a maximum sentence of 80 years.

Graham Cluley

Yeah, and he's got a second trial coming up as well.

Carole Theriault

Yeah, yeah, basically he is not living the American dream at the moment, right? Nor his family, because this story is all about what's happened to his daughter. All right, I'm going to give you a bit of a quick backstory, and then I want your help in figuring out whether the wrongs outweigh the rights or vice versa. So about a year and a half ago, this big data dump was flitting around on the dark web, and this data dump allegedly contained over 280,000 text messages which were sent and received by one of Paul Manafort's daughters.

Graham Cluley

So hang on, one of his daughters sent and received 280,000?

Carole Theriault

I know, I worked that out. Yes, I worked this out. Okay, so if this cache was about 5 years old, okay, this is each person sending and getting 120-odd texts a day.

David Emm

Is she a bot?

Carole Theriault

It's just insane. I was shocked as well. But yeah, so basically all of this daughter's text messages and the ones that she's received and sent, right, were basically collated into this big dump and it was kind of going around the dark web, right? And rumor had it that the reason this had happened was the daughter's phone was hacked, right? So at the time, some news agencies kind of tweezered out a few politically Manafort or Paul Manafort-related messages from this big glut. These are messages that seem to have some context around the political arena and some of his shady dealings with Russian-friendly forces. And it was argued that this was newsworthy and therefore warranted public attention. Of course, also some people might call less reputable media, like the National Enquirer, also dished out stories. One where Papa Manafort apparently allegedly had an affair. National Enquirer cited the hacked messages to kind of validate the story.

Graham Cluley

If only some mutual friend of Paul Manafort and the National Enquirer had managed to influence them.

Carole Theriault

Orange. Yes, a very tanned individual.

Graham Cluley

Had managed to convince them not to publish that story. Yes.

Carole Theriault

Yeah. Now, okay, so fast forward to a few months ago, 20th of July, a freedom of information activist known as Emma Best decided to make the full data set of personal text correspondence searchable and available to anyone who wanted. And it was announced via Twitter. It was written on Twitter, today I am releasing a searchable transcript of over 285,000 Manafort text messages that WikiLeaks would not publish. You can find the what, why, and where at. It gives a link.

Graham Cluley

Data which WikiLeaks wouldn't publish. Oh, maybe because of the Russian—

Carole Theriault

Well, maybe of the political, you know, it's perhaps not—

Graham Cluley

It wasn't their flavor.

Carole Theriault

It's not their penchant of political party, it seems, based on past experience.

Graham Cluley

If it had been Chelsea Clinton, then maybe they'd have done it, but yeah, okay.

Carole Theriault

Okay, so now zoom to a few days ago. This all happened about a month ago, and the reason this is back in the news is largely due to the Streisand effect, Manafort's daughter's lawyer sent a letter to Twitter demanding they remove this Emma Best tweet. And in turn, Twitter just this week sent the activist a letter saying, would you voluntarily remove the tweet? And she told Motherboard, no intention of doing that.

Graham Cluley

Right.

Carole Theriault

Okay, so here are the nuts and bolts of this. Okay, so the data set is a reported 7,000 pages of unredacted text messages. Between Manafort's daughter and friends, colleagues, family, etc., etc., etc. It's going to contain private stuff, confidential stuff, personal stuff. You know, if this happened to me, messages that, you know, you'd be affected, Graham.

Graham Cluley

Well, I think it's abominable because that— yes, exactly, it'll be her friends and family and all sorts of innocent people.

Carole Theriault

It just mushrooms out, doesn't it?

Graham Cluley

Even— I mean, I don't know if she's innocent of anything or guilty of anything at all, but it just— you know, what gave Emma Best, in quotes, what gave her the right to publish this thing and make it so easily accessible?

Carole Theriault

Exactly. So it's quite a contentious problem, right? Because to be a responsible freedom of information activist, must you provide all information, no matter how personal, to a victim circle? Like, can you not redact over, you know, maybe redacting gets you in trouble as well because people are saying, well, it's redacted, so who knows what's redacted?

Graham Cluley

Yes.

Carole Theriault

Now, interestingly, on the Emma Best website, the activist lists out seven reasons why the unredacted text messages were published. And I thought I'd share a few of those with you. So one is the data has already been exposed and the damage done. Well, no one has provided it in a searchable, unredacted format. So it's very convenient now.

Graham Cluley

Yes. A crime has already been committed, so I decided I'd commit it as well. Where's the harm in that?

Carole Theriault

Yeah, another point was tabloids and trolls have already mined the transcripts and exploited them, you know, so basically the damage has all long been done and mitigated. And this is one point I found interesting. It says those involved know that the messages were hacked and that their phone numbers and email addresses, in case of some iMessage, have been exposed. They've had over a year to change their numbers and take steps to block harassment. Therefore, any harm in this regard is minimal.

Graham Cluley

This is another of Emma Best's arguments why she's released the data. And it's— I've got no sympathy with this at all, I have to say.

Carole Theriault

Yeah.

Graham Cluley

All right. Well, doesn't convince me.

Carole Theriault

I know. So, and do you think Twitter is complicit in this in some way? Do you think Twitter is responsible for the content that they allow users to post? I mean, they've been warned. They've been told, look, this is upsetting people. This is hacked text that the woman didn't hand over that are being mined by third parties against the victim's wishes.

Graham Cluley

It's not the first people I would think to. I think if I had any complaint about this, then I might try and work out who Emma Best's web host was, for instance. Or I may go to Google and try and get links to that particular web page removed, you know, saying, look, this is damaging my privacy.

Carole Theriault

This is where Emma Best is promoting the site, right? This is where the traffic is coming from. Anyway, interesting. So not only does Twitter not let us have a G in Smashing Security—

Graham Cluley

How dare they—

Carole Theriault

It won't remove the link to a cache of hacked SMS messages.

Graham Cluley

But there's lots of bad stuff that goes on Twitter, Carole. Is this really the worst thing that happens on Twitter other than obviously the lack of a G?

Carole Theriault

Well, you know, I don't know. Ask Manafort's daughter, see how she's enjoying it. I mean, apparently she's just actually appealed to get her name changed. I don't blame her.

Graham Cluley

I think this may not be the only reason why she's changing her surname.

David Emm

Or if you widen the circle, you know, I mean, there may be people who are not even remotely involved but are referenced in this stuff.

Carole Theriault

Absolutely. It's like you texted me, David, saying, God, Graham's a pain in the butt, right? And then that was posted somewhere.

Graham Cluley

I don't think it'd ever send a message. Hey, Carole.

Carole Theriault

Did you listen to my little bit about MetaCompliance and their e-learning?

Graham Cluley

Oh yeah, I heard that earlier in the show. Yeah, did you? Yeah.

Carole Theriault

Okay, well, have you signed up yet?

Graham Cluley

Well, no, I've been doing the podcast, Carole. I haven't had time to sign up for it, have I?

Carole Theriault

Well, women know how to multitask. Surely you can get a move on and sign up. We get 10% off. Just go to SmashingSecurity.com, you should know that website, /meta-compliance and enter the code smashing with a G.

Graham Cluley

SmashingSecurity.com/meta-compliance, enter the code smashing. Terrific.

Carole Theriault

With a G. Cool.

Graham Cluley

Hello and welcome back. And you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.

Carole Theriault

Pick of the Week. David, David, you have to say Pick of the Week.

David Emm

Okay. Pick of the Week.

Graham Cluley

Pick of the Week. Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like, doesn't have to be security related necessarily.

Carole Theriault

Shouldn't be.

Graham Cluley

And my pick of the week this week is something actually useful. It's not a TV show or a podcast or anything like that. No, I'm going to give you something which is really rather handy and may actually put some bucks or some pound notes in your back pocket. It is a website called airhelp.com — air as in aeroplane.

Carole Theriault

Airhelp.com.

Graham Cluley

Airhelp.com. And that gives you a clue because I was booked on a flight that was cancelled. There I was at Birmingham Airport trying to get to Edinburgh and the flight was cancelled, and I had to wait around at Birmingham Airport with you, Carole.

Carole Theriault

Yes, I remember.

Graham Cluley

For about three or four hours, and it was most unpleasant, or at least inconvenient. And then I heard about this website called Airhelp, and it said, look, if you've had a cancelled flight or a delayed flight, you might be able to get compensation. There I was, I was thinking, I wonder if I could get compensation for that. And all I had to do was enter my name and a confirmation number of the flight I was on, and it chugged and churned away, and about a month later it came back and it put £170 in my bank account — kaboom!

Carole Theriault

Did it?

Graham Cluley

Yes! Airhelp had taken about 25% as a commission, which was why I got £170 rather than, I don't know, £200 or something. But I figured that was a small price to pay for not having to do anything. It's a very handy website, so if you are on a delayed flight you might want to try airhelp.com — you can even import your flight history, should you feel safe about doing that.

Carole Theriault

I'm just looking at the privacy statement right now.

Graham Cluley

Don't try and make this security-related necessarily, Carole. This is a Pick of the Week.

Carole Theriault

I'm just going to say quickly, you know, because you're asking people to put in a lot of data here on this site. I didn't—

Graham Cluley

I hardly entered any information. I just had my booking reference number, my name, obviously my contact details, and the flight number, and it went chug chug chug, and I chose some radio buttons saying it was delayed.

David Emm

Was it a BA flight?

Graham Cluley

Oh, I could maybe demand some higher compensation if it had been a BA flight. No, it wasn't actually, but yes, you can import flights you've made in the last three years if you want it to chug away and look at all of them.

Carole Theriault

All I'm saying is the privacy data doesn't look too bad at quick look.

Graham Cluley

Okay, all right, there, it's got the Carole seal of approval.

Carole Theriault

Good pick of the week.

Graham Cluley

David, what's your pick of the week this week?

David Emm

Okay, well, my pick of the week is and isn't related to security. Something— an article in Forbes caught my eye, and it was really to do with employing autistic people, and specifically to do with stopping cyber attacks, because some of the characteristics and skills that autistic people— many autistic people have could be very useful. It doesn't just apply to cybersecurity, however. Seeing patterns, persistence, logical thinking, all of these things really— attention to detail is another one— are facets of autism. And actually, we're missing a trick if as a society we don't actually milk this, if we don't use these skills. Clearly, this is very topical in cybersecurity because we're facing a cyber skills shortage.

Carole Theriault

Yeah, right, right.

David Emm

It's estimated that about 13% only of autistic people get employed.

Graham Cluley

Really?

David Emm

And, you know, 1 in 100 people around about are autistic or on the spectrum somewhere. So given that, you know, these are really valuable skills, we could be missing out. You know, there's a danger, I think, as awareness about autism has grown, that people tend to think, well, everyone on the spectrum is like Rain Man, you know, or they can recite pi to 27,000 decimal places, which certainly one guy can who's autistic, but that's not—

Graham Cluley

27,000?

David Emm

Yeah.

Carole Theriault

Who checks?

David Emm

I believe a guy called Daniel Tammet did that, and it took place, I think, in the Bodleian Library in Oxford. And I think that's just the record for Europe. I don't think that's a world record.

Graham Cluley

I have to be honest, if that was going on at the Bodleian Library in Oxford, I'm not sure I'd buy a ticket to watch it.

Carole Theriault

Oh, I don't know, I think I would.

Graham Cluley

27,000 rolls. I wouldn't know.

Carole Theriault

I would have it written down on a piece of paper and I'd knock it off as he went.

Graham Cluley

What do you think? 72193641.

Carole Theriault

You'd need a toilet roll, Carole.

David Emm

That's what they did. That's what they did. I think they just had mountains of computer printout paper with these on.

Carole Theriault

I love it.

David Emm

So, you know, I think we, you know, there's a danger of pigeonholing people, but nevertheless, you know, these skills do exist. I mean, I can recall, I've got a son who's autistic, and I can recall when he was about 8. A bit of background. I mean, when Disney Pixar put out, I think it was Finding Nemo, it had a short film called Knick-Knack. And it was about knickknacks on a dressing table and how the guy in the snow globe wanted to join them for a party. But in Toy Story 2, it made a sort of cameo appearance. Woody, one of the main characters in Toy Story, gets kidnapped in that particular movie, and the rest of the toys know that it was the guy that advertises the toys who wears the chicken suit who'd kidnapped him. So they decide they'll flick through all the channels very, very quickly to find the advert with the chicken man in. And they're going through at a rate of knots looking for this. Anyway, we'd watch this and my son said to me, oh, that's a knick-knack. And I said, what do you mean it's knick-knack? And the next time we watched it, I stopped it and freeze-framed it. And sure enough, one clip, one static clip from one of the channels on those of this particular short film. How he saw it, I don't know, but you know, he's got that level of attention to detail. And so, you know, these are skills which not just in cybersecurity but elsewhere are very valuable.

Carole Theriault

So if anyone wants to hire David's son, I'm sure GCHQ are listening.

Graham Cluley

Yeah, is this— is that why you're on? Is this basically an advert? Is this a job advert?

David Emm

No, no, but you know, feel free to give me a call.

Graham Cluley

That's excellent. Well, we'll put a link to that story into the show notes so other people can read all about that. Carole, what's your pick of the week?

Carole Theriault

Mine is rather silly this week. It's a Twitter feed. I thought as I'd kicked Twitter in the shins in my first story, might as well give it a little, get it back up there. So go to Cold War Steve on Twitter. This is a crazy photo montage world of McFadden's Cold War. It's kind of dark and it's snigger-worthy as well.

Graham Cluley

Steve McFadden, he's the guy from EastEnders, which is a British soap opera. Exactly. He's an egghead, Sontaran kind of person.

Carole Theriault

Right.

David Emm

Yes.

Carole Theriault

So basically this is a Twitter feed primarily aimed at Brits or Anglophiles. So there's photo montages that are mashed up with some of our best known, if least liked, political leaders or footballers or soap stars. And of course, Noel Edmonds, who shows up everywhere. So you'll see Boris Johnson, Theresa May, even Ant and Dec make an appearance. David Cameron's tasseled loafers make an appearance. It's just, it's really quite fun. I've been looking, I saw it in an article in The Guardian, I don't know, a month ago or so.

Graham Cluley

I'm looking at it right now. So these are, yes, so these are photo montages, lots of British celebrities typically, although I'm seeing some Americans as well, in bizarre situations.

Carole Theriault

And it's basically Where's Waldo, effectively, but with our British beastars. And what's really cute is this guy apparently knocks these out on his bus commute, which, you know, I've done a bit of, you know, quick editing this, you know.

Graham Cluley

Microsoft Paint. Yeah.

Carole Theriault

I'm not this smooth without a bus. I don't even know how he manages that, but who cares? It's a great time-wasting website. I love it. So check out McFadden's Cold War on Twitter and enjoy.

Graham Cluley

All right. Well, thank you. Thank you, Carole Theriault. That's slightly strange, but amusing.

Carole Theriault

You see August 23rd. It's very good.

Graham Cluley

August 23rd. You're going to read out some of your favorite dates, are you?

Carole Theriault

David Cameron's in the foreground. Yeah, I can see Noel Edmonds is there as always.

Graham Cluley

Noel Edmonds. We're going to have to put in a link to something about Noel Edmonds so people who live in other countries know all about Noel. On that slightly bizarre note, I think we just about wrap it up for this week. David, if people want to find out more about you or follow you online, what's the best way to do that?

David Emm

Well, they can go to securelist.com, which is where Kaspersky Lab puts all of its analysis on there. They can follow me on Twitter @memm.

Graham Cluley

And that's M-E-M-M. Yeah, that's right.

Carole Theriault

Emm, yes it is.

Graham Cluley

And you can follow us on Twitter as well, @SmashingSecurity. Security. No G. Twitter won't allow us to have a G. And we've got an online store where we don't make a single buck. We're giving away things for free. And if you follow us on our— what?

Carole Theriault

No, well, no, they're not totally free.

Graham Cluley

Oh no, you're right.

Carole Theriault

Don't make a buck.

Graham Cluley

We don't make any money.

Carole Theriault

He's overselling, guys. Sorry, I got excited there.

Graham Cluley

But, but, Carole, if people follow us on Twitter, occasionally we tweet special voucher codes where people can save 20% off their mugs and t-shirts.

Carole Theriault

Yeah, but it still costs something.

Graham Cluley

It still costs something.

Carole Theriault

Yes. All right, you've caught me out. Go to smashingsecurity.com/store for that. I know we got 5 new reviews last week. They were amazing.

Graham Cluley

We read them all. We read them all. We do. And we have a little private conversation, me and Carole, especially if you mention one of us or the other. And, you know, to say, you know, Graham is my favourite, something like that.

Carole Theriault

Yeah, Graham needs it more than I do, guys.

Graham Cluley

Until next time, cheerio, bye-bye, adieu!

Carole Theriault

I'm sorry, I've double entendre again. Yes, you are. I'd say I rose above it. Yeah. Was that okay?

EPISODE DESCRIPTION:

Malicious script is being blamed for the British Airways hack, Trend Micro's apps are booted out of the Mac App Store for snaffling private data, and Paul Manafort's daughter wants Twitter to remove a link.

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by David Emm of Kaspersky Lab.

Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.

Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

Warning: This podcast may contain nuts, adult themes, and rude language.

Theme tune: "Vinyl Memories" by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

Special Guest: David Emm.

Sponsored By:

Support Smashing Security

Links:

Privacy & Opt-Out: https://redcircle.com/privacy