This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Graham Cluley
It's not just the external threat, but the threat of people who are basically people you've opened your kimono to, people who you've sort of embraced or brought into your company or trusted.
Carole Theriault
You open your kimono to your investment bankers?
Lisa Forte
Who does that?
Unknown
Smashing Security, Episode 153: Cybercrime Phishing, ransomware, and phishing. Time doesn't pay, but Uber does. With Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 153. My name's Graham Cluley.
Carole Theriault
And I'm Carole Theriault.
Graham Cluley
Hello, Carole.
Carole Theriault
Hello, Graham.
Graham Cluley
We are—
Carole Theriault
How are you today?
Graham Cluley
Well, thank you very much for asking. I'm not too bad, actually. And I'm particularly excited because we have a brand new guest on the show.
Carole Theriault
Never been on the show before.
Graham Cluley
Never been on the show before. Can you believe it?
Carole Theriault
There's just a few people out there. Absolutely.
Graham Cluley
Someone who hasn't been on the show before. It's Lisa Forte. Hello, Lisa.
Lisa Forte
Hello.
Graham Cluley
Now, Lisa, you should tell us what you do and who you do it for and why are you here?
Lisa Forte
Wow, so many questions all at once. So I'm a partner at Red Goat Cybersecurity, and we specialize in security training and crisis simulations for crisis management teams and organizations where we simulate a cyberattack and then see how they handle it and the sorts of decisions they do or do not make. And then I write a brutal report up on how well they did.
Carole Theriault
That sounds awesome. Now, did you have anything to do with the name of the company?
Lisa Forte
Yes.
Carole Theriault
Oh, tell me why. Why Red Goat?
Lisa Forte
So it was kind of funny actually, because it really wasn't planned. And just as I was setting up the company, I read this report in the New Scientist that was about some study done by UCL in London, and they'd recognized that goats can tell intruders to their herd just by hearing their voice. And I thought, this is kind of exactly my thing for my company and what we're doing. So I thought, you know what, I'll do it. And now when I go into some of my clients, they go, oh, the goat lady's here.
Graham Cluley
So charming.
Lisa Forte
You can't ask for anything better in life.
Carole Theriault
I wonder if you can use something like a deepfake lyrebird on goats and then present them in front of them and they might get duped. Okay, I digress. I digress.
Graham Cluley
Just slightly. Carole, what have we got coming up on the show this week?
Carole Theriault
Well, first, thanks to this week's sponsor, LastPass. Its support helps us give you this show for free. Now, on today's show, Graham tells us what happened to a Romanian couple who hijacked surveillance cameras in Washington, D.C. Lisa visits the world of insider traders who are trading our secrets. And I'm revisiting the Uber hack of 2016, now that we have all the juicy details. All this and loads more coming up on this episode of Smashing Security.
Graham Cluley
Now, chums, chums, can I take you back in time once again to the happy days of January 2017?
Carole Theriault
Are you planning to start every single story now that has happened before last week with—
Graham Cluley
I'm glad you've noticed this. Exactly. We're going back in time almost three years. January 2017, a time when we were full of hope, wasn't it? Do you remember what was going on? This beautiful romantic couple were walking the streets of Washington, D.C. Him, he was tall. He was tanned, his blonde hair blown in the wind like a young Robert Redford, a long red tie dangling down his torso. And next to him, a pouting former model from Slovenia, a picture of true love. I'm talking, of course, I think you can guess.
Carole Theriault
Trumpistan?
Graham Cluley
Exactly. About Donald and Melania. I almost called her Melanoma. Melania. There they were as he was given the nuclear attack codes and the keys to the White House. And we thought, oh, wonderful, a whole brand new era of civilization is about to begin. How fantastic, how optimistic. Yes, those were happy times, and we knew everything was in safe, albeit quite small, hands. Well, Graham, let's not bring my hands into things. But we knew we had nothing to fear. But Donald Trump's presidential inauguration could have gone horrifically wrong. There's some people who think it did go horrifically wrong, of course, but you know, just days before the ceremony, just days beforehand, hackers managed to hijack 70%— 7-0%— of Washington, D.C.'s public surveillance cameras being used by the police. And they demanded a ransom for their safe return of over $60,000.
Carole Theriault
A worldwide investigation is underway into a cyberattack on Washington, D.C. surveillance cameras ahead of last month's inauguration. Hackers targeted traffic and security cameras in the nation's capital just 8 days before President Trump was sworn in, and the attack happened while federal law enforcement officials were trying to ramp up security.
Graham Cluley
So they came in via the internet and basically just jammed them all up so they couldn't be used.
Carole Theriault
Oh, so they jammed them. It wasn't they were taking what was being recorded, they were just flooding them.
Graham Cluley
No, no, I mean, they could have just tuned into CNN or MSNBC. That wouldn't have been that tricky. I mean, I know it can be hard getting those stations overseas, but you wouldn't necessarily go to this effort. But what they did was they installed ransomware onto the computers controlling the cameras.
Carole Theriault
Yeah.
Graham Cluley
And they then used those computers not only to sort of block them up, but also they used them to spam out an additional 180,000 email addresses with a ransomware-laden payload. Nasty stuff. And the Secret Service, as you imagine, you know, they sprung into action because this was—
Carole Theriault
So did they figure it out? So they hijacked this 70% of— this must be thousands of cameras, and what people noticed right away— or they sent out the ransom right away. Oh yeah, they demanded a ransom.
Graham Cluley
I think, yeah, and I think the smart chaps at the Secret Service and the Washington police noticed when the ransom message— yeah, exactly.
Carole Theriault
Yeah, when they got the ransom message, yeah, put on their hats, stood up, did a little backstretch, went and handled the problem.
Lisa Forte
Was it their ransomware or was it purchased?
Graham Cluley
Yes, they'd bought it from hackers based in another country. But the Secret Service, you know, they sprung into action. They said this was a really high priority due to the impact on their mission, which was obviously to protect the First Lady and POTUS as he was given all the power.
Carole Theriault
And presumably every single person in Washington, D.C.
Graham Cluley
Right.
Lisa Forte
And I'm sorry, but to play the cynic, also kind of embarrassing.
Carole Theriault
Ever so slightly.
Lisa Forte
In some ways, that's kind of the worst part of it. You're "oh my God, it wasn't even sophisticated."
Carole Theriault
And God.
Graham Cluley
And obviously, based upon what we subsequently found out, no one would have wanted cameras out of action at the inauguration. I mean, that was a truly historic moment, needed to be recorded. We needed photographs of the crowds for posterity so that we could later count how many.
Carole Theriault
So, did they use the public surveillance cameras, Graham, to do a crowd count? But to your point, if they were worried about any dissidents at the event, that is presumably how you would capture them.
Graham Cluley
Now, fortunately, before the big day, things actually got sorted out, but nobody likes loose ends when it comes to a cybercrime attack. It's fun to unravel the mystery and find out who did what and why. And that is what a recent article in the Wall Street Journal does rather spectacularly. And I was reading this and I thought, oh, I would love to share this with listeners of Smashing Security. So I'm gonna tell you what was happening because while Donald and Melania, let's not start a rumor that the First Lady's a man. No, so Melania, while they were, you know, doing all those lovely things, there was another couple 5,000 miles away in Bucharest.
Carole Theriault
Okay.
Graham Cluley
And this young couple, now I'm probably going to butcher their name. So, you know, I'm sorry, I'm not Romanian. So apologies. Alexandru Isvanca and Evelyn Cismaru, a guy and a girl, and they were set up in Bucharest and they were rather like Bonnie and Clyde. They were a bit like cyber criminals of the 21st century. They actually liked to call themselves, their nicknames, their pet names for each other were Bobo and Eve. So I think I might call them Bobo and Eve as well.
Carole Theriault
I wouldn't want to tell you my husband's nickname for me, just saying.
Graham Cluley
Eek.
Lisa Forte
Eek, eek, eek.
Graham Cluley
Waiting for that data breach. So now they'd been together for a while. In fact, ever since around about a year after they first met, they had supported themselves in their relationship through computer crime and credit card fraud. Fairly unsophisticated stuff. Yeah, romantic. Well, you know, who knows what they're buying. Committing small-scale online fraud with stolen credit card numbers, spamming out people. And they largely got away with it, I think, because for the police, the cost to investigate the crime was just too high.
Lisa Forte
Yeah.
Graham Cluley
Actually, Lisa, didn't you used to be with the police?
Lisa Forte
I did indeed.
Graham Cluley
And was this your experience that some computer crime doesn't get investigated for that reason?
Lisa Forte
Yeah, and to be honest, you've gotta balance out the chance of being able to catch someone and the harm that's been caused by whatever they've done and cost to the police resources. And sometimes that doesn't always mean everything gets investigated.
Carole Theriault
I imagine the amount of time and resources required just to make contact with the correct officials in Eastern Europe would be in itself completely off-putting.
Lisa Forte
Totally. Yeah.
Graham Cluley
Right. So there's different legislation in different countries, there's different languages, there's different time zones. It all adds up to money, money, money, and lots of effort, which maybe could be being spent elsewhere. And I think some financial institutions, if it's not tens of millions, are happy to take it on the chin. You know, and they think, well, consumers are gonna pay for this ultimately. You know, through bank fees or whatever. So Evelyn, also known as Eve, she was actually found guilty of some credit card fraud back in 2012, but she only got a suspended sentence and told to behave herself in future. But surprise, surprise, that didn't stop her. And it didn't stop Bobo either. And from their apartment in Bucharest, they had spammed out this ransomware attack to an email list they'd picked up. And it just so happened that it infected all of these computers running Washington DC.
Carole Theriault
Oh, so it wasn't a targeted attack by any stretch. It was just a lucky find.
Lisa Forte
But that's even more embarrassing.
Carole Theriault
Yes, I agree. I agree.
Graham Cluley
Exactly. It wasn't like they'd put loads of effort into infecting those particular computers. It's just that they were unprotected or the users on those computers had clicked on an email attachment, and bam, they got infected, and then it spread inside the organization.
Carole Theriault
So it's like casting a net with your eyes closed and you just happen to catch this huge poisson.
Graham Cluley
Yeah.
Lisa Forte
But to be honest, it is nice to do something with your partner and have something in common.
Carole Theriault
Yeah, a story you can tell at dinner, right? Exactly. Or to your friends.
Lisa Forte
Yeah, how did you guys meet?
Carole Theriault
Yep, well, it's kind of funny.
Graham Cluley
Do you have a partner, Lisa? I mean, you're an ex-police person.
Lisa Forte
I wonder if—
Graham Cluley
Now, on the very same day that Bobo, the guy, managed to infect all these CCTV cameras in Washington, D.C. streets, he made a mistake. And his mistake was to order food from a pizza shop called Andy's Pizza in Bucharest.
Carole Theriault
What, on the same—
Graham Cluley
On the same day.
Carole Theriault
On the same day.
Graham Cluley
On the same day.
Lisa Forte
I know where this is going.
Graham Cluley
So now his mistake wasn't ordering a Hawaiian pizza.
Lisa Forte
Okay, phew, that's fine. That's what I thought it was gonna be. Yeah. I'm Italian, so people get hung in Italy for ordering Hawaiian pizzas. So please don't do it.
Graham Cluley
That wasn't his boo-boo. What his boo-boo was is that he used the same email address that he had used to spam out all these other people.
Carole Theriault
That's pretty 101 mistake, isn't it?
Graham Cluley
Well, it turns out, Carole—
Lisa Forte
Oh, sec 101. Yeah, yeah.
Graham Cluley
It turns out that quite a few cybercriminals make 101 mistakes. The thing is, they may only make them once or twice, but that's enough, isn't it?
Carole Theriault
Yeah, well.
Lisa Forte
Wow.
Graham Cluley
Well, he wasn't the only one making a boo-boo, was Bobo. Eve, she had this other criminal scheme up her sleeve. You see, she was running a fraudulent seller account on Amazon. You know, you can buy things on Amazon which don't come directly from Amazon, but from other people who sort of set up online stores up there.
Carole Theriault
Yeah, of course.
Graham Cluley
She set up a fake one. And what happened was whenever people ordered something from her, she'd get the alert saying, oh, you know, Frank has ordered a book or a DVD box set or something. And then she would use a stolen credit card to go and buy it from a legitimate seller. So they would do all the shipments. So she'd get the money and then she'd use a fake credit card to actually buy it and get it delivered. Well, it's astonishing this sort of thing goes on, but it does go on. But she didn't use her own computer to do this because that would of course left too many clues lying around, right?
Carole Theriault
Oh my God, that would be the best outcome.
Graham Cluley
Well, she used one of the computers belonging to the police in Washington, D.C., controlling the CCTV cameras. And so when the U.S. officials, when the Secret Service were running around fixing the hijacked cameras and panicking about that and resetting the computers, they went to one of these computers and they found on it this tracking number of an Amazon package being sent to the UK, right? And interestingly, when they looked at the order of what was being sent to the UK, do you know what it described the item as?
Lisa Forte
No.
Graham Cluley
A smoking gun.
Lisa Forte
Oh my God.
Graham Cluley
Now, when I heard of a smoking gun, I thought this might be something that people vape with, right? Because that's sort of, you know, all the smoke and stuff, which I thought maybe it's something like that.
Carole Theriault
Okay.
Graham Cluley
Or a cigarette lighter or something. But no, apparently a smoking gun is an accessory used by people who like barbecues. And according to the Amazon description, adds a lovely smoky flavor to food and drinks.
Carole Theriault
Are you sure it's not a smoker gun?
Lisa Forte
Yeah, I would have said smoker gun.
Graham Cluley
Well, look, I— this is the Wall Street Journal, and far be it from me to suggest that they've got this wrong.
Carole Theriault
Okay, but did you Google it? I'm just going to do that right now.
Graham Cluley
Well, you can go ahead and use a search engine of your choice if you wish.
Carole Theriault
Start Page. Don't you worry.
Graham Cluley
While you're looking at that, I'll carry on. The UK cops were then told by the Americans, look, this is the house where this gun is being delivered, and we think it's associated with this hijack of the CCTV cameras. So cops went round to this house in Streatham.
Carole Theriault
Where the smoking gun was delivered.
Graham Cluley
Where the smoking gun was delivered.
Carole Theriault
Apparently Amazon call it that too, so there you go.
Graham Cluley
There you go. Okay. And they arrested the people. There was a 50-year-old British guy and a 50-year-old Swedish woman at the address, and they said, look, we know nothing about this. We're just into barbecues in quite a serious fashion.
Carole Theriault
Yeah.
Graham Cluley
And so they were initially arrested in connection with the hack, but they weren't actually connected at all. But Eve had blundered some more. She had created a Gmail account as a backup to some of her other online accounts, and she'd attached to that Gmail account her real name. And you may not be surprised to discover that the police have it within their ability, if they have a name, to then possibly locate the person associated with that name. And so they were able to identify that this was the same Evelyn in Bucharest.
Carole Theriault
So what you're saying, it's like if I had AAA and BBB and CCC as fake accounts, but as a backup account, I put it under my legit email address. And so they just—
Graham Cluley
Carole Theriault at SmashingSecurity.com or something like that. Yeah.
Carole Theriault
Right.
Graham Cluley
Well, again, not the smartest. So Europol investigated, and Eve and Bobo went on the run. They're eventually caught, put under house arrest. Evelyn Chutsemaru, also known as Eve, was extradited to the States and has since pleaded guilty and agreed to testify against her former boyfriend. The full story of how she was caught is quite fascinating. You can go and read it on the Wall Street Journal. It is quite interesting to read. But anyway, she has since been released for time served. And she's now in London working as a fashion fitness entrepreneur.
Lisa Forte
Good for her.
Carole Theriault
What is that?
Lisa Forte
You go, Eve.
Graham Cluley
You go, Eve. Well, you can say go Eve to her yourself because she's on Instagram and she has got 80,000 followers to her account.
Lisa Forte
Wow.
Graham Cluley
Where she is posting glamorous selfies. Now, Alexandru Izvanca, meanwhile, also known as Bobo, he hasn't come up quite so good out of all this. He's facing trial in Romania on other credit card theft charges. And is currently facing extradition to the States where he could face up to 20 years in prison.
Lisa Forte
Can I just say that the point at which they went on the run, I mean, we've all been there with our partner where we've had an argument and it just gets way out of hand. Can you imagine the arguments that they were going on in that car? No, it was you because you ordered that pizza. No, it was you because— I mean, it would have been beautiful.
Carole Theriault
It would be a lover's tiff, to be sure.
Lisa Forte
For sure.
Carole Theriault
Yeah.
Graham Cluley
We've all gone on witness protection
Lisa Forte
We've all been there.
Graham Cluley
So I thought this is a salutary warning to other cybercriminals out there not to make such elementary mistakes. from time to time with our Maybe not even commit the crime in the first place, but also as a backup for your future career, maybe set up an Instagram account because maybe you'll become an Instagram influencer. partners. We've done it.
Carole Theriault
So basically their mistake was almost inevitable. The mistake was they got too big a fish that they didn't know how to handle. They caught the attention of the FBI, who otherwise would never have looked their way because they were doing petty crime in Bucharest.
Graham Cluley
I think you're absolutely right, Carole. I think if you spam out a lot of email addresses, there's a danger that you might infect someone who you didn't want to infect, like the FBI, like Scotland Yard, like the NSA. You know, you just want to stay well away from those kind of targets.
Lisa Forte
Mossad would be another one that I would guess.
Graham Cluley
Oh, you don't want to— You don't want to mess with the Israelis.
Carole Theriault
Back away.
Lisa Forte
There's a few of them on the list that you just probably want to search for.
Graham Cluley
Says the Italian. As though they never cause any trouble.
Lisa Forte
Yes.
Graham Cluley
Lisa, what story have you got for us this week?
Lisa Forte
So I also have a romantic tale.
Graham Cluley
Ah, lovely.
Lisa Forte
Love and treachery, and you know, it's just— it's a beautiful story. Basically what has happened is two London investment bankers, madly in love, have just been charged in the US. And they've been charged for insider trading, basically.
Carole Theriault
Whoa, whoa, investment bankers with a heart?
Lisa Forte
Sounds— oh yeah, they love each other. They loved each other and they loved money.
Carole Theriault
So, right, oh, the best thing.
Graham Cluley
Truffle snuffling.
Lisa Forte
Yeah, exactly. But it's kind of interesting because one of the commentary pieces on it was that in some of the cases they released information like, okay, there's going to be a merger. So the share price was going to go up.
Carole Theriault
Right.
Lisa Forte
So in some ways, although they released that information, it benefited the company because their share price just went up early.
Carole Theriault
Yeah.
Lisa Forte
But there was also situations where they passed really damaging information to short sellers. And essentially short sellers are kind of hated.
Carole Theriault
The enemy of the company.
Lisa Forte
Yeah, they're basically people who bet that your share price is going to plummet. Exactly. And they make money when it does. So they get some sort of dirt on the company from these people and then they publish it and then the share price drops. So interestingly, they were just at this for years and it seems to be that this is just the tip of the iceberg and they reckon that there could be 10, 15 other people around the world who've been involved in this ring of insider traders. So it's really fascinating because obviously they were at a company that you'd have thought would have had a reasonable amount of security, but yet they were still managing to exfiltrate all this information and then use it to make millions.
Carole Theriault
So do you know if bankers or investment traders have to sign an oath that they're not going to pass on these secrets? I don't know how it works.
Lisa Forte
Exactly. Yeah, so they've basically been taking loads of information from the companies they work for and selling it on to other traders through middlemen so that they can basically make— they reckon about tens of millions of dollars in profits have been made from this, and it's been going on for over 5 years. So their OPSEC was a little bit better than— so they had pseudonyms for each other as well.
Carole Theriault
It must just be, "How was your day?" "Fine." "Good." It's being married to a spy or something.
Lisa Forte
They called each other Pops and Popsie in their emails. I know, it's beautiful, isn't it? So they were sort of going through middlemen, sending these things, and one of the messages that has been sort of revealed in this court case is that he wrote, once upon a time, there was a pop searching for truffles in the forest. Yeah, totally. Well, it's definitely highly, highly illegal.
Graham Cluley
Yes.
Carole Theriault
Yeah.
Graham Cluley
For sure. It reminds me a little about a hacking gang who a few years ago hacked into PR Newswire and some of the other press newswires, because of course that was somewhere where hundreds of companies were posting financial news or news about mergers and acquisitions.
Lisa Forte
And attached to said email was a highly confidential file relating to a pharmaceutical company that got sent to another trader. And they use these cryptic messages. They were encrypting everything. They were using burner phones to pass information. And yeah, they cost a lot of people a lot of money and they're in a bit of trouble for it. So it was a beautiful story of love and money.
Graham Cluley
And the hackers managed to get hold of these press releases before they were published and then sell them to dodgy people who were doing the trading. And they made a fortune. This really is a more effective way, if you don't get caught, of making a large amount of money through cybercrime than just sending out ransomware, I reckon.
Lisa Forte
Totally. And I think the other thing, people always think that, 'cause we talk so much about PII and personal information and stuff, actually to an insider threat, that's pretty useless information because the stuff that's gonna make you big, big bucks is going to be trade secrets, it's going to be market information, it's going to be IP. You know, that's the sort of stuff that you can steal and sell for a lot more money than any personal information of any employee or anything.
Carole Theriault
Yeah, that's true, isn't it? It's stealing a company's secrets as well is very useful, you know, if you can target the competitor to sell it on to.
Graham Cluley
The intellectual property or something.
Carole Theriault
Yeah, the IP.
Lisa Forte
Yeah, because the Google exec has just been indicted, hasn't he? Because he stole trade secrets about the self-driving cars that Google were developing and he sort of took them with him when he left. Rolled into Uber and was, "Hey, Uber, guess what?" This is such a big problem, isn't it?
Graham Cluley
It's not just the external threat, but the threat of people who are basically people you've opened your kimono to, people who you've sort of embraced or brought into your company or trusted.
Carole Theriault
Who opens your kimono to your investment bankers? Who does that? Graham, seriously, I'm worrying about you, man. Yeah, listen to him. He's wheezing away practically dead. Are you lying on the ground as you do this podcast? Carole, what's your story for us? We know it's about Uber. Well, Uber, right? The bane of every old school cabbie out there, but so loved by city dwellers the world over for its convenience. And I might argue its adventure as well. I mean, with an Uber, you never really know what you're gonna get. You must have a crazy Uber story. I think everybody does.
Lisa Forte
I definitely do.
Carole Theriault
Okay, tell.
Lisa Forte
I, okay, this is, I would, I got an Uber in London once and I had this Irish driver and he spent the entire duration of the journey telling me what kneecapping was.
Graham Cluley
Oh, how nice.
Carole Theriault
Oh my God.
Lisa Forte
So yeah, that was my, that's my experience. Yeah.
Carole Theriault
I got into the cab and he was furious the entire time because this previous person had vomited in the car but didn't tell me until we had taken off. So that's when the smell hit me. And with the cleaning Febreze stuff. Oh no. Oh my God. Oh.
Graham Cluley
I had a bad experience as well. I once vomited in the back of Uber and all I had was a Febreze spray with me and I just quickly sprayed it around. Got out quick. Yeah.
Carole Theriault
Now you both will of course remember that Uber got hacked 3 years ago, back in October 2016, with the hackers stealing the personal data of almost 60 million customers and drivers. Well, the two guys behind the hack have recently pled guilty, and some pretty juicy details have come out since. The upshot is Uber did not react the way you would want a respected company to behave, in my opinion. So question one was, how did these two hackers get into Uber and steal that ginormous treasure trove of user information?
Carole Theriault
ZDNet pulled together a rather insightful article on this based on court documents. Here's the gist. So in 2016, the two hackers, a Floridian named Brandon and a Torontonian named Vasily, used their custom—
Lisa Forte
Sorry, can I just ask, were these guys romantically involved?
Carole Theriault
Not at all. I have no love in my story. I know.
Lisa Forte
Okay, that's a shame.
Carole Theriault
Though you can imagine them holding hands. Okay.
Lisa Forte
I will, I'm doing that now.
Carole Theriault
Okay, so you've got your Floridian guy, he's gonna be wearing shorts, you know, maybe Magnum P.I. style-y.
Graham Cluley
Oh, sexy.
Carole Theriault
Yep, and Torontonian just wearing a big hoodie and a big, big, big toque for your head.
Graham Cluley
A moose.
Carole Theriault
Yeah, wearing a moose, yes. These two guys used their custom-built GitHub account checker tool to test user credentials leaked from other sites against GitHub's own service, and they were particularly interested in targeting credentials of corporate employees because they wanted to get high-value GitHub accounts. They weren't interested in little, you know, people like me with a few things there. They want to look for the motherlode.
Graham Cluley
So what they were doing was they were searching GitHub to see if developers had left passwords and keys?
Carole Theriault
Right.
Graham Cluley
Right.
Carole Theriault
They're looking for credentials. And then once they were able to get those credentials, they had this huge backup of information of sensitive data like user details and backups and all that sort of stuff. So boom, they had the goods. They're looking for usernames. They're looking for passwords, looking for keys, looking for anything that's gonna allow them to breach any associated Amazon Web Services. This is the personal information of nearly 60 million users and drivers. Now, question 2, how do they extort the money but stay under the radar? Because of course, no one knew about this. If the attack happened in October 2016, it didn't make it out into the public arena till a year later. So with this data in possession, the two hackers created and used a ProtonMail email service.
Graham Cluley
Oh yeah, I've got a ProtonMail account. Yeah.
Carole Theriault
They used this ProtonMail address to contact Uber. And this was in November 2016. This was a full month after the attack. Now they contacted the then chief security officer, Joe, the CSO. And they said they found a major vulnerability and provided a sample of the stolen data. And they demanded $100,000 payment in bitcoin to delete the info.
Graham Cluley
Yeah. The major vulnerability is we've managed to nab some of your passwords.
Carole Theriault
We've got—
Graham Cluley
Getting access to your data.
Carole Theriault
And here is all the data we have of yours that you should be keeping under lock and key.
Graham Cluley
Right.
Carole Theriault
Now, Joe, the CSO, you may remember, ended up paying off these hackers but told no one about it. Not the authorities, as the rules stipulate, not the affected users whose data had been stolen. Everything was kept deep, deep undercover.
Graham Cluley
That's scandalous, isn't it?
Lisa Forte
I mean, it's a strategy. I mean, it's not a good strategy, but I guess, you know.
Carole Theriault
Yeah. It's gotta be a stressful time for Joe the CSO at this stage, right? Because he's taken a road of— He's taken the left fork in the road. What is it? He's— I can't even speak.
Graham Cluley
I like the analogy, Carole. I mean— The wheels are possibly going off it, but it's— Well, I mean, this is Uber all over though, isn't it? I mean, certainly a few years ago, I know they've changed CEOs since then, but they were up to a lot of very dodgy things, which will make them very controversial. And they did seem to, yeah, ride a bit rough shod over the rules.
Carole Theriault
So here's some cute things about this that I found interesting. So first one was Joe, the CSO, responded to their ransomware threat as though it were a bug report, right? So he carried on the charade. You know, Joe the CSO paid via the company's HackerOne bug bounty program, which from a corporate standpoint is probably a very, very good way to hide if you're gonna pay off a ransom.
Lisa Forte
Yeah, definitely.
Carole Theriault
Right? 'Cause that money's already earmarked. It's not like you're trying to steal it from sales or marketing and you have to come up with some made-up reason. It's okay. So this gets interesting here, right, for me. So we have responsible ethical hackers out there, right? And they find flaws and they contacted the affected company. They provide proof that they were able to do something. And then often they look for payment for their hard work. In exchange for that, they will not go public until the problem is sorted. That's effectively what we'd call responsible disclosure. Now these guys, they're doing a similar thing, except they're holding data for ransom. They threaten to go public with that information unless Uber pays up.
Graham Cluley
Well, I think the difference probably is that if you were a genuine security researcher who is behaving ethically, you would not download all the gazillions and oodles of data from that Amazon bucket. You'd simply see that you had access to it.
Carole Theriault
But what's more important for me, I think, is that that person doesn't then share it with everyone in the entire universe and put it up on a database.
Graham Cluley
Yeah. Yeah.
Carole Theriault
So let's keep that in mind because I want to come back to that in a second. So the other big question, how did Uber know that the hackers would not release the data after they made their payment? Right? That's the big question we always have. How, you know, okay, I've paid off the ransom, but how do I know? Now, in order to ensure that the hackers stayed stum about their activities and their big treasure trove of data, Uber made the hackers sign NDAs. This is a non-disclosure agreement, right, that holds parties accountable to keeping their trap shut. But how did they do that, right? They didn't know the hackers' true identities, did they? Yes, they did.
Lisa Forte
Oh, Uber.
Carole Theriault
Yes, they did. Yes, they did. And then according to media reports, in January 2017— okay, this is still 7 months before any of us found out.
Graham Cluley
This is after Uber have paid them.
Lisa Forte
They paid them first.
Graham Cluley
I think they paid them and then they investigated and found their identities.
Carole Theriault
So, okay, so then in January 2017, an Uber rep went down to Florida to meet with our U.S. Floridian hacker and got him to sign an NDA with his real name. And then two days later, another Uber rep meets up with the Canadian hacker in a Toronto restaurant and gets his John Hancock on the NDA form.
Graham Cluley
So John Hancock, what's that?
Carole Theriault
Signature. Oh, don't know that.
Graham Cluley
Is that what people call signatures? John Hancocks? Why would a signature be John Hancock?
Carole Theriault
I'll let you Google it.
Graham Cluley
Am I terribly ignorant?
Carole Theriault
I'll let you Google it.
Graham Cluley
Am I exhibiting my ignorance? Okay.
Carole Theriault
Yeah. It's not Hancock though. Okay.
Graham Cluley
Hancock. No, I don't think that. Hang on. John Hancock.
Carole Theriault
So to sum up, Uber required the two hackers to sign a confidentiality agreement prohibiting the use of data and public disclosure of the security breach. So they knew who hacked them, but never gave the identities to the cops. So to be fair though—
Graham Cluley
John Hancock has the largest signature on the Declaration of Independence. And his is the only one still legible on the highly faded document, it says.
Carole Theriault
There you go.
Graham Cluley
He wanted to be sure that King George III could read it. There you are. Because he's like, let's get me in there, do a really big signature.
Carole Theriault
We could maybe do this at the end of my segment.
Graham Cluley
Yeah, I'm sorry, I've just found it interesting.
Carole Theriault
I'd just like to have a bit of rhythm, if I could.
Graham Cluley
Yeah, okay.
Carole Theriault
If that's all right. Yes, Lisa.
Graham Cluley
Yes, that's fine.
Lisa Forte
Can I just say though, Uber did not tell the police who these people were, but if you've just gone out of your way to hunt these people down, get them to sign NDAs to keep everything completely quiet, and then you go to the police and go, guess what, I've got them, let's just make this public. It's kind of a waste of time, really. I just think that in fairness, it does make logical sense. It's not a very good strategy decision, and it clearly does not make you look very transparent, but you're not exactly going to go and publicize it after you've got them to sign NDAs.
Carole Theriault
Well, I had two thoughts on this, right? One of them was, remember we were talking earlier about the NDAs and them signing it. The fact that they did this kind of ensures that they weren't going to go live with the data. So in a way, it may have been a very responsible thing to do in terms of Uber customers whose data had been stolen.
Graham Cluley
But still not tell the customers.
Carole Theriault
Maybe Joe the CSO did something really good here.
Lisa Forte
No.
Graham Cluley
Because of course, even if they've signed an NDA, they could still have told, you know, Mario in Bucharest or something. They could have just whispered to him or left him a copy of it, or they may have been lazy with their own security, so someone else could have hacked the data. And who knows, because those passwords were left on GitHub, someone else could have pinched it as well. So they should have told all those Uber customers and drivers about the problem.
Carole Theriault
Mm-hmm.
Lisa Forte
And let's be honest, what was going on here was Uber are thinking, our share price has taken a battering. We really can't afford to have this huge, massive data breach that shows knows how incompetent we've handled our data to come out and then our share price will be zero and we won't, you know, that'll be that. That was really the motivation.
Carole Theriault
Yeah. And ironically, what leg did Joe the CSO, what could he stand on afterwards after he paid off the money? What was he going to do, hold them to their NDA if they did go live? What was he going to do, go live on the record and say, yeah, okay, so I paid them, I knew who they were, I made them sign NDAs to keep it all under quiet, and that would have been better for the company anyone.
Lisa Forte
Now, haven't Uber said in response to this that Joe and somebody else were kind of off on a frolic of their own and no one knew that they were?
Carole Theriault
Yes, well, excuse number 48 from any organization. Potentially true, potentially true, but right? He certainly paid the price. He no longer works at Uber. And you know, it was only 10 months after this NDA signing, right, that Uber told riders and drivers— and that was under new management, you mentioned that earlier— so that's a long time now. The current CEO, he said in a statement last week, "None of this should have happened and I will not make excuses for it." And he said, "While I can't erase the past, I can commit on behalf of every Uber employee that we will learn from our mistakes." Now, I was all cool with this apology till the word mistake. Okay, mistake. I think that's a little bit rich, don't you think? I mean, I'm not talking about the breach, the fact that they got, you know, their security wasn't on par and someone stole their data. But how they responded to the breach is really abysmal.
Lisa Forte
Yeah, the company-wide manhunt wasn't an oops moment. It was a dedicated team of resources going after these people.
Carole Theriault
Flying to Toronto to get an NDA signed, you know, showing a lot of forethought.
Lisa Forte
Classic mistakes.
Carole Theriault
Yeah.
Graham Cluley
It is terrible, isn't it? I mean, we talk all the time about companies getting hacked and the mistakes they make, but this sort of deliberate cover-up, an attempt to avoid telling your breached customers about what's happened is scandalous.
Lisa Forte
And I always say this to my clients, you know, when I'm doing these things, that the best thing you can possibly do is a Maersk situation, because Maersk is held as the gold standard of incident response now, right? And their comms messaging was on point, really transparent. And I truly think that honesty is your best policy if you know you've been breached.
Carole Theriault
100%. And the way you handle these breaches can do a lot for your share price thereafter, for sure, right? When you— how you handle yourself in a crisis is a very good measure of something, someone you want to invest in.
Graham Cluley
Now, what's the damage to Uber now? Are they being punished?
Carole Theriault
It's all very interesting. So the FTC placed Uber under a strict security audit. Okay. The UK fined Uber just shy of £400,000. So what, $600,000? And the Netherlands charged €600,000. And there was a $148 million fine for a class action lawsuit, right? So this was a settlement for that. So all that together, still for a company reaching $3 billion in revenue is a tiny, tiny tap on the nose rather than a smart slap on the choppers.
Graham Cluley
It's about the same amount it would cost me to get an Uber to Edinburgh. Or something, I expect. It is a return trip.
Carole Theriault
It's funny because, right, all these fines, this money goes to government agencies. And wouldn't it be great if somehow affected users got that as a tax break? If they— so if they get the money and you're, oh, well, you were an Uber user, you can get, you know, £140 off your— this year's taxes. That might encourage—
Graham Cluley
Good luck with that. That might—
Carole Theriault
Yeah. Okay, good point.
Graham Cluley
That might be a vote winner if anyone's got an election coming up.
Carole Theriault
Okay, hand on heart time, how many of you can say that your password hygiene is squeaky clean? If you're feeling it could use a tune-up, maybe check out LastPass Enterprise. With central admin oversight, controlled shared access, automated user management, you help every employee become part of your security solution. Find out more at lastpass.com/smashing. Plus, I would like to extend a personal invitation to an upcoming LastPass event on Wednesday, November 27th, in the wonderful city of Manchester. Occasional Smashing Security guest host Jessica Barker and yours truly are going to be talking about all things security related. We would love to see you there. Check out the registration page on lastpass.com/smashing. On with the show.
Graham Cluley
And welcome back. Can you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week?
Carole Theriault
Pick of the Week.
Lisa Forte
Pick of the Week. Yeah!
Graham Cluley
Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
Carole Theriault
Should not be.
Graham Cluley
And mine is not security-related necessarily. There I was the other night in the bath thinking, how can I entertain myself because it's so dull here with my loofer? And oh, I see my wife has left the iPad. Within reach. I thought, I wonder what I could prop— I could prop that up somewhere and see if I can watch something.
Carole Theriault
Are you in the bath with electronics again?
Graham Cluley
Don't worry about it. It's absolutely safe, I'm sure. Anyway, so I propped it up at the end of the bath and I went onto Amazon Prime and I went back in time once again, because I'm quite nostalgic. I remembered being a 12-year-old boy watching a BBC TV show from the late 1970s, early 1980s. Called The Master Game.
Carole Theriault
The Master Game.
Graham Cluley
The Master Game. And this was a BBC Two show, I think it was. And there is one series, the sixth series, which is available to view for free on Amazon Prime. You don't have to pay. On some of them you have to pay, but on this one you can watch the entire series for free. And it stars 15-year-old Deep Purple fan Nigel Short. And if that isn't enough of a clue, Carole, as to what this TV show is about, it's about chess.
Carole Theriault
Ah, no, I had no idea.
Graham Cluley
I'm sorry about that.
Carole Theriault
I had no idea.
Graham Cluley
Yes, it is an innovative TV show. I absolutely loved it at the time because what they would do is they would pit two International Masters or two Grandmasters against each other. And as they were playing, you would actually get their internal commentary from the player themselves as though they were playing it. So they'd go, oh, what to do? Interesting. That's a very sensible move he has made.
Carole Theriault
Is this a voiceover? Or is—
Graham Cluley
Yes.
Carole Theriault
They do it after they watch their moves afterwards.
Graham Cluley
Exactly. They watch it afterwards and they act it as though they're playing it.
Carole Theriault
I think of how much an asshole he is and I will kill him with the next move.
Graham Cluley
And it's fantastic. I absolutely love it because it's so rare to get that kind of insight from the people who are actually playing. It was very innovative at this time because of course they didn't have computer graphics.
Carole Theriault
I was just gonna say, have you been on YouTube? Because everyone is willing to give commentary at every single thing they do.
Graham Cluley
Yes, but this is both parties on a game and it was presented wonderfully. And one of the presenters, the commentator, is a chap called Bill Hartston. I have to say, when I was 12, Bill Hartston was a bit of a hero for me. Reminds me a bit of my dad—sort of softly spoken, sort of nice chap.
Carole Theriault
He looks like Bill Cosby.
Graham Cluley
Right. Well, yep.
Carole Theriault
Oh no. Oh boy.
Lisa Forte
Yep.
Graham Cluley
Bill Hartston is one of the people who occasionally appears on the sofa in Gogglebox. Gogglebox is a TV show where they basically film people sat on a sofa watching TV and responding to TV.
Carole Theriault
For real. That is what it is.
Graham Cluley
That is—
Carole Theriault
It's quite entertaining.
Graham Cluley
Anyway, Bill Hartston is one of those people. And so he's also—and I remember watching Gogglebox once and I said, that's Bill Hartston. Chess master. Fantastic, very exciting for me. So I would recommend, if you have any interest in chess—I know I've probably lost you if you aren't interested at all—then go and check out The Master Game on Amazon Prime, and you can also see some clips on YouTube as well. And that is why it is my pick of the week. Lisa?
Lisa Forte
It's pretty cool.
Graham Cluley
It is, it is pretty cool. Lisa, what is your pick of the week?
Lisa Forte
So anyone who knows me or has met me will know that this is obviously going to be a little bit dark, because that's kind of how I feel. So mine is an app, it's a game that I've recently become addicted to and it's called Plague. Yeah, it's gonna—it's just gonna get worse from this point. And basically it's a bit weird, but it's a game where you have to design a bioweapon, a virus, a bacteria that's gonna infect and kill off every single member of the human race. And it's really, really difficult because the damn humans keep working on cures or isolating. They close airports, they close shipping ports, and you have to get around it, and it's really difficult.
Lisa Forte
So you're teaching the machines how to kill us? Yeah, in future. And your virus will mutate, and it's just, you know, you've just got to sneak in, infect everyone. If you kill them off too soon, they can't infect other people. I waste so many hours traveling, playing, killing humans, basically, is what I do.
Carole Theriault
So do you—are you playing the same game, or you have to start again? Do they suddenly win and you have to go back to the beginning?
Lisa Forte
Yeah, so if they win, then it's over. If they don't, and then you've got to see how fast you can kill everybody off, basically.
Carole Theriault
Have you beaten the people?
Lisa Forte
Oh yeah, several times. Yeah, pretty proud of my achievements.
Carole Theriault
I love the premise of it. I love how they flipped it on its head, but you're not protecting humanity but going after them.
Lisa Forte
Yeah, it's really annoying when they start using hand sanitizer. Okay, I'm actually gonna—I'm gonna check this out.
Carole Theriault
I'm gonna check this out.
Graham Cluley
It's called Plague and it's available for iOS and Android and maybe some other platforms as well. Actually, I'm just website right now. Looks like it's—oh, there's even a board game version of it.
Lisa Forte
For those Christmas memories. I think I might do that. Good.
Graham Cluley
Carole, what's your pick of the week?
Carole Theriault
So as some of you know, I've been trying to get better at art, right? And it turns out that more often than not, something comes out particularly badly. Not at all what I had in mind. It's really frustrating and I don't want to do it anymore. And in those times, I have taken to watching old art documentaries on the YouTube.
Graham Cluley
Yeah.
Carole Theriault
Yeah. And there are a few wonderful compilations, which I will share in the show notes on the Smashing Security webpage. We're talking hundreds of hours of intelligent thought-provoking, insightful, interesting things into artists or art movements or techniques or scandals. I was recently watching one called The Great Contemporary Art Bubble. It's a BBC documentary from 2017, and this is on Damien Hirst and how he was at the center of the art bubble because there was this gallery called The White Cube in London and they would occasionally come, "We've got a brand new Damien Hirst and it's valued at 500 million," you know, and have an auction around that. But it turned out that someone had leaked their inventory and price list and they had hundreds or even thousands of Hirsts in the back room and they had all the prices written down. So in other words, they were controlling the supply and demand of the artworks to keep by keeping them scarce. And what does Damien Hirst end up doing? He decides to hold his own auction of the works he still owns, right? So this could undercut the gallery, but what are the galleries supposed to do? If they don't support him, then his work might get undervalued because he might sell them for a few thousand. But if they do support him, they don't get to see any of the money returned because he owns the whole auction. Fascinating. Check it out. I will have a bunch of show notes of different YouTube compilations and a few shows that I found fantastic. And if you're into art or artists or Francis Bacon— crazy, crazy.
Graham Cluley
I will. And you can follow us on Twitter @SmashingSecurity, no G, Twitter wouldn't allow us to have a G. And you can join the discussion with us about the episode on Reddit. Just look for the Smashing Security subreddit. Oh yeah.
Carole Theriault
Anyway, go check it out. That's my pick of the week. Sounds excellent, Carole. Yeah, fantastic. Yeah, Twitter. I'm @LisaForteUK. Catch you on the flip side.
Lisa Forte
And tell me how quickly you annihilate humanity and then
Graham Cluley
Okay.
Lisa Forte
I can judge.
Carole Theriault
Okay. And once again, thanks to this week's Smashing Security sponsor, LastPass. Its support helps us give you this show for free.
Graham Cluley
Until next time, cheerio, bye-bye, bye-bye.
Carole Theriault
Lisa, you're great!
Lisa Forte
Oh cool, I had fun. I just laughed a lot.
Carole Theriault
You were awesome.
Graham Cluley
Crow, you say that you stuffed the envelopes yourself. I'm just thinking about—
Carole Theriault
Graham, did you stuff, did you put anything into an envelope?
Graham Cluley
I technically did not stuff the envelopes.
Carole Theriault
So then what's your problem?
Graham Cluley
Well, I did stick the names and addresses onto the front of them that I then had to put tape around.
Carole Theriault
Well, okay, because your Pritt Stick skills were not that great. Let's be honest here, Graham. It was doing a job with a 4-year-old. Everyone with a 4-year-old knows exactly what I'm saying.
EPISODE DESCRIPTION:
The cybercrime lovebirds who hijacked Washington DC's CCTV cameras in the run-up to Donald Trump's inauguration, the truffle-snuffling bankers at the centre of an insider-trading scandal, and the hackers that Uber paid hush money to hide a security breach.
All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Lisa Forte.