This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Carole Theriault
Apparently in the UK, we really trust the Geordie accent. So when we call call centers—
Dave Bittner
What's the Geordie accent?
Graham Cluley
Why, I'm on— It's so lovely.
Carole Theriault
No, it's not that. No.
Dave Bittner
What's the Geordie accent?
Carole Theriault
The Geordie accent is an accent from Newcastle primarily and its environs. And it has just a— I mean, you could—
Graham Cluley
Well, let's hear it, Carole. Let's hear it. No, no, no. I've done my Geordie accent. I think we should hear yours.
Carole Theriault
Okay. Anyway, crack-a-gone.
Unknown
Smashing Security, episode 271. Crypto break-in, Google blurring, and mics not muting with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 271. My name's Graham Cluley.
Carole Theriault
And I'm Carole Theriault.
Graham Cluley
And we're joined today by someone who's got his cheeks stuffed full of chocolate. Cheeks and his mouth, Carole, don't be filthy. Dave Bittner.
Dave Bittner
Hello. Yes, just call me Mr. Chocolate Cheeks. I'm enjoying chocolate bunnies and hard-boiled colored eggs and all of those delicious things.
Carole Theriault
Thank you.
Dave Bittner
Good to be here.
Carole Theriault
First, let's thank this week's sponsors, Collide and NetFoundry. It's their support to help us give you this show for free. Now coming up on today's show, Graham, what do you got?
Graham Cluley
Well, I'm gonna be going ape over iCloud backups.
Carole Theriault
Okay, what about you, Dave?
Dave Bittner
I have the story of Twitter being all abuzz over claims that Google had removed blurring from Russian strategic locations.
Carole Theriault
Sounds fun. And I'm talking all about the mute button. All this and much more coming up on this episode of Smashing Security.
Graham Cluley
Now, chums, chums, where do you keep your valuables? Is there somewhere where you store them to keep them out of harm's way?
Carole Theriault
What do you mean, like—
Dave Bittner
Physical valuables?
Carole Theriault
Yeah. Well, the most valuable thing I have is my house, and it's pretty much out there.
Graham Cluley
Oh, okay. So it's out there for the public to see. You haven't hidden that. Anything else that's valuable to you?
Dave Bittner
I have a safe deposit box.
Carole Theriault
Do you?
Dave Bittner
Sure.
Carole Theriault
Where do you keep it?
Dave Bittner
Well, the bank keeps it. So is this— I don't know if this is— do you guys have this? This is a thing where you are? Do banks have safe deposit boxes?
Graham Cluley
I've only seen them in the movies.
Dave Bittner
Okay, so here in the U.S., most banks have a room full of safe deposit boxes, and it is the big safe in the bank, and you rent this little drawer that has two keys on it. You get to keep a key, and the bank has a key, and you come and you talk to the bank person, and they let you in the room, and you pull out your little drawer, and you go in a private room, and that's where you keep— you can keep valuables, you could keep money, you could keep jewels, you could keep important papers.
Carole Theriault
Oh yeah, wills and stuff, I guess.
Dave Bittner
Yeah, all that stuff. So if there's a fire at the house, your valuables are at the bank, and presumably the bank vault is fairly safe. So I have one of those.
Graham Cluley
And you feel comfortable with the bank having a copy of the key? Do you?
Dave Bittner
Well, the bank only has one of the two keys necessary. So there are two keys to open it. They can't open it without me. Although, I mean, you know what? I suppose they could hire a locksmith.
Graham Cluley
Fascinating. Certainly in my circles, that doesn't happen very much. Maybe if I was super rich, it'd be different. But obviously podcasts get paid better in America than here.
Dave Bittner
Yeah, just rolling around with those wheelbarrows full of podcasting cash.
Graham Cluley
I want to introduce to you Dominic Iacovone. He appears to have a bit of cash. He's into NFTs, which of course we're big fans of on this show. We love talking about NFTs. If you follow him on Twitter, I checked him out on Twitter and I'll put in a link in the show notes as well. You'll see that he's tweeting all the time, nothing else other than NFTs. He's scooped up Mutant Apes, Alien Boys, Gutter Cats, Fancy Bears. The list goes on. It's all that kind of funky, weird NFT stuff.
Carole Theriault
So he must have lots of cash if he's buying these, right?
Dave Bittner
He's that guy.
Graham Cluley
Well, or a lot of cryptocurrency. That's right. But on April 15th, just a few days ago, he received a phone call on his mobile.
Carole Theriault
In case we didn't know what a mobile sounded like.
Graham Cluley
Yeah. And it said— he had a look at it and it said Apple, Apple Inc. are calling. On his caller ID. Now, he was a bit suspicious because he'd been receiving a number of messages asking him to reset his Apple ID password, and he thought it might be a scam.
Carole Theriault
Okay.
Graham Cluley
But because it said Apple Inc. on the phone, he thought, well, maybe I'll give them a call back. So he gave them a call back, and the person he spoke to, he said he was reassured because they had an American accent. I guess he was under the misapprehension that a scammer would have some sort of, I don't know, some sort of different sort of evil accent of some description.
Carole Theriault
The Count, like from Sesame Street.
Graham Cluley
Yeah, you're right. But of course, a good old trustworthy American accent like Casey Kasem or Dave Bittner on the Cyberwire, that sort of thing, you just inherently trust.
Carole Theriault
Apparently in the UK, we really trust— or this was maybe 10 years ago— but we really trust the Geordie accent. So when we call call centers—
Graham Cluley
Yeah, yeah.
Dave Bittner
What's the Geordie accent?
Graham Cluley
Why, I'm on— it's so loud.
Carole Theriault
No, it's not that. No.
Dave Bittner
What's the Geordie accent?
Carole Theriault
The Geordie accent is an accent from Newcastle primarily and its environs, and it has just a— I mean, you could—
Graham Cluley
Let's hear it, Carole. Let's hear it. I've done my Geordie accent. I think we should hear yours.
Carole Theriault
Okay. Anyway, crackin'.
Graham Cluley
Oh, I see. Interesting.
Dave Bittner
I was thinking of Geordi from Star Trek, but—
Graham Cluley
Oh no, not Geordi La Forge. No.
Dave Bittner
No. Maria is nodding enthusiastically as she listens to this.
Graham Cluley
So anyway, he rang up this number. He rang up who he thought was Apple. And they said, well, hey, they said, listen, your Apple ID account has been compromised. But don't worry, you have a chance to get it back. And what we will do is we will send your phone a one-time code. So a 6-digit number, which you can tell us back over the phone, and that will confirm your identity and we'll grant you access to your Apple iCloud account. And he's thinking, well, isn't this wonderful that they're doing this? And so he receives the code. And of course, he tells the person on the line instantly. The line goes dead. And within seconds, according to Dominic, $650,000 worth of cryptocurrency and NFTs had been stolen from him. Kaboom!
Dave Bittner
Isn't that the current value of the Graham and Carole NFT?
Graham Cluley
I think it currently stands at about $1 trillion, the Graham. Oh, that's— at least that's what they're asking for. That's what the person who bought is.
Dave Bittner
Well, I underestimated.
Graham Cluley
Sure.
Dave Bittner
This is chump change then.
Graham Cluley
So Dominic was storing all of his cryptocurrency and assets and goodies, including a Mutant Ape Yacht Club NFT worth approximately $80,000. He was using a wallet called MetaMask.
Carole Theriault
Okay. Never heard of it.
Graham Cluley
You don't revolve, Carole, in the circles of cryptocurrency.
Carole Theriault
No, I don't.
Graham Cluley
Crypto bros out there. Apparently it's trusted by 21 million monthly users around the world.
Dave Bittner
Not anymore.
Graham Cluley
I've read some reviews of it. According to the reviews, it is a highly regarded and extremely secure digital wallet, praised for its encryption technology and has suffered no digital hacks so far.
Carole Theriault
I'm wondering if our guy here is praising it as we speak.
Graham Cluley
Well, his latest tweets suggest he's not that keen.
Carole Theriault
Right.
Carole Theriault
Would it be smart to tattoo these phrases on your body, for example?
Graham Cluley
No, that's a bloody awful idea, Carole. Well, maybe— Think about it.
Dave Bittner
Depends on where.
Carole Theriault
Well, yeah, exactly. Maybe if you put it somewhere that you don't tend to show anyone, right?
Graham Cluley
Where on your body do you not show anyone?
Dave Bittner
Oh, it would make the social engineering a lot more interesting.
Graham Cluley
Dave, where on your body do you think no one would ever see? Where does the sun not shine?
Dave Bittner
I think we all know the answer to that question, Graham.
Carole Theriault
Because it's covered in chocolate, remember?
Graham Cluley
I think that's right.
Dave Bittner
I think it is self-evident.
Graham Cluley
Where—
Dave Bittner
What we say, where the sun does not shine. We are— there is one body part. It is your most private part.
Graham Cluley
Let's stop you there. Let's stop you there. The thing is— that when you're dead, for instance, right, there's going to be someone glamming you up, Carole, or you, Dave, you know, foofing your hair and putting a little bit of mascara on or whatever it is that, you know, to make you look a little bit better in the open casket. And they've basically got access to everywhere on you. So don't tattoo it on your body. Also, some thief might knock you off in order to check out your—
Carole Theriault
I wouldn't— I wasn't suggesting advertising that, you know, fact to anybody.
Graham Cluley
Well, other than going on a podcast and saying. Thousands and thousands of listeners.
Dave Bittner
Well, and also you could have the 12-word phrase tattooed, but you shouldn't have also tattooed, "This is my MetaMask 12-word recovery phrase." Right.
Graham Cluley
It could just be in Latin or Sanskrit or whatever the funky thing is to have your tats in these days.
Dave Bittner
Pig Latin would probably do it.
Graham Cluley
Pig Latin. ROT13.
Carole Theriault
Yeah. What if you had 12 words of people you dated in your life and that was your— that would be the worst password on the planet, actually.
Dave Bittner
Well, that would have to mean that you would have actually dated 12 people and I hear it's sad.
Graham Cluley
So MetaMask, they've got this secret recovery phrase, but they reassuringly say in their FAQ that they store the secret recovery phrase passwords and all their private keys in an encrypted format locally on your device where it's installed. So on your iPhone or on your Android phone. So it's stored there encrypted, out of the hands of hackers. They can't get at it. Or so you would like to think. Well, the unfortunate business here is that your MetaMask vault, this encrypted vault, including your secret recovery phrase, is by default backed up by Apple to the Apple iCloud, meaning if someone manages to gain access to your iCloud, as these bad guys obviously did by getting this guy to send them their verification code. They can also force their way into your MetaMask vault. Maybe you've reused a password or chosen an obvious one, or they brute force it, and then they have access to everything in your crypto wallet.
Dave Bittner
Wow.
Graham Cluley
So MetaMask users are probably not aware, and this may be true of other software wallets as well, not aware that these private pieces of information may be being backed up automatically by Apple.
Carole Theriault
Yeah, we're helpful.
Graham Cluley
Mm-hmm.
Carole Theriault
Yeah, it's like the paperclip
Graham Cluley
Yeah.
Carole Theriault
You remember the days though when we were just worried about, it was all celeb photographs. So people were getting their private pictures slurped up from the cloud. And now of course Apple's storing everything, right? from Windows. Well, we're here to help.
Graham Cluley
Well, there's a lot, which is why you need obviously to secure your Apple iCloud account and equivalent cloud-based accounts. You need two-factor authentication. You need to make sure that you're not handing over access keys because someone else may be saying, oh, can you send me your recovery number? And they're socially engineering it out of you. So the lessons from this: always use a cold hardware-based wallet. That way it's not going to get backed up to anything.
Carole Theriault
Don't lose it.
Graham Cluley
Don't lose it. Of course, don't give verification codes to anyone. By the way, this happened to me the other day. I was on Instagram and I got a message from my niece, but she wasn't talking like my niece normally talks. She was saying, oh, I've lost my shit. She's such a lovely, lovely young girl. You know, it's slightly out of character. And she was saying, send me your phone number and I'll get a verification code sent to you. You just give it back to me and I'll be able to get my shit together again. And this probably isn't her. But she'd been fooled by one of her friends who, because she's a lovely person, she'd said, yes, I can help you. And when I get the code, I'll send it to you. Now, other cryptocurrency wallets, MetaMask has a secret recovery phrase facility. This is 12 words which you're encouraged to write down and keep in a safe place. And so it happens on a lot of accounts, this kind of thing. So watch out for this verification code trick, which people are doing. And also remember that caller ID is really easy to spoof as well. And Apple, just like every other big tech company, they're not going to call you out of the blue. You know, you sort of hide it under your great aunt or you put it inside a dictionary or you sort of put it somewhere. So if you forget everything else, if you lose your private keys and everything else, you can still regain access with these 12 magic words, which you must never ever tell anybody else. Right. But if you have that, you can recover your funds. Even MetaMask themselves, they can't give you access to the account. The only thing you can do is use these 12 words, which you've chosen, your recovery phrase.
Dave Bittner
Right.
Carole Theriault
Yeah, because I was thinking when you're telling the story, the first thing is, you know, don't call the number that they dialed, call their main hotline number and go, yo, just got a call.
Graham Cluley
Yeah. And also you may want to look inside your settings on your phone and look to see what is being backed up to iCloud. MetaMask themselves now, because there's been a bit of a furor over this, they've tweeted saying we would advise our clients, if you don't want to back up to the iCloud, turn that off. Too late for Dominic, who's lost $650,000 and is now offering a $100,000 reward to try and get his crypto back. No one's found a way to get his cryptocurrency back, but I saw they'd received a message from someone calling themselves Lauren G81948454. Seems like a plausible username. And they said, oh, I was also hacked of $100,000 last month, but I got my funds back when I contacted a hacker on Instagram called Cyberjack002. Go and reach out to him. And so whenever you talk on Twitter about being hacked for cryptocurrency or losing your Instagram account, all these bots will pop up advising you to go and contact someone on Instagram, who of course is after your Instagram account as well. And so you're going to be scammed over and over again.
Carole Theriault
Yeah, you make it sound so cool to be all involved with all this stuff. Too long. Too long.
Graham Cluley
I agree.
Dave Bittner
Alright, you two.
Graham Cluley
You've just got to remember these codes. Never share them with anyone.
Carole Theriault
Sounds so fun. It's just, it's fucking traps everywhere.
Dave Bittner
Yeah, my general advice is if it's something important, it needs to have multifactor. Anything valuable.
Carole Theriault
Not tattoos.
Dave Bittner
Not tattoos. Maybe there's a side hustle here for you, Carole. You could open a special tattoo parlor that is just for passwords and those sorts of things on your tattoos. As people come out of the parlor, they'd be coshed over the head, chucked into the back of a van. Right. Call it Crypto Inc. Carole's Crypto Inc.
Graham Cluley
Oh, that's very clever.
Carole Theriault
Yeah.
Graham Cluley
Dave, what have you got for us this week?
Dave Bittner
Well, I wanted to talk today about Google Maps, and specifically, Google Maps has their satellite view, which I think we're all familiar with. You can go on Google Maps and you can get a nice bird's eye view of— although I think Bing calls theirs bird's eye view, but you can get a satellite view of anywhere in the world, pretty much. And over the years, this has gotten to be higher and higher resolution. My understanding these days is that they are at half a meter resolution these days, which means that a single pixel in an image is half a meter in size. So quite sharp over the past, I don't know, 20 years or so that they've been doing this. But there are, of course, privacy issues with this, and Google recognizes that. And so you can request to have a location be blurred.
Carole Theriault
Yeah.
Dave Bittner
For example, Dick Cheney famously had the US Naval Observatory blurred while he was vice president. The vice president of the United States lives at the Naval Observatory. And so that was his location. So he had it blurred.
Graham Cluley
Was he worried he'd get pictured sunbathing or something that, do you think?
Dave Bittner
Well, you know, that's another sort of funny side issue is how many people think that these satellite views are real time. I've actually convinced people to go outside and wave. Oh, wow. Yeah, they're not. So, but, and you know, there are websites full of funny images that have been captured with the satellites and particularly with Street View. There are people who find, you know, they see the Street View camera driving around, and so they take it upon themselves to punk the Street View and things that.
Carole Theriault
But yeah, I've got two friends that have done it. They're still online at the moment. Those pictures with them in there, their faces are blurred, but they're right, right?
Dave Bittner
Yeah.
Carole Theriault
Yeah.
Dave Bittner
So they automatically blur faces. But if you, for example, want your home blurred, like Carole, if you wanted your palatial estate there in Oxford blurred, you could contact Google and request that they would do it. And they would do it. And I have a link here in the show notes for a bunch of places that they have blurred. And things like military bases all make sense, right? Some private places people have requested to be blurred. For some reason, I guess because of facial recognition, the picture of Colonel Sanders that's on the sign of all the Kentucky Fried Chickens automatically gets blurred.
Carole Theriault
I wonder about Popeye Burgers as well. Yeah.
Graham Cluley
Right. I wonder how many people actually request these things. Do you have any idea? I requested it once for Street View, but they didn't do it for some reason.
Carole Theriault
Why were you out in the front lawn when the van went by?
Graham Cluley
No, I just thought, how dare they take a photo.
Carole Theriault
Nude sunbathing.
Graham Cluley
I just thought, how dare they take a photograph of my house? I just thought, but nothing ever happened.
Dave Bittner
He was afraid someone would see his tattoos.
Carole Theriault
That's right.
Dave Bittner
His crypto ink. So Twitter was all abuzz this past weekend that evidently Google had removed blurring from many Russian strategic locations. And of course, we are in the midst of the invasion of Ukraine by Russia. And so there's lots of sort of armchair quarterbacking over what's going on with this war. And one of the open source tools that lots of people are using is Google Maps to determine who's where and who's doing what and what's the status of various militaries and so on and so forth. So there was a lot of buzz over this over the weekend, and people were having fun looking at airports and military bases. I've included a link here. Evidently someone found the Russian version of the space shuttle, or the Soviets had their own space shuttle. It looks exactly like the US space shuttle.
Graham Cluley
Yeah, Carole, I don't know how
Dave Bittner
It's as if you took the plans for the US space shuttle, put it into a CAD program, and said, make it 1.5 times bigger. That's what the Soviet space shuttle looks like.
Graham Cluley
long you've been working in cybersecurity, but this is what it's like.
Graham Cluley
It's cool. I'm looking at it now, it's very cool.
Dave Bittner
And there it is, parked next to a runway. They have a couple of them, and that's one of them. Someone found — I guess the Soviets had their own version of the Concorde supersonic jet. They found one of those. But people were looking at a lot of Russian planes that were on runways that had their wings removed. People were speculating, are these actual planes? Are they made out of Styrofoam? Are they inflatable? Is this, how bad? Because we've seen the Russian military has not lived up to their legendary status throughout this campaign. And so people are wondering what's the state of their air force? Well, just today, as we record this morning, Google came out and said, no, we didn't remove any blurring. None of this was ever blurred. This has all been out there the whole time.
Graham Cluley
No.
Carole Theriault
What?
Dave Bittner
Yeah.
Carole Theriault
So people just assumed that it had been blurred?
Dave Bittner
I think so. And I've seen several people on Twitter say, no, I do this stuff, either for my work or as a hobby. And it's always been there. None of this stuff is blurred. Why did you all think this was blurred?
Graham Cluley
So someone somewhere said they've unblurred it and everyone else just took that as fact.
Dave Bittner
Right.
Graham Cluley
It's as though the internet were unreliable in some fashion.
Carole Theriault
Yeah, or like that things on Twitter aren't always true.
Dave Bittner
But that's the part of this story that I think is interesting, is how this misinformation took hold, right? That Google had de-blurred all of this imagery. Suddenly we had all this information available that we had not previously had. And people were out speculating, oh, what is this going to— this is going to change the course of history. How will this affect the war? There's so many, you know, secrets revealed. And then Google says, no, this is— what are you talking about? We haven't changed a thing. Isn't that fascinating?
Carole Theriault
How long did it take Google to respond?
Dave Bittner
Within 48 hours, I would say. I think what happened was some of the news organizations took notice, started publishing stories. I have a link to a story from The Verge. And at the top of the story now, there's a correction where they say, oh, well, we heard from Google and funny thing.
Carole Theriault
It turns out that having two tweeters is not two independent validated pieces of information.
Graham Cluley
Has anyone, or maybe it's too early for this, but I hope someone's going to sort of try and track it back and work out who was the first person to make this claim.
Dave Bittner
Wouldn't that be fascinating? Yeah, someone should do that.
Carole Theriault
It's going to be awful. It's going to be someone's dad told him, so then he puts it out saying, my dad said, and then it will have grown from there. It'd be something so innocuous, and then we're all gonna hate this person.
Dave Bittner
Yeah, but I think it's an interesting cautionary tale that these things can take hold. And this did. There were, I mean, lots and lots of accounts, people who should know better who latched on to this, legitimate news organizations who took this as fact and reported on it. And there was nothing to it at all.
Carole Theriault
But this is, this is, I think, the problem with fast food news, right? You want to be first out there. You want to do your proper due diligence and you have no time because you're trying to get out first. And you get it wrong because you're tripping over yourself to be the one to press publish first.
Dave Bittner
We have these perverse incentives. Absolutely.
Graham Cluley
Yep. Well, these news organizations which pump out, you know, every day with some new update on what's going on in the world of cybersecurity. I mean, they're never going to be as reliable as those of us who wait a week before coming onto a story, are they, Dave?
Dave Bittner
No, no, they will not. Absolutely not. In fact, I don't even know why anybody would bother tuning into a daily cybersecurity publication. That is the definition of a fool's errand.
Graham Cluley
Carole, what have you got for us?
Carole Theriault
We're talking about the mute button because the mute button gets us out of all sorts of trouble. And we're probably more aware of that now than we ever have been, thanks to all of us having to do work from home for the last few years. I think each of us has found ourselves in a moment where the mute button saved us from, you know, I don't know, shame or embarrassment or ridicule.
Graham Cluley
By mute, you mean like if you're on a conference call or something like that, or if you're on a Zoom call? Right.
Carole Theriault
Say you're on a video app, right, on your computer, and maybe you're in a meeting, and say someone DMs you a joke during that meeting, and you slam it on mute because you're gonna laugh hysterically, especially if I'd sent it, right? Or see your kids start fighting, yelling names in the background like poo-poo head and fart brains.
Graham Cluley
Yeah.
Carole Theriault
You'd want to press the mute button because you don't want your boss to. And maybe you don't even have any video, so this means you have a bit more freedom. So you're doing the laundry, the dishes. I bet you people probably do loo breaks during meetings. I bet you that's a thing.
Dave Bittner
Oh yeah, there's been video.
Graham Cluley
I think they probably do worse than that.
Carole Theriault
So you get me, right? And if you have to use these video conferencing apps, you know that the mute button is one of the great, great features of it, right?
Graham Cluley
Yeah.
Carole Theriault
So we got these 4 graduates based at the University of Wisconsin-Madison and Loyola University Chicago, and they were wondering what happens to the microphone data when a user clicks on the mute button in a video conferencing app or a VCA. Because, you know, we all have assumptions, right? And they thought, well, let's first ask people, see what they think the mute button does. And not very surprising, 77.5% said they, you know, it would be unacceptable for apps to continue to be able to access the microphone and possibly gather data if the mute mode was active, which, you know, makes sense. So they thought, okay, so people assume this works this way, but let's check what actually happens. So they looked at all the big boys. We have Zoom, Slack, MS Teams, Google Meet, Cisco Webex, GoToMeeting, and then Discord. And then there's two I don't know Jitsi Meet, Whereby, and third, BlueJeans. So those three I don't know. I don't know if you guys are aware of them.
Graham Cluley
Oh yeah, I've heard of a couple of those. I've heard of Jitsi and BlueJeans, yeah.
Carole Theriault
Yeah, they wanted to kind of go in there and see how they all worked. And a lot of us assume that they kind of work more or less similarly because they're all kind of providing more or less the same functionality. And you might also assume that Zoom is Zoom is Zoom, no matter what your OS is. Or whether you're using a browser or a native app. But you'd be wrong on both counts because native apps can collect data from the microphone with few restrictions. So web apps are implemented in JavaScript and they have to request access to the microphone through the web browser, which generally has much more restrictive policies, you know, for data collection and stuff like that. And they looked at it across 4 operating systems. So Linux, Windows, Chromium, and macOS. And each one of them processes and munges audio data in a slightly different way. So the researchers used runtime binary analysis tools to trace raw audio from the aforementioned popular video conferencing apps as the audio traveled from the app to the computer audio driver and then to the network while the app was muted.
Graham Cluley
Okay.
Carole Theriault
And they did that for all the various OSs along the board. I think they had 4 that they were looking at. And their findings are rather interesting.
Graham Cluley
You're going to tell us that no audio data whatsoever was transferred from the computers and it all stayed local.
Dave Bittner
Oh, that's all on the up and up.
Graham Cluley
And that is the big shock. That's the big surprise. Is that right?
Carole Theriault
Yes, that's exactly right. Now just flip that on its head. So it turns out that all of the apps tested occasionally gather raw audio data while mute is activated, with one of the popular apps gathering information and delivering data to its server at the same rate regardless if the microphone was muted or not.
Graham Cluley
So it's not sharing your audio with the other participants on the call.
Dave Bittner
No.
Graham Cluley
But it is sharing it with the company?
Carole Theriault
Well, with the VCAs.
Graham Cluley
Right.
Carole Theriault
And so Zoom, one of the most popular video conferencing apps worldwide, we all know Zoom, was found to actively track if the user is talking even when they were in mute mode.
Dave Bittner
Right, 'cause sometimes you'll see it'll pop up, it'll say, "Hey, you're muted," if you try to talk.
Graham Cluley
Oh, I see. Oh, okay, so it's a—
Dave Bittner
That's a useful feature.
Carole Theriault
That's a useful feature.
Graham Cluley
It's kind of a usability thing. Oh, I see, yeah.
Carole Theriault
I suspect most of these things are for usability really. So they say, "We discovered that all the apps in our study could actively query, i.e., retrieve raw data from the microphone when the user is muted," says the paper. And they continue, "Interestingly, in both Windows and macOS, we found that Cisco Webex queries the microphone regardless of the status of the mute button." So in other words, according to the study, Cisco Webex was the worst as it continued to receive raw audio data from the user's microphone and transmit it. Transmitting it to the vendor's servers in precisely the same way it did when unmuted.
Graham Cluley
Hmm.
Carole Theriault
An assistant professor of electrical and computer engineering at the University of Wisconsin-Madison told the Register in an email that we informed Cisco about our findings back in January and they promised to investigate. So Register reached out to Cisco and they told the Register that it altered Webex after the researchers got in touch so it no longer transmits microphone telemetry data. So very good example of responsible disclosure and a quick fix. And Cisco went on to say Webex uses microphone telemetry data to tell a user they are muted, to your point, Dave, referred to as the mute notification feature. They say this is not a vulnerability in Webex.
Graham Cluley
Right.
Carole Theriault
And I think what the researchers are trying to highlight is the way in which a VCA operates a mute button is different from what a user's understanding of what a mute button is, if you get my drift. Okay. And then finally, the other last thing they decided to do is they, using machine learning algorithms, they trained an activity classifier using audio from YouTube videos, and they were looking for common background noises. So they used activities like cooking, eating, playing music, typing, cleaning. And then they applied a classifier to the type of telemetry packets the app was sending, and they could identify the background activity with an average of 82% accuracy. So these types of activities can be distinguished just based on these acoustic fingerprints that were actually being sent.
Graham Cluley
As a general rule, you just can't trust software, can you? That's, you know, it's like, but if you're worried about something like this, then maybe you need a hardware button or a switch or something on your microphone.
Carole Theriault
Well, not everybody has an external microphone.
Graham Cluley
No, but you might have a headset or something. You know, there might be, I don't know, or a kill button.
Dave Bittner
Right, right.
Carole Theriault
That's one of the suggestions is double muting, right? So you can mute in Zoom, for example, or whatever VCA you're using, but you could also mute at your operating system level. Now this is a bit of a pain, right? Because you have to go into settings, you have to find your microphone, you've got to turn off the input, and then you have to remember to turn it back on next time you do something and not panic that it's broken. So the team suggests the solution might be in developing easily accessible software switches or even hardware switches, which makes total sense, right? I would like that. I want a little big button that says, you are now being recorded, and off/on, right?
Dave Bittner
That's what I want. Yeah, I have a button right here. It's my cough button. And it's just a big button that says mic mute, and you press the button and the mic mutes. But, you know, there's a saying in broadcasting, every mic is an open mic, which is a cautionary tale that if you're in a room with a microphone, assume that that microphone is open and someone's listening and/or recording. Now, this phrase came into popularity in the days before all of us carrying microphones in our pockets all the time and our webcams, and it's hard to go into a room these days that doesn't have a microphone capable of recording. So—
Graham Cluley
Didn't Ronald Reagan once get himself in a spot of bother by— he was doing a test in a radio studio or something and he said, "Hey, Nancy, let's bomb Russia." He did. Yeah, he did.
Dave Bittner
That's pretty— boy, dead on there. It's as if I'm in the room with the old Gipper himself. Wow. But you know, Graham, if this podcasting thing doesn't work out for you, there's definitely a future for you as a mimic.
Carole Theriault
Yeah, yeah, the
Dave Bittner
Yeah, yeah, because there's a high
Carole Theriault
kids— for kids'
Dave Bittner
demand for Ronald Reagan these days
Carole Theriault
school, you'd be great.
Dave Bittner
in the grade school level.
Carole Theriault
The network is dead. Long live the network. This is the tagline from our sponsor this week, NetFoundry. Protecting applications is getting more complicated. We all care about security, but man, it's hard. You see, all networks, according to NetFoundry, are insecure, period. And the Zero Trust security model is the way to go. It was created with the idea of never trust, always verify. But historically, this has been seriously hard to implement. NetFoundry have created OpenZT to provide an open-source, free, and easy way for you to embed Zero Trust networking into anything. Embed SDKs inside your app, tunnelers to run on all major operating systems, or deploy an edge router for any cloud. And the best bit? No networking engineering skills required. This is something you guys definitely want to check out. Visit smashingsecurity.com/zero-trust. NetFoundry.com/netfoundry. That's N-E-T-F-O-U-N-D-R-Y. And thanks to NetFoundry for sponsoring the show.
Graham Cluley
And welcome back. Can you join us for our favorite part of the show? The part of the show that we like to call Pick of the Week.
Carole Theriault
Pick of the Week.
Dave Bittner
Pick of the Week.
Graham Cluley
Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish. Doesn't have to be security related necessarily.
Carole Theriault
Better not be.
Graham Cluley
Well, my pick of the week this week is not security related, but I'm actually going to start it with a joke. Dave, just to be sure, are you familiar with Lady Penelope and Parker?
Dave Bittner
No.
Graham Cluley
From the TV show Thunderbirds, very popular show in the 1960s.
Dave Bittner
Oh, I'm sure I'm familiar with Thunderbirds. Yes. And I'm with you now.
Graham Cluley
Kolide sends employees important, timely, and relevant security recommendations for their Linux, Mac, and Windows devices right inside Slack. Kolide is perfect for organizations that care deeply about compliance and security but don't want to get there by locking down devices to the point where they become unusable. So instead of frustrating your employees, Kolide educates them about security and device management while directing them to fix important problems. Thunderbirds with the puppets.
Dave Bittner
I'm with you now. Yes.
Graham Cluley
Yes. Yep. Okay, so here's a joke. You may not like this. Okay, so Lady Penelope is a sort of aristocratic English woman, and Parker is her sort of Cockney East End driver. Sign up today by visiting smashingsecurity.com/kolide. That's smashingsecurity.com/kolide. Enter your email when prompted, and you will receive a free Kolide goodie bag after your trial activates. And so she goes, Parker, take off my jacket. Yes, milady. Parker, take off my dress. Yes, milady. Parker, take off my shoes and stockings. You can try Kolide with all of its features on an unlimited number of devices for free for 14 days. No credit card required. Try it out at smashingsecurity.com/kolide. Yes, milady. And Parker. Yes, m'lady. Don't ever let me catch you wearing my clothes again. How we love it. That's smashingsecurity.com/kolide. And thanks to Kolide for supporting the show. That is the Thunderbirds joke. Now, I'm a big fan of the TV show Thunderbirds and other series which came from the mind of Gerry Anderson with his Supermarionation. Things like Stingray, Captain Scarlet, UFO, Space: 1999. Wonderful.
Carole Theriault
I don't know any of these except for, yeah.
Graham Cluley
Oh, Carole! This is really good stuff. You haven't lived. Well, there is a documentary that's just come out made by Gerry Anderson's son, Jamie Anderson, about his dad. It's called Gerry Anderson: A Life Uncharted. I saw it on BritBox, but it may also be available in other places. Now, Gerry Anderson sadly died about 10 years ago, I think. And he left some audio recordings where he was telling the story of his life. And to be honest, he did not have the best of lives. He was married a few times, including a marriage to one woman which was spectacularly— how can you put it? A bit of a roller coaster.
Carole Theriault
Yeah. Yes.
Graham Cluley
And this is actually the woman who did the voice of Lady Penelope. And they absolutely hated each other by the end of it. And it made him kind of destitute afterwards as well. So it tells the story of that. It's not really the story of his TV shows, but it's the story of his life. And it's fascinating because it gives you some indication of where— what the impetus for some of the things which happen in stories came from. And it came from a very sad childhood. And it's quite interesting. What's unusual is they took audio recordings of Gerry Anderson, this great star of British children's TV. And they've used deepfake technology to turn it into video of him sat on a sofa telling the story of his life. And this is intercut into—
Carole Theriault
Whoa, here we go.
Graham Cluley
Wow. And I watched this documentary and it keeps on cutting to Gerry Anderson talking about his life. And you imagine at first it's sort of archive footage. And there's actually also a supplemental sort of behind-the-scenes thing where they describe how they did it and show you the iterations, how they did it. It's completely convincing. And it does make the documentary easier to digest and to enjoy because it's not just audio. You can see him sat there as well, talking through his life and explaining it. You even see him at some points walking around various locations like Pinewood Studios. And it's not him. It's been—
Carole Theriault
This is fairly uncontroversial, right? That they portray someone on the couch reading out the words that they've written. But what if they had him doing anything else? Right? Flying a plane or water skiing while he tells you about this stuff. No, but they could with the magic of technology.
Graham Cluley
I think it must have been a particularly unusual experience for Jamie Anderson, who is his son, who appears in the documentary and was a guiding force behind it, you know, his dad has only been dead about 10 years to have all this happen as well. Anyway, I found it quite a good documentary. It's not going to give you much of a flavor of Thunderbirds and Stingray and Captain Scarlet, but it will tell you about Gerry Anderson himself, who is a bit of a hero of mine. And that is why Gerry Anderson: A Life Uncharted is my pick of the week.
Carole Theriault
Interesting.
Graham Cluley
Dave, what's your pick of the week?
Dave Bittner
Well, my pick of the week was inspired by something you talked about a couple of weeks ago here on Smashing Security. And I'll admit, I don't remember specifically what it was. And I actually went back, I went back and tried to look it up and I was unsuccessful. But what I remembered I heard from this episode was you were talking about some show, I believe, and you said you should only watch the first season of it. That the first season was great.
Carole Theriault
Oh, that was Graham, and it was Afterlife.
Graham Cluley
Afterlife, yes. I think I was talking about Afterlife, yeah.
Dave Bittner
All right. Well, when I heard you say that, it made me think of this show that is my pick of the week this week. And it is a show called Bloodline. It is a thriller drama TV series on Netflix, and it is about a family who is in the Florida Keys here in the US, and the family owns a resort. And it's about the siblings in this family. One of them is the black sheep of the family, their relationship with their parents who run the resort. They all — each of the kids have their own personalities. There's a murder.
Carole Theriault
Dun dun dun!
Dave Bittner
Yeah, so it is — one of the things I really like about this show is that the location is one of the characters of the show in a way. That the fact that it's in the Florida Keys really plays into the way that this series feels, the way that it's shot. You really feel like you're there, but it's a super compelling first season. Kyle Chandler is the star of this. He's the guy from Friday Night Lights who, according to my wife, is just quite dreamy. Ben Mendelsohn is in it. He was in the Star Wars movie Rogue One. He's the bad guy in that. He was also in Ready Player One. So a good cast, very good season. But I will tell you, when the first season comes to an end, and there is a cliffhanger, there's a tease. They're going to try to get you to watch the second and third seasons. Do not take the bait. Because — just be satisfied that you watched a season of excellent television. Let it go. Drop it and just leave it there. And think, "Gosh, I wonder what would have happened if they'd made a second and third season of this show." Don't.
Carole Theriault
Yeah, don't wonder.
Dave Bittner
Because if you go and you watch them, you will be disappointed and you will waste a bunch of time. But season 1, excellent. Season 1 is really worth watching. Well done, compelling, a real good thriller drama kind of show. So check out season 1 of Bloodline and just leave it there and get on with your life. That is my pick of the week.
Carole Theriault
You know, I've watched season 1 of Bloodline.
Dave Bittner
Oh, have you?
Carole Theriault
And I think I've only watched season 1 of Bloodline, but I can totally echo what you're saying about the location and the being a kind of a character. It is really— it feels hot, and it feels— you're always by the water, and they always see this blue tint on everything. Yeah, yeah, fascinating. Okay, well, good.
Dave Bittner
I—
Graham Cluley
It's not on my hit list anyway, so there's a bit of me which wants to watch it now only to carry on to season 2 to find out how awful it is.
Carole Theriault
Do it.
Graham Cluley
I mean, there's some perverse gene inside me.
Dave Bittner
Yeah, it's a slow drip. I mean, season 2 is bad, but season 3 is horrible. Horrible.
Carole Theriault
Funny.
Graham Cluley
Carole, what's your pick of the week?
Carole Theriault
Well, we've done a hat trick, because I also have— Do you have something to watch? Mine is Succession from HBO. Graham, have you heard of it?
Graham Cluley
I have heard of Succession, mostly from you. I mean, a lot of people have been raving about Succession for a couple of years.
Carole Theriault
I know, we're late to the party.
Graham Cluley
But I don't have a streaming service which offers it, and so I haven't watched it.
Carole Theriault
Yeah, I know. I got so bored of people telling me to watch it, I went out and forked the cash to buy it. And I have to say, it's a brilliant dissection of a family going into serious trouble. So, it's from the writer Jesse Armstrong of The Thick of It and Peep Show.
Graham Cluley
The Theriault dynasty. Well, he's great.
Carole Theriault
Great, right? Yep. Completely. And basically, the plot is you have this mega-rich family, a dynasty, Trump or Murdoch kind of thing. And they're media conglomerates, and you've got the aging controlling dad at the helm desperately clinging on to the power. And then you have a squabble of spoiled children navigating their roles and trying to figure out who's going to take over the family business. You've got a stepmom who's very strange, but wonderful, but strange. And basically, the whole thing is who's going to be the next king of the castle. But you've got a great cast, Bryan Cox, Jeremy Strong, Sarah Snook is in there, and dialogue's really good. It's tight, and it's so scathing, right? I come from a family of very straight-talking people that are pretty scathing at times. And this is probably the closest rival I've seen. So, yeah. And anyway, I—
Carole Theriault
But you know, maybe this is a Jesse Armstrong thing because when I think of Thick of It and Peep Show, I would say it's true, but every single character here is pretty unappealing and a bit of a monster in their own way. You know? No one's carrying the, "I'm the one to follow, just trust me," character.
Dave Bittner
Yeah, I have a hard time with shows like that because they— I find they're fascinating at the outset.
Carole Theriault
Yeah.
Dave Bittner
And I find I get drawn in by these horrible characters. But then over the course of a couple of
Graham Cluley
Dave, have you ever watched The Thick of It or Peep Show? Because they're comedies. But they're quite sort of dark.
Dave Bittner
seasons, I feel I don't want to be spending any more time with these people.
Carole Theriault
Yeah, you might really like them, actually.
Graham Cluley
The Peep Show, I can imagine Dave enjoying it and think of it just because it takes swearing to a whole new level.
Dave Bittner
Yeah, well, I'm all about that.
Carole Theriault
Anyway, there you are. That's my pick of the week, Succession, season 1. That's as far as I've made it, but I'm gonna head to season 2. So you can't stop me, Dave. And that's from HBO.
Graham Cluley
Terrific. Well, that just about wraps up the show for this week, Dave. I'm sure lots of our listeners would love to follow you online. What is the best way for folks to do that?
Dave Bittner
You can follow me on Twitter. It's @DaveBittner, B-I-T-T-N-E-R, and everything else is over on thecyberwire.com.
Graham Cluley
Super duper. And you can follow us on Twitter @SmashInSecurity, no G, Twitter allows to have a G. And we also have a Smashing Security subreddit. And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast apps such as Overcast, Apple Podcasts, LastPass and Spotify.
Carole Theriault
And massive shout out to this episode's sponsors, Kolide and NetFoundry, and to our wonderful Patreon community. It's thanks to them all this show is free. For episodes, show notes, sponsorship information, guest lists, and the entire back catalog of more than 270 episodes, check out smashingsecurity.com.
Graham Cluley
Until next time, cheerio, bye-bye.
Dave Bittner
Bye. Bye-bye.
Graham Cluley
Bye-bye, baboo.
Carole Theriault
I'm riding home.
Graham Cluley
Thank you so much, Dave.
Carole Theriault
Thanks, Dave.
Graham Cluley
I know you owe your busy chest.
EPISODE DESCRIPTION:
A man loses $650,000 from his cryptocurrency wallet after his Apple iCloud account is hacked, video conferencing apps may not be muting your mic quite the way you imagined, and Google has unblurred military bases in Russia... or has it?
All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner.