This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Graham Cluley
Newsflash!
Mark Stockley
Newsflash!
Unknown
Smashing Security has made it to the finals of the European Security Blogger Awards. If you can be arsed, please go to smashingsecurity.com/vote and vote for your favorite security podcast. So don't delay or I'll electrocute your eardrums. That's smashingsecurity.com/vote. Now, on with the show. Smashing Security, Episode 276: Webcam Extortion, Michael Phish, and Food Foul-ups with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security, Episode 276. My name is Graham Cluley.
Carole Theriault
And I'm Carole Theriault.
Graham Cluley
And this week on the show, Carole, we got someone who's returning to the show, a popular VIP.
Carole Theriault
No, it's me.
Mark Stockley
It's not them. It's me.
Graham Cluley
Oh, I read it as Maria. It actually says Mark. Mark Stockley. Hello, Mark.
Carole Theriault
Hi.
Graham Cluley
Thank you for joining us on the show again.
Mark Stockley
Thanks for having me back.
Graham Cluley
On the possibly award-winning show again, because we have won awards in the past and we're now up for another award. It's the EU Security Bloggers Awards.
Mark Stockley
Oh, that's high prestige.
Graham Cluley
They're coming up in June. There is an opportunity for the audience to vote as well.
Carole Theriault
What, our listeners, you mean?
Graham Cluley
Our listeners. Our listeners can vote if they wish for their favorite cybersecurity podcast. Sadly, Sticky Pickles isn't listed as one of the nominations this year. They were last year, of course.
Mark Stockley
Weren't you listed as one of the top cybersecurity blogs last year as well?
Graham Cluley
Oh yeah, we— oh, well, actually, Mark, funny you should say that, 'cause this year we are once again one of the top cybersecurity blogs as well as one of the top podcasts. So if people want to vote for us as one of their favorite cybersecurity blogs. That's great. We'd rather have the vote for the podcast though.
Mark Stockley
I think it would be hilarious if you won the blog category and you didn't win the podcast category. Come on, come on listeners, we can make this happen.
Graham Cluley
The way to vote, the way to vote is to just go to smashingsecurity.com/vote and that will redirect you to an awfully long Google Docs link where you can tell the organizers what your favorites are.
Carole Theriault
Yeah, obviously say us,
Graham Cluley
Yeah, obviously. Yeah. Otherwise you're dead to us.
Carole Theriault
No, not to me. Shall we get on with the show? And let's thank this week's sponsors, Collide, Rumble, and Good Access. It's their support that help us give you this show for free. Now, coming up on today's show, Graham, what do you got? dudes, you know.
Graham Cluley
I've got Michael Fish.
Carole Theriault
Am I supposed to know who that is?
Graham Cluley
We'll discuss that.
Carole Theriault
Okay. Mark, what about you?
Mark Stockley
I've got a story about all your worst fears coming true.
Carole Theriault
Oh, sounds hilarious. And I enter the world of food production. All this and much more coming up on this episode of Smashing Security.
Graham Cluley
Now, chums, chums, talking about all your worst fears coming true, you do know who Michael Fish is, don't you?
Carole Theriault
I don't think I do.
Mark Stockley
I know who Michael Fish is.
Graham Cluley
Of course you do. Everyone in Britain knows who Michael Fish is because for 30 years he was one of our most famous weathermen. Appearing on our television screens in a series of horrendous jumpers. But he became something of a celebrity for— What's your problem with jumpers?
Carole Theriault
What kind of jumpers?
Graham Cluley
Oh, well, these were quite, you know—
Carole Theriault
Colourful?
Graham Cluley
Colourful.
Carole Theriault
Good?
Graham Cluley
Just wasn't very much of a sex symbol. It's strange though, because he did have a punk group in 1985 who wrote a song called 'I Wish I Wish He Was Like Michael Fish'.
Mark Stockley
I wish, I wish he was like Michael Fish.
Carole Theriault
Michael Fish, Fish!
Graham Cluley
Rachel and Nikki sang that. You may remember Rachel and Nikki.
Carole Theriault
No.
Mark Stockley
John Kettley had
Graham Cluley
John Kettley was a weatherman. That's right. And so is Michael Fish. And so is Iain McCaskill. But yes, that's right. That was an even more popular song. Michael Fish's forecasts have even been sampled by The Prodigy.
Mark Stockley
a song as
Carole Theriault
Oh, really?
Graham Cluley
Yes. But none of this means anything to anyone outside of Britain because you don't know who Michael Fish is.
Mark Stockley
well, didn't he?
Graham Cluley
So you might be thinking, Graham, Graham, why are you talking about Michael Fish? Well, even if you're not British, you might know a Michael Fish. Maybe you were a student at the State University of New York at Plattsburgh, maybe between 2016 and 2019, because there was a guy there studying law called Michael Fish.
Carole Theriault
What, with the exact same name?
Graham Cluley
By the way, yes.
Mark Stockley
How is that possible?
Graham Cluley
I can't believe it.
Mark Stockley
I can't believe it.
Graham Cluley
Not spelt with a PH. He was a Michael F-Fish. A proper F fish.
Mark Stockley
Like fish.
Carole Theriault
Swimming in the water.
Graham Cluley
Just like, yes, actually coincidentally, spelt the same as fish you encounter in the sea. Now, Michael had a problem.
Mark Stockley
Was it jumpers?
Graham Cluley
Not just jumpers. No, Michael had a problem. This is Michael at the university now. We've moved on from the weatherman.
Mark Stockley
Okay, but he's got the same name, so it's very confusing.
Graham Cluley
It is confusing. I'm going to try and clarify throughout the story.
Carole Theriault
Can we just say 1 and 2? Number 1 and number 2?
Graham Cluley
I don't think there would be a lot of arguments as to which one was number 1 and which one was number 2. Michael Fish had a problem. He liked the ladies. Oh, it can be a tremendous, horrible problem, that one, can't it? Liking the ladies and wanting, for whatever reason, to occasionally have a little peek at the ladies, have a little look at the ladies. Maybe he had a girlfriend, maybe that wasn't quite enough for him, maybe he wanted to look at other ladies as well. I don't know, but—
Carole Theriault
What are you saying, he looked at porn and that's the problem?
Graham Cluley
Well, that's one of the solutions, Carole. If you are someone who likes to engage in the male gaze, then you might find different ways to— I don't know what that means. It's an artistic term. We like to look at the ladies. Now, there's different ways of handling this problem, right?
Mark Stockley
If you want—
Graham Cluley
If you want to look at ladies' boobs and their other bits, what are you going to do? What are you going to do? Carole, I'll ask you first. I don't know how interested you are in ladies' boobs and bits.
Carole Theriault
Well, you know, I'm a girl from the '70s, so I'm buy a mag.
Graham Cluley
Old school. I thought you were going to say you could just look at yourself and that would be satisfaction enough. But you'd actually go down to the newsagent and buy yourself a mag. Mark, would you go onto the internet rather than buying a jazz mag?
Mark Stockley
Well, I have heard that there is pornography available on the internet. Right, okay.
Graham Cluley
Well, he didn't do any of those things. He didn't even make a PowerPoint presentation to convince young women to reveal all to them, which is a technique I can tell you.
Carole Theriault
That works, does it?
Graham Cluley
Well, it hasn't worked yet. Hasn't worked yet. But I'm hoping at some point they'll be impressed with my clipart enough.
Mark Stockley
Do you think that that is because you haven't— you just haven't put the right slides together?
Graham Cluley
I think I haven't got the right builds. That's what I think it is. The right transitions. Something like that. If I really convinced— I mean, because we're told PowerPoint presentations can sell anything, haven't we? So why can't they sell the idea of, you know, a woman—
Carole Theriault
This conversation is going crazy.
Graham Cluley
Anyway, so what he did instead of all of those very reasonable ideas—
Carole Theriault
Michael Fish at the university.
Graham Cluley
Michael Fish. What he did was he hacked into the accounts of some of his classmates.
Carole Theriault
Okay.
Graham Cluley
Now, it wasn't any old classmates. It was just the female ones. So he very cleverly targeted just the ones he was interested in.
Carole Theriault
That's who we're talking about. Like accounts, like their math accounts or like—
Graham Cluley
Their email accounts.
Carole Theriault
Oh, right. Okay. Their email accounts.
Graham Cluley
Which presumably weren't protected by multifactor authentication. I don't know. I've— trust me, I've dug deep into this story. As you know, I always do a lot of research. I don't know if Michael Fish phished these guys to get their account details. I don't know how he did it. I don't know if he used malware.
Mark Stockley
But if he had, you'd love it.
Graham Cluley
I would love it.
Mark Stockley
You would love it, wouldn't you?
Carole Theriault
He could have
Graham Cluley
He could have done that. He could have got the common passwords off the internet. Could have used a password cracker, maybe. He might have written a PowerPoint presentation where he said, "People, I'm doing research into people's passwords. Please tell me your password." I don't know what he did.
Carole Theriault
tried 12345, right? So wait, so he's cracking into email for what reason?
Graham Cluley
Well—
Mark Stockley
Guess.
Carole Theriault
As a password, maybe. To look at— 'Cause I keep loads of nude pictures of myself in my email.
Graham Cluley
Of course.
Carole Theriault
Because that's what one does, right?
Graham Cluley
We all do that. We've all got lots of pictures of you in our email, Carole. As backups, in case you ever lose yours. So, Michael Fish, not the weatherman. The weatherman never did this. I have heard he's very litigious.
Carole Theriault
He just wears weird jumpers, according to you.
Graham Cluley
He broke into the accounts of over 100 female students. And once he had access to their accounts, he was able to get into their other accounts, their other online accounts, their social media accounts. And he was able to scoop up nude photos and movies of these young women.
Carole Theriault
Do they really keep that stuff on their social media accounts?
Graham Cluley
Well—
Carole Theriault
It just seems a bit weird to me.
Mark Stockley
I understand that direct messaging of pictures is a thing that the young people do.
Graham Cluley
Yeah. And also, some services might be backing up their photographs from their cameras as well. And if they gained access to those online accounts, they might be able to access them that way. So, all kinds of ghastliness there. So, he's scooping up nude photos and movies. I mean, that's ghastly really, isn't it? Imagine knowing that Michael Fish, not the weatherman, everyone would be completely comfortable with that. Imagine that Michael Fish had seen your private snaps.
Carole Theriault
Oh, no one knows who Michael Fish is. It's not like he's the hero of the university, presumably, or the college, or whatever we're talking about.
Graham Cluley
So which Michael Fish are you saying nobody knows?
Mark Stockley
I bet they know who he is now.
Graham Cluley
So no, but Kroll, if you just knew someone had seen your photos, that would be horrible, wouldn't it? So what did he do, right? He got this stash of nudes.
Mark Stockley
What's the first thing you think he does? Can we skip to the second thing that he does?
Carole Theriault
After the first thing—
Graham Cluley
After the first thing, which he then repeats several times.
Carole Theriault
He makes what, a website, a gallery for them all, for him to enjoy in his own private time. Am I close?
Graham Cluley
You're so close, but not quite.
Carole Theriault
Okay.
Graham Cluley
So obviously he did the obvious thing quite a lot, I imagine. And then he started trading the pictures with other people.
Carole Theriault
What is he, 12?
Graham Cluley
It's like Pokémon cards. Or collecting butterflies. No, he's not 12. He's in his 20s.
Mark Stockley
So yeah, he's 12, basically.
Graham Cluley
Yeah, he's mentally 12. And what's more, he got out his copy of Photoshop.
Mark Stockley
I was very worried there for a second.
Graham Cluley
He pulled out a copy of Photoshop and he created a collage.
Carole Theriault
An obsession wall.
Graham Cluley
Well, well.
Carole Theriault
Oh my God, he's a—
Graham Cluley
He took the photos, he made collages where he put the sexual images, the ones with the nudie stuff, alongside the innocuous Exactly.
Carole Theriault
Nice, nice. This guy's twisted.
Graham Cluley
He labeled each one with their full name. graduation photographs of these young women. And he shared those collections with other people who were appreciative of collages, including a chap called Nicholas Faber, who was sentenced last August to 3 years in prison.
Mark Stockley
So at some point, he's got a magazine. And in the magazine, he's found an article called something like, "Are you a psychopath?" And then there's a list of tick boxes that you have to go through.
Graham Cluley
Yeah.
Mark Stockley
And he's just working his way down through the tick boxes. And he's now at number 15. He's just, tick, tick, tick, tick, tick, tick, tick, tick, tick, tick. Okay, if he blows up, what's he gonna do next?
Carole Theriault
We're fucked.
Mark Stockley
Yeah.
Graham Cluley
He.
Mark Stockley
Then he decides to create a physical version of this, where he puts their pictures on the wall and joins them together with pieces of red string. Is that what he's gonna do next, Graham?
Graham Cluley
I think that this is probably the way it was going.
Mark Stockley
Does he start leaving cryptic clues for the police officers who are always half a step behind him?
Graham Cluley
Like the Zodiac Killer.
Mark Stockley
Yes, like the Zodiac Killer.
Carole Theriault
A really nice guy.
Graham Cluley
Yeah.
Carole Theriault
Nice chap.
Mark Stockley
Another upstanding person with an interesting name.
Carole Theriault
Okay, so this little pig, Michael Fish, what happens to him?
Graham Cluley
Well, obviously he was causing some upset, embarrassment, stress, anxiety for any victims who found out that their images were being shared online or shared between these unpleasant people.
Mark Stockley
And probably rage as well, I would imagine.
Graham Cluley
Yeah, I would think so. But, you know, it could haunt you for years, this kind of thing. And they didn't know it was him.
Carole Theriault
They just knew someone had done this. They didn't know it was that Michael Fish who sits behind them in geology.
Graham Cluley
Yes, yes. And so eventually the security breach was discovered and the university spent thousands investigating the scale of the problem. They realized, oh my goodness, there's quite a lot of accounts which have been hacked here. They looked at the computer, the server logs, they reset passwords. It cost them thousands and thousands, and Fish was caught. I don't know exactly how he was caught.
Carole Theriault
Again, excellent research, Graham. I just want to commend you.
Graham Cluley
I haven't been able to find that out. I did do a lot of research into the other Michael Fish, which I think we can appreciate. So he obviously was there before a judge, right? And the case is going forward, and it's like, you've been a very naughty boy. You've done some highly unpleasant stuff.
Carole Theriault
Yeah, yeah, I'm sure that's exactly the words that the judge used. Naughty boy.
Mark Stockley
Yeah, and then the judge said, 'And is that jumper you're wearing made out of human hair?' Exactly.
Carole Theriault
Toenails.
Graham Cluley
Yeah. And, yeah, one of the things that judges like, of course, is they like to look at any mitigating circumstances, you know, whether they need to consider the ethics of the person, you know, what they've contributed to society. And so what Michael Fish did was he sent the judge a letter. In fact, he forged a letter. He forged a letter claiming to come from an aide to a US representative. And this US representative is someone who he'd actually volunteered for her election campaign back in 2016. He took a legitimate, genuine letter which said, oh yeah, he's a good bloke, he worked hard on the campaign, etc., etc. And he augmented the letter.
Carole Theriault
What do you mean augmented?
Graham Cluley
He added bits. He added extra paragraphs saying, even though he's been in a spot of trouble, you know, with the whole nudie picture thing. So he put forward this letter, and of course judges, it turns out, don't like receiving forged letters claiming that you have great integrity. And so he's currently also in a spot of trouble about that as well. He has now been jailed, so over 9 years in prison. In addition, after the prison sentence, he's been told he's not going to be allowed to go anywhere near computers for umpteen years. He's also got to pay tens of thousands of dollars to the university as well. But of course, it's all these poor women who still have to live with the knowledge that those photographs could still be circulating in collage form.
Carole Theriault
Well, yeah, that's the stress. The collage.
Mark Stockley
Yeah, okay.
Graham Cluley
I'm not saying that the collage bit is— the fact it was a collage is—
Mark Stockley
At least he didn't make a montage. At least he spared them that.
Graham Cluley
It wasn't macramé.
Carole Theriault
You know what you've done though in your story?
Graham Cluley
What? What have I done?
Carole Theriault
Is that from now on, every time I hear of the real Michael Fish, the weatherman, will think of this story. And you have basically sullied his name as well.
Graham Cluley
Why don't I—
Carole Theriault
You knit them together.
Graham Cluley
I seem to remember something about Michael Fish, the weatherman, which I wasn't able to find evidence of on Wikipedia. But I—
Carole Theriault
Again, excellent research.
Mark Stockley
Here's a thing I've made up about Michael Fish. Just saying. Hi, Graham. Wouldn't it be funny if Michael Fish—
Graham Cluley
I'm not saying he did anything illegal. I'm just saying he might fuck me. I'm just saying that.
Carole Theriault
What, here's Sheila with her graduation
Graham Cluley
No, I'm not. I'm not saying that. And that's because we're up for an award and we'd like you to vote for us and not get us into any legal trouble.
Carole Theriault
outfit on and all, here are
Graham Cluley
So let me say right now, Michael Fish, of all the weathermen, is one of them and a fine, upstanding fellow. Well done, Michael Fish. But not the American student who stole people's photographs.
Carole Theriault
her tits type thing? Okay.
Graham Cluley
On that note. Mark, what have you got for us this week?
Mark Stockley
I said in the intro, it's your worst fears.
Carole Theriault
Yeah.
Mark Stockley
Maybe not all of you. You're quite well-put-together human beings. Maybe it's not your very worst fear.
Carole Theriault
We just heard of Michael Fish, so, you know.
Mark Stockley
Okay, but yeah. But as we heard in the previous story, and I don't know if you picked up on this, but it turns out that there's pornography on the internet.
Carole Theriault
Dun dun dun!
Graham Cluley
I've looked, never found anything. Never found a single thing. Very disappointing. Massively oversold, the internet.
Mark Stockley
So obviously the reason that we're sort of laughing awkwardly about this is 'cause there's a little bit of cultural stigma attached to the idea of self-pleasure. Unless your name's Michael Fish.
Carole Theriault
Are we going down the masturbation route now?
Mark Stockley
What the heck's going on with this show? Well, I was— I used the words self-pleasure. We all know what you mean.
Graham Cluley
You're talking about wanking. Okay, yes, yes, that's where we're going.
Mark Stockley
We are on Route 1 to Wankville. Okay? Strap in.
Graham Cluley
Just remember, this is the episode where we're encouraging people to vote for us.
Mark Stockley
Yeah.
Graham Cluley
Carry on.
Mark Stockley
Anyway, so, as you may have noticed, there's a bit of stigma attached to this act. And you're not the only one who's noticed, 'cause cybercriminals have noticed this as well. And one of the very simple and extremely popular ways that they have of making money from this sense of shame is that they will occasionally send people emails saying something like, I've got full control of your device and I've made a video of you watching porn. And when I say watching porn, obviously they don't just mean watching. They mean joining in enthusiastically, hand actions, audience participation, all that stuff. And then they threaten to send the video to all of your friends unless you pay them some money in bitcoin, of course.
Carole Theriault
Can I just say, if anyone threatened to send me a video of either of you doing this, I would not watch on my life. I would rather do anything else than watch that. No offense, I love you both very, very much.
Graham Cluley
No, I am a little bit offended by that, actually.
Carole Theriault
Well, you shouldn't be. Because just— I'm doing it out of respect. Just honestly. Okay, carry on.
Mark Stockley
So what you're saying is I should ask for my bitcoin back?
Carole Theriault
No.
Mark Stockley
So the key thing about these emails, and one of the reasons that they work, is that the criminals will often provide some sort of proof that they do indeed have full control of your device. Such as they might send you the email from your own email address.
Graham Cluley
Oh yes.
Mark Stockley
Or they might include a password that you have used for a website in the email.
Carole Theriault
Aha. So that you basically just shit bricks and then do what they say.
Mark Stockley
Yes. And then send bitcoin. Yeah.
Graham Cluley
But if you don't realise, that's easy to have gathered.
Mark Stockley
Yeah.
Graham Cluley
Or to do.
Mark Stockley
Neither of those two things are actually proof.
Graham Cluley
Yeah.
Mark Stockley
As Graham said, anyone can send you an email from your own address. It's one of the wonders of email. We've only had 50 years to fix it. We're working on it. It's fine.
Carole Theriault
We've got a lot of other things on our plates right now, guys.
Mark Stockley
Yeah, it's been a busy time. The internet, all that stuff.
Graham Cluley
We might fix the climate problem before we actually fix the internet.
Mark Stockley
I don't know. There's absolutely no chance of that, no.
Carole Theriault
Yeah.
Mark Stockley
Anyway, the one thing that they never do, the one thing they would never ever ever do, because they can't, is send you actual proof. So for me, as Carole Theriault was kind of saying, the real proof for me would be send the video.
Carole Theriault
Yeah, or at
Mark Stockley
Yeah.
Carole Theriault
Right? Show me my mug that was on the table at the time.
Mark Stockley
Let's see the O-face. But they're not gonna do that. Because actually, the reason they can't send proof is they don't have any. Because actually breaking into someone's computer and taking over the webcam is much, much harder than just saying— sending an email that says you've done that. But what if it wasn't that hard?
Carole Theriault
least a still of it.
Graham Cluley
Oh.
Mark Stockley
What if a website could turn on your webcam and video you without asking?
Graham Cluley
That would be uncool.
Carole Theriault
It makes me very smug that I don't take my clothes off in front of the computer.
Mark Stockley
Yes. Me too.
Graham Cluley
I think we're all pleased about that, Carole.
Mark Stockley
We're all joined together in a sense of smugness about not doing that. Now, there is an ethical hacker who specializes in browser add-ons. His name is Vladimir Palant. And he's been wondering the same thing. What if a website could turn on your webcam? And he's made some fairly alarming discoveries.
Carole Theriault
Dun dun dun!
Mark Stockley
So his focus is a browser extension called Screencastify, which is— It's just a typically awfully named thing, because everything has to have -ify on the end now. Because we've run out of Rs. 10 years ago, it'd be Screencasterr with an R on the end.
Carole Theriault
Yeah, Tinderrr.
Mark Stockley
There are no Rs left, so Screencastify. And it creates videos, and it's being used by at least 10 million people. We don't know how many people actually use it, because they stop counting at 10 million when you download extensions. So 10 million plus. And there are limits to what you can get browser extensions to do. You know, they're designed so that they can't take over the world. So according to Palant, what Screencastify does is it integrates with its own website in order to add video editing functionality. And that's a problem because it massively increases the number of people and organizations that you've got to trust because you think you're just trusting this browser extension, but actually you're not.
Carole Theriault
So is this a supply chain issue, effectively?
Mark Stockley
It is. It is a supply chain issue, but it's one of those, you know, supply chain is very buzzwordy at the moment, and this is a supply chain issue that is fundamental to the way that the web works. So fixing this is very hard.
Carole Theriault
Right.
Mark Stockley
So the Screencastify website, which integrates with this extension, can send messages to the extension, and those messages include things like start the webcam. And because you grant the extension permission to take pictures when you install it, it doesn't ask you for permission again. So you install it, it asks for permission, you say yes, it remembers that permission forever. So at any moment, the Screencastify website can send a message to your extension saying, turn on your webcam.
Graham Cluley
What?
Mark Stockley
And the video that it takes is saved to your Google Drive.
Graham Cluley
Okay.
Mark Stockley
But you can't use the extension without also giving it access to your Google Drive.
Graham Cluley
Oh boy.
Mark Stockley
So it can start a video recording and then it can snaffle the resulting video from your Google Drive because you've allowed it to do that. Now, that's fine, you say.
Carole Theriault
Yeah, we do say that.
Mark Stockley
Of course we're saying that.
Carole Theriault
Of course they wouldn't.
Mark Stockley
Because you know every individual at that company and you trust them all individually. They're all fine, upstanding people. Screencastify aren't going to just arbitrarily turn on
Carole Theriault
They've all given you a pinky swear to be good guys.
Mark Stockley
So that's all fine. Well, it's not actually that simple. your webcam and video while you're masturbating. Because as Carole was alluding to, modern websites are kind of collections of stuff from other websites. So the way that you add functionality to a website often is you just pull in some code from the other website and all the pulling in from other websites happens the minute you load a page in your browser. So you're pulling down code from Screencastify, but you're also pulling down code from other places as well. And any code that gets pulled into the Screencastify page also gets permission to trigger this API and the Screencastify website.
Graham Cluley
Okay.
Mark Stockley
The Screencastify website, it includes code from Webflow, Teachable, Atlassian, Netlify, Marketo, and Zendesk.
Carole Theriault
Sorry, can I just give a warning? If anyone feels affected by this and is driving a car right now, could they pull over if they're suddenly losing blood as they realize what might have happened to them? Just carry on. Sorry.
Mark Stockley
So just to recap. The Screencastify website can access your webcam at any time that it likes, but it also includes code from Webflow, Teachable, Atlassian, Netlify, Marketo, and Zendesk, which means they can as well. Yeah, that's fine, you say. Screencastify, Webflow, Teachable, Atlassian, Netlify, Marketo, and Zendesk aren't just going to arbitrarily turn on your webcam and video you while you're masturbating. I know all the people that work at those companies and I trust each one of them individually. They're all fine, upstanding people.
Graham Cluley
It's fine.
Mark Stockley
Well, unfortunately, it's not that simple at all, because the problem is actually bigger than that. So in the words of Vladimir Palant, with such a large attack surface, just meaning all these different websites, exploitable cross-site scripting vulnerabilities are to be expected, and these would give anyone the power to attack Screencastify users. And for anybody that didn't understand that, what that means is if the Screencastify website were discovered to have a particular type of vulnerability on it, that would create a route that allows any website to turn on your webcam without asking. All the crooks would have to do if they discovered this vulnerability is basically set up a trap where you get users to click on a link. And if you get them to click on a link, then their website, a little bit of their code gets included in the Screencastify website code. And because it's inside the Screencastify website code, it gets access to everything the Screencastify 'Can I ask if I can do?' And I don't know if you've noticed, but crooks generally don't have a problem getting people to click on links.
Carole Theriault
Well, I imagine if you're in a hurry in that situation, like say you've got 10 minutes before someone comes home, and you're presented with a number of dialogue boxes before you get to the main event, you would hurry through them, right?
Graham Cluley
10 minutes isn't a hurry, Carole, in this particular scenario. That's a very leisurely—
Carole Theriault
Oh yeah.
Mark Stockley
I imagine that you are correct, Carole, and that a theoretical person put in such a position would probably just hurriedly click through any dialog boxes. Yeah, yeah, yeah. Get me to the pictures. Yeah. Anyway, so I mean, this is theoretical, right? If such a vulnerability were to exist, then any website anyone in the world could video you. And so to prove the point of how bad that would be, Palant actually went and found one of those vulnerabilities.
Graham Cluley
Oh, so there is a vulnerability. This can be done.
Mark Stockley
There was. We bring to you news that the vulnerability which he discovered in February and reported to them has been fixed.
Graham Cluley
Right.
Mark Stockley
And they fixed it, to be fair to them, they fixed it very, very quickly.
Carole Theriault
I bet they frickin' did. Holy moly.
Mark Stockley
But I think the broader picture is, what happens in these situations is somebody like Palant comes along and he goes, what if?
Graham Cluley
Yeah.
Mark Stockley
All he's trying to do is proof of concept. So all he's trying to do is say, it would be bad if there was one of these vulnerabilities. I wonder if I can find one. Because if he can find one, then he's basically made his case in the most persuasive way possible. So he stops as soon— he's not going to find all of them. So there may well be others because he's done what he set out to do. And I will leave you with a quote from his article on this. So the question whether to keep using Screencastify at this point boils down to whether you trust Screencastify, Pendo, Webflow, Teachable, Atlassian, Netlify, Marketo, and Zendesk with access to your webcam and your Google Drive data. And it's all your Google Drive data, by the way, not just the videos dropped by this webcam. And whether you trust all of those parties to keep their web properties free of cross-site scripting vulnerabilities, because actually a cross-site scripting vulnerability in any of those websites would give crooks a route through to your webcam. If not, you should uninstall Screencastify ASAP.
Carole Theriault
It's time to introduce 3M to your webcam, right? Don't you think?
Graham Cluley
Tape it up.
Carole Theriault
Tape it up.
Graham Cluley
And who knows how many other extensions there may be out there? Maybe they don't interact with your webcam, but they might access your Google Drive and maybe could be exploited or what needs to happen about this porn. Obviously, you need to cover your webcam before you go looking at porn and then you can be fairly confident. What you need is some sort of hardware gadget which plugs in via USB combined with a piece of software running. Tape up the camera. I've thought about this quite a lot combined with a piece of software running on your computer which detects erotic imagery on your computer and automatically turns off the webcam physically blocks it because obviously your hands are busy. You can't do it yourself.
Mark Stockley
Like a little robot arm comes out. Yes.
Graham Cluley
A robot arm.
Mark Stockley
Rolls some tape over the window.
Carole Theriault
Sounds good, Graham. TM that.
Graham Cluley
TM that. Carole, what have you got for us this week?
Carole Theriault
Well, I don't even know how to follow these two stories.
Mark Stockley
I think something about masturbation.
Carole Theriault
Graham, we're going to talk to you. So do you mind if I mention to our lovely listeners that you are on a bit of a health kick at the moment?
Graham Cluley
Oh, for God's sake. Now that's going to put the pressure on me to carry on, isn't it?
Carole Theriault
Well, whatever. It's good. Is that not good?
Graham Cluley
Sure.
Carole Theriault
Okay. And can I ask what kind of things you maybe have been doing? High level, high level, right?
Graham Cluley
I've been trying to eat more sensibly. I've been exercise biking, and I've been going for brisk walks.
Carole Theriault
Would you say sensibly means less?
Graham Cluley
What, less food?
Carole Theriault
Yeah.
Graham Cluley
Oh yeah, there's less food. And the food I am eating is the kind of food which allegedly is better for you.
Carole Theriault
Well, can I just say on behalf of the rest of the people on Earth that we thank you for your contribution?
Graham Cluley
Finally.
Carole Theriault
Because it turns out it just might have been super important that you did this. Because you see, there's a threat of a serious global food crisis at the moment.
Graham Cluley
I don't think you can pin that on me, Carole.
Carole Theriault
I'm not pinning it on you. I'm just saying—
Mark Stockley
You sort of, it doesn't sound like you were. You did a bit.
Carole Theriault
Do you know how some supermarkets say every penny counts, right? Or some straplines, it's like that.
Mark Stockley
But particularly Graham's. They count more than everyone else's.
Graham Cluley
Let's leave my pennies out of this, please.
Carole Theriault
Oh my God. So the global food supply is being hammered by a number of things, right? Do you want to name a few that can come off the top of your head?
Graham Cluley
There's a war going on in Ukraine. Right. Ukraine and Russia, 25% of the world's wheat is produced there. So that's a bit of a pickle. Yes.
Carole Theriault
That little pandemic thingy that we're still kind of recovering from.
Graham Cluley
There have been ransomware attacks on some big food supply companies in America in the last year or so.
Carole Theriault
Yes, there has. And the UN estimates that in the past year, global food prices have risen by almost by a third, fertilizer by more than half, and oil prices by two-thirds. And this company FoodLogistics say that while this is all horribly bad, there are some silver linings, as in technology is there to save us. So there's things like CAT, which stands for catastrophe modeling, which will help us predict weather conditions so that we can take preventative actions.
Mark Stockley
That's definitely what we should do about global warming. We'll just try and locate the ever smaller patch of livable space as it slowly dwindles and everything else goes crispy.
Carole Theriault
It can monitor conditions to help improve yields, reduced waste. There's also smart agricultural tech that promises to bring more automation, allowing for things like remote monitoring, less human labor, less human error, right? Less effort, more money, yada, yada, yada.
Mark Stockley
Yeah. But just to be clear, these devices that are going to free us up from human error are themselves made by humans, correct?
Carole Theriault
Mm-hmm.
Mark Stockley
Okay. And so these massively giant centralized systems, so instead of having the human error of, let's say, 10,000 separate farms, some of whom may have idiots running them, they're all going to use one piece of tech designed by a human.
Carole Theriault
Mm-hmm.
Mark Stockley
So it's just one system. It's just one big system. What if the human who makes it has an error?
Carole Theriault
Yes. Well, there is a new paper that came out. Researchers at Cambridge University are ringing the alarm bell, saying that using new AI technologies at scale, to Mark's point, holds huge risks that are not being properly considered. Now, as you say, a lot of us are going, oh God, of course that's the case. That's, you know, of course all industries, but there's so many industries out there that have not pulled up their so-called cyber bootstraps, right? And maybe they're excited about the possibilities of high returns, but they're not thinking hard enough about how to safeguard against bad stuff that might come their way. And in this paper, links in the show notes as always, the authors have come up with a catalog of risks that might be considered in the responsible development of AI for agriculture. Sorry, they raised the alarm about cyber attackers potentially causing disruption to commercial farms using AI by poisoning datasets or shutting down sprayers or making sprayers not be able to be shut down or autonomous drones, right? Robotic harvesters. There's so much of this stuff that we're dependent upon.
Mark Stockley
I think it's very important there that when we say drone in the context of farming, what we mean is an American-sized combine harvester.
Carole Theriault
Yeah.
Mark Stockley
Yeah? Yeah.
Carole Theriault
They're huge.
Mark Stockley
The hacker is not taking over your little quadcopter, your little $50 quadcopter. We're talking about a giant human threshing death machine.
Carole Theriault
Mm-hmm. But, you know, you have to also think about the little guys too, right? For example, there's a guy that the BBC was talking to that was trialing an autonomous asparagus harvesting robot, right, called Sprout. And the farmer says, you know, there's a real risk that people anywhere in the world could try and take control of these machines to get them to do whatever those people want or just prevent them from operating. So someone could potentially drive Sprout into a hedge or a ditch or prevent it from working at all. So they say they're working with security research to address any vulnerabilities, but I'm imagining there are thousands, nay, tens of thousands of companies that are going, "Hey, food's a big deal. Let's come up with some automatic cool ways and let's race out the door before our competitors."
Graham Cluley
And yeah, who cares about the pen test dudes? And if Sprout can harvest broccoli, maybe it can also harvest humans.
Mark Stockley
Asparagus.
Graham Cluley
If Sprout can harvest asparagus, maybe it can also harvest humans.
Carole Theriault
Yes, Graham, again, really excellent insight. And to your point, Mark, a farmer—
Graham Cluley
That's how Terminator started.
Mark Stockley
With an asparagus picker. Yeah.
Carole Theriault
So you said, Graham, it's not we've not seen attacks, right, in the industry. Was it— there was the meat processing plant, JBS?
Graham Cluley
JBS, yeah.
Carole Theriault
Yeah. And they had millions of dollars in ransom they paid to resolve the attack. And there was also this top agricultural firm, AGCO, was hit by a ransomware attack that affected production. And that was this month.
Mark Stockley
And the FBI actually put out a warning in the last month or so, saying to the entire agricultural sector, be very, very wary of ransomware attacks in your planting and harvesting seasons. Because they think that the ransomware attackers are— they're basically always looking for more leverage. And if you have a very short time window in which to do some of your most important economic activity, e.g., planting and harvesting, then you're very vulnerable to ransomware. And ransomware attackers are very good at picking the worst moments, so they'll often run the ransomware at night, for example, or at a weekend or on a public holiday, because they've been sat in your computers for months sometimes. So they're just well able to choose, okay, what's the absolute worst moment to attack you, so that your calculation about whether to pay them or not is fraught with urgency.
Carole Theriault
Yeah, and I really feel for the people in this industry at the moment, because they are not necessarily experts in cybersecurity and encryption and all this stuff, right? And they don't necessarily have very strong ties to that community, and yet they're trying to stay alive and produce food. And these are— things are coming to them saying that we can 3x what you produce now, or we can do this and we can do that, and the cost will be way little. And yeah, the Cambridge researchers suggest that ethical hackers should help companies uncover any security failings during the development phase. So, do you think that's enough?
Graham Cluley
Well, that sounds like a good idea, but will an ethical hacker have access to some multi-million-pound tractor of death in order to find out if the vulnerability's there?
Carole Theriault
Yeah, if they do get access to it, then I think that's when they say, "Hello?
Graham Cluley
I got in." Yeah, but you might need one in your backyard to tinker around with it, find out where the problems are.
Carole Theriault
Yeah.
Graham Cluley
Are the companies, are the agricultural companies going to actually bring in ethical hackers and say, "Look, we want you to try and break this.
Carole Theriault
Here you go, here's the equipment, see what you can do." I wonder if government bodies should set up a slush fund for ethical hackers to throttle the tech and uncover issues, right? And that you could kind of run it through that route so that you don't put the onus on these individual farmers or whatever, right, to try and manage this horrible, complicated problem.
Mark Stockley
Yeah, it seems to me
Carole Theriault
Yeah.
Mark Stockley
Because if food supply isn't a national security issue, then I don't know what is. that whatever works, it's all
Carole Theriault
Yeah, because it's super important to us all. And well, not for Graham right now, but you know.
Mark Stockley
Even if you're a self-interested government, people aren't going to miss too many meals before they start rioting. But we seem to be doomed to repeat the same cycle with each form of new tech. So there's always a gold rush. of the above, basically. And my rule of thumb is, if your industry hasn't been absolutely turned over by security problems, just wait, then you probably have all sorts of latent security issues. So there's always a sense of complacency that, okay, well, that hasn't affected us, therefore we're okay. You are simply on the wrong side of that big problem. And you haven't recognized it yet. And I think agriculture is getting there, but it's been through a huge transition in the last 10 years. It's basically gone from dumb devices to smart devices. And that sort of speed, you only do that if you make speed the most important thing. And the easiest thing to miss out when you do that is security, unfortunately.
Graham Cluley
Yes.
Carole Theriault
Well, thank you for that very fun end.
Graham Cluley
Do you know what assets are connected to your network? Most organizations don't. For your security program to be effective, you need an inventory of all your devices so you can make critical decisions fast. Well, Rumble was made by the creator of Metasploit, which explains why it finds many devices that other solutions miss, including orphaned machines running outdated operating systems. Quickly find systems affected by the latest security news. Just think of Log4j, SolarWinds, and Kaspersky. It can even tell you which machines are missing endpoint protection from your local network all the way to the cloud. Sign up for a free trial and build your asset inventory in minutes. Get your trial at rumble.run. That's rumble.run. And thanks to Rumble for supporting the show.
Carole Theriault
So we all know that users these days sometimes have to connect from an unsecured network using any device they have at hand, and companies have no control over the device applications, clouds, and the infrastructure that connects it all together. This rapid shift in online work created security gaps that bad actors use to the full. And most importantly, companies need to emphasize the reduction of risk of a data breach if a user's credentials are stolen. This is why you need to check out GoodAccess. This is a global company based in the Czech Republic with a proven 10-year track record. They are a bunch of security enthusiasts dedicated to delivering anytime, anywhere secure remote access for small and medium-sized businesses worldwide. And this begins with a free GoodAccess starter product for unlimited usage by up to 100 employees. Yes, you heard right, 100 employees. Learn more at smashingsecurity.com/goodaccess. And big thank yous to GoodAccess for sponsoring the show.
Carole Theriault
You can go and find out more. Yeah, run, guys, run.
Carole Theriault
I think you're losing your mind slowly, Clue.
Graham Cluley
Kolide sends employees important, timely, and relevant security recommendations for their Linux, and Windows devices right inside Slack. Kolide is perfect for organizations that care deeply about compliance and security, but don't want to get there by locking down devices to the point where they become unusable. So instead of frustrating your employees, Kolide educates them about security and device management while directing them to fix important problems. Sign up today by visiting smashingsecurity.com/kolide. That's smashingsecurity.com/kolide. K-o-l-i-d-e. Enter your email when prompted, and you will receive a free Kolide goodie bag after your trial activates. You can try Kolide with all of its features on an unlimited number of devices for free, no credit card required. Try it out at smashingsecurity.com/kolide. That's smashingsecurity.com/k-o-l-i-d-e. And thanks to Kolide Smashing Security for supporting the show. And welcome back. And you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week. Pick of the Week.
Carole Theriault
Pick of the Week.
Graham Cluley
Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
Carole Theriault
Please don't be.
Graham Cluley
Now, I remember some years ago attending a dinner party with Carole Theriault. And yes, you weren't the host. Someone else was the host. There were a number of us there. And I think maybe the party wasn't quite lively enough for you. You weren't finding it quite interesting enough. And so you suddenly decided, okay, I'm gonna, I'm gonna, you know, I'm gonna get, I'm gonna zhush things up a bit.
Carole Theriault
I don't even know which one this is.
Graham Cluley
I'm gonna zhush. I'm gonna, oh, what can I do to make this interesting? No, no, on this occasion, you announced your intention to marry a horse. And I was reminded of this. It did make for an interesting evening.
Mark Stockley
I was browsing the internet.
Carole Theriault
This was even before the internet got crazy, but I think I just did it just to have a philosophical argument of why would that be a bad idea.
Graham Cluley
I'd like to introduce you all to Bernard. I'm sorry for his table manners. Anyway, so—
Mark Stockley
Have you discovered a website with some? Sadly not.
Graham Cluley
I haven't found the horse dating website. Horse human dating website.
Mark Stockley
Yeah, that's what I meant. That's what I meant.
Carole Theriault
Rule 34.
Graham Cluley
I bet it exists. But what I did find is something that's going on in Iceland where they have a campaign called 'Out Horse Your Email.' So rather than outsource, you see what they did there? Awfully clever. No. So rather than outsource your email. So the idea is this, they want Icelandic horses to help people with their out-of-office messages when they go on vacation, because it can be very stressful creating an out-of-office message.
Mark Stockley
Okay.
Graham Cluley
And so what they've done in Iceland is they have trained 3 horses to write your out-of-office message for you.
Carole Theriault
What?
Graham Cluley
They created a giant keyboard, which the horses stride across, creating the words.
Carole Theriault
The words? The words? Do you think words is the right?
Graham Cluley
Well, they're written in Horsish, you know. They're not written in English or Icelandic. Let's not stress the horses too much. But apparently some of them claim to be trained in corporate buzzwords or be particularly assertive. I have signed up for this, but I'm not out of the office at the moment. But it has created an out-of-office message for me. It's not entirely intelligible, what the horses have created. Others are described as a fast typer but might take a nap. Anyway, you can go.
Mark Stockley
Is that just because it's in Icelandic?
Graham Cluley
I'll put the link in the show notes. It might be. Maybe it is Icelandic. Maybe it is Icelandic. Maybe that's why I don't understand it. I don't know. But certainly an interesting initiative coming from Iceland, which I thought I would share with our audience.
Mark Stockley
Well, it's one of the effects of some of the activities we talked about earlier.
Graham Cluley
And it's all about out-horsing your email. Mark, what's your pick of the week? So mine is bees. Bees. So while we're busy working out how to live on the smaller patch of the Earth that's livable and farming it with robots that are all going to kill us, you may have noticed that there are fewer bees and people are a bit worried about this. And I was a bit worried about this a few years ago, so I thought, what, is there anything I can do in my garden that will help the bees? Wow. And then at the end of the season, you gather up your cardboard tubes, you send them back to Mason Bees UK, they check— So they soak them in water, they unfurl, they take out the cocoons, they check them for disease, they make sure everything's healthy, they remove any parasites. And then in the spring, they return the same number of cocoons that you bought in the first place. Cool. So your excess bees each year go to new people. Oh, that's very cool.
Carole Theriault
What a cool idea to buy it for a school as well. That's super clever.
Mark Stockley
Well, I did mention it for the credit for, you know, Mark the hero.
Graham Cluley
It does seem rather more worthy than my Icelandic horses right in my out of office email messages.
Carole Theriault
Don't worry, mine's not worthy.
Graham Cluley
Okay, Carole, what's your pick of the week? Mine is for my fellow lovers of audio drama. So Graham, feel free to snooze. So BBC Four, one of the most consistent producers of high-caliber audio dramas that I've come across anyway, have a podcast called Limelight.
Mark Stockley
I have a question.
Carole Theriault
Yes.
Mark Stockley
Why did they send a fencer?
Carole Theriault
Well, there's a few scenes inside where her skills become very important.
Graham Cluley
They needed a fence made.
Mark Stockley
It's just that I feel like I have managed to get through life thus far without needing to call upon any sword fighting skills.
Carole Theriault
Yeah, but you probably have used the internet in ways that you wouldn't want recorded. So, you know, swings and roundabouts.
Graham Cluley
Wow.
Mark Stockley
Wow. Lovely way to treat the guest, Carole. I do apologize, Mark. You can find my webcam footage on Google Drive. But if you can't find that, you can find me on Twitter @MarkStockley. And you can follow us on Twitter @SmashingSecurity, no G. Twitter allows us to have a G, and there's also a Smashing Security subreddit. And huge thank you to this episode's sponsors, Kolide, Good Access, and Rumble, and to our wonderful Patreon community. It's thanks to them all that this show is free.
Graham Cluley
Until next time, cheerio. Bye-bye.
Carole Theriault
Bye-bye. Bye.
EPISODE DESCRIPTION:
A browser extension bug let malicious websites spy on webcams, hackers threaten the global food supply chain, and Michael Fish (not that one...) hacked into his female classmates' online accounts, hunting for nude photos and videos.
All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.