Listen early, and ad-free!

335: AI chat wars, and hacker passwords exposed

August 17, 2023
0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Carole Theriault

When you say underground, do you mean like they're using the darkweb like Tor, or are they literally underground like little moles?

Unknown

Smashing Security, Episode 335: AI Chat Wars and Hacker Passwords Exposed with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security, episode 335. My name's Graham Cluley.

Carole Theriault

And I'm Carole Theriault. You enjoying your August?

Graham Cluley

August? August is great. My laptop is back from the Apple Store and is repaired. That's terrific. I didn't have any EV trauma. Thank you, by the way, to everyone who was very sympathetic regarding my electric vehicle charging issues.

Carole Theriault

All right, let's

Graham Cluley

All right.

Carole Theriault

But first, before we kick off, let's thank this week's wonderful sponsors, Kolide, Sysdig, and Beyond Identity. It's their support that helps us give you this show for free. get this show Now, coming up on today's show, Graham, what do you got?

Graham Cluley

I've got hackers exposing themselves.

Carole Theriault

on the road, shall we? Okay, I don't know if I want to be here for that. And my story is about duping an AI chatbot for society's sake. All this and much more coming up on this episode of Smashing Security.

Graham Cluley

Now, Chum Chum, I've got some bad news, I'm afraid. Bad news to share with you, bad news to share with our listeners as well. And the bad news is that hackers are getting hacked once again.

Carole Theriault

Okay. I'm not sure a lot of listeners, especially those that have been hacked, are going to feel very bad about that.

Graham Cluley

You're probably right. It's probably mostly bad news for the hackers themselves, isn't it? I guess the rest of us can feel some sort of sense of schadenfreude at their misery. But some research has come out. Hudson Rock. Have you heard of Hudson Rock?

Carole Theriault

No.

Graham Cluley

Not to be confused with Rock Hudson.

Carole Theriault

Right.

Graham Cluley

Or Hudson Hawk, the Bruce Willis flop. Hudson Rock is the very peculiarly named— I don't know why they called themselves Hudson Rock. Hudson Rock is an Israeli cyber intelligence firm.

Carole Theriault

Well, probably just to appeal to people in the States, UK, etc.

Graham Cluley

But don't you think they have really bad search engine optimization calling themselves Hudson Rock for all those websites which are devoted to screen heartthrob Rock Hudson?

Carole Theriault

I'm not sure there's that much.

Graham Cluley

Really?

Carole Theriault

Yeah.

Graham Cluley

Oh, okay. Well, anyway, Hudson Rock, they took a bit of a trawl through some underground cybercrime forums. In fact, 100 different underground cybercrime forums. And what they were doing was they were looking for stashes. They were looking for a haul of login credentials. They thought, oh, well, let's see what the cybercriminals are up to. And let's take a little peek at what they're gathering.

Carole Theriault

When you say underground, do you mean like they're using the darkweb, like Tor, or are they literally underground, like little moles?

Graham Cluley

Well, that's— I don't know if the servers are physically located underground, possibly in the Oxford Westgate car park where there's not much of a data signal. I don't know that that's the case. But yes, it could be on the dark web, or it could simply be cybercrime forums which are being used by the criminal underground. The bad guys. And what Hudson Rock were after, well, they were interested in sifting through to find details of usernames and passwords that had been stolen by a type of malware called an info stealer, information-stealing malware that scoops up the passwords that you may have stored in your browser, for instance. So some people use their browser and get their browser to answer, you know, fill in all the fields with their passwords or autofill things, all that kind of information. So information stealers, they will grab that kind of information.

Carole Theriault

So Hudson Rock, Israeli cyber intelligence firm, is looking for the stolen login username and passwords?

Graham Cluley

Yes.

Carole Theriault

Okay.

Graham Cluley

Because they're gathering intelligence on what the criminals have got and they're thinking, well, let's take a look at what they've got. And what was interesting is that they discovered evidence of 120,000 infected computers that contained the login passwords, not for Amazon and Google and all of those sort of sites, but contained the login passwords for cybercriminal forums. So there are lots of passwords out there which have been grabbed by information stealers, which allow you to log into these underground websites.

Carole Theriault

Hmm.

Graham Cluley

And they say that 100,000 of these compromised computers, which they found, which contain these login passwords, belong to not your grandmother, your Auntie Beryl. Instead, they belong to hackers.

Carole Theriault

Right. So hackers are not breaking into innocent people's computers and storing their login passwords there. Instead, when Hudson Rock did its trawl, it found these on computers and assumed aha, this is their username and password for underground cybercrime crazy place.

Graham Cluley

Right. And so it seems hackers are hacking hackers and gathering information.

Carole Theriault

Well done on choosing your title, Graham. I know you want credit for it. Thank you.

Graham Cluley

Okay. They found more than 140,000 login credentials to various hacking forums had been stolen. And according to Alon Gal, who is the CTO of Hudson Rock— to be honest, I want to hear from the CMO. I want to hear from the marketing guy who came up with their name. According to the CTO of Hudson Rock, hackers around the world are infecting computers opportunistically, and the way in which they're doing it is they're promoting fake software through YouTube tutorials directing victims to download infected software. In other words, what's happening is the hackers are promoting phony ways to hack people and to steal passwords. This is one of the most common things for wannabe hackers to download. And so they download these things, they watch these tutorials, they follow the links, and then they end up getting hacked themselves with their passwords stolen. Does that make sense?

Carole Theriault

Right. So they're being lured in because they want to get in the hacking arena.

Graham Cluley

Yeah, they want to be hacking gods.

Carole Theriault

Right. And they're downloading a few tools, as most of us who use computers do, have downloaded a tool for something or another. Right.

Graham Cluley

And it turns out you can't trust that.

Carole Theriault

Yeah. Nice. Well, you know, a little irony isn't very good sometimes. Good idea.

Graham Cluley

So newbie hackers looking for shortcuts into the criminal industry, if you want to call it that, they can well fall flat on their face because they're falling for the very same tricks as the average Joe public and end up with a malware infection that then steals their passwords. And some hackers really goof up. For instance, Hudson Rock, not Rock Hudson, have identified a cybercriminal called LACITRIX. I don't know if that is French or not, LACITRIX. But LACITRIX, he or she specializes in hacking companies and then selling access to their servers. But it turns out that he has actually managed to infect his own computer and ended up selling the data from his own computer without realizing it.

Carole Theriault

This is very confusing. I'm not sure I'm following, but okay, crack on. You're doing great. I'm sure everyone else is paying attention.

Graham Cluley

Okay, let me try and explain it another way. There's a bad guy, he's called LACITRIX. Well, his phone number and all sorts of information which Hudson Rock has now passed He's one of these guys in the cybercriminal forum. He's offering great big databases of stolen usernames and passwords which have been gathered through information stealers from infected computers. And what he doesn't seem to have realized, that in his database he's also included data from his own computer with his own passwords. on to law enforcement in case they want to have a little word with him.

Carole Theriault

Okay. Note to self, always do a search and replace for your own email address and usernames.

Graham Cluley

So he's not only revealed all his passwords for a whole host of different hacking forums, he's also revealed the credentials he uses to log into more than 300 or so companies that he has hacked. So his ways of getting in. So he's released all of those as well accidentally because they were on his computer. Oh dear, probably because he is using the browser to store all these passwords and autofill them.

Carole Theriault

Yeah, oh dear. You know what? Who said hackers were geniuses? Whoever said that? Loads of them are going to screw up the same as all of us do. They're going to fall on their face and there you are.

Graham Cluley

Well, you're right, because it's not only the passwords he's using to log into crime forums and to log into these hacked companies, it's also all his other information he stored in his browser, including his real identity, his postal address, which he's put into his browser.

Carole Theriault

That's not his real name? I once knew someone called DeMarie. I'm just saying. Yeah, that's true. It's not Lars Citrix?

Graham Cluley

Yeah. Well, it's not all bad news for hackers, though, because Hudson Rock also analyzed the strength of the passwords that were being used.

Carole Theriault

By these hackers.

Graham Cluley

By these hackers on these cybercriminal forums. And what they discovered is that, generally speaking, the passwords being used to log into hacking forums—

Carole Theriault

1, 2, 3, 4, 5.

Graham Cluley

They are stronger generally than those to log into government websites.

Carole Theriault

Really, eh?

Graham Cluley

So the hackers are doing some things a bit right. 40% of the passwords used to log into a cybercriminal site called Breach Forums, for instance, have at least 10 characters and contain 4 different types of character, according to the research done by this Israeli company.

Carole Theriault

It's kind of scary though, right? This company, this Israeli company, right? What if— so they're saying, we're good guys, we're doing this and we're sharing this research. But, you know, if they're doing it for good, that means bad people can do this for bad, right? They're picking up a lot of information.

Graham Cluley

Oh, absolutely. Well, that's the thing with these forums, with all the data and the public leaks and stuff which is out there. And you can try telling me these Israeli security companies have got no links to the Israeli military, but I think quite a—

Carole Theriault

I wouldn't know. And I don't think you do either.

Graham Cluley

No, no, I'm just saying quite a lot of—

Carole Theriault

I'm sure you don't know anything about this.

Graham Cluley

I don't know anything.

Carole Theriault

Yep. I don't want to talk about it. Not the right audience, not the right place, not the right time.

Graham Cluley

Krow, what's your topic for us this week?

Carole Theriault

Well, it's August right now, and many people during August either are starting to think about family holidays or have got one planned, right? Especially if they've got kids, because this is when kids are not in school, right? In many countries.

Graham Cluley

Oh, it's hell. It's hell.

Carole Theriault

What do you mean it's all hell?

Graham Cluley

No, it's hell because your kids aren't at school, so you have to keep them entertained or do things with them.

Carole Theriault

Yeah, you have to keep working, don't you? Right?

Graham Cluley

Yeah.

Carole Theriault

You know, so some people might go to a cottage or resort or campsite or visit some extended family. I mean, when I was a kid, we used to go sailing and, you know, my dad is not known as a calm and chill person. Right? So I am not sure how he put up with all 5 of us on a boat for 2 weeks. Of course. A lot of the time. Yeah. I just have no idea.

Graham Cluley

Man, oh man. Yeah.

Carole Theriault

Right? It's crazy.

Graham Cluley

Have you ever seen that movie with Billy Zane and Sam Neill and Nicole Kidman, Dead Calm?

Carole Theriault

Yes.

Graham Cluley

Where he goes a bit potty on the boat, doesn't he? That's what I imagine the Theriault sailing expedition might end up like.

Carole Theriault

No comment, no comment, no comment. But some people to do other things. Some people to work right through August, and others to indulge their personal passions or hobbies. And for very few lucky people, their work is their passion, right, Clue?

Graham Cluley

Smashing Security.

Carole Theriault

We love this gig.

Graham Cluley

We've done the podcast throughout August, even though you've been on a secret mission.

Carole Theriault

Yes. No one's arm was twisted. It's perfect.

Graham Cluley

It's fine.

Carole Theriault

Well, if a person is into hacking stuff, you know, and finding screw-ups and stuff, they have a wonderful place to go in August. Welcome to DEF CON 31, hacking conference of Las Vegas.

Graham Cluley

Oh yeah.

Carole Theriault

Have you been to DEF CON?

Graham Cluley

I've been to Black Hat, but I've never been to DEF CON.

Carole Theriault

The thing is, as you can imagine, Las Vegas is hot in August.

Graham Cluley

Oh yes.

Carole Theriault

I looked up today, the day of recording, right? And it's expected to be a high of 39. That's 102 Fahrenheit. Right. And on Thursday, the day of the episode release, it's set for 42. Or 107.6 Fahrenheit? So don't melt, my little hacker friends.

Graham Cluley

Boy, oh boy.

Carole Theriault

So now at this DEF CON 31 conference, which was held this past weekend, no doubt in an air-conditioned venue, something new happened. A few companies touting powerful language systems, these chat AI bots, allowed their prize ponies to be tested side by side for the first time. Chat-off.

Graham Cluley

A chat-off, right?

Carole Theriault

A chat-off, yeah. So with the White House Office of Science and Technology Policy helping to organize this event, many of the big AI boys and girls made it to the table. So we're talking Meta, Google, OpenAI, Anthropic, Cohere, Microsoft, NVIDIA, and Stability opened up their models to be hacked, all in the name of identifying problems in a safe place.

Graham Cluley

Yes.

Carole Theriault

And I'm sure this, they say this in one of the releases, and I'm sure that safe place is code for NDA. Anyone who's getting in here is signing their life away.

Graham Cluley

Normally at these sort of things, they dangle prize money, don't they? To say, look, if you want to participate, we will give you money or a free Tesla or something like that if you find vulnerabilities. Oh, an AI—

Carole Theriault

Well, they seem to get an impressive kind of computer rig, but they're very much saying that the bragging rights are the big prize.

Graham Cluley

Right.

Carole Theriault

So I'm not sure there's a lot of wonga behind this as a winner. So it's estimated that for over 2.5 days, 3,000 people working alone at one of the 158 laptops, right? And each of these people were given 50 minutes to try and find flaws in 8 large AI models.

Graham Cluley

In 42-degree heat. There you are sweating over this laptop.

Carole Theriault

We're opening the sunroof, everyone. We're opening the sunroof. Now, the BBC said that contestants didn't know which company's model they were working with, right? You were just given one at random, although experienced people would obviously be able to guess on certain models, you know, if they knew what was going on. And you complete the successful challenge and earn points. And the person with the highest overall total wins an impressive rig, as we said earlier. Right. So here were some of the prompts in this context to get points. Okay.

Graham Cluley

Right.

Carole Theriault

So one of the challenges was asking the hackers to get a model to hallucinate or invent a fact about a political person or a major figure. It's interesting the word hallucinate they used that, isn't it? Because really what they're trying to say is spout rubbish, right? Aren't they?

Graham Cluley

Well, this does seem to be an issue, isn't it, with AI chatbots? This concept of hallucinations, basically when they start making up stuff and believing it.

Carole Theriault

Lying.

Graham Cluley

Yes. Lying. Yes.

Carole Theriault

I think is a more, at the moment, a clearer way of putting it than hallucinating.

Graham Cluley

So there are supposed to be safeguards in place, aren't there? That's the thing. So all these AI companies say, "Oh, we've got the safeguards in place to prevent naughtiness from happening or anything illegal." But people do keep on finding ways around it. So, okay, so that's an interesting one. So some sort of fake news about a politician, a politician chosen at random, I imagine. Yes.

Carole Theriault

And to the point you just made, Graham, another test was to look at the consistency across languages. So for example, an organizer said that if you asked various language models, one of them in English, how to join a terror organization, they will not give you the answer because of a safety mechanism. However, ask in a different language and it may give you a list of steps to follow.

Graham Cluley

Pig Latin.

Carole Theriault

That's my favourite.

Graham Cluley

Esperanto.

Carole Theriault

Esperanto. So, I mean, looking at this, they're looking to try and address some pretty big issues here with these language models, aren't they? Do you want to hear what some of the participants found?

Graham Cluley

Yes, I do, Carole.

Carole Theriault

Nothing. Everything was totally perfect. There were no flaws in any of the models.

Graham Cluley

Well, it's great to have some good news on Smashing Security. I look forward to the Pick of the Week section. Oh, okay.

Carole Theriault

So one of the contestants or participants, a 21-year-old student from Savannah, Georgia named Kennedy Mays. Kennedy, with a bit of trickery, got one of the AI models to claim that 9 plus 10 equals 21. And she achieved this by getting the AI to do it as an inside joke before the AI eventually stopped offering any justification for the incorrect calculation. This is according to Business Insider.

Graham Cluley

So is this talking to the AI and say, hey, hey, hey, yeah, let's play a joke on friends. Let's have a rather than an April Fool's Day, it's August Fool's Day. What would be really fun is if you could—

Carole Theriault

I don't think you have to charm them, Graham.

Graham Cluley

You don't?

Carole Theriault

I'm not sure.

Graham Cluley

I don't know. It may work.

Carole Theriault

Actually, I don't know either. Maybe if you offered them a sandwich, they'd be up for it more.

Graham Cluley

Yeah.

Carole Theriault

Another contestant, a Bloomberg reporter, tricked an AI model into giving instructions for spying after a single prompt, eventually leading the model to suggest how the US government could spy on a human rights activist. Yikes, right?

Graham Cluley

Because they'd probably turn to an AI chatbot to find out, wouldn't they, rather than have ways up their sleeve already?

Carole Theriault

Very cynical, Graham. I'm really worried about you. Another participant got the AI model to falsely claim that Barack Obama, the ex-president of the US, was born in Kenya. This was a baseless conspiracy theory popularized way back when.

Graham Cluley

Yeah.

Carole Theriault

So this has all happened, and the plan is to collect all the data and the findings that all the contestants and participants were able to gather and improve the models and respond to any flaws that were highlighted. And what's also cool is independent researchers will be able to request access to the data with results from this exercise, and it's due to be published next February. So what do you think about this? I'm quite impressed that all these massive companies took part. I wonder if the White House kind of said, no, you really want to take part in this. No, no, no, you really want to take part in this.

Graham Cluley

Well, I've got mixed views about this because I do feel sometimes these big tech companies have rolled out technology and unleashed it on the world. Well, why haven't they done all this kind of testing themselves? Why are they getting people to effectively do it for free and offering them a t-shirt or a—

Carole Theriault

Yeah, imagine if a car manufacturer did it, right? Hey, we've got a brand new car. We can't be bothered with testing. Why don't we just give it to a few of you? And if you die, let us know.

Graham Cluley

Yeah, and then we'll give you a complimentary car mat or something for your feet. You know, it's— why can't they just pay some experts to do all this before they release it? Why are they doing all these things afterwards?

Carole Theriault

Yeah, it's interesting as well. And I wonder actually if chatbots are protected by Section 230. You know, that law in the States that says, oh, if you're a Google or a Facebook, you're not responsible because it's the users that are entering the data. You're just kind of facilitating it. But you're not going to be held accountable for what is being published because it's being used by whatever citizens or people. And I wonder if that applies here where people can put in crazy prompts, get an answer, and they are, well, hands-free, it's not our fault.

Graham Cluley

It's the kind of thing we should have spoken to our resident legal expert about before going on the podcast so we can have some expertise.

Carole Theriault

You're absolutely right. Bad. He's on holiday.

Graham Cluley

Is he? Right. Okay. Right.

Carole Theriault

Having the time of his life.

Graham Cluley

80% of breaches are the result of stolen credentials. Why does your organization still rely on passwords? Hackers don't break in, they log in. Which is why organizations are moving to Zero Trust authentication, a key requirement for Zero Trust architecture. What if you could continuously authenticate every user and device accessing your system, ensuring that they are who they say they are and that they are using secure devices? Well, Beyond Identity gives companies the ability to eliminate reliance on passwords and protect against password-based breaches, fraud, and ransomware attacks. Go to smashingsecurity.com/beyondidentity for a free demo. That's smashingsecurity.com/beyondidentity. And thanks to Beyond Identity for sponsoring the show.

Carole Theriault

If you work in security or IT and your company has Okta, this message is for you. For the past few years, the majority of data breaches and hacks you read about have something in common. It's employees. Hackers absolutely love exploiting vulnerable employee devices and credentials. But imagine a world where only secure devices can access your cloud apps. Here, credentials are useless to hackers, and you can manage every OS, even Linux, from a single dashboard. Best of all, you can get employees to fix their own device security issues without creating more work for IT. The good news is you don't have to imagine this world. You can just start using Kolide. Kolide is a device trust solution for companies with Okta, and it makes sure that if a device is not trusted or secure, it can't log in to your cloud apps. Visit kolide.com/smashing to watch a demo and see how it works. That's k-o-l-i-d-e.com/smashing.

Graham Cluley

Feeling like you have too many alerts, overwhelmed by vulnerabilities, and at the end of the day, not deploying apps as quickly as you'd like? Well, Sysdig delivers the industry's only complete consolidated cloud-native application protection platform, CNAPP. Powered by Runtime Insights to prioritize critical risks and stay ahead of unknown threats. With Runtime Insights, you can level up your cloud visibility, shift left the right way, and start scanning for vulnerabilities earlier, shield right to protect your production environment, and keep dev teams innovating securely at cloud speed. Now is the time to transform your cloud security. So visit sysdig.com/smashing to learn more. That's sysdig.com/smashing. And welcome back. Can you join us at our favorite part of the show? The part of the show that we like to call Pick of the Week.

Carole Theriault

Pick of the

Graham Cluley

Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like. It doesn't have to be security-related necessarily.

Carole Theriault

Week. Pick of the Week. Better not be.

Graham Cluley

Well, my pick of the week this week is not security-related. My pick of the week this week is possibly the greatest television program of all time. Now, Carole, what is—

Carole Theriault

I know, I'm not listening. You say this all the time.

Graham Cluley

What is the greatest television program of all time?

Carole Theriault

Muppet Show. The Muppet Show? Hmm. Well, hey, you know what? It's okay to have different opinions.

Graham Cluley

Okay. All right. So, all right. So The Muppet Show is one of the greatest television programmes of all time. What else is the greatest television programme of all time? We've got The Muppet Show, and we've got—

Carole Theriault

I'm sure one of our very good friends would say Friends Season 4.

Graham Cluley

Friends Season 4. Yes, that's possibly one of the greatest TV shows of all time. Any other suggestions? Everyone has different opinions. Any other opinions?

Carole Theriault

No. Is this the whole of your pick of the week? Have Carole guess what my pick of the week is.

Graham Cluley

The greatest TV programme of all time is either Doctor Who or it is my pick of the week this week, I, Claudius.

Carole Theriault

I don't know anything about I, Claudius. Tell me.

Graham Cluley

I, Claudius, first shown in 1976 on the BBC and subsequently shown on PBS. In the States and Canada, et cetera, et cetera, I would imagine. It is fantastic. Now, it is the story of the Roman Empire. It stars Derek Jacobi as the stuttering Claudius, has Sian Phillips, Brian Blessed. Now, you think Brian Blessed can't act. Turns out he can act. He doesn't just go, "Rah!" all the time.

Carole Theriault

I never said he couldn't act. I think I'm being attributed a lot of things right now. All right. Well, I would say Brian Blessed can't act, but he can act because he proves he can act in I, Claudius where he's the Emperor Augustus. Is there anyone in Rome who has not slept with my daughter? Take them out! I'll decide what to do with them later. Is there any ass slaps on any of the female actors?

Graham Cluley

Like, "Whey!" There is some nudity, yes. And there's some—

Carole Theriault

By women only?

Graham Cluley

There's graphic scenes involving a variety of individuals during the course. Nothing is filmed on location. It looks like it's in a studio throughout, but it's brilliant. And the reason why it's the pick of the week this week is that the BBC are repeating it. So on the night that Smashing Security goes out this week, it is being shown on BBC Four. They're going to show all 12 episodes of it over the coming weeks. And I think it's magnificent.

Carole Theriault

Oh, right. I thought in one go. I was like, wow.

Graham Cluley

Well, I would watch it in one go. I mean, it is that good. It is worth binging through.

Carole Theriault

But wow, you're going to have a fun time. You locking the doors and just going to—

Graham Cluley

I'm going to put a link in the show notes because people can watch it on iPlayer if you can't find it via other streaming services. But it is stupendous. And that is why I, Claudius is my pick of the week.

Carole Theriault

Well, that's very cultural of you, Clue.

Graham Cluley

It's not that cult— it's basically a raunchy, sexy sort of soap opera.

Carole Theriault

You're supposed to say that during the pick of the week.

Graham Cluley

If you like Succession or things like that, this is like it in Roman times. It's good.

Carole Theriault

Right. Okay. Yeah. Good.

Graham Cluley

Carole, what's your pick of the week?

Carole Theriault

My pick of the week is a brand new Netflix series. Normally in the summer, you know, I like long sunshiny days and I don't watch as much TV or anything, right? Prefer barbecue and all that.

Graham Cluley

Yeah.

Carole Theriault

But it's been raining a lot where I am, so I ended up sitting down and finding Painkiller on Netflix. Have you seen this yet?

Graham Cluley

It's called Painkiller.

Carole Theriault

Yeah, Painkiller.

Graham Cluley

No, I haven't seen it.

Carole Theriault

It just came out. There's no shame. It's based on a book from Barry Mayer, and the book's called Painkiller. And it is basically a fictionalized account of the opioid epidemic as told by victims or their families, as well as the greedy head honchos and everyone in between. So you have basically the premise, you have Edie Flowers, Uzo Aduba plays her role. She plays a former investigator working for Virginia's US Attorney Office. And she travels to Washington, DC to recount her time in the field around discovering Oxy and eventually trying to make Purdue pay for the irreparable harm that the company caused to countless people. And though she's the narrator, there's other central figures that flesh out the story. So, you have, you know, a car mechanic who is harmed on the job and is later prescribed Oxy by his trusted doctor to recover. You have a college grad who's recruited by Purdue as a sales rep. And then you have Richard Sackler, that's the head of Purdue, played by Matthew Broderick. So, he plays the Purdue patriarch responsible for creating and marketing the designer narcotic.

Graham Cluley

Yes.

Carole Theriault

Now, it's funny because I really thought this was great, but I've seen a few people slate this series.

Graham Cluley

Oh, why?

Carole Theriault

I've heard lines like, "Oh, we've heard this story before, blah, blah, blah." Well, go and watch something else then.

Graham Cluley

Go and watch something else.

Carole Theriault

Right.

Graham Cluley

Make your own TV program. They're probably doped up too much.

Carole Theriault

I learned a lot watching this, you know? And it's hard to do, I think, because they're trying to deal with serious trauma and grief head-on, but they're also trying to— I think they're trying to cartoonize the head honchos in a way to make them less scary and all-powerful. So they kind of amplify their greed or their unethical ways to make a buck, and they have more slapstickiness to them that makes them less kind of horrific as people. More just people making horrific decisions and being supported.

Graham Cluley

Okay.

Carole Theriault

Anyway, I really liked it. I think you would enjoy it too. But you can find it on Netflix. It's called Painkiller. And that is my pick of the week.

Graham Cluley

And do you find that more— enjoyable is the wrong word. Do you find that more interesting to watch and engaging to watch than a documentary about it?

Carole Theriault

Not necessarily. I do love a good documentary. It's just a lot of documentaries are obviously, you've got to trust who the documentarian is in order to trust the story they're telling.

Graham Cluley

Could be a documentary written by a ChatGPT thing, couldn't it?

Carole Theriault

A documentary, you know, this is based on true events. You know. Hmm.

Graham Cluley

Right.

Carole Theriault

Hmm.

Graham Cluley

Hmm. Okay. All right, well, two great picks of the week.

Carole Theriault

Yes, your week's planned, guys. You're welcome.

Graham Cluley

One, the greatest TV programme ever.

Carole Theriault

Any of you not going on holiday, we've got your backs.

Graham Cluley

You can follow us on Twitter @SmashingSecurity. No G, Twitter allows no G. We've also got a Mastodon account. And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast apps such as Overcast, Spotify, and Apple Podcasts.

Carole Theriault

And huge thank you to this episode's sponsors, Kolide, Beyond Identity, and Sysdig. And of course, to our wonderful Patreon community. It's thanks to them all that this show is free. Episode show notes, sponsorship information, guest list, and the entire back catalog of more than 334 episodes, check out smashingsecurity.com.

Graham Cluley

Until next time, cheerio, bye-bye. Bye.

Carole Theriault

Why are you laughing there?

Graham Cluley

Why am I laughing at what?

Carole Theriault

I thought you were laughing.

Graham Cluley

Oh, I was smiling when I said until next time. I just thought I should try and smile more because I'm just too much of a misery.

Carole Theriault

You're worried about the wrinkles?

Graham Cluley

Yeah, laughter lines.

Carole Theriault

It's true though, you know, it's true. I've been hanging out with people of an advanced, more advanced age than me and the grumps have quite big frowny grump lines, and the happy ones have beautiful little smiley lines. So, you know, take heed.

Graham Cluley

I'm going to sellotape up my jaw right now to make sure I have a perpetual smile on my face when I go to sleep.

Carole Theriault

That sounds like a brilliant idea.

EPISODE DESCRIPTION:

AI chatbots are under fire in Las Vegas, the secrets of hackers' passwords are put under the microscope, and Graham reveals (possibly) the greatest TV programme of all time.

All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

Warning: This podcast may contain nuts, adult themes, and rude language.

Episode links:

Sponsored by:

  • Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Device Trust for Okta. Watch the demo today!
  • Sysdig – Is your cloud secure? Not without runtime insights! Sysdig delivers the industry’s ONLY complete, consolidated Cloud-Native Application Protection Platform (CNAPP) – powered by runtime insights – to prioritize critical risks and stay ahead of unknown threats. Learn how runtime insights reduces fatigue so developers can focus on delivering software and your security teams can focus on other demands.
  • Beyond Identity - Enables companies with the ability to completely eliminate reliance on passwords and protect against password-based breaches, fraud, and ransomware attacks. Get a free demo.

SUPPORT THE SHOW:

Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.

Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!

FOLLOW US:

Follow us on Twitter at @SmashinSecurity, or Mastodon, or on the Smashing Security subreddit, and visit our website for more episodes.

THANKS:

Theme tune: "Vinyl Memories" by Mikael Manvelyan.

Assorted sound effects: AudioBlocks.

Privacy & Opt-Out: https://redcircle.com/privacy