This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Joe Tidy
Like I say, they're having fun.
Unknown
Smashing Security, Episode 423: Operation Endgame, Deepfakes, and Dead Slugs with Carole Theriault. Hello, hello, and welcome to Smashing Security episode 423. My name's Graham Cluley.
Carole Theriault
And I'm Carole Theriault.
Graham Cluley
And Carole, we're joined by a special guest, someone who's been on the show a couple of times before. Please put your hands together for BBC cyber correspondent and author, ooh la la, Joe Tidy. Hello, Joe.
Joe Tidy
Hello. Yes, I like that and author bit. That's very new to me, but it feels nice hearing that. I'm saying it as often as possible.
Graham Cluley
Your book's out now, isn't it? Control Alt Chaos.
Joe Tidy
Yes. Been out a few weeks. Yeah. My first book.
Carole Theriault
Congratulations.
Joe Tidy
Thank you very much. A labour of love.
Carole Theriault
How many hours? Come on. How many hours?
Joe Tidy
Well, you know what? I actually worked it out pretty accurately.
Carole Theriault
I bet you did.
Joe Tidy
Because what I did was I would do my working day, put the boys to bed about 8, and then work till about half past 10, 11. Right. And I did that for about a year. I just basically quit watching TV.
Carole Theriault
And talking to your wife.
Joe Tidy
Oh yeah. She loved it. And I think it was probably about 400 hours sat at the laptop, tip-tapping away. And that doesn't include all the other nonsense you have to do around a book. But yeah, a lot of work.
Graham Cluley
Well, you've been busy. I've seen loads of publicity for it and you've been popping up all kinds of places. Well, no, but that's absolutely terrific. How's it going?
Joe Tidy
Yeah, good. Yeah, obviously I've got no frame of reference at all, 'cause I've not done this before. But yeah, lots and lots of nice feedback really. There's been enough people now that are being nice about it to make me think that actually maybe it is a good book, you know, because the first few people you think they're just being nice, but actually no, it's been pretty good. I got some nice reviews in the press and some people have commented on it and it's been a really amazing thing. It's the hardest thing I've ever done, but I've done documentaries and I've done podcasts and all the rest of it. But writing a book has been, you know, massive. I liken it to kind of an Ironman. I've done an Ironman before and it's a bit like that in terms of an endurance race or the sacrifices and discipline, but it's the most rewarding thing I've ever done already in terms of just what I learned and what I'm hearing. And yeah, I'm really, really enjoying it.
Graham Cluley
Well, I was lucky enough to get my copy. I went along to the launch party down in London.
Carole Theriault
Beautiful.
Graham Cluley
Control Alt Chaos.
Joe Tidy
Yes. Thank you for coming.
Graham Cluley
Now, I must admit, I haven't finished it yet, Joe, but that's not your fault.
Carole Theriault
He's probably spent 400 hours reading it so far though.
Joe Tidy
I hope it doesn't take that long.
Graham Cluley
But I can confirm something which you said at the launch party, which is the font is quite beautiful. They've done a lovely, lovely done a jolly job with the typeface.
Joe Tidy
They have, they have. And that's all you're going to say, Graham?
Graham Cluley
Well, I think we're going to be talking a little bit more later on about the book and the story which it covers, which is absolutely fascinating.
Joe Tidy
Ah, thank you. Yeah, I think so. But I would say that. But then again, we're all geeks here, aren't we? So hopefully we'll all find it interesting.
Carole Theriault
Well, two-thirds. Before we kick off, let's thank this week's wonderful sponsors: Flare, 1Password, and Vanta. It's their support that helps us give you this show for free. So coming up on today's show, Graham, what do you got?
Graham Cluley
I'm going to be asking if this is the endgame for ransomware.
Carole Theriault
What about you, Joe?
Joe Tidy
Well, as you know, I'm here for the first time as a salesman. So, you know, roll up, roll up, apples and pears, apples and pears, all that business. I'll be talking about the book.
Carole Theriault
And I'm going to be covering deepfakes and recruitment. All this and much more coming up on this episode of Smashing Security.
Graham Cluley
Now, chums, for years, the fight against ransomware has felt a bit, well, you know, how can I put it? Maybe a little bit one-sided, perhaps something like that. Cybercriminals, they've been swanning around in their Telegram channels. They've been selling access to corporate networks. They've been launching attacks left, right, and center. They've been doing donuts in their Lamborghinis around Red Square. And they have been laughing all the way to the bank, or maybe more specifically, their cryptocurrency wallet.
Carole Theriault
I was going to say, yeah.
Graham Cluley
Yes.
Joe Tidy
The crypto banks.
Graham Cluley
Crypto banks. Meanwhile, however, the cops, law enforcement, they've been telling people to watch out for phishing emails or asking their Russian counterparts, very nicely, one assumes, if they wouldn't mind having a word in the ear of some of those who are responsible for these attacks. There's a good lad. Maybe just give them a nudge. It's been they've been asking nicely for suspects to come in for questioning. And you've thought, isn't this a losing battle? Well, I'd postulate that maybe it isn't. Maybe it looks something may have actually changed, and it's not all going the way of the bad guys any longer. Because I know over the last few months, there have been lots of headlines about the likes of Marks & Spencer and Co-op and British Library and insurance companies in the States and Victoria's Secret being hacked, all that sort of stuff. But maybe it's not all bad news on the cybercrime front because there has been something going on. There is a police operation called Operation Endgame, which has stormed onto the scene and it's not mucking about.
Carole Theriault
Okay.
Joe Tidy
I've seen this. They've been doing these videos, haven't they? Have you seen the videos they've been putting out?
Graham Cluley
They're extraordinary.
Joe Tidy
They're brilliant. Europol are having such a good time, and it's great to see. They've been using AI, no doubt. I've watched these videos and it looks they're AI-generated. And they've been basically taking the mick out of all these people that they have uncovered and unmasked as being behind these big ransomware crews.
Carole Theriault
They've done this before, haven't they?
Graham Cluley
Oh, but they've taken it to a whole new level, Carole, with Operation Endgame.
Carole Theriault
Everybody has two sides. There is the light and there is darkness.
Joe Tidy
The EU imposes first-ever sanctions on leading cybercriminals.
Carole Theriault
Yin and yang. Love and fear. On the grand scale of life, most people tip to one side.
Graham Cluley
But some lean toward the other. They exit the light and enter the night.
Carole Theriault
But here's the thing: the scale doesn't tip itself.
Joe Tidy
You do.
Graham Cluley
We'll include some links to these in the show notes. It seems now if you want to be a cybercrime cop, you also need skills to create AI videos with Russian subtitles aimed at the criminal underground. Some of these videos are mocking the malware authors for infecting their own computers with malware. Others are telling them to go straight and turn a new leaf, saying it's never too late to change. They actually, if you go to the Operation Endgame website, and this is a police operation, as I'm about to explain, they're releasing seasons of these videos. You can binge-watch them as if you were sat in front of Netflix.
Joe Tidy
I have. This is my Netflix. It's the sort of life I lead.
Carole Theriault
Now that you don't have to write a book anymore, your feet are up on the desk, popcorn going in the mouth, and watching this.
Joe Tidy
They're brilliant. They're anime and manga, and they're really stylised.
Graham Cluley
Look at me here.
Joe Tidy
I'm setting up a botnet named QuackBot, earning us lots and lots of money.
Graham Cluley
We had success all over the world.
Carole Theriault
Unfortunately, QuackBot was taken down in August 2023, making me feel very sad.
Graham Cluley
The amount of money we had was decreasing rapidly. I was looking for answers to our problems.
Carole Theriault
But without much luck.
Graham Cluley
What's wrong, honey?
Joe Tidy
You seem a little down.
Carole Theriault
Oh, just a bad day at the office, honey.
Graham Cluley
I did not want to let your mom know, kids, but boy oh boy was I worried. And every day I grew increasingly paranoid. So Operation Endgame, it sounds a Marvel superhero movie, but despite the cheesy name, it has been succeeding in disrupting and smashing up parts of the criminal underworld. And I thought it was worth just talking about some of the ways in which they've been doing that. At the end of May, for instance, Dutch police working with the FBI, they announced that they had taken down—
Joe Tidy
It's always the Dutch.
Graham Cluley
The Dutch are amazing, aren't they?
Joe Tidy
They are absolutely brilliant. They've got such a good cybercrime sort of division or something. I don't know what it is, but they are involved in every single major international operation.
Graham Cluley
I wonder also whether the Dutch have got a history and experience of setting up very hardened anonymous web servers.
Joe Tidy
True.
Graham Cluley
And so maybe cybercriminals have been drawn to hosting some of their operations there.
Joe Tidy
Bulletproof cloud providers, yeah.
Graham Cluley
And then when they become undone, inevitably, obviously, the local police are involved as well. Anyway, for over a decade, this website, AVCheck, offered this really convenient service. What you could do is you could upload a suspicious file you found on your computer, and it will tell you which antivirus products detected it and what they detected it as. A bit VirusTotal, which you may have heard of.
Carole Theriault
Mm-hmm.
Graham Cluley
And this was an absolute godsend to the cybercriminals because all they had to do was just tweak their malware code, keep on uploading it to this service until it said, nope, nothing detects this, and then boom, launch it into the wild undetected because the site very carefully didn't share uploaded files with security vendors, unlike VirusTotal.
Carole Theriault
Mm-hmm.
Graham Cluley
And that in itself is highly suspicious that they weren't doing that.
Joe Tidy
There's only one reason why you would use that website. Yeah. It reminds me of the DDoS-for-hire services where you can go on and they say, oh, well, this could be for internal testing for your own web service or whatever. And you think, yeah, okay. But that one, there's no disclaimer possible, is there? There's only one reason why I'd use that.
Graham Cluley
Yeah. I mean, why wouldn't you use VirusTotal? Why wouldn't you use the one which everybody uses? So that service was running for over a decade. Makes you wonder how many attacks slipped through because of it. But Operation Endgame brought it to a halt. They took down the site and Operation Endgame didn't stop there. Earlier in May, they also went after initial access malware. Those are the tools that cybercriminals use to sneak into systems before deploying ransomware, we're talking about malware with crazy names like QuackBot and TrickBot and Danabot. Danabot has infected over 300,000 computers around the world. It's caused an estimated $50 million worth of damage. And there've been variants of it actually, which are specifically, it appears, designed to conduct espionage for the Russian state. So Danabot.
Joe Tidy
And you've just reminded me that one of the videos from Europol is Danabot, Danabot. They actually make up a song, don't they? They make up this theme tune for it.
Graham Cluley
Yeah.
Joe Tidy
Yeah, someone said to me once, there's 3 ways that you would take down a cybercrime gang. You could either arrest them, disrupt their infrastructure, or you can unmask them. Because obviously anonymity is part of their power.
Graham Cluley
Yes. So the authorities have taken down the Danabot malware botnet. The DOJ has launched indictments against a number of these Russian hackers. On the same day as they took down Danabot, they also took down LumaStealer. There were over 2,300 domains that were hosting LumaStealer control panels and payloads. LumaStealer was a piece of malware that infected your computer and would extract usernames and passwords from various apps and send them to servers controlled by the attackers. The cops, when they took over LumaStealer, they not only put up their sort of standard This website has been taken down banner and began collecting traffic about infected victims. They also posted a message to LumaStealer's Telegram channel, again, mocking them for what they had done.
Joe Tidy
That sort of stuff is effective though, because, you know, these guys want to seem all powerful in their forums and on their channels and stuff. So if you can rip the carpet from underneath them, or rug pull, as they say, make them look silly, they're far less likely to get anyone following them and using their services.
Graham Cluley
And every time one of these malware service providers, effectively, these cybercrime service providers, gets compromised by the police and that information falls into police hands, it's gonna make cybercriminals more nervous as to who next are they gonna partner with. Is something already being compromised?
Joe Tidy
You love to see it. Yeah.
Carole Theriault
They're probably also getting more backing from kids who are watching the videos going, oh, that's pretty cool. You know, wow, they've got a personality. Wow, the good guys.
Joe Tidy
Who knew? Yeah.
Graham Cluley
I'd like a job as a cyber cop because I get to make videos like that.
Carole Theriault
Right.
Joe Tidy
Yeah, exactly. And that's good. Making the good guys look cool is actually what we need, isn't it?
Carole Theriault
It definitely is.
Graham Cluley
Trust us, we've been trying for decades, Joe. So, Luma Stealer has really been something of a market leader when it comes to this information stealing market. It's because it's got this simple, point-and-click interface. It means even the thickest cybercriminal could handle it, make money out of what they stole. They could even very easily— there was an option to sell all of the data which you had stolen with this tool on a private marketplace, which was operated by the creators of LumaStealer. So they really made it easy. It was like the Etsy of cybercrime. So in just one month, Operation Endgame, which has been running for a while, and had various victories, but they've managed to go after the major tools that help cybercriminals steal credentials and passwords, the tools which help them test their malware to see if it's detected or not and to gain access to networks. This has been a real strategic hit, I think, to ransomware infrastructure. And that, I think, combined with these crazy anime videos with Russian subtitles aimed at the criminal underground. It's doing a pretty good job.
Joe Tidy
Like I say, they're having fun.
Graham Cluley
They are having fun, which is good because obviously, you know, these cops must get fed up. If they're not succeeding in collaring some of these cybercriminals, they might as well have some fun taking the mick out of them.
Joe Tidy
I suppose that the proof will be in the pudding though. So it doesn't always have an impact, because sometimes of course these people will rebrand their services and pop back up and use a different alias. I think there's definitely something to be said for unmasking and embarrassing these individuals who are just men, normally always men, who have got egos and they want to be seen to be all powerful. So, yeah. And you can't arrest them because quite often you can't get hold of them, can't That will have an impact. But if Danabot's down, will there be a Jannabot that pops up in a few weeks' time? That's the frustration, I think, with these law enforcement operations is how long-lasting they are.
Graham Cluley
I think you're right, because sometimes they do, yes, rear their head worryingly quickly again. And appear to come back.
Joe Tidy
get in the countries that they're in, potentially Russia. So you can do the other
Graham Cluley
But of course, you always have to think, is it actually them that are back, or is it the cops masquerading as them? So hopefully that uncertainty will make things better.
Joe Tidy
two. And sometimes that makes a difference and sometimes it doesn't.
Graham Cluley
If you go to the Operation Endgame website right now, you can not only see these videos, you can also see the mugshots of the suspects, some of Europe's most wanted, including some anime drawings of suspects when I guess they didn't have photographs.
Carole Theriault
They should call it Operation Shame, Name and Shame. So that's basically what they're doing.
Joe Tidy
Well, that's what these criminals are doing to companies, their victims, aren't they, all the time? You go on there. And that's what I quite liked about a similar one from— it was led by the NCA in the UK. Smashing Security against LockBit, because they took over the LockBit name and shame website, the leak site. And instead of having the victim companies, you know, normally you have this kind of graveyard-style darknet site where you scroll down, you see all the companies that have been popped by LockBit. Instead of that, they had the names of the people who are part of LockBit and statistics on how many people have been arrested and threats of more action to come. They were the boxes. I really remember that as being quite a strong message being sent.
Graham Cluley
They were practically doxing the cybercriminals, weren't they?
Joe Tidy
That's it, yeah. In some cases, that's all you can do.
Graham Cluley
Yeah.
Joe Tidy
You can't arrest them.
Graham Cluley
Yeah. Because they're
Joe Tidy
Yeah.
Graham Cluley
Russia is allowing cybercriminals to operate with impunity as long as they don't attack Russian companies. So they're not facing justice. So these cartoonish videos, these catchy jingles, all very entertaining. But you're right, they're no real substitute for actual arrests. mostly in Russia, I guess.
Joe Tidy
Yeah.
Graham Cluley
But they are a lot of fun. Joe, what have you got to talk to us about this week?
Joe Tidy
Well, I would like to talk to you about a brand new book that has hit the bookshelves called Control+Alt+Chaos: How Teenage Hackers Hijacked the Internet. So I'm shamelessly using my little slot that you've given me to plug my book. I'm a first-time author, and all the support and help that the community can give me would be wonderful to prove that cyberbooks can be a success. So the book is about, as the subtitle suggests, this trend of teenage cybercriminals on the internet. We have heard over the years so many stories of teenagers finding their way into systems and networks and causing havoc and mayhem and chaos to not only businesses but people's lives. And the thesis of the book is that this is an element of the cybercrime ecosystem that we always underestimate. We don't like to admit that we've been popped by teenagers, hackers in hoodies in bedrooms. We like to think, oh no, it's definitely the Russians or the Chinese or the North Koreans. But actually, quite often, it is indeed little Johnny upstairs when he's not playing Minecraft or Roblox. He's causing problems online. And the thrust of the book, the thread that runs through, is this criminal called Julius Kivimäki, who was a teenage cybercriminal who I interviewed at Sky News when I used to work there, when I was a general reporter. And it was in 2014 at Christmas time. And I don't know if you guys remember this, but he was part of a gang called Lizard Squad, which took down the PlayStation Network and Xbox Live and caused— it was a big DDoS attack, which hit both companies simultaneously. And it meant that about 150 million people couldn't play on their new games or register new consoles.
Carole Theriault
I don't think my therapist takes notes, so.
Graham Cluley
Christmas was cancelled as a result. Exactly. That's one of the names of the chapters. Correct.
Joe Tidy
Yeah. Yeah, we cover this stuff.
Graham Cluley
Yeah.
Carole Theriault
How come?
Joe Tidy
You guys talk about it week in, week out. Well, so he was 17. The other guys were roughly around the same age. They were absolutely loving the attention back then. He did an on-camera interview with me from over Skype. I do it all the time on BBC News and at Sky News before that. He's Finnish, which we put on Sky News around the time. And he was like, yeah, we did it for fun. We did it to prove that we're more powerful than the companies.
Graham Cluley
Why?
Joe Tidy
But this type of breach, this type of vulnerable data, bear in mind, these people are already quite often vulnerable themselves already. Why did you do this? It affected so many people.
Graham Cluley
Why we did it? Mostly to raise awareness to ourselves. They should have more than enough funding to be able to protect against these attacks.
Joe Tidy
You say that you're doing it to make sure that people understand the security, or lack thereof, on these networks, but you're laughing when you're talking about it. On the internet, you're obviously bragging about it, but this is a serious thing. There are victims to this, aren't there?
Graham Cluley
Consider the biggest victim Sony and Microsoft, because they actually lost money from this.
Joe Tidy
Do you not feel guilty that you've taken so much enjoyment of gaming away from more than 100 million people over this Christmas period?
Graham Cluley
I'd be rather worried if those people didn't have anything better to do than play games on their consoles on Christmas Eve and Christmas Day. What?
Joe Tidy
And that for me was just such a moment in my career, a kind of fork in the road where I thought, hang on a minute, how can people, especially kids, have so much power with a keyboard and a mouse? And from that day, I just became obsessed with cybersecurity. And I've sort of tried to follow this individual who went missing for a few years after many other cybercrimes and then popped up back in 2022 when he was accused of what is, I would argue, the cruelest cyberattack in history against a chain of psychotherapy centres in Finland called Vastamo. He hacked in and stole the patient notes of about 33,000 people. And for my money, I can't think of anything worse than having my therapy notes stolen. You know, we talk about data breaches all the time, don't we? Oh, well, that's good. Keep it that way.
Graham Cluley
More than most of us. Yes.
Joe Tidy
But your name, address, telephone number, email address, or whatever, Social Security.
Graham Cluley
But it's more than that though, Joe, isn't it? Because they didn't just take the information, they then contacted the patients. And said, unless you pay up, we're going to publish this online.
Joe Tidy
Step 1, pretty cruel, pretty nasty to steal that data. Step 2, went to the company CEO and tried to get them to pay €400,000, and he wouldn't. So then the kind of final Hail Mary, which is arguably why I put it in that cruelest cyberattack ever, is because, as you say, he then emailed about 27,000 people who he could find email addresses for, saying, "I have your notes." Oh, I thought you'd been saying "coolest."
Carole Theriault
No, I get it. I was going, "Wow, this guy's dark." No, definitely cruel with an R.
Joe Tidy
And in the book, I speak to lots of the victims of this. And the impact it's had on their lives is absolutely immeasurable.
Carole Theriault
Devastating.
Graham Cluley
Yes.
Joe Tidy
And the badges on LinkedIn are actually real, So to have this extra stress on their lives, absolutely unbearable. And there's some suggestion from some of the lawyers that some people even took their lives over this. aren't they? It's not like a Twitter badge,
Graham Cluley
So Joe, having spent hundreds of hours writing this book and presumably a huge amount of time and experience researching this topic, why is it that teenagers are drawn to this? Have you seen some common explanation as to what's going on?
Joe Tidy
which someone can just pay for. Every single hacker that I've ever interviewed started off in gaming and there's this thing that the NCA actually did in 2015. So, you know, 10 years ago they put this what they call a pathway to cybercrime. They did a survey and they put this out and said, this is by far and away the most likely scenario. So you're a young teenage boy and it is normally always boys. You play games, then you want to beat your friends. So you go on the internet and you find ways to cheat in games. Then you find ways to get more, basically hack the game in a sense and get more kind of powers or whatever. Then you find yourself on cheating forums and hacking forums. Then you find yourself carrying out more traditional hacking. For fun and out of curiosity. Then there's money sometimes that becomes involved, and then serious cybercrime follows. And I think in my book, what I talk about is why? Why does this happen? And why, why particularly do we see this shift from the sort of do no harm hacking to what we see today with teenage cybercrime, how it went dark essentially? And I think the things that I landed on are, first of all, the rise of Twitter. I'd say that that had a big impact because before that, social networks were about being social. People in your network, whereas Twitter was about followers and likes and retweets. So it was about becoming famous and more particularly, more specifically becoming infamous on the internet. So that's how you got these massive gangs rising up and they had logos and they had spokespeople and hacking was sort of brought out of the shadows and made to look cool and fun. And then Bitcoin as well. Bitcoin meant that suddenly you've got really easily transferable money, which you can hide behind as well. And I think they're the reasons why, you know, we've seen some of this teenage cybercrime culture or teenage hacking culture move towards cybercrime.
Graham Cluley
Wow.
Carole Theriault
It's kind of scary though to imagine, like, I don't know, if they're kids and teenagers, I kind of think their kind of ethics
Graham Cluley
This is going on, and the technology is extraordinary, not only in deepfaking the voice and the faces, but also, as you've just suggested, in terms of giving the fake recruitee information to answer the questions. In fact, I have a slight personal interest in this because someone recently launched their service, which claims to be able to help you to get through any job interview online by listening in and giving you the answers.
Carole Theriault
So it's kind of like we're letting them down somewhere. Badly without realizing it. and sense of self is not yet fully developed either.
Graham Cluley
And they've called this damn thing Cluley AI. Yeah, one hacker said to me that when you're a teenager, you've got an invincibility cloak around you. So you don't really care about the damage that's being done. But also, you don't really know as well. So they're using—
Carole Theriault
Right.
Graham Cluley
I think, hang I don't get to the answer. No spoilers there. It's a very complicated problem. on a moment, Yes, exactly. So, they may well think, well, I'm so young, it's not like I'm going to get locked up.
Carole Theriault
And they can be recruited or groomed for
Graham Cluley
let me see.
Carole Theriault
that, you know.
Joe Tidy
Yeah, definitely.
Carole Theriault
By people that are overage saying, look, you can do it, you're under 18.
Graham Cluley
Mind you, I remember someone who was in their late 80s who tried to buy a fake driving license in a pub because they wanted to be able to drive and they weren't able to get a real driving license. And their attitude was, well, they're not going to put me in jail, are they?
Joe Tidy
And even if they do, how many years will it be?
Carole Theriault
At least I'll get dinner. Yeah.
Graham Cluley
So it's called Clueley is how they've spelt it. I think that's right. So maybe one day we'll have hackers who are nonagenarians as well. I'm not sure. Yes, Clueley. So C-L-U-E-L-Y. The other thing which comes through in the book is it's a very, very misogynistic community as well. So it's the common misspelling of my name. And my search engine optimization has completely tanked since these guys came along, this AI startup. For sure. Cybersecurity in general is obviously very male skewed because I don't know reasons, I suppose. But in the hacking world, in the cybercrime world, you speak to some— I have spoken to some female hackers. I know this is why I'm really complaining, but apparently it's—
Carole Theriault
You're locked out. Yes, exactly. Yes. And, you know, is that a bad thing? Exactly. Yeah. And also, you know, if you say it starts with the gaming, a lot of games, most games, especially if you're talking 10 years ago when they might have There's a lot more male-focused games or boy-focused games, I think.
Graham Cluley
Yeah.
Joe Tidy
Yeah. Yeah. Although, did you hear about the Grow a Garden? Did you hear about this one?
Carole Theriault
Yes, I have heard about Grow a Garden.
Graham Cluley
What's that, Joe?
Joe Tidy
So there's this new Roblox game. Obviously, Roblox is a kind of universe of games that anyone can make. And I don't know if Roblox has made it or somewhat a creator on the platform made it. So Grow Your Garden is just you have a really rubbish-looking blocky garden, Roblox style, and you just plant stuff, and then you watch it grow. Literally, that is it. But it's absolutely monstrous. I think they said something it's broken the record for having 16 million concurrent players. Before that, it was Fortnite, and now this ridiculous grow-a-garden game.
Carole Theriault
But how sad, get them outside.
Joe Tidy
Get them outside. Well, yeah, but you know what? I know. I was picking up my son yesterday from football, and I thought it was so funny and also quite wholesome because all the kids that were waiting to run onto the pitch, boys and girls, were all discussing grow a garden. And I was listening and they were going, oh yeah, I grew a courgette today. Oh yeah, you should see my cauliflowers. And then, and I was, what is going on? And then they all ran on the football pitch and they started playing football in the sunshine. I thought, that's childhood, you know, you can have it all. You can have the computer games and the online life and you can have the offline life and you can be a fully rounded individual. You don't have to go from gaming to cybercrime, which is where my brain always goes, obviously.
Graham Cluley
I think Operation Endgame needs to stop making these videos and start making Roblox games set in people's gardens. And maybe we'll get—
Carole Theriault
TM it, Graham. TM it.
Graham Cluley
Maybe we'll get the overlords of Lockbit and other ransomware gangs growing marrows rather than creating malware.
Joe Tidy
Marrows, not malware. That's the campaign.
Carole Theriault
Yeah.
Graham Cluley
Yeah.
Carole Theriault
There we go. And the legislation isn't there. So the companies would have to go, oh yeah, we did hire North Korean workers.
Graham Cluley
Get the t-shirt made right now. That's the slogan. Carole, what have you got for us this week?
Carole Theriault
Sorry, we just didn't know. Okay, we're talking deepfakes. Of course, we know AI has seriously reshaped how many businesses do all their stuff from recruiting people and coding and manufacturing, fulfillment, marketing, sales. The list goes on.
Graham Cluley
While companies and employees often sing AI's praises, we know, we Smashing Security folk know, there's a darker side where AI tech is used for the not so good. Take deepfakes in the business world, for instance. With a veritable cornucopia of AI-powered tools available, people without much training can create highly realistic fake identities. We've heard about scammers posing as C-levels on video conferencing calls to dupe employees into big payouts, right? We even talked about that in the show.
Joe Tidy
There was that big Hong Kong one, wasn't there?
Graham Cluley
There was. Millions was lost, wasn't it?
Joe Tidy
Something crazy, yeah.
Graham Cluley
Oh yeah, okay. Yeah. Yeah. But what I was hoping to talk about today is deepfakes in the recruitment process. So as you'll soon hear, some of these attempts are really rather convincing.
Carole Theriault
And then use solutions to help identify VPNs. And I mean, especially in the cybersecurity industry, you'd expect people to use VPNs, you know, and maybe their exact number, but use a VoIP number instead.
Joe Tidy
Wow.
Carole Theriault
And then they say, of course, in-person onboarding, make that mandatory wherever possible. So I mean, I'm just reading this and thinking this job recruitment has never sounded so fun, you know? So, good luck millennials, good luck Zoomers, bonne chance, and the Alphas, hopefully it'll all be clear and great by the time you hit the market. Wow. That's in 3 years, not even.
Graham Cluley
Goodness.
Carole Theriault
And so the idea is that this needs addressing pronto. And the thing is, we're not just talking about an applicant attempting to put a bit of spit polish on their true identity or to skirt around a background check. It seems there's a mounting concern of organized criminals and nefarious state hackers. So I'm very interested in what you think about this, Joe. Maybe it's teenagers, but these guys using artificial intelligence to pose as remote job applicants in an effort to infiltrate companies from the inside, steal data, hold them to ransom. So a company called Pindrop— this is a company that offers tools to help detect fakes— but they did a spot of research last week saying it has seen applicants from across the globe creating as US-based candidates. So they name Russia, China, Pakistan, and parts of Africa. So they have this interview candidate they called Shamar, and he sailed through the initial screening, right? So Shamar's resume looked like a perfect match for the role. They were looking for a software engineer, so he had experience building scalable systems in Python and Go. He had familiarity with cloud environments like AWS and direct alignment with key technologies in their stack. So they're interested. Shamar even referenced contributions to real-time systems in sensitive environments. That means absolutely nothing to me, but they say that is exactly the kind of language that catches the eye of recruiters and hiring managers alike. So they were basically running this job search, and they were then looking at everyone that was coming in to see if they were deepfaked or not. They write that his work history checked out too. So he held roles for 2 or 3 years at a time with a clear and logical progression from junior to senior positions. His resume was well-structured, clean formatting, concise bullet points. I mean, everything that AI can do these days.
Joe Tidy
He's perfect. He's so perfect.
Carole Theriault
Even his LinkedIn profile looked legit, which is why he didn't raise any flags. I haven't seen mine in 10 years. So his LinkedIn profile included a verification
Joe Tidy
Yeah, but then some of the talent is abroad, isn't it? I was on it and
Carole Theriault
badge, the kind that LinkedIn displays when a user has verified specific information, like
Joe Tidy
And then, you know, we're meant to be in a globalised world
Graham Cluley
No, that's right.
Carole Theriault
their identity or employer, that sort of stuff.
Joe Tidy
I'm afraid it hasn't kept my attention. where you can work from anywhere and, ah, yeah.
Carole Theriault
Yeah.
Graham Cluley
They were a bit more careful, aren't they?
Carole Theriault
Yeah. So basically, nothing felt off. And this is from a company that's looking for these things. And it was the kind of resume that they say they see, they trust from experienced engineers in today's remote talent market. However, in their postmortem, they reported that Shamarr used high-fidelity face swap, clear audio, strong English fluency, fast response times, and long polished answers, some of which were likely to be AI-assisted. And they figured that out by apparently coming prepared to detect for AI-assisted interviews by pre-testing the questions against common LLMs to anticipate potential responses. Is it spelt correctly? Well, they love you now because you've just given
Graham Cluley
Right.
Carole Theriault
them a load of—
Joe Tidy
They'll put that on their promos. Exactly. AI upstarts.
Graham Cluley
It's helping people with their real-time conversations and helping people fake and cheat at everything in order to pass job interviews.
Joe Tidy
Deepfakes are a strange technology. I was thinking about this the other day. It's a little bit like we were talking about with that AV testing cybercriminal service. I can't really think of a good use of the deepfake technology. We've got this way of swapping faces now. And if you're a Hollywood producer and you're making a film or whatever, I can see how that will be useful. But—
Carole Theriault
Well, no, not Face/Off. You don't need deepfakes for Face/Off, surely.
Joe Tidy
Actually, you just get John Travolta and whoever it was.
Graham Cluley
Just get him
Carole Theriault
So basically the name of the game is
Graham Cluley
to play the
Carole Theriault
you listen to tunes and you put them
Joe Tidy
But I was thinking about it, you know, obviously deepfakes came in and they've become, like many industries, turbocharged by porn. And, you know, I can see that as being a use case that is unethical. Illegal in some cases, of course.
Graham Cluley
other part. That's right.
Carole Theriault
into a chronological musical timeline.
Joe Tidy
But then what else is there? You hear about deepfakes being used to victimize women and for people to use them for BEC scams and stuff like that.
Graham Cluley
Sextortion as well of young people.
Joe Tidy
Yeah, I can't really think. I wish we could put it back in a box. You know, I know you can't. As a technologist, I shouldn't be saying that, but there are some technologies that you just think, why? Why is it here? It doesn't feel like it's a good idea.
Carole Theriault
Another thing they had in their postmortem was that his LinkedIn profile had successfully passed the identity verification through CLEAR using a Jamaican government-issued ID. So that was a kind of, "Oh, that's odd," since he claimed to be a US-based person.
Graham Cluley
I have to say, this appeals
Carole Theriault
And the IP address found across two of Shamar's interviews was linked to a known Astral VPN range, an anonymization service repeatedly cited by Mandiant and Unit 42 from Palo Alto as a key obfuscation tool used by DPRK, also known as North Korea.
Graham Cluley
to my competitive nature.
Joe Tidy
So there's your red flags.
Graham Cluley
I think I'd be quite good at this.
Carole Theriault
There's your red flags. But they had to dig quite deeply.
Joe Tidy
Yeah, exactly.
Graham Cluley
It's the Wombles, for goodness' sake. Come on.
Joe Tidy
The North Korean worker stuff is absolutely fascinating, isn't it? There's this whole industry of potentially thousands of North Koreans who run multiple jobs at the same time, earning normal wages. And if it goes wrong, there have been cases where they steal the company's data on their way out and use that as another way to make money.
Carole Theriault
Yeah.
Joe Tidy
I think it's just fascinating to me. But then if you're funding the regime, you could get yourself in trouble because of sanctions. Oh, it's a nightmare.
Graham Cluley
Yeah, it is quite astonishing. I've also seen people say, well, get the person you're interviewing to share their screen in case they've got other, but again, they're ready for that now. They can really convince you that they are genuine and they're not necessarily. And of course, remote working has opened up so many more opportunities for this.
Carole Theriault
Now, advice, right? Be interested in your take on these. Here's some advice to prevent being
Joe Tidy
Throw your computers in the sea, do everything in person.
Carole Theriault
duped by deepfake candidates.
Graham Cluley
Exactly.
Joe Tidy
Yeah, that's it.
Carole Theriault
So, before you do that, you might want to consider tools that aid detection. So, maybe foolproof vetting, which I don't understand how you could do. A robust identity verification process that includes verifying all contact details and working with specialized providers for sensitive roles. Ka-ching! That adds a zero to your process. Train interviewers, educate those responsible for hiring about candidate fraud and how to spot suspicious behavior. But that's the problem, it's really hard to spot. Require candidates' camera be on during interviews, ask in-depth questions, and watch for evasive answers. But again, I think anybody in a job interview is going to give something evasive at some point, aren't they?
Joe Tidy
Yeah, I'd come across very suspicious.
Graham Cluley
Exactly. Yeah, well, I've never done— I'm not in a managerial position, but I know from speaking to my boss, hiring is already really, really hard. So you add in all these layers.
Carole Theriault
Or hire local, you know, go
Graham Cluley
And sometimes they claim to be based in your country as well.
Carole Theriault
back to the old days. Come on in. Come in for coffee. Graham would be "sorry, I'm a very busy man and I don't drink coffee." If you're a security or IT professional, you've got a mountain of assets to protect: devices, identities, and applications. It's a lot, and it can create a mountain of security risks. Fortunately, you can conquer that mound with 1Password Extended Access Management. Over half of IT pros say discovering SaaS apps is their biggest challenge. With the growing problem of SaaS sprawl and shadow IT, it's not hard to see why. Trelika by 1Password inventories every app in use at your company. Then pre-populated app profiles assess SaaS risks, letting you manage access, optimize spend, enforce security best practice across every app your employees use.
Graham Cluley
So take the first step to better security for your team by securing credentials and protecting every application, even unmanaged shadow IT. Learn more at 1password.com/smashing. That's 1password.com/smashing.
Carole Theriault
There are lots of threats out there affecting businesses, but what if you could see them all and exactly how they impact your organization all in one place?
Graham Cluley
Well, with Flare, you can. Flare gives security teams real-time visibility into cybercrime forums, Telegram channels, Stealer Logs, and darkweb marketplaces, so you're not blindsided by the threats.
Carole Theriault
Flare helps you prioritize real risks and kick off remediation fast so your team can move from awareness to action before any damage is done. Think of Flare as your exposure management platform built to help you detect, prioritize, and respond with lightning speed.
Graham Cluley
Sign up now for free at smashingsecurity.com/flare. That's smashingsecurity.com/flare.
Carole Theriault
And thanks to Flare for sponsoring the show.
Graham Cluley
Now, Carole, according to Vanta's latest State of Trust report, cybersecurity is the number one concern for UK businesses. And of course, Vanta can help you with that.
Carole Theriault
Whether you're a startup growing fast or already established, Vanta can help you get ISO 27001 certified and more without any of the headaches.
Graham Cluley
You see, Vanta allows your company to centralise security workflows, complete questionnaires up to 5 times faster, master and proactively manage vendor risk to help your team not only get compliant, but stay compliant.
Carole Theriault
So stop stressing over cybersecurity and start focusing on growing your business in 2025. Check out Vanta and let them handle the tough stuff. Head to vanta.com/smashing to learn more. That's Vanta, V-A-N-T-A, dot com, slash Smashing Security. Smashing. And thanks to Vanta for sponsoring Smashing Security.
Graham Cluley
And welcome back, and you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
Carole Theriault
Pick of the Week.
Joe Tidy
Pick of the Week.
Graham Cluley
Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. It doesn't have to be security-related necessarily.
Carole Theriault
Better not be.
Graham Cluley
Now my pick of the week this week is not security related. Are either of you on Mastodon? Do you remember when the whole world was going crazy about Mastodon? Everyone said, oh, we'll go to Mastodon because we hate Twitter now.
Carole Theriault
I don't think the whole world was, but—
Joe Tidy
Yeah, maybe a few.
Graham Cluley
Oh, there was a lot of talk about it.
Graham Cluley
Shame on you. I am still there. I'm on Mastodon. There's actually a lot of cybersecurity-related stuff people out on Mastodon. You may want to consider it, Joe. Okay. But I used to use the standard Mastodon web client on my desktop computer, but I found it a real pain because that's my own personal account. But there was also the Smashing Security account, and to switch between both of them, I had to log out and then log in again with a different password and then go in and out. Oh, I was getting really frustrated with it, and I wanted something that wasn't going to irritate me on my desktop, and I have found it. So for those 3 of you listeners who still use Mastodon, this is my recommendation. It's called Phanpy. Now it's spelt a little bit peculiarly. It's P-H-A-N-P-Y, phanpy.social, and it is free.
Joe Tidy
Do we know why it's called that?
Graham Cluley
Oh, I don't know why. I think it may have been created by an Asian chap. And so maybe it means something in his particular language. I don't know which particular part of Asia he's from, but it is a free website. It's a minimalist Mastodon web client, which can handle multiple accounts, runs entirely inside your browser. So you can use Chrome or Safari or Firefox. Doesn't gain access to your accounts, which is obviously really important. Has some nice features like a catch-up, which shows you a sortable list of posts within the last hour. We can make it up to 12 hours. Doesn't scroll infinitely, so you can feel you're done. It's really helped me get a proper handle on my Mastodon presence. I am on Bluesky as well, and LinkedIn, and those sort of places too, but it's really helped me in terms of Mastodon. And that is why my pick of the week is Phanpy, P-H-A-N-P-Y, dot social.
Joe Tidy
Don't you just miss Twitter? It just makes me miss Twitter.
Carole Theriault
The name?
Joe Tidy
The place, you know, it used to be my favourite website on the internet. And it's gone.
Graham Cluley
From about 10 years ago. Yeah, I did. Twitter was my favourite, I have to say. And something went badly wrong with Twitter, didn't it? It's hard to put our finger on exactly what went wrong. But—
Carole Theriault
Oh, there was a lot going wrong before then too.
Graham Cluley
Yeah, you know, it's a lot worse now from what I've seen.
Joe Tidy
Phanpy is the future.
Carole Theriault
Dry your tears, guys.
Graham Cluley
Joe, what's your pick of the week?
Joe Tidy
My pick of the week is not security related. It's not technology related. It's not even audiovisual related. I'm afraid I'm going to choose something really, really sad, but something that I just cannot get enough of. It's my mini pond in my garden.
Graham Cluley
Mini pond.
Joe Tidy
The time before last I came on your show, I talked about my wildlife camera and now I'm talking about a mini pond. And yes, if you put the two and two together, I am a garden geek when I'm not on my computers.
Graham Cluley
When you're not on your Roblox garden. Yeah, no, I'm not growing anything. Unless you count sort of maggot fly larvae and stuff like that. But it just brings me pure joy and it's just fascinating.
Carole Theriault
I can bring over bags and bags of snails and slugs for you. My garden's full of them, all of them ruining my plants.
Joe Tidy
But if I throw them in the pond, will they die?
Carole Theriault
Oh, probably. I don't know.
Joe Tidy
I don't know. I did actually get back from holiday once. I went on a two-week holiday, which is very rare. And I could smell the pond from the other end of the garden. I was like, what is going on? And I walked up to it and there were about 40, no joke, I counted them, dead slugs just floating in the water. And I've no idea what happened. I think one or two fell in. And of course slugs eat slugs. So I think a few of them went, oh, that looks tasty. Fell in, another one went, that looks tasty, fell in. So over the course of two weeks when I wasn't there doing my usual—
Carole Theriault
They're like lemmings.
Joe Tidy
Yeah, exactly that. Yeah, I'm normally there doing pond husbandry, as I call it, you know, tidying it up and sorting it out. And without me to remove the carcasses, I think it can quite easily become a death trap. So that aside, mini pond, everyone should have one. They're awesome.
Carole Theriault
Amazing.
Graham Cluley
Fantastic. Carole, what's your pick of the week?
Carole Theriault
Well, my pick of the week is a board game. So I've chosen Hitster. Not hipster, but Hitster.
Graham Cluley
Hitster.
Carole Theriault
Yeah. And I discovered this game a few years ago, but I had some friends over on the weekend and we played it and it was a total gas. So I thought I'd share it with you guys.
Joe Tidy
Oh. So the first player to have collected 10 hits in the right order is crowned the winner. And that's it. So you get this box of 300 cards, you pick a music card and scan the QR code.
Graham Cluley
Are these modern songs, Carole? Are they songs that I'm likely to know?
Carole Theriault
From the last 100 years. So they have a century of songs. So some might be more modern. You might be less aware of them, less au fait, but the ones from the '50s and '60s.
Joe Tidy
I would be terrible at this.
Carole Theriault
One app drawback is the app dependency, right?
Graham Cluley
That's a bit annoying, isn't it?
Joe Tidy
Because you can't, I was thinking you could do that on camping, but then you need signal and stuff, don't you?
Carole Theriault
Well, you can do it, I think. You could play, as long as someone's playing the Maestro, they would just be able to have a list of the songs, play them, and then you could make a list. I think you could do it pen and paper as long as someone's playing it. Who was going to be the boss.
Joe Tidy
Oh, I see.
Graham Cluley
Do you get told the name of the song and the artist, or is that a secret? Do you just get to hear it?
Carole Theriault
No, no, you just get to hear it, and I think you can get extra points if you can name the artist, if you can give the exact year. It's quite fun. Check it out.
Joe Tidy
My sister would be expert at that.
Carole Theriault
Mm-hmm. Yes, and actually, Joe, not being good at it is actually very fun as well.
Joe Tidy
Yes, because you can embarrass yourself.
Carole Theriault
People then, everyone goes, "How do you not know this?" You know, So that's my pick of the week. It's the board game Hitster with a T. Enjoy. and everyone loves that.
Graham Cluley
Fantastic. Well, that just about wraps up the show for this week. Thank you so much, Joe, for joining us today. I'm sure lots of our listeners would love to find out what you're up to and follow you online and maybe find out some more about your book. What's the best way for folks to do that?
Joe Tidy
Yeah, usual places really, LinkedIn and Blue Sky, and Instagram as well.
Graham Cluley
And can you remind us what your book's called again?
Joe Tidy
Control Alt Chaos.
Graham Cluley
That's it. And very good it is too. And you can find Smashing Security on Blue Sky, unlike Twitter, which wouldn't let us have a G. And don't forget, to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
Carole Theriault
And huge, huge thank you to our episode sponsors, 1Password, Vanta, and Flare. And of course, to our wonderful Patreon community. It's their support that helps us give you this show for free. For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 422 episodes, check out smashingsecurity.com/podcast. Smashingsecurity.com.
Graham Cluley
Until next time. Cheerio. Bye bye.
Joe Tidy
Bye. Bye bye. 424. That is amazing. Congrats, guys. That is seriously good.
Graham Cluley
It's bonkers.
Joe Tidy
Why does Twitter not want you to have a G?
Graham Cluley
Oh, people sometimes ask that. We don't have an account up there any longer, but the simple basic answer is it was too many characters. So we had to drop one of them. Yeah.
Joe Tidy
Right, I see. So it used to be Smashing.
Graham Cluley
Yeah, Smashing Security perhaps. You see, it's all very clever. Very clever.
Carole Theriault
We are very clever.
EPISODE DESCRIPTION:
In this episode, Graham unravels Operation Endgame - the surprisingly stylish police crackdown that is seizing botnets, mocking malware authors with anime videos, and taunting cybercriminals via Telegram.
Meanwhile, Carole exposes the AI-generated remote hiring threat. Could your next coworker be a North Korean hacker with a perfect LinkedIn?
And BBC cyber correspondent Joe Tidy joins us to talk about "Ctrl-Alt-Chaos", his new book diving into the murky world of teenage hackers, ransomware gangs, and the strange motivations that lie behind digital mayhem.
Plus: competitive pond husbandry, dead slugs, Hitster the board game, and a shoutout to the AI startup that hijacked Graham's SEO.
All this and more is discussed in episode 423 of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault - it's like a cauldron of life... but for cybersecurity.
Warning: This podcast may contain nuts, adult themes, and rude language.
Vanta– Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
Flare- Uncover the latest threats across the dark web and Telegram. Start your free trial today.
Trelica by 1Password - Access Governance for every SaaS app. Discover, manage, and optimize access for any of your SaaS apps - whether managed or unmanaged.
SUPPORT THE SHOW:
Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!