This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Tanya Janca
I had my data stolen once, Graham, from a governmental organization I worked at.
Graham Cluley
Right.
Tanya Janca
And they were selling it online for the bitcoin equivalent of $50 Canadian. And that made me feel very humiliated.
Graham Cluley
Were you like, please, please sell it for more?
Tanya Janca
I know, I was like, aren't we worth more than that?
Unknown
463. This AI company leaked its own code. It's also built something terrifying. With Graham Cluley and special guest Tanya Janca. Hello, hello, and welcome to Smashing Security episode 463. My name's Graham Cluley.
Tanya Janca
And I'm Tanya Janca.
Graham Cluley
Tanya Janca, first time on Smashing Security. Hello. How the flip are you?
Tanya Janca
I am wonderful, Graham. How are you?
Graham Cluley
I'm gorgeous. Now, you are dialing in today from the beautiful Canadia. Thank you very much for doing that. Now, you are a famous name, right? You're a pretty big deal in the world of cybersecurity. So if people haven't heard of you, how can you describe what you do and what you're all about?
Tanya Janca
So I am a software developer turned application security expert who really likes to write. And now has written a bunch of books and tons of blogs. I really like to speak, so I speak at conferences, and right now I'm giving secure coding training to large organizations and then kind of just doing contracts here and there, helping people change their application security program so it's more AI aware.
Graham Cluley
Okay, so you are going into organizations and you're helping those developers code more securely, which is a pretty good idea, I think, because we don't want software which is full of security holes like Swiss cheese.
Tanya Janca
Well, we have a lot of that right now all over the internet. Right now, that is a giant problem, and especially not on the internet, embedded devices. You know, you go into an emergency room, a hospital, all of those places, the security is usually much worse than it is on the internet, and it's not great on the internet.
Graham Cluley
Now, a little birdie tells me, Tanya, that you have recently set up a rival podcast to Smashing Security, and you are basically I'm thinking that you can come in here and tell everyone about your podcast. Is that correct?
Tanya Janca
It's 100% correct, Graham. Right, right. My completely different topic podcast is called DevSecStation, and it's 5 to 10 minute mini lessons for software developers about security. So, this month I'm covering the supply chain and how to secure the supply chain and how software developers they're a target now. Malicious actors are actually targeting the actual developer, the human, and they need to know.
Graham Cluley
That's interesting actually, isn't it? Because of course, it's easy to imagine how hackers could target people who work in the finance department, for instance.
Tanya Janca
Mm-hmm.
Graham Cluley
But if they're targeting the developers themselves, the idea, I presume, is to try to implant code within the code which these developers are writing, because eventually it will roll out to many, many organizations and could cause absolute mayhem.
Tanya Janca
Absolutely. So, often, the past couple years, people will say, oh, there was a software supply chain breach. But if we look at maybe half of those, it was actually the software developer that was compromised. And then as a result, multiple parts of the supply chain was breached because they have superpowers, because they can control the CI, and they control their IDE, and they control the repo, and they can go to prod, and, and, and. And so, you get the developer's credentials and suddenly you have everything. And then on top of that, what some of the malicious actors have been doing, Graham, is then they rob the developer as well.
Graham Cluley
Oh.
Tanya Janca
So they go and they try to empty their crypto wallets because why don't we just kick people while we're down?
Graham Cluley
Developers are the kind of people who quite often would have crypto wallets, wouldn't they?
Tanya Janca
Yep.
Graham Cluley
And so they understand the technology and so they may have a few thousand dollars or perhaps more.
Tanya Janca
They'd be significantly more likely to have a crypto wallet than the average person.
Graham Cluley
And I'm also thinking that, I mean, my background is I used to be a developer many years ago, used to write antivirus software. And I remember from way back then that the programmers are also the kind of people who would demand to have admin privileges on their computers because they feel they have godlike capabilities anyway. And so they would be arguing with the IT team, well, I need all of these rights. And that could be a security threat in itself, couldn't it?
Tanya Janca
Oh yeah, for sure, Graham. And I was a software developer longer than I've worked in security. I was that person for sure. And on top of having admin rights and being the lord of their workstation, I think a lot of people, when we think of the CI/CD, we think of it as a thing that publishes code and we don't think about how it's a thing that talks to the outside, does downloads, tells us if everything's okay or not, decides to log or not log certain security things. And very few organizations are currently logging or alerting, for instance, if a new admin gets added or if a new workflow gets added. I worked at a place, I was contracting there, and we're playing around with their CI because I'm going to add some stuff and—
Graham Cluley
Time, time, time, Tanya. Look, you've been developing code more recently than me, and I recognize that there's a lot of listeners who may not work in the programming world. You're giving me some acronyms here. No, no, no, it's all right. But what is that? What is that that you are talking about?
Tanya Janca
So a CI/CD, continuous integration, continuous delivery pipeline. It's a piece of software that the software developers will put their code into, and then it will run lots of tests. It will go and get things off the internet for them. It'll add some updates, it can log things, it can send alerts, and then it will put a copy of whatever the thing is they're building onto maybe a development server so they can play with it and look at it and do more tests. And then if all those tests pass, it's, hmm, that seemed pretty good. Let's put it on another server and let another team see it. And it goes from environment to environment automatically, automagically even. And then by the end, assuming it passes all the tests and the humans it, it goes out into production, which is where you and I and most of us humans live. So, if you're a customer and you're using software, you don't know, but that's called production. That's the place where the magic happens, where the users are. But there's all these other environments below that where we're playing around with things of making sure things are okay and making sure they're safe. And so this system is usually the most powerful software system in an organization. It can go to the internet and download things. It can install things. It can delete things. It can decide this code's not good enough and it's not going anywhere on my watch. And it does most of this quite automatically without human intervention. And now imagine a malicious actor takes that over. They could literally put code in that's bad and put it out into your product and release it to all your customers without you knowing. And it's happened a bunch of times and we're not protecting these systems very well. And so, I'm talking about it.
Tanya Janca
If you're there for a month, Graham, you could have 50 cappuccinos.
Tanya Janca
I think new software is having security added significantly more often. However, we couldn't have a podcast episode without talking about AI. So everyone right now is using Cloud, which we're going to talk about in a bit, and Copilot, et cetera, to write code for them. And the quality of code coming out of those is not very good right now. And I am seeing it improve, but not the speed that I dream of. Graham, it sounds weird, but I want to be put out of a job, right? Like, I would like to not need to teach secure coding anymore because we've got this. That's what I want. And the AI is not doing it for us. So what's happening now is that we have developers with varying levels of how to create secure software and varying level of prioritization on that. And then now they're being told develop software at 10 times the speed or we're going to fire you and hire someone else. So, they're using the AI, the AI is changing tons and tons of things they don't fully understand. They don't have time to review it. They're just pressing the commit button. And that is my fear for new software. For old software, it's, it's that, oh, it's always worked. Why would we update it? We'd have to re-architect it to fix that. We don't have money for that. We'll just leave it. A lot of legacy is in a bad shape. And by legacy, I mean software that's already out in production that's been out one or more years.
Graham Cluley
Well, you know what? I think more people need to tune into DevSecStation, the brand new podcast, something of a competitor to Smashing Security, to learn more about this. Anyway, great to have you here, Tanya. Before we kick off, let's thank this week's wonderful sponsors: Meta, CoreView, and Vanta. We'll be hearing more about them later on in the podcast. This week on Smashing Security, we won't be talking about how hackers have breached travel site Booking.com, stealing names, addresses, phone numbers, and information shared with hotels. You'll hear no discussion of how Rockstar Games, the makers of Grand Theft Auto, have been hacked for the second time in 3 years. And we won't even mention how Meta is blocking lawyers from running ads on Facebook and Instagram to recruit clients who say that they've been harmed by social media. So, Tanya, what are you going to be talking about this week?
Tanya Janca
I am going to talk about how Anthropic accidentally leaked their code for Claude Code CLI. And then I'm also going to talk about Mythos, the new model that is terrifying. Yeah.
Graham Cluley
Yeah. And I'm going to be talking about how Venetians are getting themselves in a world about hackers. All this and much more coming up on this episode of Smashing Security. Well, we've got time now to talk about one of today's sponsors, Vanta. Joe, what keeps you up at 2 o'clock in the morning?
Joe
The dog next door, mostly.
Graham Cluley
So you are not even All right, well, yeah, but I'm getting the web traffic is talking professionally, what keeps you up? the truth, right?
Joe
Oh, whether we've got the right security controls in place, whether our vendors are secure, how to escape the nightmare of outdated tools and endless manual processes.
Graham Cluley
Exactly, which is where today's sponsor comes in. It's Vanta.
Tanya Janca
It's a little bit like when H.D. Moore released Metasploit so many years ago. So Metasploit is a tool that you can point at a web app or a piece of online infrastructure. So it needs to be webby. And it will go and try to exploit a list of known CVEs, so Common Vulnerability Enumerators. So vulnerabilities that are publicly known in software that you can buy. So not custom software, but, you know, I have version XYZ of Apache web server and it's known to have that vulnerability. And so you point Metasploit at it, and if it has that vulnerability, it'll go and it'll open up a hole there and exploit it. And in the wrong hands, you can use that to hurt people just the same as if you give a scalpel to someone, they can cut themselves, they can cut someone else. But this tool, it's kind of handing someone an atomic bomb.
Joe
Fanta, the fizzy orange drink.
Tanya Janca
And so I feel, you know, for instance, let's say a big company Microsoft or Netflix or whatever, some big software company, they get a license to use it internally. They find all their own bugs. They have time because they're not publicly exposing, you know, no one else knows but them and they're fixing it. It would be the ultimate pen test, right? That could be great, except for what if one of those employees then sells those vulnerabilities to a malicious actor?
Joe
How can this possibly be true?
Tanya Janca
You know what I mean? Or they take it and then they point it at something they're not supposed to, right? Because it's so powerful and it's so fast and it's finding apparently very novel, unique things that humans haven't been able to see before. It's quite disconcerting, or I think so.
Graham Cluley
No, no, Joe, it's a Vanta with a V. It's a trust management platform. It's not a drink full of sugar. It automates all of that tedious manual compliance work so you can stop drowning in spreadsheets, chasing audit evidence, and filling out questionnaire after questionnaire.
Joe
Lush. I hate questionnaires.
Graham Cluley
Well, who doesn't? Vanta continuously monitors your systems. It centralizes your security data. It keeps your program audit ready all of the time. It also uses AI to streamline evidence collection and flag risks. It automates compliance for SOC 2, ISO 27001, HIPAA, GDPR, and more.
Tanya Janca
Yeah. Yeah.
Joe
So basically it handles the boring stuff so we can focus on the interesting stuff.
Graham Cluley
Exactly. Precisely that. And for a limited time, new customers can get $1,000 off. $1,000? Yep, $1,000. Head to vanta.com/smashing. That's vanta.com/smashing and get started today. Which is this. Maybe this will give you a little bit of comfort.
Joe
And maybe get a decent night's sleep for once. Oh, and unlike fizzy drinks, Fanta isn't bad for you.
Graham Cluley
Do you get any comfort at all from the thought that the people building these tools are still fundamentally human and therefore fundamentally fallible? Thank goodness it's not the AI, right?
Joe
That was a fruit twist.
Graham Cluley
It's human error. Hey, yes, us humans, haven't we done great? Now, chums, I want you to picture this. You are a tourist in Venice. It's a warm, Spring morning, you've just paid €12 for a cappuccino, and you're standing in Piazza San Marco watching the pigeons do their thing. Because we've really cocked up on this occasion by leaking the source code. I think we should feel good about that rather than it being an AI which screwed up, which surely is only a short way away. And what you don't realise is, while you're there in that beautiful setting, that somewhere on a dark Telegram channel, a hacking group is claiming that they could, at the press of a button, send water flooding across the very stones that you are standing on. Which would of course solve the pigeon problem in Venice, at least temporarily. Now, Tanya, have you ever been to Venice? Does this make you want to go?
Tanya Janca
So I haven't been to Venice, and I still want to go. Wet feet are okay with me.
Graham Cluley
Right? Wet feet are alright. Pack your flippers. Well, a hacking group called the Infrastructure Destruction Squad, they announced in early April that they had broken into the hydraulic pump system that protects Piazza San Marco, in Venice from the notorious high tides of Venice. They said that they accessed the system's control interface on the 26th of March. They spent about 10 days quietly poking around, having a little rummage, and then on the 7th of April, they began what they called the disclosure phase. And the disclosure phase, that's hacker speak for bragging about it on Telegram. Right?
Tanya Janca
Yeah.
Graham Cluley
Because you can't be a hacker these days without a bit of bragging. They were sharing screenshots of control panels and valve states and system layouts, and then they offered to sell full root access to one of Italy's most iconic pieces of critical infrastructure.
Tanya Janca
So they should go to shehackspurple.ca. And if you sign up for my newsletter, which is free, you'll get invites to everywhere I speak. That's scary. You'll see all my new content every month. You'll get the episode of the podcast and you'll get at least one meme. And memes are important, Graham.
Graham Cluley
How much do you think they could charge?
Tanya Janca
A million dollars?
Graham Cluley
I mean, that is plausible, isn't it? They could try that. How about $600? Oh my gosh, Graham. Not $6 million. Not $6,000. $600. Which is about the price of a mid-range Android phone. Or if you're in Venice, round about 50 cappuccinos.
You'd be high as anything, Tanya. You can't drink 50 cappuccinos.
Graham Cluley
I suppose over a month you could. I was thinking it would all be consumed in one day, in which case you'd be desperate for the loo, wouldn't you?
Tanya Janca
Yeah, that'd be awful.
Graham Cluley
Now, you live in the world of application security, Tanya. It's all about software code, web apps, all that CI/CD nonsense. When you hear $600 to access flood defense infrastructure, is that a surprising number to you, or is it just depressingly familiar for critical systems security? What's your feeling?
Tanya Janca
So my first thought is that it's very low. However, I had my data stolen once, Graham, from a governmental organization I worked at.
Graham Cluley
Right.
Tanya Janca
And they were selling it online for the bitcoin equivalent of $50 Canadian. And that made me feel very humiliated.
Graham Cluley
Were you like, please, please sell it for more?
Tanya Janca
I know. I was like, aren't we worth more than that?
Graham Cluley
It's such a slap in the face, isn't it?
Tanya Janca
Right, right. But you could just scrape the stuff off our website. None of it was private. It was publicly available data. So I was like, well, I mean, maybe what they're paying for is the convenience of it being in an Excel spreadsheet instead of having to scrape it. But I feel like $600 seems like they don't actually have access and they're just a kid in a basement being like, whoa, €600, that would be amazing. We could have 50 cappuccinos.
Graham Cluley
It's a strange old thing, isn't it? So they were posting up on Telegram this thing saying, you know, you can have access to this too as well for such a small amount of money. And their Telegram post, which was written in Chinese— I don't speak Chinese, I don't read Chinese, but thankfully the internet can do all that for me. This is what it was saying in English. It said, yes, you conducted new checks after the attack in late March. Yes, equipment tests came back positive after Easter. In other words, they were tracking the remediation efforts being made by the organisation trying to clean up afterwards. They were doing this in real time while Telegram posts were being written about it. And they continued, but what you haven't understood is that we have refused to completely shut down the flood defense system. So they're trying to make Venice basically say, oh, thank you very much. That's very good of you. We're very grateful. They said, we are not here to destroy you. We are simply here to deliver a message. We can do it and we are still inside your network. 'No tests conducted by your security teams can drive us away. No system updates can expel us. We've been here for months and will remain here for months to come.' Which is fairly aggressive, kind of spooky talk, isn't it?
Tanya Janca
It is. It makes me wonder if they have persistence on the network, where that is, right?
Graham Cluley
Yeah. I wonder how they're managing it. It'd be interesting to know, wouldn't it? And they carried on. They had a message for the press as well. They said, 'Any newspaper that disseminates this news without understanding the truth, prepare for a devastating attack. I mean, to be honest, at this point, I'm beginning to think this is most likely a 14-year-old. Yeah, there's a lot of bravado going on here, isn't there? But to recap, these hackers broke in, refusing to leave, threatening journalists, but they're only charging $600 for the privilege of having access yourself. So you could imagine if someone had a problem with Venice. I don't know, maybe you were in charge of IT at a rival European tourist destination. Maybe if you thought, "Oh, Venice has beaten us once again with all of their gondoliers and cornettos. If only we could access their flood defence system, and basically when that next high tide comes, we could ensure that they get flooded."
Tanya Janca
I don't know. I don't want to cause destruction. Maybe I'm weird.
Graham Cluley
You're Canadian. Of course you're not destructive. You know, you're just unbelievably pleasant all the time, aren't you? But I mean, but there are— now, this may come as a shock to you as a Canadian, but there are countries— I'm not going to name any countries, particularly to you, a Canadian— but there are countries which are perhaps a little bit more interested sometimes, some elements of them, in destruction. I'm just saying it's possible. But of course, lots of hacktivist groups may be interested. And look, a lot of the early malware which we saw was purely destructive. It would wipe drives or delete files. You know, there was no point to it. There was no financial incentive. It was about just being mindless, really, in a way.
Tanya Janca
I feel like there's a certain, I need to prove that I'm cool sort of thing, especially when we are coming of age, like teenagers, like I need my peers to see I'm cool. I need people to think I'm powerful. And then hopefully that sort of just wears off when we mature and we're like, actually, I could just achieve things and be awesome and I could prove I'm amazing by actually doing positive, good contributions to the world rather than negative ones. But I feel like sometimes people get lost, and maybe they don't see that there are good things that they could do to prove how awesome they are rather than bad things.
Graham Cluley
Do you think it's a bit of low self-esteem? Do you think, is it that they simply don't have girlfriends, boyfriends, or whatever it is that they're after? Maybe there's something missing in their lives.
Tanya Janca
Yeah, I often joke they just need to go get a life and maybe they need a dog. Think about it though, they're not finding this purpose in their life, this thing that brings them joy, and they're angry. And so they're taking it out on people. And I feel like if we could find a way— when we do the Pick of the Week, we're gonna talk a little bit about maybe this, but I feel like you're really onto something there, Graham. I've said things like this before where I'm just like, you know, why are people doing this? Maybe we need to find a focus to give them where they could show their brilliance, show their determination and be successful, but in a positive way.
Graham Cluley
Yeah, absolutely. So this claim they make about still being on the network, that's interesting to me. And this, no updates can expel us. In your world, when someone says they've got that kind of persistent access, do you take that seriously? Is that a technical claim, do you think, or is that just bravado?
Tanya Janca
So I do software and that's definitely an infrastructure network thing, but yeah, absolutely. Potentially still have access. There was an incident a few years ago where I remember the malicious actor was posting images of the Slack channel that the incident responders and security team was using. So they could actually see the Slack channel and the discussions of the security incident, and then they were posting it to Twitter, mocking them, which made me feel so bad for that team. And this is why we need to have a way to talk to each other that's I call it out of bound, a different separate way. So maybe there's a Signal chat where you talk or Telegram if that's your jam and you have this separate space where you can discuss things and where you can double-check things.
Graham Cluley
You've given the example of that Slack channel. It reminded me of a story from, oh my goodness, years and years ago, there was a hacking group in the UK. I think it was the LulzSec hacking gang. The police in the States, the police in the UK, Smashing Security set up a conference call to discuss this particular hacking group. And one of the participants in that call, a British police officer, was accessing the call from his private email account, or he had forwarded the login details because he had to connect late in the evening. What he didn't know was that a member of that particular hacking group had hacked his personal email, and they were actually able to tune in to the conference call and hear the police discussing the investigation into them. So, these things can really badly backfire.
Tanya Janca
Yeah. The comms are really important during an incident. When I teach software developers, I have this little section about what a security incident is, what it looks like, how you should call the security team, and what not to do. Because I've had so many software developers attempt to help me, and always from a good place, just to be clear, then ruining the chain of custody, effing up all my evidence. You know, "Don't worry, I erased it." I was like, oh my God. Yeah, I feel like the security team needs to communicate better to the entire rest of the organization, the processes that they should follow so that if there is an emergency, everyone knows what to do because a helpful person can sometimes completely ruin everything.
Graham Cluley
Yeah. Well, this is at its heart what we call an OT attack, operational technology. So it's not your email server. It's not a web application necessarily. It's not a customer database. This is all about the physical world of pumps and valves and sensors. This means that when it goes wrong, it's not your data that's being leaked. It could mean water's going everywhere. I know your world is very much the software side of things, Tanya, but OT security and application security, they are converging in some ways, aren't they?
Tanya Janca
Software runs everything. You can't have OT without any software. And I would say in this case, it sounds like it's critical infrastructure because at first when you were describing it, you're like, oh, you'll get your feet wet. And I was like, whatever, I'm British Columbian, we're always wet. It would actually flood, people could be harmed and stuff. It becomes critical infrastructure, if that makes sense. And so software runs literally everything.
Graham Cluley
That's true. And the problem is that OT systems, these operational technology systems, they were built for longevity and reliability and uptime. You know, the important thing was that they need to always work. And this was long before people were thinking about connecting them to anything. But once they were networked for convenience, maybe, or remote maintenance, suddenly this decades-old infrastructure is perhaps accessible via the public internet and may have very weak security.
Tanya Janca
I find, Graham, quite frankly, that a lot of the security industry focuses on the internet and web, but that's the tip of the iceberg of all the software that we have. In December I was working with this company that does embedded medical devices and then they do operating systems and emergency room systems, all of the devices that are in there, they write the software for that. And obviously, the security is pretty important. Safety and security and privacy, pretty darn important, right? And we worked together, and it was a really cool project. But I feel like a lot of organizations, they're like, oh, well, we're not on the internet, so it's not that important. So when we did a threat model of all the things that could happen and how easy it would be, they're really shocked. And hospitals get hit with ransomware all the time, but if you— it'd be so easy to hit a hospital physically.
Graham Cluley
Yeah, it's a big problem. And we're living in this world of web apps. People build them, they work, and then they think, oh, maybe we should add security later. If you're lucky, they have that part of the conversation. But do you think the software world is actually learning that lesson to integrate security earlier on in the process? Well, whether you believe every word that Infrastructure Destruction Squad has said about Venice or not doesn't really matter, because the next group that finds their way into a system like that, they might not be interested in writing threatening Telegram posts or asking for the mighty sum of $600. They might just want to open the valves and cause mayhem that way.
Tanya Janca
Yeah, it's true.
Graham Cluley
Well, time now to talk about one of our sponsors, Meta. Joe, have you ever had to set up a network for a new office?
Joe
Once. I've since sought therapy.
Graham Cluley
Ah, right. Well, Meta exists to make all of that someone else's problem. They are a network as a service company, but a proper end-to-end one. You hand them a physical address, a floor plan, they handle everything. They sort out the ISP, they design and deploy the network, they turn up on the site, they rack their own hardware. Kits that they've actually designed themselves, not just rebranded someone else's gubbins.
Joe
So I don't have to spend 45 minutes on hold with the telecoms company only to be told they've misspelled our company name on the contract.
Graham Cluley
Right, right. Yeah. Not a single minute of that. And once you're up and running, you get one dashboard for monitoring, security, VLANs, firewall, DNS security, the whole works. Full control without any of the soul-destroying groundwork.
Joe
This begs the question, what's the catch?
Graham Cluley
Genuinely, no catch. It's a straightforward subscription model. They even have a hardware buyback program if you've already blown the budget on equipment from another vendor.
Joe
So they'll take away the evidence of my previous terrible decisions.
Graham Cluley
Right, basically, yes. So find out more at meter.com/smashing. That's meter.com/smashing. Smashingsecurity.com/smashing, and thanks to Meta for supporting the show. Tanya, what story have you got for us this week?
Tanya Janca
Okay, so I wanted to talk about how Anthropic accidentally leaked the full source code for Claude Code CLI. So—
Graham Cluley
Sorry, isn't it Claude rather than Claude?
Tanya Janca
Oh, je parle français. I'm Canadian. I speak French. So—
Graham Cluley
Ah, mais oui, ce sont des mots qui vont très bien ensemble. Sorry, I'm putting you off.
Tanya Janca
Basically, when we publish code to production, the magical place where the users are, software developers are supposed to turn off debug mode, which is a nerdy thing that we use so that we can find problems and fix things. And then we also usually have something called an ignore file, which means don't put all of those files up there. These are the just-for-us files. And both of those things didn't happen. And so then they published this file, it's called a source map file, and it can be opened like a present, and inside was the code.
Graham Cluley
What actually got leaked here? This was Anthropic, the big AI company, which did this. They leaked the code for Claude. Is that right? The thing they spent billions on, right?
Tanya Janca
So they accidentally leaked all the intellectual property. This would be a data spill because they did it themselves. I can't imagine being the software developer that did that because they're probably pretty upset with themselves. So it wasn't a hack, it was human error. And the reason why this is a really big deal is, so first of all, they spilled their intellectual property. And as a person who has made most of her income off of her intellectual property her whole life, 'cause when I was younger, I was a professional musician, then I was a software developer writing code, then I wrote books. I did all of these things, right? All of that's intellectual property. So that's one thing. But the other thing is that then the internet got ahold of it and analyzed it for vulnerabilities and started writing exploits for it so that they could take advantage of Claude. And so people can dissect all of its defenses and come up with better attacks. And all of the other AI companies now are stealing it. And basically, so someone, rather than seeing that and reporting it immediately to Anthropic, the person's "you know what I'm gonna do? I'm gonna copy it to my own GitHub repo and start distributing it." Which makes me sad. And I know that it's a cool thing to find. I would be really excited too, but—
Graham Cluley
The thing is, yes, obviously that's naughty, right? Because it's Anthropic's code, right? But let's not forget what Anthropic and the other AI companies have been doing for years, which is they've been stealing everyone else's content without permission in order to train their AI models, right? So isn't this just actually a case of they're getting their just desserts. They have spilt their code and now it's in the hands of everybody.
Tanya Janca
So I would say yes to that part. So I've written two books and my second book came out last year and it is barely sold. And the theory is, is because Claude and all the other AIs just give you all the answers. When you go and you Google something now, it'll just tell you the smart thing that Tanya said, but it doesn't say Tanya said it.
Tanya Janca
And so before people would Google things and it'd be "oh, you wanna know what pushing left is, or you wanna know what security drift is, or whatever the many things that I have defined throughout my entire career." And then instead of it bringing you to the blog post where I'll explain that to you, it now just tells you the answer. No. So there's a place where I write articles for them that I'm not gonna name 'cause I like them. And I used to write articles for them and they'd get a couple hundred thousand reads, and now they're getting 2,000 reads. It's that different because the AI reads it and then now it knows everything Tanya just spent weeks researching to write that article. And so this is a huge problem for those of us that do research and release research because immediately it's taken from us. It sucks.
Graham Cluley
Yeah.
Tanya Janca
I know we're supposed to do one article, but I wanted to do two because they're related. So Anthropic also announced but did not publicly release a new model called Mythos. And what Mythos does, it's quite dangerous. So it finds vulnerabilities in applications and chains them together into exploits. And it has been finding novel new kinds of things that humans haven't been able to find before. And it's been finding them so terribly fast. It's absolutely completely terrifying. So for instance, they found, I can't even remember just how many bugs in OpenSSL, but Heartbleed level terrifying bugs. For those of you that don't know, Heartbleed was a bug found in OpenSSL where you could just send a specially crafted call and then it would just tell you all the secret sauce.
Graham Cluley
Yeah, it would spit back what should have been confidential encrypted information, things which no one should ever have been able to see.
Tanya Janca
And Anthropic, they're not publicly releasing it. They're just working with a couple trusted organizations for now. But they've openly admitted that they can't fully control it or understand it. And I would really not want to see Mythos on the internet.
Graham Cluley
Oh, okay. So let's just backtrack for one second. So we've got this company Anthropic, which has just goofed up. They called it a human error. They said it was a release packaging issue rather than a security breach. And they're saying, oh, it doesn't matter because no customer data or credentials were involved. And technically that's right. It's their code. It's not somebody else's. But, you know, they were leaking their source code. They were careless.
Tanya Janca
It's still a data spill. It's their data and they spilled it and it was private, confidential data that's high value.
Graham Cluley
Yeah. And meanwhile, they've just publicized this new technology they've built called Mythos, which can do something which could be very useful for many people in terms of securing their systems, because it can find vulnerabilities and you could find flaws in software and you could hopefully patch them and fix those bugs. But if that fell into the wrong hands, if they had a release packaging issue and they spilt it out like they've just spilt out something, that's horrendous because anybody could use something like Mythos to hack all kinds of systems and software, couldn't they?
Graham Cluley
And there have been AI-powered bug hunting solutions in the past. I mean, I believe if you look at the HackerOne league table right now, the number one bug hunter is an AI-powered bug hunting solution at the moment.
Graham Cluley
But the other thing which worries me is that, okay, so Anthropic has had this data spill. We're worried that maybe it could happen with Mythos as well. Potentially it could. The thing which I think changes the story a bit, this isn't even the first time Anthropic has had a data leak this. I mean, earlier versions of the same package in 2025 also shipped with full source maps before being pulled. So this isn't a one-off slip. It seems to almost be a pattern which has happened. And who's to say it couldn't happen again? And maybe it could happen with Mythos.
Tanya Janca
You know what, Graham? I had no idea that they'd previously accidentally leaked their map. Oh my gosh. This is completely shocking. I don't mean to sound insulting, but I can't believe that they could make the same mistake again, right? Because that would be so painful the first time.
Graham Cluley
So Anthropic says this is a human error. But should it be possible for a single human error to publish source code that should never have been made public? Is that a process failure? Is it a tooling failure? Do we just have to sort of shrug and say, oh well, that's life, these things happen?
Tanya Janca
So first of all, in Git, so Git is a tool that you can use to hold your source code and take care of it and manage it and store it. There's this setting that you can do called .gitignore, and you list all of these files to say basically no matter what I say, don't upload this.
Graham Cluley
Yes. Override my own stupidity. Yes.
Tanya Janca
Yeah, exactly. And I take advantage of that all the time. So there should be a default for every org and it should include those map files. So that's step one is that we want to have the ignore file things set up properly. And then we always know we're not supposed to have debug mode in production, right? So, we know that we should have on the build server these settings turned off. And so basically this is like security misconfiguration happening twice, which is on the new OWASP Top 10 2025, as a top risk to web apps. Basically, they didn't configure the build server correctly and then they didn't configure Git correctly. And then they don't have a process or a checklist to check that. So I would love to see those three things. I teach supply chain security. I'm expanding and expanding that class all the time because there's more and more that we're doing wrong there. And I feel like if organizations had a checklist and they had, you know, a hardening of these things that they're using that are part of their supply chain, like we talked about earlier, if we properly hardened our build server. So, the CI/CD and build server, those are usually synonymous. They're usually the same thing. Or you have a build server and then you have a pipeline and you connect the two, but usually, it's all one big thing. And so, if we were properly hardening that, if we're checking it at least once a year, if we analyzed who, you know, there's an alert. Oh my gosh, there's a new administrator.
Graham Cluley
Hmm.
Tanya Janca
Who's that? Why do we have a new administrator? We could do a lot better. So, it is a human error, but the human error happened because we didn't have processes to protect that human from making that error. And I don't like to blame Alice or Bob. I like to look at, no, but did we train Alice or Bob on this? Did we? Right? Did we have a safeguard to stop them from making this error? Did we have a policy? Or do we just assume they knew? Because when we assume, we're let down a lot.
Graham Cluley
So what we have here, Tanya, is an AI company which has leaked the source code of its AI coding assistant. Via a packaging mistake, which is kind of ironic. I'm going to give you a little bit of silver lining on the cloud, right? Because this has all been a bit depressing.
Tanya Janca
Okay. But we don't know that.
Graham Cluley
That's true, actually. That is true.
Tanya Janca
Right? Have you heard this term dark factory?
Graham Cluley
Oh, hello.
Tanya Janca
So we don't know if Anthropic is becoming a dark factory. So in manufacturing, it means we just have robots, so we don't need lights. But there's software dark factories being built now where you don't have a single software developer anymore, and literally every single part is only written by the AI. And wouldn't you think the AI company might be most likely to do something like that? I don't know.
Graham Cluley
Well, thank you very much, Tanya. There I was trying to be optimistic and cheer everybody up, and you've just made it all doomy and gloomy again. Great. That's great. Thank you.
Joe
This episode of Smashing Security is brought to you with support from CoreView.
Graham Cluley
Now, Joe, quick question. If someone broke into your Microsoft 365 tenant right now and quietly disabled your conditional access policies, grabbed global admin rights, turned off Defender, would you even notice?
Joe
I'd like to say yes.
Graham Cluley
Well, that's the spirit, Joe. Good job. But here's the uncomfortable reality. 63% of Microsoft 365 tenants hand out admin rights not that they're going out of fashion. One compromised account and an attacker can quietly reshape your entire tenant. No alerts, no noise, just someone systematically dismantling your defenses while you're none the wiser.
Joe
So wait, restore from backup doesn't fix that?
Graham Cluley
No, no, no. Backups protect your data. They don't restore tenant-level configurations. There's no native rollback for that. You could be rebuilding your tenant settings from scratch for weeks.
Joe
And who's doing that?
Graham Cluley
Exactly. Who wants to do that? Well, CoreView have written a white paper called Total Tenant Takeover: The Microsoft 365 Disaster No One's Ready For. It's actually a really practical read. It covers how these attacks unfold step by step, where your existing tools are leaving gaps, and what it actually takes to recover control once it's been lost.
Joe
So less detect and panic, more here's how to actually get your tenant back.
Graham Cluley
That's it. Exactly. And you can download this paper for free right now. You can learn more at smashingsecurity.com/coreview and maybe do it before someone else does something bad to your organization.
Joe
That's smashingsecurity.com/coreview. And thanks to CoreView for supporting the show.
Tanya Janca
And welcome back.
Graham Cluley
And you join us for our favorite part of the show, the part of the show that we like to call pickpocketing. Pick of the Week.
Tanya Janca
Pick of the Week.
Graham Cluley
Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish. It doesn't have to be security related necessarily. Well, my Pick of the Week this week is actually security related. In fact, my Pick of the Week this week, and this is gonna get very, very meta, not in a Mark Zuckerberg kind of way, because my pick of the week this week is actually about the Smashing Security podcast, because I've been busy doing a bit of vibe coding. I know, very dangerous. I've been exploring the world of podcast transcripts, ladies and gentlemen. I think it must have been about 9 years ago when I first got an email from a listener saying, why don't you have a transcript? I'd much rather read rather than listen to you. And I said, well, you know, it's very hard putting together a transcript. I'd be up all hours typing my nonsensical words into a word processor. Or I'd get some computer system to try and transcribe me into written English. And, you know, the quality is going to be diabolical anyway. After quite a lot of work involving largely pipe cleaners and pots of treacle, bicycle chains, I have got together a Heath Robinson-type solution which now has, I believe, acceptable transcripts for this show. Now, my podcast host, does create automated transcripts. So if you go into your favorite podcast app at the moment and look at transcripts, if it supports that, you will see a very, very bad transcript of the show. My intention is to replace all of those. And if you go to my website or to the Smashing Security website right now, you will find a much better transcript. And in fact, it will even display the words as they are being said. So you can read as you are listening I think it works reasonably well most of the time. Sometimes it makes a mistake, for goodness' sake. Yes, I know. Sometimes it will mix up my name with someone else's or something will go wrong. But most of the time, I think it's pretty darn impressive. So my pick of the week, rather self-referentially, is the new transcripts on the Smashing Security podcast. Go to smashingsecurity.com or go and check out my articles on Graham Cluley.com. And you will be able to see the transcripts in all of their glory there and tell me that it doesn't work. And then I'll have to try and work out what the code's doing and try and fix it. Cool. That is my pick of the week.
Tanya Janca
I your pick of the week, Graham.
Graham Cluley
Thank you very much.
Tanya Janca
That was awesome. Well done.
Graham Cluley
Do you have a pick of the week, Tanya?
Tanya Janca
I do. So my pick of the week is a television show on Apple TV called Shrinking. And it is about three psychologists that are friends that are all grieving because one of the psychologists, his wife died. And it shows how he grieves, how his daughter grieves, how the two other psychologists grieve. And they teach all these different psychology lessons essentially in the show. And last year I did a talk about the psychology of bad code and applying economic behavior types of concepts to our security programs. And how if we do that, we can get better results. 'Cause just yelling at software developers actually doesn't improve code quality at all, as it turns out. Just being mean to them doesn't work. We've tried that for two decades. So, I was what if instead we did something different?
Graham Cluley
Have you tried the old cricket bat trick of taking a cricket bat and just bopping them on the back of the head? Does that help at all?
Tanya Janca
My old boss was have you tried violence, Tanya? And I was no, I haven't. And he's you're not really trying to problem solve at all, are you?
Graham Cluley
Oh, so I've just realized why your show is called Shrinking because of—
Tanya Janca
It shrinks. Yeah.
Graham Cluley
I'm so stupid sometimes. It's taken me this long to work it out. Okay.
Tanya Janca
No, but so I'm fascinated by the reason that people do things and why people react the way they do. I've always been really curious about things like that. And so also so that I could get better results, right? If someone blows up at me, it's like, why did they blow up at me? And often it's not because of something I did. It's because they feel insecure or afraid or whatever.
Tanya Janca
And so in the show, they're always explaining these different concepts and I keep seeing them pop up in my life, whether it be at work or personally. And so most shows aren't very educational, Graham. Most of them are kind of garbage.
Graham Cluley
Oh, really? I'd never noticed. I've just been watching Married at First Sight Australia. So I thought all of them were really high quality, personally.
Tanya Janca
But so this one teaches lots of psychology lessons and why people do the things they do, but in an entertaining way. So I don't know, I like that. I think if people are curious about, you know, why people do the things they do, they might like this.
Graham Cluley
And is this a drama or a documentary? What is it?
Tanya Janca
So it's sort of a drama and it's sort of a comedy. So I think they call them dramedies.
Graham Cluley
I think that's what you call a one-humped camel, actually. So anyway, yes, carry on. So a dromedary, right?
Tanya Janca
Basically, there's a bunch of parts that are sad, and then there's a bunch of parts that are funny. And so I think they call it a drama comedy, which they literally put on Apple TV, Dramedy.
Graham Cluley
Oh, I don't know if I like that word. Yeah. I'm not so sure about that.
Tanya Janca
You're like, no, I do not accept.
Graham Cluley
Anyway. Okay. So your pick of the week is the TV show Shrinking.
Tanya Janca
Yep.
Graham Cluley
Well, that just about wraps up the show for this week. Thank you so much, Tanya, for joining us. I think you've been absolutely smashing. I'm sure lots of our listeners would love to find out what you're up to and follow you online or listen to your podcast, of course. What's the best way to do that?
Graham Cluley
Yes, that's what we need more of, is more memes.
Tanya Janca
We do.
Graham Cluley
That and emojis and animated GIFs. And of course, Smashing Security is on social media as well. You can find me, Graham Cluley, on LinkedIn, or you can follow Smashing Security on Reddit or Bluesky or Mastodon. And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts for episode show notes, sponsorship info, guest lists, and the entire back catalog of 463 episodes, check out smashingsecurity.com. Until next time, cheerio. Bye-bye.
Tanya Janca
Bye. You've been listening to Smashing Security with me, Graham Cluley, and I'm very grateful to Tanya for joining us this week and this episode's sponsors, CoreView, Vanta, and Meta. And of course, to all of our fabulous supporters via Patreon.
EPISODE DESCRIPTION:
A hacking group claims to have broken into the flood defence system protecting Venice's Piazza San Marco - and is offering to sell access to whoever wants it. The asking price? A frankly insulting $600.
Meanwhile, Anthropic accidentally leaked the source code for Claude Code via a basic packaging mistake. Oh, and by the way, they've also just revealed they've built an AI model called Mythos that can find and chain together software vulnerabilities faster than any human. Sleep well.
All this and more in episode 463 of the “Smashing Security” podcast with cybersecurity expert and keynote speaker Graham Cluley, joined this week by special guest Tanya Janca.
Meter - Network infrastructure for the enterprise. Get a free personalised demo.
Vanta - Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
Coreview - Download "Total Tenant Takeover", a white paper about the Microsoft 365 Disaster No One Is Ready For.
SUPPORT THE SHOW:
Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.
Become a supporter! Join Smashing Security PLUS via Patreon or Apple Podcasts for ad-free episodes on our early-release feed!