Sept. 8, 2025

Cybersecurity Situational Awareness Lessons from Mr. Robot

Cybersecurity Situational Awareness Lessons from Mr. Robot

This episode of The Backup Wrap-up examines cybersecurity situational awareness through the lens of Mr. Robot's prison break episode. Curtis and Prasanna analyze the technical accuracy of USB stick attacks, Bluetooth car hacking, and social engineering tactics. The hosts discuss real-world defenses including USB port management, network segmentation, and employee training. They explore WPA2 encryption vulnerabilities and why upgrading to WPA3 matters for wireless security. The conversation covers practical cybersecurity situational awareness lessons, from recognizing physical security threats to monitoring network traffic patterns. Curtis shares war stories about malware-infected conference USB sticks, and both hosts examine how poor cybersecurity situational awareness enabled the fictional attacks. This episode provides actionable insights for IT professionals looking to strengthen their organization's security posture against USB-based threats, Bluetooth exploits, and social engineering campaigns.

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we break down another wild Mr. Robot episode

Speaker:

that's packed with lessons in cybersecurity situational awareness.

Speaker:

We'll talk about USB stick attacks, Bluetooth hacking, and why that officer

Speaker:

really should have checked his six.

Speaker:

We look at how Elliot bypass prison security systems and

Speaker:

what real world defenses I think would've stopped these attacks.

Speaker:

It's a fun episode with practical cybersecurity lessons that you

Speaker:

can apply today, real cyber lessons from a fictional show.

Speaker:

Go figure.

Speaker:

Well, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup, and I've been passionate about backup and recovery for over

Speaker:

30 years, ever since I had to tell my boss there were no backups of that

Speaker:

production database that we just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this show, we turn unappreciated admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the show.

Speaker:

Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy who will

Speaker:

not join me on my morning trash pickups.

Speaker:

Prasanna, Molly Yondi.

Speaker:

How's it going?

Speaker:

Prasanna,

Speaker:

I am good Curtis.

Speaker:

Uh, yeah, you're, uh, yeah.

Speaker:

No, I'm not going on

Speaker:

you're, you're not

Speaker:

Although I have to say, I don't think I have as much trash in my neighborhood as

Speaker:

Yeah.

Speaker:

I don't know.

Speaker:

I, um, yeah, so, so I've been taking a morning walk and

Speaker:

then I decided I got tired of.

Speaker:

Seeing how much trash that I see along the thing.

Speaker:

And at first it was like, this is a little bit, just a little bit.

Speaker:

And so I was like, oh, I'm gonna bring a little garbage bag along

Speaker:

with me and, um, try to pick it up.

Speaker:

And that I ended up bringing back three pounds of trash from my first walk.

Speaker:

And I, and I felt pretty good about that.

Speaker:

Yeah,

Speaker:

But then this morning I went a different route and I'm like, oh my God, I would

Speaker:

have to bring a five gallon bucket,

Speaker:

Well,

Speaker:

you know?

Speaker:

should also comment on what you did yesterday on your walk

Speaker:

and what you took with you.

Speaker:

I have a battery operated leaf blower.

Speaker:

Uh, if you have a leaf blower.

Speaker:

You can, they're designed also to be leaf suckers.

Speaker:

Right?

Speaker:

And so they have a bag and essentially it's like a vacuum.

Speaker:

And so my initial idea was that I wouldn't actually be picking up trash.

Speaker:

There's lots of little pieces of trash and I would just suck it up with the

Speaker:

leaf blower into the little leaf bag.

Speaker:

Um, that did not work.

Speaker:

So you're basically walking around with a leaf blower strapped to your

Speaker:

back, just walking down the street.

Speaker:

Just walking down the street with a leaf blower.

Speaker:

Um.

Speaker:

Wondering what people were thinking of this random, you know, random

Speaker:

gray haired dude walking down the street with a leafblower.

Speaker:

Um,

Speaker:

Well, I just wanna say thank you for actually doing like going and actually

Speaker:

picking up trash, because I know a lot of people would just be like, ah, screw it.

Speaker:

It's not my problem.

Speaker:

Not my,

Speaker:

yeah.

Speaker:

not my cir, not my circus, not my monkey, not my monkey, not

Speaker:

Uh, we'll, we'll see.

Speaker:

We'll see.

Speaker:

Like I will say it de definitely, it was very nice feeling.

Speaker:

The problem with the leaf blower is that it's made, or the leaf sucker is, is that

Speaker:

it's made to actually shred the leaves.

Speaker:

The way that the, the impeller, the leaves go through the

Speaker:

impeller and they get chopped up.

Speaker:

And so what happens is when you suck up, let's say, I don't know, a ketchup packet,

Speaker:

Uh,

Speaker:

um, it just gets, it just jams.

Speaker:

yeah.

Speaker:

just, if it makes it through, it doesn't get shredded.

Speaker:

And so it, what I found when I actually took the bag off was

Speaker:

that all of the little trash.

Speaker:

Was all jammed up in the,

Speaker:

Empower.

Speaker:

in the, well, the, the little tube right past the impeller.

Speaker:

It did, you know?

Speaker:

Yeah.

Speaker:

So, so that, that idea was just a bus.

Speaker:

It was just me walking around with a, I don't know, five, 10 pound device.

Speaker:

I think what you should do instead.

Speaker:

Mm-hmm.

Speaker:

Is you should walk with the vacuum cleaner, which you then plug into

Speaker:

your vehicle to then operate and have someone drive alongside you as you're

Speaker:

What if, what if I, what if I turn on FSD and have the car,

Speaker:

you know, like robot taxing me.

Speaker:

wonder if you, no, I don't

Speaker:

I, it, it won't, it won't work.

Speaker:

It won't work.

Speaker:

I, I think I know how you do it.

Speaker:

It's

Speaker:

But

Speaker:

Okay.

Speaker:

You could do FSD, but you basically place a heavy weight in the passenger

Speaker:

seat, so, or in the driver's seat, so it thinks someone's there, and

Speaker:

then you keep something in front of the sensor so it thinks there's

Speaker:

always someone in front of it.

Speaker:

And then as you move, it moves along with you.

Speaker:

I, I think it's a little smarter than that, but

Speaker:

I don't think so.

Speaker:

I think you're a little insane.

Speaker:

Um, speaking of a little insane, this episode was insane.

Speaker:

Um,

Speaker:

it really?

Speaker:

It

Speaker:

well, I, yeah, I was right.

Speaker:

Um, and.

Speaker:

This, this is episode six, AKA 1.5, and I don't know, I don't know if this continues

Speaker:

in season two, if the whole numbering thing continues in season two, but

Speaker:

Brave Traveler.

Speaker:

Right.

Speaker:

Brave Traveler, which comes from Vera.

Speaker:

So Vera is the, the, the, the, the, the drug dealer that he got put in prison.

Speaker:

He figured out that Elliot's the one that put him in prison and he, he calls him

Speaker:

and says, Hey, you need to break me out.

Speaker:

And today,

Speaker:

Yeah,

Speaker:

right?

Speaker:

He has kidnapped Shayla.

Speaker:

And he says, you, you know, you need to break me out today

Speaker:

or else I'll kill Shayla.

Speaker:

And he try, you know, Elliot tries to tell him, Hey, you know,

Speaker:

you, you can't, I can't do that.

Speaker:

Right.

Speaker:

That's not, you know, that's, that's the surefire way to have a unsuccessful

Speaker:

attack, which is to not do any recon.

Speaker:

Right.

Speaker:

We've talked about recon before.

Speaker:

And he's like, you want me to just do that?

Speaker:

But he does figure out that there is, uh, you know, an electronic

Speaker:

system that will open the doors and he just needs to get in the network.

Speaker:

And so he, um, he does this, um, USB stick thing.

Speaker:

Uh, you know, we'll talk about that in a minute.

Speaker:

And, um, that doesn't work.

Speaker:

And, uh, then he gets, um.

Speaker:

Uh, he tries to hack through the wifi and he, he actually does end up successfully

Speaker:

hacking the wifi of a car, of a cop car, getting into the network and then letting,

Speaker:

Well, it wasn't wifi of the car.

Speaker:

oh, it was Bluetooth.

Speaker:

It was Bluetooth.

Speaker:

Right,

Speaker:

Bluetooth of the

Speaker:

right.

Speaker:

in the car and then realized, hey, you're connected to the prison network over

Speaker:

4G, so

Speaker:

Yeah.

Speaker:

Yeah,

Speaker:

you are the weakest link.

Speaker:

yeah, yeah, exactly.

Speaker:

and you know, once again, you know, sex works.

Speaker:

Uh, you know, he uses Darlene, uh, you know, dressed kind of.

Speaker:

Alluring

Speaker:

Hmm.

Speaker:

distract the cop while, while he's gonna control his computer.

Speaker:

And, um, uh, that works.

Speaker:

'cause guys are stupid.

Speaker:

So he, he, he does, he hacks the, um, the, the cop's car via Bluetooth gets

Speaker:

into the thing and he does successfully.

Speaker:

Bust Vera out of prison,

Speaker:

Mm-hmm.

Speaker:

after which he does get Shayla back,

Speaker:

Not the way he was expecting.

Speaker:

right?

Speaker:

He did get Shayla back like they promised, but she was D-E-D-E-D

Speaker:

as my daughter likes to say.

Speaker:

DED Dad.

Speaker:

Um, she was, yeah, shot in the head it looked like, um, that did not look good.

Speaker:

So maybe it's too late to say spoilers.

Speaker:

Yeah.

Speaker:

Well, and it was also like when he gets outta, when Vera gets outta prison, right?

Speaker:

He's like, yeah, she's been with you this entire time, man.

Speaker:

You

Speaker:

Yeah,

Speaker:

realize it.

Speaker:

yeah.

Speaker:

And then I was just like, oh my gosh.

Speaker:

And then the way that they also shot the scene, sorry, this has nothing to do

Speaker:

with cybersecurity or anything else like

Speaker:

Yeah.

Speaker:

just the way they shot the scene, right?

Speaker:

Where it's like.

Speaker:

He goes, he opens the trunk, the trunk opens.

Speaker:

He, they don't show the body or

Speaker:

You see?

Speaker:

You see his reaction?

Speaker:

Yeah.

Speaker:

reaction.

Speaker:

And in the beginning he doesn't make any noise, right.

Speaker:

He doesn't

Speaker:

Yeah.

Speaker:

He doesn't yell, he doesn't scream.

Speaker:

He doesn't even sniffle or cry

Speaker:

Hmm.

Speaker:

of like catatonic and, and then you look at him and then he just like

Speaker:

looks down at the body and then they pan over his shoulder and you just

Speaker:

yeah, yeah.

Speaker:

covered in blood and then he, yeah, and then he runs because the cops are coming

Speaker:

Right, right.

Speaker:

By the way, the, the, the time, the length of time that they stand

Speaker:

around BSing before hopping into the getaway car was like, I was like, I

Speaker:

think you just broke outta prison.

Speaker:

I think maybe you should get in the getaway car now.

Speaker:

You know?

Speaker:

But anyway.

Speaker:

Yeah,

Speaker:

Curtis.

Speaker:

it's a Devi, it's a TV show.

Speaker:

I think is what they

Speaker:

Yeah.

Speaker:

So let's talk about some of the mechanisms that they, that they

Speaker:

used, um, you know, more exploits.

Speaker:

And the first one that I, I don't know.

Speaker:

What if, if I had seen this in real life, I'd have been like, Hey lady,

Speaker:

what are you doing, number one.

Speaker:

Number two, why are there all these USB sticks around here, right?

Speaker:

to recap, right, so Darlene is walking outside a police station,

Speaker:

Yeah,

Speaker:

in the parking lot and she just has like a pocket full, like.

Speaker:

Probably like 50 or a hundred USB sticks.

Speaker:

And every

Speaker:

yeah,

Speaker:

few steps, she just like takes it and dumps out like three and

Speaker:

yeah.

Speaker:

along and you just see

Speaker:

I,

Speaker:

these USB sticks on the road.

Speaker:

yeah.

Speaker:

coming in and out of the station.

Speaker:

There are kids playing like not too far away.

Speaker:

And no one is going, why is this lady dumbing all our US music?

Speaker:

Hey, I think he dropped something.

Speaker:

Nobody says that, but

Speaker:

Well, and, and

Speaker:

yeah.

Speaker:

then you move on, and then she's like, she goes away, and then you

Speaker:

see a scene where a cop comes up

Speaker:

Yeah,

Speaker:

he's like, oh, A

Speaker:

I,

Speaker:

stick.

Speaker:

And he picks it up.

Speaker:

But I'm just thinking in my mind, I'm like, yeah, there's a USB stick.

Speaker:

There's another USB stick, there's another USB stick.

Speaker:

There's like a hundred on the

Speaker:

yeah.

Speaker:

right?

Speaker:

It's

Speaker:

She wasn't very subtle in that.

Speaker:

Yeah.

Speaker:

I was like, shouldn't you know something's up when you see like

Speaker:

a hundred USB sticks just lying

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

And, um, he puts it in the computer like a maroon, right.

Speaker:

Puts it in the computer and runs it, executes what's on the USB stick.

Speaker:

Do you remember what was on it?

Speaker:

It was like a game, like a.

Speaker:

it was a click this to get a 10 or a hundred dollars

Speaker:

Oh, yeah, yeah, yeah,

Speaker:

and it, it was like, answer these

Speaker:

yeah,

Speaker:

questions.

Speaker:

So it was like.

Speaker:

yeah.

Speaker:

your favorite music type and all the rest, and, and then as it's running, as

Speaker:

he's going through this, what happens?

Speaker:

The intrusion detection system actually detects that he had, um, inserted malware.

Speaker:

Did

Speaker:

Uh, and malware was one running.

Speaker:

It was.

Speaker:

No, I didn't.

Speaker:

avast.

Speaker:

Oh, was it?

Speaker:

Okay.

Speaker:

Running on windows.

Speaker:

Gotcha.

Speaker:

Um, and it, yeah, it noticed that it was, you know, that it was malware and,

Speaker:

uh, and so of course the guy's like, crap, crap, crap, crap, crap, crap.

Speaker:

You know?

Speaker:

And he realizes that he, he screwed up.

Speaker:

what does he do though?

Speaker:

Did you see what he did?

Speaker:

Do you remember?

Speaker:

No, I don't.

Speaker:

so he realizes, he's like, crap, crap.

Speaker:

And then he pulls the USB stick and then he goes and pulls the power cord.

Speaker:

Oh, he pulls a bar.

Speaker:

Yeah.

Speaker:

Yeah, yeah.

Speaker:

Well that's, you know, it's effective I suppose, you know?

Speaker:

but, but you have a story around this,

Speaker:

I do, what do I,

Speaker:

USB stick that contains malware that was handed out at a

Speaker:

oh, yeah, yeah, yeah, yeah.

Speaker:

I, I, yeah.

Speaker:

I've seen this where I was, um.

Speaker:

And, you know, there been, there have been studies where they drop these USB

Speaker:

sticks and people will just do this.

Speaker:

Right.

Speaker:

Um, and, and I've seen that, um, the, the, the one where I experienced

Speaker:

was, was different than that.

Speaker:

I was at a symantec conference.

Speaker:

It, it happened to be the Symantec.

Speaker:

When it was net backup, right?

Speaker:

It was the Symantec Vision and it was the, it was the conference immediately

Speaker:

after Symantec acquiring Veritas.

Speaker:

And they had distributed some stuff, you know, that they wanted you to, to, to

Speaker:

have for the, um, for the conference.

Speaker:

And, uh, there was, and they did it.

Speaker:

They distributed via this USB stick and, uh, the next morning.

Speaker:

We got, you know, they, they told us in the session, please don't put the

Speaker:

USB stick in, there's malware on it.

Speaker:

Right?

Speaker:

Which is that, that right there is ironic, right?

Speaker:

Uh, unlike Alanis Morissette, I actually know what the word ironic means.

Speaker:

Um, it doesn't mean coincidence anyway.

Speaker:

Um,

Speaker:

isn't it ironic?

Speaker:

No, actually it isn't Alanis.

Speaker:

Um, that just sucks.

Speaker:

Um, anyway.

Speaker:

this happened, and I think though when USB sticks first came out,

Speaker:

Mm-hmm.

Speaker:

at conferences, like you'd walk around, it's a freebies that people

Speaker:

would give out because everyone was

Speaker:

Yeah.

Speaker:

B sticks.

Speaker:

They're so

Speaker:

Right, right, right.

Speaker:

And then malicious people realized that is a great way to send things out because

Speaker:

most right at the time, you insert a USB stick, it auto runs whatever is on there,

Speaker:

Yeah.

Speaker:

even let you to be like, Hey,

Speaker:

Yeah.

Speaker:

you sure you wanna open this or do

Speaker:

Right, right.

Speaker:

Yeah.

Speaker:

Do you trust what's on this USB stick?

Speaker:

Yeah.

Speaker:

INF? If you remember Windows

Speaker:

Yeah,

Speaker:

showing my age, Curtis showing my age.

Speaker:

yeah.

Speaker:

Um, I was watching a comedy routine this morning and the, the guy was

Speaker:

talking about how the phones used to have, you know, minutes and,

Speaker:

Hmm.

Speaker:

and number and a limited number of text messages.

Speaker:

Yeah.

Speaker:

The same thing here.

Speaker:

Um.

Speaker:

So, yeah.

Speaker:

So that obviously that is not good.

Speaker:

Right?

Speaker:

And, and so, so we can talk about what can you do to prevent that?

Speaker:

You can disable that

Speaker:

yeah.

Speaker:

in, like if you're in a corporate network, you can disable the use of USB ports.

Speaker:

Before we move on though, sorry.

Speaker:

Yeah.

Speaker:

actually want to give credit to the cop though, because he did not

Speaker:

click the button that said ignore on

Speaker:

Oh,

Speaker:

detection.

Speaker:

Right,

Speaker:

I, I don't, I'm not gonna give him much credit.

Speaker:

at least he did that, right?

Speaker:

Okay.

Speaker:

Yes.

Speaker:

Yeah, he

Speaker:

But, but, but you're right though.

Speaker:

There is things you could do, like make sure that it's not auto running.

Speaker:

Make sure you know where the USB stick came from.

Speaker:

right.

Speaker:

you have a USB stick, that is also your personal.

Speaker:

Also, be careful if you're taking it and plugging into like some other

Speaker:

person's computer, because now your USB stick may be infected that you

Speaker:

Yeah.

Speaker:

necessarily about a USB stick.

Speaker:

Just be careful where you're plugging these USB sticks into.

Speaker:

Well, I guess I'm saying from a corporate perspective, you

Speaker:

can disable these features.

Speaker:

You could disable the USB port altogether.

Speaker:

Um, it's unlikely you're gonna do that on laptops.

Speaker:

Um.

Speaker:

been at companies where they disable USB,

Speaker:

I'm just saying unlikely.

Speaker:

I

Speaker:

uh.

Speaker:

I, I'm sure it happens, right?

Speaker:

Uh, there are some companies that truly take their cybersecurity, uh,

Speaker:

seriously, and they're like, you know, um, but un IWI wonder at that,

Speaker:

at that those companies where they do that, do they also disallow, uh, BYOD.

Speaker:

Uh, n So from the places that I've worked where they've done

Speaker:

that, they don't disallow BYOD,

Speaker:

Mm-hmm.

Speaker:

they

Speaker:

is bring your own device in case people don't know that.

Speaker:

Uh, but it would basically be blocked from accessing pretty much

Speaker:

anything on the corporate network.

Speaker:

Okay.

Speaker:

So they, yeah.

Speaker:

All right.

Speaker:

So they give 'em wifi to, to access the internet, but not to be able to access.

Speaker:

Okay.

Speaker:

yeah,

Speaker:

Yeah.

Speaker:

I, I've seen places that disable all USB ports, even on laptops.

Speaker:

Or especially on laptops.

Speaker:

Right.

Speaker:

Um, and that's something that you should at least think about if you're

Speaker:

not thinking about that, that would, that would've stopped this Right.

Speaker:

I do wonder if they have the capability to just disable

Speaker:

peripherals versus things like a monitor or,

Speaker:

No, you, I think it's in the bios to disable basically USB Port

Speaker:

No, no, no.

Speaker:

I.

Speaker:

like, what if you need to use a monitor for work and the company disables USBC?

Speaker:

Oh, and it's A-U-S-B-C monitor.

Speaker:

Yeah,

Speaker:

Hmm.

Speaker:

That's a good question.

Speaker:

Right.

Speaker:

I

Speaker:

Um

Speaker:

to differentiate between displays, but then you have to also worry about,

Speaker:

okay, a display it also have a USB hub built into it, and now what happens

Speaker:

with that and all the rest, so.

Speaker:

hmm.

Speaker:

Yeah, time to look into that.

Speaker:

Hmm.

Speaker:

Um, all right, so, uh, let's see.

Speaker:

We talked about, um, so the, the, um, the USB stick hack didn't work because

Speaker:

the malware was actually caught.

Speaker:

Good job on the, on the police station.

Speaker:

What.

Speaker:

what Elliot, so Dar Elliot had asked Darlene to go drop the USB sticks, right?

Speaker:

And

Speaker:

Right.

Speaker:

also created the package, the malware package.

Speaker:

Oh yeah.

Speaker:

Yeah.

Speaker:

when it fails, because Elliot sees that someone had plugged in, he's like, oh.

Speaker:

And then he starts to execute stuff and then basically he's not able

Speaker:

to get it to fully run, and so

Speaker:

That that's what, that's when it got detected.

Speaker:

Right.

Speaker:

And so El Elliot was what?

Speaker:

Well, like I never took you for a script kitty, which is the

Speaker:

term I haven't heard in a while.

Speaker:

Right?

Speaker:

Um, yeah.

Speaker:

Uh,

Speaker:

kitty is

Speaker:

yeah.

Speaker:

So this is basically somebody who's downloading and using other people's

Speaker:

code, um, which interestingly enough is, has been escalated

Speaker:

to like ransomware as a service.

Speaker:

Right.

Speaker:

Uh, because a, a true hacker.

Speaker:

As depicted in the show, a true hacker would write their own malicious code.

Speaker:

Oh,

Speaker:

Right.

Speaker:

Which would, which would not be as detectable because it, there's not

Speaker:

an established, uh, you know, IIOC.

Speaker:

Yeah.

Speaker:

today with ai, are all developers script kitties?

Speaker:

Wow.

Speaker:

That's a good question.

Speaker:

That's a good question.

Speaker:

And I, and also I wonder, is there malicious ai?

Speaker:

Because like a lot of the ais that are out there, they have

Speaker:

morals, you know, they have,

Speaker:

Yeah.

Speaker:

well, well they, it's like they act.

Speaker:

So like I've, I've, I've tried to do things, not hack computers, but I've

Speaker:

tried to get some LLMs to do something for me before, and it's like, and it,

Speaker:

it's literally said, I don't think that's.

Speaker:

I don't think you should be doing that.

Speaker:

Right.

Speaker:

And I'm like, um, hello.

Speaker:

Right.

Speaker:

Um, I, I just remember like, it wa I wasn't trying, I don't, I don't remember

Speaker:

exactly, but I do remember me having an argument with an LLM going, but I, what?

Speaker:

Do what I tell you.

Speaker:

You know?

Speaker:

And, and, um, it, it, it was like, no, I, I won't do that.

Speaker:

And I'm like, okay, fine.

Speaker:

I'll go use another LLM.

Speaker:

Yep.

Speaker:

Well, and that's the thing, right?

Speaker:

It's all these companies, right?

Speaker:

The AI companies that build safety models,

Speaker:

Yeah.

Speaker:

sure you're not able to do things like make chemical weapons

Speaker:

Right.

Speaker:

And, and malicious code, I guess is what, is what I'm suggesting.

Speaker:

I don't, I, I don't know if, but I'm assuming there's also bad LLMs, right?

Speaker:

Um, that are able to do, you know, literally whatever you want.

Speaker:

Elliot gets this epiphany as he's talking to Mr. Robot in his stairwell.

Speaker:

And by the way, the bad guys are keeping Elliot hostage and there are two guys

Speaker:

Right.

Speaker:

the time.

Speaker:

Right.

Speaker:

Well, by, by this point, Darlene has been taken hostage.

Speaker:

Right?

Speaker:

Because she came in to tell him what happened and, you know, and,

Speaker:

um, uh, she got taken hostage.

Speaker:

So now they have Darlene and Shayla.

Speaker:

Yep.

Speaker:

Um, yeah.

Speaker:

And so Mr. Robot's like, oh yeah, you should go to the source.

Speaker:

So he basically decides, Hey, I'm gonna go to the prison.

Speaker:

And I'm

Speaker:

Yeah.

Speaker:

visit Vera.

Speaker:

And by the way, when I'm there, and he tells him this, right?

Speaker:

He's like, I came and talk to you.

Speaker:

And Vera's so surprised.

Speaker:

He's like, what are you doing here?

Speaker:

Your face is on camera.

Speaker:

He is like, it doesn't matter.

Speaker:

I needed to drop my cell phone off in

Speaker:

Right, right,

Speaker:

place, right?

Speaker:

right,

Speaker:

allowed to take cell phones into the prison.

Speaker:

And he's

Speaker:

right.

Speaker:

my phone is looking for wifi networks

Speaker:

Right.

Speaker:

to figure out, and he tells him.

Speaker:

He is like, and you need to keep talking with me because

Speaker:

my program needs time to run.

Speaker:

Right, right.

Speaker:

Yeah.

Speaker:

And what happens with that?

Speaker:

Is that how he detects the, the

Speaker:

The cop

Speaker:

go ahead.

Speaker:

So what happens is, so he ends up having this conversation with Vera.

Speaker:

This is where Vera says, okay, you need to come out, you

Speaker:

need to break me out tonight.

Speaker:

And then as he's leaving the police station, he looks at his phone to

Speaker:

see, okay, what did my uh, app find?

Speaker:

And he realizes that it found a bunch of wifi networks, but

Speaker:

they were all WPA two encrypted.

Speaker:

And

Speaker:

Right,

Speaker:

me days to crack,

Speaker:

right.

Speaker:

What wifi WPA two is is for wifi, right?

Speaker:

It's all wireless, right?

Speaker:

You're not physically connected, and so technically, if you didn't

Speaker:

have any sort of encryption, anyone could sit there and listen in over

Speaker:

the air and just like download.

Speaker:

It's just like how you get radio stations, right?

Speaker:

Right.

Speaker:

Right.

Speaker:

listen to it.

Speaker:

But with, uh, encryption, right?

Speaker:

WPA is sort of one type of encryption.

Speaker:

There are

Speaker:

Mm-hmm.

Speaker:

and three.

Speaker:

Um, WPA two was what was available at the time the show was made,

Speaker:

Right.

Speaker:

It allows for your device and the access point you're connected to, to

Speaker:

negotiate sort of an encryption key

Speaker:

Mm-hmm.

Speaker:

that all of your traffic is encrypted

Speaker:

Right.

Speaker:

one else listening in over the air will be able to decrypt your traffic.

Speaker:

And he's like, I could do this if I have time, but I don't have, you know,

Speaker:

because of he's saying it's gotta, yeah.

Speaker:

So he, he needs to

Speaker:

and what's, I was looking it up.

Speaker:

I was trying to find out, but WPA two actually has flaws that allow attackers to

Speaker:

crack your wifi password pretty quickly,

Speaker:

Oh, okay.

Speaker:

which is why they're, they've, uh, released WPA three, I think it's been

Speaker:

out for four years, five years as a

Speaker:

Mm. Right.

Speaker:

secure than WPA two and eliminates a lot of the security vulnerabilities.

Speaker:

So I guess that's a, that's an action item for people is to look into, uh,

Speaker:

you know, upgrading to WPA three, if that's available on your device,

Speaker:

but

Speaker:

but.

Speaker:

the problem is WPA three, if you want to use it, you have to enable

Speaker:

it on your wifi router or your access point, which means all of your client

Speaker:

devices need to support WPA A three.

Speaker:

So

Speaker:

Correct.

Speaker:

devices, like old iPads or laptops, or a lot of.

Speaker:

devices,

Speaker:

Hmm.

Speaker:

WPA three.

Speaker:

Right, right.

Speaker:

So even if you wanted to, you may not be able to.

Speaker:

Now some do

Speaker:

well you,

Speaker:

the mechanism of sort of WPA two or three, so it can

Speaker:

Yeah.

Speaker:

the two, but it's not

Speaker:

Yeah.

Speaker:

Sort of like with the 2.4 and the five.

Speaker:

Right.

Speaker:

Um, and so, you know, once again, it's like upgrade it where you can.

Speaker:

Right.

Speaker:

Um, and, uh, I mean, I mean, I still have devices in my house that only do 2.4.

Speaker:

Yeah,

Speaker:

right.

Speaker:

still have wifi three devices.

Speaker:

Really, really?

Speaker:

Yeah,

Speaker:

Wow.

Speaker:

Yeah.

Speaker:

I have a new, my Sovi.

Speaker:

My Sovi only does 2.4 and it's a new device.

Speaker:

Yeah.

Speaker:

Anyway.

Speaker:

wifi three, I mean like 54 megabit per second.

Speaker:

Fastest speed possible.

Speaker:

Wow, that, that's some, that's some old stuff right there.

Speaker:

Yes, it's my printer.

Speaker:

Oh, of course.

Speaker:

Well, yeah.

Speaker:

Um, what's a printer?

Speaker:

Anyway, sorry.

Speaker:

All right, so, so he goes with O option number three, right?

Speaker:

So first thing failed, second thing failed.

Speaker:

He goes with option number three.

Speaker:

Which is he realizes that the police cars are connected to the network

Speaker:

via 4G and, um, uh, and he can connect to the car via Bluetooth.

Speaker:

And, um, this is where, you know, he, he relies on a time tested method and

Speaker:

that is sex, um, and stupid boys, right?

Speaker:

So he gets, um.

Speaker:

appeal, if you

Speaker:

Sex appeal?

Speaker:

Yeah.

Speaker:

Well, not sex, I guess not sex.

Speaker:

Right.

Speaker:

But, but sex appeal.

Speaker:

Yeah.

Speaker:

Uh, so he gets Darlene to, you know, sort of, she drops her thing, you

Speaker:

know, down the shoulder and she goes over to, Hey, how are you?

Speaker:

Right.

Speaker:

And the stupid cop, you know, because boys are stupid.

Speaker:

The stupid cop is like, oh, hello, how are you?

Speaker:

You know, just, you know, like, like he.

Speaker:

Thi this is what I would call bad situational awareness, right?

Speaker:

He needs to understand, and, and I'm surely that he's taught this, not just

Speaker:

from a cybersecurity perspective, but from a, um, from a life's perspective.

Speaker:

He's a police officer.

Speaker:

Bad things, you know, can happen and that they can literally bring up.

Speaker:

I mean, I, I've watched Alia, I've watched all of Alias, right?

Speaker:

75% of the plots of alias are Jennifer Garner looking amazing,

Speaker:

trying to distract somebody.

Speaker:

Right?

Speaker:

And, uh, that, that, that happens, you know, uh, that I know that

Speaker:

happens all over the place, right?

Speaker:

But you, you'd think that a police officer would be trained better than to, you know,

Speaker:

for some situational awareness that if some girl just comes up and approaches you

Speaker:

and leans in and starts hitting on you.

Speaker:

Maybe you should just, you know, check your six.

Speaker:

Right.

Speaker:

but

Speaker:

he,

Speaker:

also might be that maybe he did look around the car because he

Speaker:

thought, like, as a cop, right?

Speaker:

He was like, oh yeah, maybe other people might be approaching me.

Speaker:

But he's not necessarily looking at his computer screen.

Speaker:

I don't know.

Speaker:

Well, it's just, it's his job to look at the computer screen, right?

Speaker:

No, I

Speaker:

Isn't that part of his job?

Speaker:

Not, not, I don't mean in terms of supervising, and I'm just saying,

Speaker:

But

Speaker:

you know.

Speaker:

when he needs to, he will

Speaker:

Well, in this time he didn't look at it none of the time because he's

Speaker:

looking at Darlene the whole time,

Speaker:

And so

Speaker:

right?

Speaker:

so just for, for people, so the cop is sitting in the PA in the driver's seat.

Speaker:

Yeah,

Speaker:

is at his window on his

Speaker:

yeah,

Speaker:

his computer screen is on his right.

Speaker:

yeah.

Speaker:

And he, she has all his attention because that scene lasted.

Speaker:

Minute or so, you know, uh, yeah.

Speaker:

And he's over there like hacking away and the guy, and he's, you know, uh, Elliot is

Speaker:

taking control of his computer and if he just looks over there for like a second,

Speaker:

he would see, and he does towards the end.

Speaker:

Towards the end, he is like, oh, and his reaction is, oh, my computer's

Speaker:

on the fritz, not, why is there a command and control window up in

Speaker:

front of my, I mean, I get that, like the average person probably doesn't

Speaker:

understand what that would mean.

Speaker:

Um, and, um, but yeah, so he does successfully.

Speaker:

Um, and there was that he, uh, Elliot does have a moment where

Speaker:

he allows them to free Darlene,

Speaker:

yep.

Speaker:

uh, because he's like, I, I just need to press go, but I'm not gonna press go

Speaker:

until you drive away and let Darlene go.

Speaker:

Right?

Speaker:

Uh, so he does that and we do later find out that it's a good thing

Speaker:

that he did that because, you know,

Speaker:

Yeah.

Speaker:

got.

Speaker:

here's one thing I want to know, right, is if you were the prison

Speaker:

network or whatever else, right, the

Speaker:

Mm-hmm.

Speaker:

Mm-hmm.

Speaker:

would you allow a cop car, which is probably not very secure,

Speaker:

Um,

Speaker:

access to your prison network?

Speaker:

well, the answer would be, um, video download.

Speaker:

No, but even then, it should be a very specific

Speaker:

Yes, it should be a very specific use case, a very specific port and a system.

Speaker:

You're allowed to, you know, do this.

Speaker:

Right.

Speaker:

Because

Speaker:

Agreed.

Speaker:

Elliot FTP something to the cop car, and then from the cop car,

Speaker:

he f TPed that, or migrated that

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

network.

Speaker:

Right, right.

Speaker:

Um, which then gave him, uh, control of the prison network.

Speaker:

Um, yeah, it's a very good point, right?

Speaker:

I was also gonna add Bluetooth security, right?

Speaker:

Uh, because that does exist.

Speaker:

It exists in most anything.

Speaker:

And you have to, like, you, if you're gonna control a device with Bluetooth,

Speaker:

it's like, you know, when you first pair something, it's gonna pop up a number.

Speaker:

It should pop up a number, and you need to look at the screen and tell

Speaker:

the number, which in any scenario would've stopped this attack.

Speaker:

If you use a standard Bluetooth security, it would've popped up a number on the

Speaker:

screen of the cop car, and he would not have been able to see the number

Speaker:

unless he employed Darlene to go to, to say the number out loud or something.

Speaker:

Well, I think that works in some scenarios, Curtis, but I don't think

Speaker:

in all, for instance, keyboard has

Speaker:

Uhhuh,

Speaker:

dongle.

Speaker:

right.

Speaker:

Right.

Speaker:

I plug it in.

Speaker:

It doesn't ask me for anything.

Speaker:

No, it doesn't, but I'm saying it could.

Speaker:

It could, yes.

Speaker:

Right.

Speaker:

And, and in this scenario, you would think that the, the Bluetooth that is capable

Speaker:

of controlling the, the car would, uh, would have that as a feature, right?

Speaker:

the other thing is, do they even need Bluetooth?

Speaker:

Yeah, that,

Speaker:

Right.

Speaker:

I was about to say the same thing.

Speaker:

Why does it, why does it need Bluetooth?

Speaker:

Right.

Speaker:

Is it what, what exactly Well is like, maybe is is is camera, the, the, the body

Speaker:

cam, is that connecting via Bluetooth?

Speaker:

No, they didn't.

Speaker:

They had Bluetooth because that's what the plot needed.

Speaker:

Okay.

Speaker:

Prasanna.

Speaker:

The cop wanted to listen to his music on the, on the stereo?

Speaker:

Yeah.

Speaker:

With his Bluetooth, with his AirPods.

Speaker:

Um, back then, 'cause there's actually one, there's actually AirPods.

Speaker:

Yeah.

Speaker:

Probably AirPods, but not, but the Bluetooth headsets did,

Speaker:

Yeah.

Speaker:

uh, there's actually one in the episode I remember.

Speaker:

Uh, when, um, when Angela goes to visit Terry Colby, the sun turns his

Speaker:

head and he's got one of those black

Speaker:

i I had

Speaker:

yeah, yeah, I had one of those too.

Speaker:

It, you look like, you look like such a. Uh, idiot.

Speaker:

I think back when you, when you wore those, I don't know, you

Speaker:

just seem like you know, whatever

Speaker:

love the Bluetooth headsets, especially on calls.

Speaker:

you mean back then now or, you know.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

I, I as well, but I don't know.

Speaker:

They were just so big.

Speaker:

They just, I don't know.

Speaker:

There was something, I think when you, when they first came out, they,

Speaker:

they looked kind of, I don't know,

Speaker:

but anyway.

Speaker:

them.

Speaker:

I still like them.

Speaker:

I, I did too.

Speaker:

I had,

Speaker:

headset.

Speaker:

had one of the Plantronics ones that went around the ear and the thing over here.

Speaker:

Oh, do you?

Speaker:

Why?

Speaker:

Why do you still have it?

Speaker:

Well, it's not broken.

Speaker:

You know what I remember, I remember I had a Plantronics

Speaker:

desktop, um, Bluetooth for my phone.

Speaker:

Okay.

Speaker:

Uh, 'cause I had a desk phone.

Speaker:

Right.

Speaker:

And what I remember was

Speaker:

I would forget that I was on a desk call

Speaker:

Oh,

Speaker:

and I had my Bluetooth headset, and I would get in my car and drive away.

Speaker:

And then at some point, the, the, the, the thing would drop.

Speaker:

And I'm like, oh, sorry, crap.

Speaker:

I still use a over the ear headset for my calls.

Speaker:

Really?

Speaker:

Why?

Speaker:

Uh, I find it more comfy than, and the quality audio quality is better.

Speaker:

And then I also like the fact that it comes with the mic, that you can actually

Speaker:

flip up to know for sure that something

Speaker:

Okay.

Speaker:

Okay.

Speaker:

because I never can remember is it muted or is it not?

Speaker:

And

Speaker:

Oh, oh, it mutes when you flip the mic up.

Speaker:

Gotcha, gotcha.

Speaker:

Alright.

Speaker:

One funny story and then we'll, we'll put this episode to bed.

Speaker:

A hundred years ago I was working at a consulting company and we used

Speaker:

to live in corporate housing and there were like three of us that

Speaker:

were in this corporate housing.

Speaker:

This story takes place in Marina Delrey for those of you that are familiar with

Speaker:

that in the Oakwood corporate housing.

Speaker:

And we were all sitting around.

Speaker:

We had a speaker phone, we were all sitting around on the mandatory,

Speaker:

like Monday morning conference call and this our direct boss.

Speaker:

Was blabbering on.

Speaker:

Okay.

Speaker:

And I reached over, pressed the mute button, and I said,

Speaker:

what are you still talking?

Speaker:

He is like, why are you still talking?

Speaker:

You know?

Speaker:

But I muted.

Speaker:

And then I was like, I said, I exclaimed something.

Speaker:

And then there was a pause and it was like, what?

Speaker:

What did you say?

Speaker:

And I go.

Speaker:

Uh, that's when we learned and we found out later that the, that the mute button.

Speaker:

It didn't work on the speaker,

Speaker:

no,

Speaker:

light would come on, but it didn't, but it, it didn't actually mute the call.

Speaker:

And so I, so luckily there were several of us, and this was

Speaker:

because nowadays would like zoom.

Speaker:

It would be like, Curtis just blurb something else.

Speaker:

You know, your, your picture would pop up on the screen, but at least in this

Speaker:

case, just some random, and I said, it really whatcha talking about, you know.

Speaker:

And, and I was like, what, what was that?

Speaker:

And I was like,

Speaker:

Uh,

Speaker:

and this is how Curtis almost got fired anyway.

Speaker:

the 10th time

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

I've only been fired, hired like three times in my life when I

Speaker:

all, all, when I was younger.

Speaker:

Um,

Speaker:

So, all right, so what's the recap for this episode?

Speaker:

So again, continued security, right?

Speaker:

So obviously, uh, devices or USB devices bad, right?

Speaker:

Trusting USB ports, bad trusting.

Speaker:

Um, even, even the fact that like if you're, if you're truly concerned

Speaker:

about like cell phone security, put that cell phone in a Faraday bag,

Speaker:

Mm-hmm.

Speaker:

right?

Speaker:

That's the thing.

Speaker:

Um, that would've stopped.

Speaker:

bag for people

Speaker:

a Faraday bag, uh, comes from the idea of the Faraday cage, which is come from

Speaker:

the name of the guy, and basically you put the cell phone in a Faraday bag.

Speaker:

It's unable to communicate outside that bag.

Speaker:

I've been in facilities where you had to leave your phone and you

Speaker:

had to put it in a Faraday back.

Speaker:

In schools, they make you do that too for kids?

Speaker:

Oh, do they?

Speaker:

Yeah.

Speaker:

They make you put it in a bag so you can't communicate outside.

Speaker:

And then I think it has like a lock that only opens at certain times.

Speaker:

Interesting.

Speaker:

Um, and then, if you have an external device, in this case a police car

Speaker:

that has network access, that device should be very limited, right?

Speaker:

It should be for the very specific use case, the very specific port and device.

Speaker:

Yeah.

Speaker:

you should at least be monitoring to be like, Hey, why is it uploading files to an

Speaker:

Yeah, yeah,

Speaker:

when that should never be happening?

Speaker:

yeah.

Speaker:

I, I would say yes, and I would say, and you should be

Speaker:

monitoring, but, um, and then, um,

Speaker:

oh, and if you get offered something enticing, check your six.

Speaker:

Yeah, or just think about if it's too good to be true.

Speaker:

It's like, Hey, why don't you see, uh, CISO come out to this great resort.

Speaker:

We're doing this giant conference and we'll

Speaker:

Yeah,

Speaker:

about things and

Speaker:

yeah,

Speaker:

And you've never heard of the place.

Speaker:

yeah.

Speaker:

Do you mind

Speaker:

I, I actually watched, uh, I watched an exploit with that where basically they.

Speaker:

They wanted to exploit a person.

Speaker:

They sent him an invitation to be a speaker at their show,

Speaker:

hmm.

Speaker:

right?

Speaker:

They had a full like, you know, trade show website and everything.

Speaker:

And they said, we'd like you to speak at this show.

Speaker:

And then, um, they, um, um, so I lost my train of thought.

Speaker:

Oh.

Speaker:

And so they said we'd like to just have a quick zoom call.

Speaker:

Hmm.

Speaker:

Prior to the show to just make sure, you know, set expectations

Speaker:

and everything, like I said.

Speaker:

Sure.

Speaker:

And so they sent him a link.

Speaker:

That link was not a Zoom link.

Speaker:

Hmm.

Speaker:

That link was a malicious link that immediately downloaded the

Speaker:

malware and then opened up Zoom

Speaker:

Mm.

Speaker:

so it could have been stopped by, you know, and so basically what you're

Speaker:

counting on is the person being distracted because they're, you know, they're, um.

Speaker:

Their pride, et cetera.

Speaker:

You know, they're, they're just thinking about, oh, I'm gonna, I'm gonna, and,

Speaker:

and they had like a speaker's fee.

Speaker:

They were gonna pay a speaker's fee and so Yeah.

Speaker:

Boom, boom, boom.

Speaker:

And the guy clicks on the thing and it, and the, the exploit runs in like,

Speaker:

Yep.

Speaker:

you know, milliseconds and then he opens up Zoom and so you

Speaker:

never thought anything of it.

Speaker:

Right.

Speaker:

Um, and uh, then immediately they're controlling the guy's network.

Speaker:

people are the weakest link.

Speaker:

They are.

Speaker:

They will continue to be that way.

Speaker:

All right.

Speaker:

Well thanks Prasanna for, uh, having another chat.

Speaker:

No, this was good.

Speaker:

I'm gonna go hunt around for some random USB sticks on my next walk.

Speaker:

So have you

Speaker:

I'm going to

Speaker:

USB stick on your walk yet?

Speaker:

No,

Speaker:

Okay.

Speaker:

I have encountered USB sticks in the wild, but not on any of my walks.

Speaker:

Okay.

Speaker:

I have encountered.

Speaker:

Really weird stuff.

Speaker:

The my favorite thing that I picked up yesterday was, um, was,

Speaker:

um, the instruction manual for some sort of electronic device.

Speaker:

I was like, a lot of the stuff I understood, like it was like,

Speaker:

you know, slim jim wrappers and, you know, things like that.

Speaker:

Like it, it's, somebody bought a snack into seven 11, they want to throw it

Speaker:

out the window before they get home and get busted for having a slim jim.

Speaker:

But why was there.

Speaker:

Um,

Speaker:

don't know.

Speaker:

I don't know that.

Speaker:

But anyway, I'm gonna drive around and, you know, hope that some young girl

Speaker:

leans in the window and talks to me.

Speaker:

okay.

Speaker:

But if she does, I will check my six.

Speaker:

Yes.

Speaker:

Well, thanks, uh, for listening everybody.

Speaker:

That is a wrap.

Speaker:

The backup wrap up is written, recorded and produced by me w Curtis Preston.

Speaker:

If you need backup or Dr. Consulting content generation or expert witness

Speaker:

work, check out backup central.com.

Speaker:

You can also find links from my O'Reilly Books on the same website.

Speaker:

Remember, this is an independent podcast and any opinions that you

Speaker:

hear are those of the speaker.

Speaker:

And not necessarily an employer.

Speaker:

Thanks for listening.

Speaker:

I.