Social Engineering Lessons from Mr. Robot Episode 1

Learn how social engineering attacks really work by analyzing the cybersecurity lessons from Mr. Robot's pilot episode. Curtis Preston and Prasanna Malaiyandi break down real-world social engineering tactics used by cybercriminals to manipulate victims into revealing sensitive information.
This episode covers social engineering phone scams targeting even cybersecurity professionals, the dangers of AI-powered voice cloning in modern attacks, and practical defense strategies. Discover why security questions should never be answered truthfully, how to verify suspicious calls claiming to be from banks or family members, and the importance of "trust but verify" principles.
The hosts also examine insider threats in cybersecurity firms, discuss the role of OSINT (Open Source Intelligence) in attacks, and explain honeypot detection systems. Plus, learn about proper backup storage security and why offsite, air-gapped backups remain critical for ransomware protection. Get actionable tips to protect yourself and your organization from increasingly sophisticated social engineering schemes.
Disclaimer: The Backup Wrap-up is not affiliated with the Mr. Robot show nor the network on which it airs. But we think you should go watch it!
you found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we look at social engineering attacks and insider threats.
Speaker:By analyzing the pilot episode of Mr. Robot Persona and I break down how cyber
Speaker:criminals use social engineering tactics.
Speaker:To manipulate people into giving up sensitive information.
Speaker:We examine realistic ex examples from the show and discuss how AI
Speaker:powered voice cloning is making these attacks much more dangerous than ever.
Speaker:And of course, we explore the role of offsite backups in ransomware protection.
Speaker:This episode will give you practical tools to defend against social engineering.
Speaker:While actually having a little fun with a great show.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr. Backup.
Speaker:I almost said Mr. Robot.
Speaker:I've been passionate about backup and recovery for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss that we had no backups of the production
Speaker:database that we had just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated backup admins into cyber recovery heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the show.
Speaker:Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me
Speaker:my Tesla Grief counselor Prasanna Malaiyandi, how's it going, prasanna?
Speaker:I am doing well, but I don't know about you.
Speaker:How are you doing, Curtis?
Speaker:And
Speaker:in pain.
Speaker:that you needed a Tesla grief counselor?
Speaker:I'm in pain.
Speaker:My friend.
Speaker:I, my Tesla got, we, um.
Speaker:think it's more than an owie.
Speaker:It's more than an alley.
Speaker:Yeah.
Speaker:For the record, clearly I'm fine.
Speaker:Uh, my Tesla is not, uh, I was having breakfast at my favorite breakfast place
Speaker:and two cars parked parallel, well, my car and then a big old pickup truck.
Speaker:And then the guy pulled out, we were both backed into the spot.
Speaker:He pulled out, did a sharp right, right into my front
Speaker:left bumper, and he got like.
Speaker:You know, ti tied up and he just couldn't figure out how to get out.
Speaker:And so basically he went back and forth a couple times.
Speaker:It actually, um, the picture kind of looks like a can opener like it places,
Speaker:and it ended up being about $7,000 worth of damage from a parking lot ding.
Speaker:Which is amazing, right?
Speaker:Because it's like the complete, uh, fender bumper, some, the support stuff behind
Speaker:the bumper as well as a control arm.
Speaker:and yeah.
Speaker:And a headlight
Speaker:Yeah.
Speaker:And it's not like those headlights are cheap.
Speaker:I was reading
Speaker:no.
Speaker:LED headlights are like a thousand dollars to replace.
Speaker:Yeah.
Speaker:So that's a thousand of the 7,000 head.
Speaker:It's the headlight.
Speaker:And then like there, they listed like a couple of other lights because
Speaker:there's a light in the, in the fender.
Speaker:Yeah.
Speaker:And that light breaks when you take the fender off according to them.
Speaker:Um, and I'm like, great design.
Speaker:But, um, yeah, so, uh, and, and then I, I require additional, uh, support because
Speaker:of the rental that I have, which I'm just gonna call not a Tesla, um, the Polestar.
Speaker:And it's not so much I am living, you know, when you, when when
Speaker:I originally bought my Tesla.
Speaker:You and I talked a lot before I bought the Tesla, and the thing that I remember
Speaker:you saying more than anything was it's about the supercharger network, right?
Speaker:And, and now I'm living that reality because I got used to the supercharger
Speaker:network and now I don't have the supercharger network and it is a hot mess.
Speaker:I, I feel for all of those poor.
Speaker:People out there that have EVs, that have CCS or Chad Mo.
Speaker:Is that how This's pronounced Chad Mo, uh, adapters and the, the fact that there's
Speaker:like 15 different competing companies, it really comes down to kind of three, right?
Speaker:Uh, at least in my area, uh, there's, there's Evie go, there's Electrify
Speaker:America, and then there's charge point,
Speaker:Yep.
Speaker:Like I, and the rates, the rates go up and down throughout the day.
Speaker:The rates based on the different location and, uh, trying, like in the Tesla, I
Speaker:just go and I say, you know, show me the chargers within 10 miles of me.
Speaker:And then, oh, look at the rates and if I want to save some money,
Speaker:because I, I do have to supercharge, uh, pretty, pretty regularly.
Speaker:And, uh.
Speaker:I can just look at the rate.
Speaker:Oh look, that one's less expensive right now.
Speaker:Let me drive over to there.
Speaker:The, there's it.
Speaker:No, it's like one at a, you know, and then there's the fact that, that a bunch
Speaker:of the fast chargers, 50 kilowatts.
Speaker:What is that?
Speaker:That's not fast.
Speaker:So.
Speaker:Well, it's all relative, Curtis.
Speaker:It is faster than charging at home,
Speaker:right?
Speaker:then I have that problem too.
Speaker:'cause I've, I have a, I have a Tesla plug at home, so I had to buy an adapter
Speaker:and I'm only getting 30 amps out of that.
Speaker:Instead of the 48 I was getting, uh,
Speaker:life is rough.
Speaker:Curtis life is rough.
Speaker:yeah.
Speaker:So I'm living, I'm, I'm just, it's not, it's not a good month for me.
Speaker:They're saying like two to three weeks, once the insurance company approves the
Speaker:estimate, which hasn't happened yet.
Speaker:Anyway, that's why I require a Testa grief counselor.
Speaker:It's it.
Speaker:Yeah.
Speaker:Well, so it's funny because I remember when you went from your
Speaker:Prius to your Tesla, you had all sorts of questions and concerns,
Speaker:Mm-hmm.
Speaker:still trying to figure out all these things, and then it's like human nature.
Speaker:We get used to things over time and then
Speaker:Yeah.
Speaker:to change.
Speaker:Yeah.
Speaker:Yeah, I, I, I, I'm, uh, you know, people still ask me, so,
Speaker:what do you think of your car?
Speaker:You know, and I'm like, I could, you know, 'cause they see, they see my
Speaker:car and they, and I'm like, I hate it.
Speaker:And they're like, what?
Speaker:And, and it's not so much the Polestar, it's the, it's the charging
Speaker:network attached to the Polestar and.
Speaker:and I'm sure there are ways to show maps and the charging stations
Speaker:and all the rest, maybe hopefully,
Speaker:But, but not with money,
Speaker:yeah.
Speaker:right?
Speaker:So like, so my favorite app is plug share.
Speaker:Mm-hmm.
Speaker:you can say, I would like CCS adapters over a a hundred kilowatts,
Speaker:uh, you know, in this range.
Speaker:And then they'll go, here they are.
Speaker:But then you click on 'em and it'll say, it'll give you an idea.
Speaker:Sometimes, sometimes it'll have a price, sometimes it won't.
Speaker:But it will say, listen, you should really go to the companies.
Speaker:But the other problem is that each of these networks has
Speaker:their own like membership.
Speaker:Yep.
Speaker:so you kind of have to pick one because they want you to
Speaker:pay to belong to that network.
Speaker:Um, and, um, if you want to discount, well the, it's, it's a,
Speaker:it's, you want the discount, right?
Speaker:They, they price it so that you definitely want the discount.
Speaker:Anyway, uh, we're gonna, we're gonna continue.
Speaker:Um, I just finished, I just published as we're recording it.
Speaker:I just published the Mission Impossible episode, and I thought we would do,
Speaker:um, we would go down another sort of entertainment, I'm not gonna call it a rat
Speaker:hole, an entertainment tunnel, uh, path.
Speaker:Yes, because it's really hard to
Speaker:good representations of and cybersecurity in Hollywood.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And I think one example of of pretty decent coverage is Mr. Robot.
Speaker:And, um, you know, it's not perfect.
Speaker:It doesn't get everything right.
Speaker:It sensationalizes some stuff.
Speaker:But I, I think just by and large, clearly somebody who knows
Speaker:something about cybersecurity, uh, and also backups, right?
Speaker:Um, you know, our two sort of intersecting topics.
Speaker:And so I thought, I thought that it'd be perfect for us to do a, a series
Speaker:Yep.
Speaker:based on things that we can learn from Mr. Robot episodes.
Speaker:Now
Speaker:so, so I think the
Speaker:that
Speaker:we should say is
Speaker:is.
Speaker:if you have not watched the show and you are interested in it,
Speaker:you should pause this episode.
Speaker:Go watch the first episode, which we're about to cover today, and
Speaker:then come back and listen to it because there will be spoilers.
Speaker:Yes, there will be spoilers.
Speaker:Um, hint, um, Rammy.
Speaker:Malick is not Mr. Robot.
Speaker:Hmm.
Speaker:That's a different guy.
Speaker:Um, so the first episode we're going to talk about, and it's a nice tail
Speaker:off of the pre, the last episode, which we talked about, insider threat.
Speaker:So we're gonna talk about social engineering and insider threats.
Speaker:From the, the perspective of episode one, which is called, uh, hello Friend Mov.
Speaker:Um, and, um, you know, which is a, which is a, a bit of a spoiler in
Speaker:terms of how things get introduced.
Speaker:So, um, let me, uh, just give a, a summary of the episode.
Speaker:Uh, you know, it's the pilot, so you know, you're introducing the
Speaker:characters and you get Elliot, the cybersecurity professional.
Speaker:So he works for All Safe, which is a cybersecurity company,
Speaker:which is fascinating given what we're talking about.
Speaker:I just wanted to say like the people who pick these names, they're geniuses
Speaker:like of these companies, right?
Speaker:It's
Speaker:Yeah, yeah.
Speaker:Yeah.
Speaker:similar to Allstate, right?
Speaker:Insurance and
Speaker:Yeah.
Speaker:Yeah.
Speaker:And, and also we have Evil Corp, which is um, which is the big company
Speaker:that they're gonna try to take down.
Speaker:And they use the logo, they use basically Enron's logo.
Speaker:That's, that's Evil Corp. And I love that they just, they call it Evil Corp in the
Speaker:show, and no one, like does it, wink, wink, like it's literally just, that's
Speaker:the name of this company called Evil Corp.
Speaker:Uh, yeah.
Speaker:So he works at, uh, the cybersecurity firm and then, uh, evil Corp is a, uh,
Speaker:as a client of allsafe and they actually get hacked in the, uh, in the pilot.
Speaker:And the, the, the, um.
Speaker:All safe to text the hack.
Speaker:They stop the hack.
Speaker:Clearly.
Speaker:Remy Malick is like sort of the, the star of everything, and
Speaker:he's the one who figures it out.
Speaker:Not only did that he, he's able to find something they keep
Speaker:referring to as the dat file.
Speaker:So he finds the IOC, right?
Speaker:The indicator of compromise.
Speaker:And, uh, inside that debt file, he finds some, what would you call those,
Speaker:uh, breadcrumbs that leads him to Mr.
Speaker:Robot.
Speaker:And it turns out that this whole thing was a recruiting exercise
Speaker:to see if he could find this.
Speaker:And it's for this group called FSO Society, which is the group that
Speaker:hacked Evil Corp. And, uh, he's then presented the choice of, um.
Speaker:Of joining F Society to take down Evil Corp. They are a big bad bank,
Speaker:and we're gonna take them down.
Speaker:And literally what he wants to do is erase all of the, um, the, the debt, you know,
Speaker:by, by basically erasing all the records.
Speaker:And he's like, but wait, there's backups.
Speaker:They have backups stored at Steel Mountain.
Speaker:That's another one.
Speaker:They have offsite backups.
Speaker:Thank you.
Speaker:Good job.
Speaker:They have, you know, offsite air gapped backups stored at Steel
Speaker:Mountain, but he says, aha.
Speaker:There is a gas storage facil, a gas processing facility, I think
Speaker:is what it is, right next to.
Speaker:Bad desire there, right next to the, uh, steel mountain storage facility, and we're
Speaker:gonna blow it up, thus blowing up Steel Mountain and all of their backups with it.
Speaker:That's the plan.
Speaker:What do you think?
Speaker:Do you want to join?
Speaker:Right.
Speaker:And that's, and that is episode one.
Speaker:What, you know, what's your thoughts on the, you know, just overall
Speaker:Yeah.
Speaker:No.
Speaker:So loved episode one
Speaker:mm-hmm.
Speaker:It's one of those shows where you're like, oh, like especially being in
Speaker:tech and movies, other than Mission Impossible, which you talked about,
Speaker:most shows do an awful job of portraying or it's like, Hey, let me just type.
Speaker:I think the best was, uh, example you have is like Alias, right?
Speaker:Where it's like, oh no, they're in the network.
Speaker:Let's just pull all the cables.
Speaker:It's
Speaker:Yeah.
Speaker:Yeah, yeah, yeah.
Speaker:The, the one, the one of the worst ones I can think of is like the net,
Speaker:yeah.
Speaker:Um, you know, it's just, yeah.
Speaker:Sandra Bullock.
Speaker:Yeah.
Speaker:Yeah.
Speaker:The tech is so bad.
Speaker:This is, the tech is decent, right?
Speaker:exactly.
Speaker:And I think it's also interesting sort of that dilemma that Elliot
Speaker:played by Remy Mallick faces, right?
Speaker:Where it's like, do I want to help and defeat the evil corp, or
Speaker:do I wanna keep my job and be a normal person and all the rest?
Speaker:Yeah, there, there's a couple of side plots.
Speaker:Uh, one of them is, uh, that there's this girl that he, he kind of, I don't know
Speaker:if he, I think he has a crush on her, or she's just a friend, I'm not quite sure.
Speaker:But she's, you know, she's this woman that, that works
Speaker:and she's an account executive.
Speaker:And the, um, in, uh, and then the, um.
Speaker:The, that's one plot.
Speaker:And then the other plot is that he's seeing a counselor.
Speaker:Um, and he clearly has some issues with people and like, and he, he clearly in
Speaker:his brain, like he hates everyone and he hates society and he hates like,
Speaker:like, uh, you know, capitalism and, you know, so he's definitely, you know,
Speaker:f Society again, great naming, right?
Speaker:'cause it's like f the society, right?
Speaker:I get it.
Speaker:Um, and, and so it, it, it definitely, like on one hand he's like, I hate,
Speaker:I hate the world, and this would be a great way to screw the world.
Speaker:But he also does have some, um, yeah.
Speaker:I think the one critique I'll make of the show, I think they did a phenomenal job.
Speaker:I think that they played too much into the stereotype of a hacker
Speaker:Mm-hmm.
Speaker:with his character.
Speaker:Right.
Speaker:In the
Speaker:In what way?
Speaker:in the sense of right, a loner who has people issues, right?
Speaker:Who is right.
Speaker:Those sort of things
Speaker:This is, this is wrong.
Speaker:This is wrong.
Speaker:How?
Speaker:no, no, no.
Speaker:But if you think about like your Edward Snowdens, right?
Speaker:Your other folks, right?
Speaker:They're just
Speaker:Yeah.
Speaker:They look and seem like normal people.
Speaker:Right?
Speaker:It's almost like portraying that, Hey, if you see someone who looks like
Speaker:this, they may be a hacker, versus there are a bunch of people who seem
Speaker:normal, who act normal, who have social skills, But who could be malicious?
Speaker:Yeah, I, I think that's probably true of any.
Speaker:Yeah.
Speaker:Sort of fringe group, right?
Speaker:Um, there are definitely, so yeah, hacker doesn't necessarily, you know, Rami Malick
Speaker:has a very unique look to him, and I'm sure that's part of why he was hired.
Speaker:Um, and, um, and the character definitely is a loner, right?
Speaker:Um, but they paint a picture that he is an ethical hacker.
Speaker:Yeah.
Speaker:So, um, and what we're gonna talk about, one of the things in this, in this
Speaker:episode is they, they do paint the picture that he does do some hacking, but his
Speaker:hacking, like his first thing that we see in the episode is that he, the, he
Speaker:uncovers a person who does child porn,
Speaker:Yeah.
Speaker:at least he, he has child porn.
Speaker:Yeah.
Speaker:um, he, um, 'cause the guy's like, I never hurt anyone.
Speaker:Yeah.
Speaker:Okay.
Speaker:Dude, whatever.
Speaker:Um, and, and he, and he turns in this person to the police.
Speaker:Right.
Speaker:Yeah.
Speaker:Um, and then the other topic that we're gonna talk about in this, you know, in
Speaker:this episode, um, he, you know, he paints a picture that he's an ethical hacker.
Speaker:And so what these guys are suggesting is very much a
Speaker:non-ethical thing, unless you really
Speaker:Believe in
Speaker:have some serious situational ethic situation.
Speaker:Yeah, yeah.
Speaker:Believe in the cause.
Speaker:Yeah.
Speaker:right.
Speaker:Of FSO society.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Which is apparently, you know, erasing all debt.
Speaker:but by the way, okay, so there are two things I think that were interesting
Speaker:that are actually three incidences that happened in this episode, which
Speaker:I think might be useful to talk about.
Speaker:Right?
Speaker:The first,
Speaker:Okay.
Speaker:The first that you alluded to was a cyber cafe owner.
Speaker:Yeah.
Speaker:And so what did he end up doing?
Speaker:Or did they, uh, describe what he did in order to sort of infiltrate?
Speaker:Or was it kind of like, Hey, I did something and,
Speaker:think he, yeah, he, I, he, he did give a, he did give a, a summary.
Speaker:I don't remember exactly what he, 'cause it was so early in the episode,
Speaker:I wasn't, you know, quite, but he basically got into the guy's accounts.
Speaker:He saw that he was doing, the guy was using, uh, security by obscurity.
Speaker:Right in that he was hiding in plain sight in this, uh, cyber cafe.
Speaker:Right.
Speaker:He was using his business that otherwise would have, you know, um, but, but, um,
Speaker:Elliot saw something that caused him to sort of look differently and he looked
Speaker:and he saw all this stuff going on, right?
Speaker:And he's like, look, I, I, I've, I've got your emails, I've got your, you
Speaker:know, I've got, I've got all the stuff.
Speaker:I've got, dude, I've got all the evidence.
Speaker:And the guy's like, are you blackmailing me?
Speaker:And, um, and he's saying, um, no, I've turned you into the cops.
Speaker:And then the cops all show up.
Speaker:Yeah.
Speaker:So I don't, I don't, I don't have any good stuff from that one.
Speaker:Do you, do you have any, um, yeah,
Speaker:from that one.
Speaker:Any good takeaways?
Speaker:yeah.
Speaker:But the, let's talk about the, the, the, i I, I want to call her the girlfriend.
Speaker:The, the, the friend girl.
Speaker:Yeah,
Speaker:yeah.
Speaker:the coworker who he may or may not have a crush on
Speaker:Yeah.
Speaker:Yeah,
Speaker:may or may not have feelings for.
Speaker:yeah, yeah.
Speaker:So, um, the, um, uh, you want, you wanna talk about that.
Speaker:So his coworker, whose name is Angela, right?
Speaker:He sort of is looking out for whatever you want and he suspects the guy
Speaker:and doesn't like the guy at all.
Speaker:Going back to what Curtis was saying, he hates people,
Speaker:Yeah,
Speaker:He has people issues and so he
Speaker:but he senses something.
Speaker:Something is not right with this guy.
Speaker:Yeah.
Speaker:senses are going off.
Speaker:So he decides, okay, let me take a look and do a deeper dive and dig
Speaker:into what this guy's all about.
Speaker:And so he actually sort of social engineers, the guy, right?
Speaker:Yeah.
Speaker:uh, do you wanna walk through like what he does?
Speaker:Yeah, so he calls the guy pretending to be, I believe it's the bank, and
Speaker:basically said, Hey, we're the bank.
Speaker:We need to talk to you about your account, but before we do that, uh,
Speaker:we need to authenticate you, uh, you know, what's your dog's name, what's
Speaker:your, you know, blah, blah, blah.
Speaker:And he asked a couple different security questions and the guy's
Speaker:like, I don't remember these being security questions, but the guy totally
Speaker:falls for the social engineering.
Speaker:which is crazy considering he works for a cybersecurity company.
Speaker:Right, right.
Speaker:Maybe he's another, maybe he's an ae and he's not a, he's not
Speaker:a cybersecurity professional, but it's still, he should know.
Speaker:He should know better.
Speaker:And then he uses the, the responses to then, um, seed a
Speaker:password guessing, uh, algorithm.
Speaker:Yeah.
Speaker:And
Speaker:And.
Speaker:ends up breaking into the guy's account and he finds all sorts of evidence
Speaker:that the guy is not who he seems to be.
Speaker:Dun Dun.
Speaker:Yes.
Speaker:married and actually Dun, he, I think he has like multiple
Speaker:girlfriends or something.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Not a good guy.
Speaker:And then he, he blackmails something.
Speaker:He's like, look, get out, get out of her life, or else.
Speaker:Um, and then I,
Speaker:the first one, we talked about him being like the ethical hacker.
Speaker:yeah.
Speaker:This one, do you think he's really the ethical hacker
Speaker:just because it's self-motivated?
Speaker:Does
Speaker:It is, you know, he is an ethical hacker with an ulterior motive.
Speaker:How's that, right?
Speaker:I I, I, I'm one of these that believes that there's no
Speaker:such thing as a selfless act.
Speaker:Um, every selfless act that you do has a reason behind it.
Speaker:This just may be a bigger reason.
Speaker:Right.
Speaker:Um, we could have that philosophical discussion, you
Speaker:know, even like gifts to charity.
Speaker:Right.
Speaker:You know, you give it, I, I believe you, you know, you want that
Speaker:feeling of, you know, whatever.
Speaker:Right.
Speaker:Anyway, in this case, he's trying to stop the,
Speaker:Yeah,
Speaker:you know.
Speaker:the interesting thing, if we just look at this particular incident, right?
Speaker:It's the fact the guy worked at a cybersecurity company, he didn't
Speaker:like, someone calls you from the bank and starts asking you questions.
Speaker:You should be like, Hey, I'll call you back, hang up, and then call the
Speaker:number from the back of your bank card,
Speaker:Yes.
Speaker:Right.
Speaker:whatever else to validate because then you know, okay, that is the actual number.
Speaker:Well, you know, here's a, here's a real world, um, example of this.
Speaker:I am an Airbnb host and I, and I'm on the Facebook groups and this person said.
Speaker:Someone calling, claiming to be Airbnb.
Speaker:Um, and I talked to them and uh, next thing you know, he's locked out
Speaker:of his Airbnb account and they've changed the bank stuff to go and
Speaker:he's trying to get into Airbnb to get to, to fix things, right?
Speaker:Meanwhile, any payments that go through or going to this other entity and, um.
Speaker:And I'm just like, guys, guys, you know, like what if, if any business
Speaker:or government entity, you know, or personal entity calls you they
Speaker:called you and then they want you to authenticate them yourself.
Speaker:It's, it's a scam.
Speaker:Yep.
Speaker:And, and even if it's not a scam, if it's not a scam.
Speaker:'cause what, well, what you should do regardless is what you just said.
Speaker:Right.
Speaker:Call them back at the published number.
Speaker:Not a number that they give you the published customer service number.
Speaker:Right.
Speaker:And they're like, you know, they're like, no, that one, you gotta call
Speaker:this special number to get into me.
Speaker:You know?
Speaker:No, no, no, no.
Speaker:I'm gonna call the published number.
Speaker:Yep.
Speaker:And I, I, in my entire career, this has always been a thing in my entire career.
Speaker:I've always.
Speaker:Done this.
Speaker:And I've had one company, and I remember that it was Union Bank, which it,
Speaker:you know, this is like 20 years ago.
Speaker:Union Bank would call me and say, we want to talk to you about your account,
Speaker:but we need you authenticate first.
Speaker:And I'm like.
Speaker:You are bad, bad company.
Speaker:And it was Union Bank, right?
Speaker:They're like, we want to call you about your, your, um, you know,
Speaker:these transactions, but we need you to authenticate yourself before you
Speaker:can authenticate these transactions.
Speaker:And I'm like, you called me.
Speaker:What?
Speaker:What?
Speaker:exactly.
Speaker:uh, yeah.
Speaker:So that's, that.
Speaker:That's classic social engineering.
Speaker:There are, there are lots of, go ahead.
Speaker:there's also one more I wanted to talk about too from, from this incident.
Speaker:A social engineering one.
Speaker:yeah,
Speaker:Okay.
Speaker:What?
Speaker:Go ahead.
Speaker:So the other one to talk about is the security questions,
Speaker:Yeah.
Speaker:right?
Speaker:So I know everyone likes to be like, Hey, what's your favorite, uh, fruit?
Speaker:Or What's your favorite travel destination?
Speaker:Or blah, blah, blah.
Speaker:People don't realize, you don't have to answer those truthfully
Speaker:Yeah.
Speaker:is asking you, like, I remember we had Rose Rose
Speaker:Yes.
Speaker:podcast,
Speaker:Yeah.
Speaker:And one of her favorite things was when people ask me for those, she's
Speaker:like, I just put random things because it doesn't matter what it is.
Speaker:Yeah.
Speaker:You just need to store.
Speaker:Yeah.
Speaker:As long as you can remember.
Speaker:So what I do is I put the, the answers to those in the notes of my, of of Dashlane.
Speaker:Right.
Speaker:Um, and, uh, and that way I, I have it because some of them are like.
Speaker:You know, some of them are case sensitive and you know, all stuff,
Speaker:so you gotta make sure you store it as the way you put it in there.
Speaker:But yeah, you could put, you know, you know, mother's maiden name,
Speaker:Yeah.
Speaker:like, it doesn't matter what you put as long as you could, as
Speaker:long as you can put it back.
Speaker:Yeah.
Speaker:By the way, that is my mother's maiden name, but
Speaker:So here's a question just now that you brought it up.
Speaker:yeah.
Speaker:think it would be better for you to store those answers to
Speaker:security questions separately from your Dashlane password manager?
Speaker:I don't think so.
Speaker:Um, I, I know what you're thinking.
Speaker:Single point of failure.
Speaker:Here's the thing, if gasoline is hacked, I am.
Speaker:Straight?
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um, and I, I put, um, you, you can make the argument.
Speaker:I, I do use a different.
Speaker:OTP, uh, program, right?
Speaker:I don't, I don't use Dashlane supports.
Speaker:OTP one time password.
Speaker:Uh, I, I use a different one of those, but, but to me, it's a very secure
Speaker:place to store this information.
Speaker:Um, I see what I, I can see the argument that says if someone gets
Speaker:my password, they would also have my, if someone gets into Dashlane,
Speaker:they would also have the word the.
Speaker:Arguments to my security questions.
Speaker:Um, this is, this is where security versus no, um, uh,
Speaker:security versus convenience, right?
Speaker:We had a great conversation with Mike and I learned a lot on a few episodes
Speaker:ago about where, where I was able to come up with a good security version.
Speaker:Security versus convenience Workaround to his suggestions.
Speaker:Like always do a, a separate browser for whenever you're doing anything that like
Speaker:really matters, like great squad cast.
Speaker:If some we're using squad cast to record this, if somebody hacks
Speaker:squad cast, I couldn't care less.
Speaker:I would lose like the last couple of recordings.
Speaker:Right?
Speaker:Yeah.
Speaker:it wouldn't be the end of the world.
Speaker:Right?
Speaker:Uh, but my bank.
Speaker:You know, QuickBooks, all these things, I, those need to work.
Speaker:And so what I came up with was I use a separate browser, not the
Speaker:one I, I live in Chrome, right?
Speaker:I don't use Chrome now, based on his, uh, suggestion, I don't use Chrome anything
Speaker:financial and anything where really important Prasannal information is stored.
Speaker:Yeah.
Speaker:So like, if my social security number is there, I'm, this is going.
Speaker:And then what I did was, um, I, I installed a Chrome
Speaker:plugin to block those sites.
Speaker:So that's my, so I created the process.
Speaker:The process is, um, you know, I'm gonna use this other browser for those.
Speaker:And I needed to use another browser that was supported by Dashlane.
Speaker:Yep.
Speaker:And, um.
Speaker:I then, uh, installed this plugin that basically if I go to.
Speaker:Any of the sites that I, that I've need, by the way, it's, it's a lot of sites.
Speaker:It's like, it's like 30 or 40 sites where I do this kind of stuff.
Speaker:And, um, I, um, it, it comes up as being blocked.
Speaker:Right?
Speaker:So that's, um, and so that's the kind of thing that you can do.
Speaker:Um.
Speaker:But I, I can see, I can see a solid argument saying, okay,
Speaker:if you have security questions, put it in this other thing.
Speaker:Um,
Speaker:I can't argue against it.
Speaker:I can't argue against it.
Speaker:but you also have to back it up.
Speaker:You have to make
Speaker:Yeah.
Speaker:keeping copies everywhere, right?
Speaker:You have to secure it, you have to encrypt it all the rest.
Speaker:And like you
Speaker:Well, I just download all my passwords and I put it as a,
Speaker:as a Google spreadsheet, as a.
Speaker:that's, that's I think the easiest.
Speaker:Yeah.
Speaker:Oh yeah, it's a text file.
Speaker:Yeah.
Speaker:a text file on my desktop.
Speaker:Um, so yeah, so the, the social engineering thing is, you know, that
Speaker:the only protection against social engineering is constant training
Speaker:and vigilance to, to, to recognize.
Speaker:For, for, you're right.
Speaker:'cause that guy should have recognized what was happening.
Speaker:He should have said, I'm sorry if you're really the bank, let me
Speaker:call you back at the bank's number.
Speaker:He should have done that.
Speaker:He should have recognized this as a po potential social engineering, uh, effort.
Speaker:exactly.
Speaker:then, and then immediately shut it down and, and, and called him back.
Speaker:And the only way, this is where the human is the worst, uh.
Speaker:It's the weakest link.
Speaker:You are the weakest link.
Speaker:So the only protection is you.
Speaker:yep.
Speaker:And so you, this is why you need to constantly train, remind
Speaker:yourself of, of the newest things.
Speaker:By the way, the latest thing has to do with ai.
Speaker:You want to talk about that.
Speaker:Yeah.
Speaker:So as, yeah, unless you've been living in a rock somewhere, or
Speaker:a deserted island, one of the things that is happening, right?
Speaker:AI is everywhere, right?
Speaker:Everyone uses chat.
Speaker:GPT, Claude, take your pick, right?
Speaker:But now.
Speaker:Huh?
Speaker:I.
Speaker:yes.
Speaker:This podcast is not being generated by ai.
Speaker:Don't worry.
Speaker:Um, but one of the things now is before it just used to be like generating
Speaker:text, but now it's gotten really good with like generating video and audio.
Speaker:And so it's actually able to replicate people's voices.
Speaker:So you might get a call, Curtis being like, Hey, it's uh, my
Speaker:granddaughter that needs help at
Speaker:Yeah.
Speaker:and she's been kidnapped, and please pay X amount of dollars in
Speaker:ransom, otherwise you won't get
Speaker:Yeah.
Speaker:or
Speaker:Yeah.
Speaker:it is.
Speaker:Or they went to jail and they need to be bailed out.
Speaker:Please call this number.
Speaker:And very, very convincing about the voices because people's voices are out
Speaker:there, like our voices are out there.
Speaker:Right, right.
Speaker:this podcast, on YouTube, et cetera.
Speaker:Yeah.
Speaker:Yeah.
Speaker:people can build a pretty good AI model just based on a short amount of audio.
Speaker:so that's where if you do get a call sounding like someone, make
Speaker:sure you have a way to verify that.
Speaker:Yeah, if they're calling, I mean, my granddaughter calls me and
Speaker:just wants to chat, talk about the latest episode of Bluey.
Speaker:Um, but if she calls me and says, I need you to wire this money.
Speaker:I'm gonna do a little extra authentication.
Speaker:And the way to do that, by the way, is to discuss something that only
Speaker:the two of you would actually know,
Speaker:Yep.
Speaker:Where did, where did we go?
Speaker:You know what?
Speaker:Where did we go for dinner last week?
Speaker:What did we have?
Speaker:Something like that
Speaker:yes, and the key is only the two of you would know.
Speaker:So if you post on Instagram what you ate to last week,
Speaker:that would.
Speaker:that's probably not a good thing to use for verification.
Speaker:Yeah, you wanna, you wanna, you know what, you know what,
Speaker:what, what did we talk about?
Speaker:What did we talk about while we were at dinner?
Speaker:Right.
Speaker:Um, you know, I, I, you know, originally I was thinking that you should
Speaker:have a shared secret, but thi this, this is, this is what you need as a
Speaker:shared secret if you really are my granddaughter, um, you know this thing.
Speaker:Right?
Speaker:Um, what was the last topic that we talked about When we spoke, right?
Speaker:And in
Speaker:Yeah.
Speaker:think that having a last topic or something like that, like more contextual
Speaker:makes sense because who's gonna remember a password that you agreed upon like
Speaker:six years ago or 10 years ago, right?
Speaker:one's gonna
Speaker:Yeah.
Speaker:versus like, Hey, we just had this conversation.
Speaker:What did we talk about?
Speaker:You know, we used to, we used to have a DT.
Speaker:Right?
Speaker:Um, and there was a password that you could call.
Speaker:and
Speaker:Um, yeah, you know what, you know what ours was?
Speaker:It was, it was lumpia.
Speaker:Oh
Speaker:Um, anyway.
Speaker:Yeah.
Speaker:So, uh, and by the way, use the same uh, thing we just said.
Speaker:You, if, if it really is your granddaughter, call them back on
Speaker:your granddaughter's phone right now.
Speaker:There's still a possibility that still might not be your granddaughter, right?
Speaker:Because of.
Speaker:Things Right.
Speaker:But the, the chances are, again, good, better, best.
Speaker:Right.
Speaker:Yeah.
Speaker:then, so call 'em back on the number and then, and if they don't answer Hmm.
Speaker:Right.
Speaker:Um, and then have that conversation, uh, of, you know, some shared secret
Speaker:that only the two of you would know.
Speaker:Yeah.
Speaker:Um, in my case, it, yeah, go ahead.
Speaker:yeah.
Speaker:And it is interesting because I don't think people realize the amount of
Speaker:information they post online about
Speaker:Yeah.
Speaker:Yeah.
Speaker:Yeah.
Speaker:right.
Speaker:Well, that, that's another,
Speaker:against you.
Speaker:that's another thing that happens here.
Speaker:Uh, what, what is it called?
Speaker:Um, yeah.
Speaker:So that's a great, uh, um, segue into another topic to talk about, which
Speaker:is, uh, osint, O-S-I-N-T, which is short for open source intelligence.
Speaker:And, um, Elliot does that when he, when he, once he hacks the guy, that's
Speaker:how he figures out all the stuff.
Speaker:Like he's looking at a, he's looking at all his Facebook profiles and stuff.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And sometimes people will be like, Hey, where did this thing come from?
Speaker:Um, as an example, Hey, here's a license plate.
Speaker:Can you help me figure out what it is?
Speaker:Or here's like a random broken taillight of a car that did a hit and run,
Speaker:Yeah.
Speaker:of scour the internet looking for things, right?
Speaker:That's all open source intelligence.
Speaker:Yeah.
Speaker:That they're using
Speaker:Yeah.
Speaker:this.
Speaker:It might be Wikipedia, it might be Google, it might be looking at
Speaker:Google Maps to figure out like, okay, where did the sunlight hit
Speaker:in this certain point of time?
Speaker:And let me figure out where exactly
Speaker:There's a guy, have you seen the guy?
Speaker:There's a guy that you could send him a picture and within five minutes he will
Speaker:tell you where that picture was taken.
Speaker:It's really kind of freaky.
Speaker:There's a YouTube channel.
Speaker:Um, and, and he does it really, really quickly.
Speaker:Um, the, um.
Speaker:I saw Kevin Mitnick, uh, speak once, uh, which is, you know, at one time
Speaker:he's a, he was an ethical hacker.
Speaker:He is no longer with us.
Speaker:Um, and again, every time I mention his name, I gotta say,
Speaker:not everybody is a fan of Kevin.
Speaker:There's some stuff there, but I did see this, um.
Speaker:This presentation where he talked about using, again, this is
Speaker:again, a combination of social engineering and, uh, OSINT, right?
Speaker:So he finds, he, he, he wants to target a person.
Speaker:He finds their, their LinkedIn profile, and then he sends them an
Speaker:invitation to be a speaker at his event, which he has created a, um.
Speaker:Uh, you know, a webpage, four and everything, right?
Speaker:And, um, and he sends him a Zoom and, and he, he goes, we want to do a, um,
Speaker:intro
Speaker:an interview of you prior to the thing.
Speaker:We just want, we just wanna close the deal.
Speaker:And he sends him a, a link, supposedly to a Zoom invite.
Speaker:The link is actually a, uh, a thing that downloads.
Speaker:Malware and then opens up zoom, right?
Speaker:So unless you're really paying close attention, you don't notice that you
Speaker:just downloaded this, this malware, and, um, and basically you then just gave
Speaker:them your keys to the kingdom, right?
Speaker:Um, and that's where again, that's, um, that's another topic that we'll cover in
Speaker:a later episode about the phishing, right?
Speaker:But, but osint is a big thing.
Speaker:Um, and of course, um.
Speaker:Social engineering.
Speaker:And then, um, let's also talk about just the fact we talk about it a lot.
Speaker:Uh, the concept of an insider threat
Speaker:Mm-hmm.
Speaker:Elliot is going to be, you know, a really big insider threat.
Speaker:Oh yeah.
Speaker:in cybersecurity for the client, right?
Speaker:Who you are thinking about now attacking
Speaker:Yes.
Speaker:know,
Speaker:Yeah.
Speaker:you know all their weaknesses, you know all their infrastructure,
Speaker:you know, all the personnel.
Speaker:Yeah, and you, you know, a pretty good story about, uh, an
Speaker:insider threat situation from a cybersecurity firm as well.
Speaker:Yeah, there was recently, a, probably a couple weeks ago, uh, an article came
Speaker:out where the DOJ was investigating an employee of a cybersecurity company
Speaker:who basically was supposed to be ne.
Speaker:Helping, uh, victims negotiate with ransomware companies and
Speaker:Yeah.
Speaker:up and running, and literally what the person did instead was he would negotiate
Speaker:for lower rates with the ransomware companies and then take the difference and
Speaker:Take a, yeah, take a cut.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And, um, yeah, not good.
Speaker:Not good.
Speaker:exactly.
Speaker:The person
Speaker:Um,
Speaker:trust, it's like your doctor who's like, oh, by the way, when
Speaker:I'm doing surgery, I'm gonna like take out part of your kidney.
Speaker:Or take out your kidney at the same time.
Speaker:Right?
Speaker:You
Speaker:And yeah.
Speaker:do what they're trained to do, right.
Speaker:Yeah, and I, and I, without going into detail, I had an incident like this, not,
Speaker:not in cybersecurity, but I had this, I had an incident in my business life where
Speaker:I had a person that I had entrusted a lot of stuff and I did not verify, and
Speaker:honestly, it ruined my life for a while.
Speaker:And so
Speaker:Yeah.
Speaker:you, you, um.
Speaker:The, this is where we want to talk about the concept of trust, but verify, right.
Speaker:The, the great, so two things, trust, but verify.
Speaker:And then also, um, the concept of, uh, least privilege and, you know,
Speaker:bumpers and all of, all of the things that the, the more that a person
Speaker:is entrusted with, the more they should be monitored by someone else,
Speaker:yeah,
Speaker:right?
Speaker:Yeah.
Speaker:yeah.
Speaker:Because otherwise you don't know what they're doing.
Speaker:But here's the challenge though, Curtis, right?
Speaker:So as an example, you hired the doctor
Speaker:Yeah,
Speaker:a surgery.
Speaker:not an expert in that.
Speaker:You don't know what's gonna be happening, right?
Speaker:And you
Speaker:is, this is, this is why you get a second opinion, right?
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um, I, I think, I think, um.
Speaker:The, I I, I'm not sure if that's a good analogy for this world, but
Speaker:I mean, you should, you should.
Speaker:But in the case of like, it's just a matter of like, have other things, other
Speaker:people that can verify, you know, again, the more you, the more you entrust a,
Speaker:a group, a company, a person with, the more you need to at least occasionally be
Speaker:looking around to see what they're up to.
Speaker:Yeah, I agree with that.
Speaker:And it might be as simple as logging reviewing the logs to make sure,
Speaker:okay, what actually did happen?
Speaker:Does it align with what they said they're doing?
Speaker:Or hey, setting alarms for things they shouldn't be doing.
Speaker:Right, right.
Speaker:Yeah.
Speaker:Honey pots,
Speaker:Yeah.
Speaker:uh, you wanna talk about what a honey pot is?
Speaker:Yeah, so honeypot is basically, you can think of it as physical world.
Speaker:You have honey in a pot and it's supposed to attract bees,
Speaker:Mm-hmm.
Speaker:And so a honey, a pot is basically you put out something that looks like
Speaker:a normal device, but you're putting additional logging and monitoring.
Speaker:And the goal is to have bad actors target that.
Speaker:So you can detect when someone is in your network, in your infrastructure, or
Speaker:doing something they shouldn't be doing.
Speaker:Yeah.
Speaker:And, and a really important element of a honeypot, uh, is
Speaker:that it has no other purpose.
Speaker:No one should ever be logging into it.
Speaker:If anyone ever logs into it, it should set off the CLS on alert
Speaker:Yep.
Speaker:uh, it's time to look.
Speaker:I first learned about honeypots reading the Cuckoo's Egg, which we've talked
Speaker:about before, but if you've never read The Cuckoo's Egg, go read it.
Speaker:It's a short read, right?
Speaker:It's a pretty, pretty short read.
Speaker:And it's a true story back from the early days of, of, uh, you know, computing
Speaker:where, um, a guy uncovers a. Like a couple of, like a 3 cent accounting error.
Speaker:Right.
Speaker:Yep.
Speaker:And he ends up uncovering, you know, a cybersecurity ring and, and it's
Speaker:fascinating the way, so, you know, the cis admin is the hero in the story.
Speaker:Uh, cliff Sto is the guy's name and, uh, it's a great, it's a great book.
Speaker:And, and then he has honeypots.
Speaker:That's where I first learned about honeypots.
Speaker:Yeah.
Speaker:Um, and then finally our, our favorite topic.
Speaker:Backups.
Speaker:So I was so excited to see that, that they discussed that, that
Speaker:they were using Steel Mountain.
Speaker:I mean, this is where I was like, okay, alright.
Speaker:Iron Mountain facilities are generally like, the more branding you see of
Speaker:Iron Mountain, the less it has anything to do with storing anybody's media.
Speaker:Like one of the things I learned was when you see Iron Mountain trucks,
Speaker:those do not have backups in them.
Speaker:Those have paper.
Speaker:Shredding,
Speaker:Yeah.
Speaker:Yeah.
Speaker:The shredding services.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um, and, um, because they, they, they know this problem, right?
Speaker:There is, there is some element, or there is some value in
Speaker:security by obscurity, right.
Speaker:Um, not publishing what's, I mean, maybe you can figure it out, but I'm thinking
Speaker:that I, that Iron Mountain probably and other media storage facilities.
Speaker:Probably use lots of LLCs and things like that to, to rent
Speaker:buildings so that they can have that stuff, um, easily not detected.
Speaker:Uh, and then the vehicles that are going to and from of them, you know,
Speaker:I'm wondering if you're a determined hacker really wanting to target
Speaker:Iron Mountain or something like it.
Speaker:Maybe you could eventually figure it out.
Speaker:But again, it's um, you know, you follow the, you follow the guy, right?
Speaker:Where's, where's the guy going?
Speaker:Right.
Speaker:sign up for an Iron Mountain account and ship a tape and just put an air tag in it.
Speaker:Just saying
Speaker:That's just so wrong that it's so easy to do that.
Speaker:Right.
Speaker:saying that's
Speaker:You're just saying.
Speaker:But yeah, that is, that would definitely find a Iron Mountain
Speaker:storage facility and might not find the one you're trying to target.
Speaker:But, um, yeah, again, I'd go back to Alias.
Speaker:I remember when she needed to pass a message, she would, um.
Speaker:Like have a thing and she would like ball up a thing and put it in the trash can.
Speaker:And then that was how they passed messages.
Speaker:Yeah.
Speaker:Anyway.
Speaker:Um, so enough for, uh, Mr. Robot episode one.
Speaker:Go watch.
Speaker:You know, go watch episode two.
Speaker:Go Refresh.
Speaker:It's a decent show.
Speaker:It's a solid show.
Speaker:It really put, uh, Remy Meek on, on the map and he of course ends up
Speaker:playing Freddie Mercury in the movie.
Speaker:Uh, Bohemian Rhapsody an amazing job, uh, doing, uh, Freddie Mercury.
Speaker:So, um, yeah, go watch it.
Speaker:And, you know, and, and you, you'll see the same things we
Speaker:stuff where they get it wrong.
Speaker:I, you know, but, but by and large, the show does a pretty good
Speaker:job of, of getting this stuff.
Speaker:So go watch it.
Speaker:It's good, you know, and, um, you know, and then we'll talk, we'll talk next week.
Speaker:Sound good?
Speaker:sounds
Speaker:Thanks.
Speaker:Yeah.
Speaker:All right.
Speaker:, Thanks folks for listening.
Speaker:And uh, that is a wrap.
Speaker:The backup wrap up is written, recorded, and produced by me w Curtis Preston.
Speaker:If you need backup or Dr. Consulting content generation or expert witness
Speaker:work, check out backup central.com.
Speaker:You can also find links from my O'Reilly Books on the same website.
Speaker:Remember, this is an independent podcast and any opinions that
Speaker:you hear are those of the speaker and not necessarily an employer.
Speaker:Thanks for listening.