Social Engineering Attacks: Lessons from Mr. Robot Episode 3

Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social engineering to impersonate employees and reset passwords. We break down the hospital hacking scene, revealing how underfunded IT departments create vulnerabilities that social engineering attacks exploit. The episode also covers email security, backup system risks, and the Sony hack parallels shown in the series. Learn how to protect your organization from social engineering by understanding what information to keep private, how to properly fund cybersecurity, and why your backup systems need protection from social engineering tactics.
you found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we look at social engineering tactics in our analysis
Speaker:of the Mr. Robot Series persona, and I will break down how one character
Speaker:uses Instagram stalking, personal information gathering, and even
Speaker:sleeping with somebody to compromise their phone and steal sensitive emails.
Speaker:We also talk about, uh, how cybersecurity budgets, low ones, like the $7,000 budget
Speaker:they talk about in the show, create vulnerabilities that hackers will exploit.
Speaker:We look at how social engineering attacks work, what you can do to
Speaker:protect yourself and your organization.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss that there were no backups of that database we just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated backup admins into cyber recovery heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the show.
Speaker:Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy who
Speaker:is also celebrating the return of the Tesla Prasanna Malaiyandi How's it going?
Speaker:Prasanna,
Speaker:I was like, what am I celebrating?
Speaker:It's, I'm
Speaker:return of the Tesla, it's all back.
Speaker:you got it back and then you had to put it back and then you got it back again.
Speaker:I did, I had to put it back.
Speaker:Or give
Speaker:uh.
Speaker:say.
Speaker:Yeah, the, the hood, the hood was slightly misaligned and then, and
Speaker:then, and there was some, some clear, clear coat over spray on a
Speaker:completely different part of the car.
Speaker:So like, it was, I guess the wind or something took some that was, that was
Speaker:not, I wasn't very happy about that.
Speaker:I,
Speaker:be spraying outdoors just saying.
Speaker:So today we're gonna
Speaker:Yeah,
Speaker:series on Mr. Robot,
Speaker:Mr. Robots.
Speaker:and we are today on.
Speaker:Episode three, which is
Speaker:1.2.
Speaker:1.2, according to their naming, labeled debug M kv.
Speaker:Yeah.
Speaker:me about the numbering, but it all gets confusing, so
Speaker:it all starts at zero.
Speaker:Yeah.
Speaker:So normal people call it episode three.
Speaker:Uh, that's why I'm saying episode 1.2.
Speaker:He wakes up in hospital after being dumped off the pier, uh, from Mr. Robot.
Speaker:And, uh, you know, he's obviously, uh, uh, upset.
Speaker:Angela shows up with his psychiatrist,
Speaker:Right, right.
Speaker:is like, I'm not gonna let you go because you're the one who called
Speaker:me and said, come, come, come.
Speaker:Yeah.
Speaker:And she's like, are you using, I need you to get a drug test every
Speaker:two weeks or whatever it is to make sure you're not still using,
Speaker:Yeah.
Speaker:gonna sign you out.
Speaker:Yeah.
Speaker:And he agrees to do that.
Speaker:But by drug test, what he means is I'm gonna hack the hospital and
Speaker:And,
Speaker:Yeah,
Speaker:how he has like, he tells someone, and then you have like the inner voice Go on.
Speaker:yeah, yeah, yeah.
Speaker:And he is like, this is the whole reason I chose this hospital.
Speaker:Right.
Speaker:Because there's a guy that, um.
Speaker:You know, the IT guy, he says, I, I heard $7,000 a year, but I think it was seven.
Speaker:I think you're right.
Speaker:It's $70,000 a year.
Speaker:Um, and he, and he, he's not that impressed with the guy's skills.
Speaker:And,
Speaker:Um, or the budget, I guess he said.
Speaker:95, I
Speaker:Yeah, yeah.
Speaker:Something like that.
Speaker:yeah.
Speaker:And, um, so he, so he gets outta the hospital and, um, he tries
Speaker:to go back to what he, normal and then he goes, he gets invited to,
Speaker:uh, a dinner party with his boss.
Speaker:Um, and he, he brings the girl that he kind of rescued from drugs or
Speaker:sort of rescued Yeah, his neighbor, uh, as his girlfriend, although they
Speaker:don't, they're not really girlfriend to boyfriend to this dinner party.
Speaker:And he's at the dinner party?
Speaker:What,
Speaker:asked her two
Speaker:what he, he, yeah, I guess.
Speaker:I guess.
Speaker:Yeah.
Speaker:Um, and, um.
Speaker:Really awkward seeing when they ask him how long he's been,
Speaker:how long they've been together.
Speaker:He goes, uh, today
Speaker:Yeah.
Speaker:and
Speaker:did you see Angela just like pour the rest of the bottle
Speaker:yeah.
Speaker:Yeah.
Speaker:She just, so clearly Angela has feelings for him as well, or maybe concern.
Speaker:I don't know.
Speaker:We, we just don't know.
Speaker:But anyway, uh, and then you have the boss, which is Gideon.
Speaker:And the bosses.
Speaker:The bosses, he, he still wasn't sure.
Speaker:Yeah.
Speaker:About what happened.
Speaker:So he looked into what happened, and he came up with a story as to
Speaker:why he didn't tell 'em about the, the, you know, the, uh, that file.
Speaker:And then he hugs him.
Speaker:Um, and, but then the, the, the end of the episode is the episode.
Speaker:There's this big email hack.
Speaker:And the Terry Kolby is revealed to be behind and, and an Evil
Speaker:Corp is behind revealed to be behind this big toxic waste spill.
Speaker:Toxic waste, toxic waste spill,
Speaker:Yep.
Speaker:um, that ultimately resulted in the deaths of his dad and her mom.
Speaker:Um.
Speaker:That's actually when they finally say that's how the two of them met.
Speaker:Because the
Speaker:Right.
Speaker:how do these two know each other?
Speaker:Why are they, yeah.
Speaker:Why are they so close?
Speaker:And, yeah.
Speaker:Yeah.
Speaker:I think you're also missing one part.
Speaker:What part am I missing?
Speaker:happened in the this episode.
Speaker:Right?
Speaker:Because didn't Terrell find out information, right?
Speaker:yeah.
Speaker:Terrell, t. T, Terrell, Ty, Tyrell, I think it's Tyrell, right.
Speaker:Finds out that he's not going to be the CTO, right?
Speaker:Is that what you're talking about?
Speaker:And he basically, so I think that's an important part, right?
Speaker:Because as he's waiting, right, so he's supposed to have a meeting with the CEO.
Speaker:Yeah.
Speaker:And as he's like all pumped and ready to go, he goes into the
Speaker:CEO's like waiting area and the CEO comes out and says, I'm busy.
Speaker:I
Speaker:I.
Speaker:we have a good candidate for the CTO.
Speaker:And you just look at his face just like
Speaker:Yeah.
Speaker:all dejected.
Speaker:Now as you leave, I
Speaker:And,
Speaker:if you notice this, but he like to the assistant
Speaker:and he tells him to send the email to him directly.
Speaker:an email to him directly
Speaker:Why is it, why is that relevant?
Speaker:later in the episode.
Speaker:Because he got the email, he got the name of the person and
Speaker:then he starts looking him up.
Speaker:He tracked him on Instagram.
Speaker:He figured out where he was going to be.
Speaker:He showed up at the club and the dude's like, Hey, I didn't know you're into this.
Speaker:He's like, I'm not, I'm here just for you.
Speaker:ends up taking the guy home, right,
Speaker:So he sleeps with the guy to get, to get access to his phone, and
Speaker:it does appear that he's straight,
Speaker:Yep.
Speaker:we, we don't have any other evidence that he's not, and he sleeps with a guy to get
Speaker:access to his phone, which I'm gonna say.
Speaker:Is commitment,
Speaker:Yeah.
Speaker:Well, and he
Speaker:right?
Speaker:wife, right?
Speaker:He's like, I have business to go take
Speaker:Yeah, yeah.
Speaker:Yeah.
Speaker:He lies, lies to his wife.
Speaker:He had business, he had business.
Speaker:All right.
Speaker:Uh, so yeah.
Speaker:So I'm gonna, you know, I'll, I'll applaud him for his level of commitment
Speaker:and then, what he does is when the guy's out of the room, he basically steals
Speaker:the guy's phone, and then from there he basically installs a root kit on it.
Speaker:He makes it such that the phone can be remotely accessed and he later on uses
Speaker:that to be able to read all the emails.
Speaker:And this is the one thing I was surprised about right, is.
Speaker:Hopefully today most people have either biometrics or pins or something on
Speaker:their phones, so then when they are not available or around that, someone
Speaker:Yeah.
Speaker:open up their phone and start using it.
Speaker:Right.
Speaker:Well, he literally opens up his phone, right?
Speaker:opens up the back of his phone.
Speaker:Yes.
Speaker:Yeah.
Speaker:I'm gonna say number one.
Speaker:I'm gonna say that's an Android phone, not an iPhone.
Speaker:You're not opening up iPhones like that,
Speaker:Yeah.
Speaker:and you're not opening up most Android phones like that either.
Speaker:That's a cheap Android phone.
Speaker:To be able to do that.
Speaker:Um, he could have just swapped the SIM card, but that wouldn't
Speaker:have been as cool, I suppose.
Speaker:Right.
Speaker:Uh, you're also not swapping the sim card in a, in an iPhone easily, right?
Speaker:and most of 'em don't even have sim cards.
Speaker:Well, they, I think they have 'em, but they're internal, right?
Speaker:most
Speaker:No.
Speaker:They're all eims now.
Speaker:Yep.
Speaker:Oh, okay.
Speaker:All right.
Speaker:What do I know?
Speaker:And this is where he finds out, okay, who is in the running for the CTO?
Speaker:He finds out it's this woman's husband who is in the office with the CEO earlier.
Speaker:Right?
Speaker:And you could kind of see like the wheels turning in his head.
Speaker:And then later at the very end of the episode, right.
Speaker:His wife is like, we need to make sure that we sort of
Speaker:invite them over to dinner.
Speaker:Right.
Speaker:And you could already see like the wheels turning between the two of 'em.
Speaker:Right?
Speaker:In
Speaker:Yeah.
Speaker:where they're like, yes, we have to figure out how to sabotage this so that
Speaker:other guy doesn't get the CTO role.
Speaker:And you do.
Speaker:Yeah, so, you know, when we think about that again, once again, especially if.
Speaker:If you're in a sensitive role, caution the level of personal
Speaker:information that you put out there.
Speaker:This is where I'm going to dinner.
Speaker:Yep.
Speaker:is where I'm going out.
Speaker:Um, these are the kind of places that I like to go.
Speaker:Um, here's a, here's a picture of me that if you download, you're
Speaker:gonna get all kinds of metadata.
Speaker:It'll tell you exactly where this is.
Speaker:Right.
Speaker:The two generations following me, um, I think you're, you're
Speaker:in the other generation, right?
Speaker:You're, yeah.
Speaker:Um, the two generations following me are much more.
Speaker:You know, used to putting that kind of information out quite
Speaker:a bit, like all day long.
Speaker:Like, here's what I had for breakfast and here's the club that I'm at,
Speaker:and whoa, look at here are the seven different pictures of the seven
Speaker:different clubs I went to and win.
Speaker:Yeah,
Speaker:Um, and just realize that that can be, uh, used against you.
Speaker:And it's not even just like.
Speaker:He was important.
Speaker:It's the fact that he was working in an important role where he was managing the
Speaker:CEO's calendar and other things like that.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Let's go back to the beginning of the episode and talk about that hospital.
Speaker:I think it's interesting that he chose a hospital.
Speaker:I mean, he says, I chose this hospital because of its lack of
Speaker:cybersecurity because he, he knew, he knew sort of what was gonna happen.
Speaker:He knew that, that he was gonna get busted for the morphine
Speaker:and the, and the, and that
Speaker:matter
Speaker:at some point, and, uh, that he, he knew that based on.
Speaker:What he knew about the the guy that, that runs the thing.
Speaker:And that's, I mean, that's it.
Speaker:When you look at somebody who's an actual hacker, right?
Speaker:The level of information that they can get about you, especially once they
Speaker:started doing reconnaissance, right?
Speaker:He's good at sort of, you know, poking in and figuring stuff out and, and, and
Speaker:he definitely got enough information on this guy to know that he would be able
Speaker:to easily get in and change the, the hospital records to make it look like
Speaker:he was clean when clearly he was not.
Speaker:You know what though?
Speaker:That's, that's like very thoughtful,
Speaker:Yeah, he's a super smart dude.
Speaker:You know, he's a super smart dude.
Speaker:He's troubled, he's clearly addicted to drugs.
Speaker:Um, and, um, yeah, but, but he, but he's super smart, right?
Speaker:I, I'd, I'd call him a high functioning, a high functioning drug addict.
Speaker:but some parts of me thinks like he kind of like starts going
Speaker:along like the white hat line.
Speaker:Right.
Speaker:Yeah, yeah,
Speaker:Right.
Speaker:Where he's
Speaker:yeah,
Speaker:for ethical reasons.
Speaker:yeah.
Speaker:Not the hacking of the,
Speaker:Yeah.
Speaker:not the hacking of the hospital, but, yeah.
Speaker:But yeah, so the, the, just the topic to discuss there is just think
Speaker:about the people that work for you, and if these people are responsible
Speaker:for cybersecurity in any way.
Speaker:Uh, you should think twice about underpaying them.
Speaker:Just a thought, right?
Speaker:and then I think the other thing they also mentioned is the guy had no budget.
Speaker:Hmm.
Speaker:like, I think it was like $10,000 a year to spend on it.
Speaker:Security.
Speaker:Maybe that's the number that I was hearing.
Speaker:$7,000 a year is the number that I heard.
Speaker:Maybe that's the number I was hearing
Speaker:and so
Speaker:yeah.
Speaker:especially a hospital or anything of value that you put the same budget towards
Speaker:things like security, data protection, resiliency, that you are for other aspects
Speaker:Yeah, I remember when I go all the way back to, um, you know, my first
Speaker:job with backups, and this was abs
Speaker:back in the day.
Speaker:Um, I remember how much money we would spend for the new sexy server, right?
Speaker:We bought, um, there was.
Speaker:I, I think it was called a T 500.
Speaker:It was an HP HPUX server.
Speaker:It was a T 500, and this thing was, um, huge.
Speaker:It was a hundred gigabytes.
Speaker:It was huge.
Speaker:Um, now, like I have this,
Speaker:Yeah.
Speaker:this, this is a x, you know.
Speaker:card
Speaker:Yeah.
Speaker:An XSD card, micro SD card, and it's 256.
Speaker:Um, but yeah, it was a hundred gigabytes.
Speaker:And what I remember was there was zero discussion about backup
Speaker:infrastructure for this thing.
Speaker:And we were using DDS drives, which were two gigabytes, uh oh.
Speaker:I think it had a DDS two, which meant it was four gigabytes.
Speaker:And I was like, so I'm gonna have to swap tapes 25 times.
Speaker:I remember having that discussion and that was how we, that was how luckily we
Speaker:bought our, our first, um, tape library.
Speaker:But, uh, yeah, it, it, it's very common for things that aren't directly
Speaker:related to revenue, like cybersecurity and data protection to how to be,
Speaker:you know, budgeted down the, and it's your job as a cybersecurity or a
Speaker:backup professional disaster recovery.
Speaker:It is your job to.
Speaker:Bring that stuff out into the forefront.
Speaker:so I remember this was a while ago that in it, there was a study done,
Speaker:I think they said people spend one to 2% of their IT budget data protection.
Speaker:Yeah, that sounds about right.
Speaker:and this was a while ago, but I think though if you now throw in security,
Speaker:cybersecurity and just given everything that's happening in the world these days,
Speaker:Yeah.
Speaker:think, I hope that that number has shifted upwards.
Speaker:Uh, yeah, I think it has, but, but maybe not enough.
Speaker:You know, it depend, it depends on the company.
Speaker:It just, it, I, I've been at companies where like, I can remember a, a
Speaker:meeting where we were discussing the fact that this company didn't have a
Speaker:DR plan, and this was a big company.
Speaker:This was a company that you would absolutely know the name of.
Speaker:Okay.
Speaker:And.
Speaker:Uh, the, the comment was made by a senior manager.
Speaker:Well, like, 'cause it was like, well what happens if a big earthquake comes?
Speaker:'cause this was a Southern California company.
Speaker:What happens if the big earthquake comes?
Speaker:Well, if that happens, if an earthquake that big happens,
Speaker:I'm probably gonna be dead.
Speaker:I won't care.
Speaker:Right.
Speaker:You know, if you, if you have somebody who's like, who's convinced that like.
Speaker:Raid is backup, or we don't need backup or whatever, you know, maybe
Speaker:it's time to wash your hands and walk away right at, at a minimum it's time
Speaker:to very much, very loudly in writing.
Speaker:This is what I think we should be doing and, and what we're
Speaker:currently doing is, is beyond ill advised, you need to do that right.
Speaker:To make your case.
Speaker:And if they ignore you, then maybe it's time to, it's time to move on.
Speaker:Right.
Speaker:Yeah.
Speaker:Um, so all right, so then let's talk about.
Speaker:The
Speaker:Email, right?
Speaker:So this huge, uh, f society, which by the way, I'm basically
Speaker:likening, I I, I hadn't mentioned this in the previous two episodes.
Speaker:I'm basically likening them to anonymous, right?
Speaker:Anonymous uses, um, a um, Guy Faulkes mask.
Speaker:This guy uses this weird looking mask.
Speaker:what.
Speaker:What,
Speaker:Even around anymore, I think they got shut down
Speaker:uh, I don't know.
Speaker:or, or they got
Speaker:I think I haven't, I haven't heard much about him yet.
Speaker:So I think when Mr. Robot was made, whichever, what was
Speaker:like six, seven years ago?
Speaker:Six years
Speaker:Mm-hmm.
Speaker:Mm-hmm.
Speaker:time anonymous was very prevalent,
Speaker:Right, right,
Speaker:think since then they've either been shut down or rebranded
Speaker:to one of the other groups.
Speaker:Right.
Speaker:Whatever it is.
Speaker:And that's why you may not know about it as much,
Speaker:, I haven't seen any videos of anyone like.
Speaker:Yeah.
Speaker:Posting videos of like the stuff that, that they were doing there.
Speaker:But what we have is they, we have this email hack, which,
Speaker:and an email dump, right?
Speaker:We have an email dump of really embarrassing corporate emails that, that,
Speaker:you know, prove essentially that you know, that they did some really bad stuff.
Speaker:do.
Speaker:As I was watching this episode, I remember thinking back, I don't know
Speaker:if you remember Curtis, the Sony hack,
Speaker:Oh, yeah.
Speaker:Sony had their emails compromised and published, and there was some
Speaker:embarrassing information that executives
Speaker:Yeah, they were trash talking talent.
Speaker:Channing Tatum was somebody that, that I was just, I was just looking at it.
Speaker:Channing Tatum apparently got some, some emails about him read, you know?
Speaker:Hmm.
Speaker:Yeah,
Speaker:I think that is kind of what they modeled this
Speaker:yeah, yeah.
Speaker:And.
Speaker:but so
Speaker:And similar to that, basically this was just released.
Speaker:It was like, you know, and so, you know, you wonder wh why, what
Speaker:was the, um, why did Mr. Robot essentially release this email?
Speaker:Yep.
Speaker:And I'd say it was obviously to completely discredit Terry Colby,
Speaker:Yeah.
Speaker:The previous CTO, um, and to just to continue to muck up the waters right.
Speaker:Well, I, I think it was also because until this point, Elliot's
Speaker:kind of on the fence, right?
Speaker:He's like, I want nothing to do with you.
Speaker:I'm stepping away from you guys.
Speaker:Right?
Speaker:And this is kind of like.
Speaker:The nail in the coffin for Elliot, right?
Speaker:Where he's like, screw this.
Speaker:Let's go guns a blazing and go after these guys.
Speaker:Because until that
Speaker:Yeah.
Speaker:he was like,
Speaker:Oh
Speaker:think so.
Speaker:yeah.
Speaker:Okay.
Speaker:So you're, I see what you're saying.
Speaker:This, this was, he wanted Elliot, um, you know, to, to do the thing.
Speaker:And, um, he, he and he, and he, he wants, he wants him to do it willingly.
Speaker:He wants him to come along and he does believe Elliot, as he says, multiply him.
Speaker:El Elliot is the key to this whole thing.
Speaker:The other thing too that I was wondering as I watched this episode
Speaker:was, it's interesting how like Elliot and Allsafe and all the investigations
Speaker:they did, they didn't notice all these emails being exfiltrated.
Speaker:Well, so, so that's a, that's interesting.
Speaker:So there is a, there is a possible reason for that.
Speaker:And we, you know, I, I literally, so I'm, I'm currently, uh, editing my book, right?
Speaker:So the, you know, the, we finished the rough draft and we're editing it,
Speaker:and I was just, it's called learning ransomware response and recovery.
Speaker:Thank you very much.
Speaker:And I, I was just editing the part where just realized that the
Speaker:backup system, not only is it.
Speaker:Um, it's not an attack.
Speaker:Like, it's not the, it's not just the thing that they want
Speaker:to attack because they want to take it out of the mix, right?
Speaker:They want to, they want to take it away from you as a tool to be
Speaker:used after the ransomware attack.
Speaker:It is also the, the kingdom, right, is the key.
Speaker:I had an interesting, um, conversation with one of the, one of, one of the tech
Speaker:editors and, and I was saying that if you had control of the backup system, that you
Speaker:could restore an image of a vm and then you could do things like a brute force
Speaker:attack against the password file without anybody noticing because you restored it
Speaker:like outside the control of everybody.
Speaker:And he's like, why would you do that?
Speaker:And I, I was listening this as like additional reconnaissance
Speaker:that you could do and he, um.
Speaker:And he said, why would you do that?
Speaker:And I said, well, to be able to hack that server.
Speaker:He's like, why?
Speaker:You have the server, you have the vm, right?
Speaker:And I'm like, yeah, I guess you have the keys to the kingdom
Speaker:if you've got the backups.
Speaker:He goes, no, you have the kingdom.
Speaker:Like he's like, you've got everything.
Speaker:And so it's quite possible that one of the reasons that they didn't notice an
Speaker:exfiltration is that the exfiltration was done via the backup system,
Speaker:Hmm.
Speaker:right?
Speaker:Email backups.
Speaker:I, I, it's a double-edged sword.
Speaker:You should be backing up your emails.
Speaker:You should be backing up Microsoft 365 or Gmail or whatever it is that you're using.
Speaker:But the double-edged sword is if you're backing up your emails, um, then tho
Speaker:those are a valuable tool for forensics.
Speaker:So for E Discovery and things like that.
Speaker:And in this case, you know, you could very easily restore, um, you know,
Speaker:all these emails and then, you know, uh, find out what you're looking for.
Speaker:Yeah,
Speaker:Yeah.
Speaker:is true.
Speaker:Yeah.
Speaker:And it is a possible thing.
Speaker:It was just one thing that I just felt that they missed.
Speaker:Right.
Speaker:Just given how much
Speaker:Oh, just talking about it.
Speaker:Yeah.
Speaker:Yeah, because that in general, you, you're right.
Speaker:That, that they, what, who's they?
Speaker:Is they the writers of the show or the or, or, uh, all safe.
Speaker:All safe slash Elliot?
Speaker:Okay.
Speaker:Okay.
Speaker:Yeah, yeah.
Speaker:We'll, we'll, uh, we'll put this in the IMDB category of
Speaker:mistakes made by characters.
Speaker:Right?
Speaker:I dunno if you've ever looked at the goofs.
Speaker:No.
Speaker:Um, I, I love, uh, looking at, I'm a big movie and TV fan, and I love looking
Speaker:on, I mdb love looking at the goofs.
Speaker:And, um, if you're, if you're an Uber nerd on a particular topic.
Speaker:Like cybersecurity, um, you can go in and put this kind of stuff in there.
Speaker:So, all right, so be careful about, so be careful what you put in email.
Speaker:Be careful and be, make sure to protect the backups of your email, right?
Speaker:We talk so much about the cybersecurity of, of, of the, the environment.
Speaker:Make sure about the cybersecurity of your backups.
Speaker:Make sure they're not easily, um
Speaker:also the social engineering aspect.
Speaker:mm.
Speaker:Right.
Speaker:I don't know if people are aware, but there's like this ransomware
Speaker:group called Scattered Spider going around and popping a bunch of,
Speaker:uh, I think banks and airlines and
Speaker:Mm-hmm.
Speaker:Mm-hmm.
Speaker:one of their first ways of getting in is they pretend to be an employee
Speaker:asking for their password to be reset.
Speaker:Yeah.
Speaker:No bueno.
Speaker:Yes.
Speaker:So be
Speaker:Yeah.
Speaker:you post out there about where you work, what you're doing,
Speaker:and other things like that.
Speaker:'cause that may be used against you.
Speaker:Yeah.
Speaker:That's why I tell people I work at Inn Out.
Speaker:Oh,
Speaker:I don't even, I don't even like inn out.
Speaker:I, I mean, I mean, I don't hate it.
Speaker:Okay.
Speaker:I know that's like sacrilege here in California, but
Speaker:No.
Speaker:There's now an uproar.
Speaker:I don't know if you've heard about this.
Speaker:what
Speaker:CEO moved to Tennessee.
Speaker:Oh, really
Speaker:Yeah.
Speaker:She took the company and left.
Speaker:interesting.
Speaker:Interesting.
Speaker:Um, yeah, we'll see.
Speaker:But like my daughter, she, you know, the mo if she, whenever she leaves
Speaker:California, the first thing she does literally on her way home from
Speaker:the airport is getting in and out.
Speaker:I'm like, I don't get it.
Speaker:she get a four by four fries and a shake?
Speaker:Uh, no, I don't think so.
Speaker:I don't think so.
Speaker:Me, I'm a five guys person, but you know, that's just me.
Speaker:All right.
Speaker:Well, another fun episode.
Speaker:Look forward to episode four, aka 1.3 next week.
Speaker:Yes, I am.
Speaker:Then I will now have to go watch it before then, and uh, hopefully
Speaker:you will not spoil it for me.
Speaker:There's computers in it.
Speaker:Curtis, why,
Speaker:All right, well thanks.
Speaker:Thanks, Prasanna.
Speaker:It's been fun.
Speaker:Likewise, Curtis.
Speaker:And thanks to our listeners.
Speaker:You are why we do this.
Speaker:Hope you enjoyed the episode.
Speaker:Hope you learned a thing or two.
Speaker:That is a wrap.
Speaker:The backup wrap up is written, recorded, and produced by me w Curtis Preston.
Speaker:If you need backup or Dr. Consulting content generation or expert witness
Speaker:work, check out backup central.com.
Speaker:You can also find links from my O'Reilly Books on the same website.
Speaker:Remember, this is an independent podcast and any opinions that
Speaker:you hear are those of the speaker and not necessarily an employer.
Speaker:Thanks for listening.