How not to steal $46 million from the US government

How not to steal $46 million from the US government

A Wikipedia security engineer accidentally wakes a dormant JavaScript worm that hadn't stirred since 2024 - and within minutes, giant woodpecker images are plastered across the internet's favourite encyclopaedia.

Meanwhile, a crypto contractor hired to help the US Marshals manage seized digital assets allegedly decides to help himself to $46 million of it - and then brags about it on a recorded Telegram call.

Plus: Graham champions Asterix, Trisha discovers the fantasy novels of Robin Hobb, and someone called "Lick" ends up in the nick.

All this, and much more, in episode 458 of the "Smashing Security" podcast with cybersecurity veteran Graham Cluley, and special guest Tricia Howard.


EPISODE LINKS:




SPONSORS:

  • Vanta - Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
  • ThreatLocker - Start your free trial and book a demo of ThreatLocker today to see how you can implement Zero Trust in your environment.
  • Meter - Network infrastructure for the enterprise. Get a free personalised demo.


SUPPORT THE SHOW:

Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.

Become a supporter! Join Smashing Security PLUS via Patreon or Apple Podcasts for ad-free episodes on our early-release feed!


FOLLOW THE SHOW:

Follow us on Bluesky or Mastodon, or on the Smashing Security subreddit, and visit our website for more episodes.


THANKS:

Theme tune: "Vinyl Memories" by Mikael Manvelyan.

Assorted sound effects: AudioBlocks.





Privacy & Opt-Out: https://redcircle.com/privacy

Jaksot(464)

Zoom.. just one click and your data goes boom!

Zoom.. just one click and your data goes boom!

Graham explores how the Elusive Comet cybercrime gang are using a sneaky trick of stealing your cryptocurrency via an innocent-appearing Zoom call, and Carole goes under the covers to explore the extr...

23 Huhti 202533min

Hacking the hackers... with a credit card?

Hacking the hackers... with a credit card?

A cybersecurity firm is buying access to underground crime forums to gather intelligence. Does that seem daft to you?And over in Nigeria, even if romance scammers would like to update their LinkedIn ...

16 Huhti 202533min

Signalgate sucks, and the quandary of quishing

Signalgate sucks, and the quandary of quishing

QR codes are being weaponised by scammers — so maybe think twice before scanning that parking meter. And in a blunder so dumb it makes autocorrect look smart, the White House explains how it leaked wa...

9 Huhti 202555min

The fall of Troy, and whisky barrel scammers

The fall of Troy, and whisky barrel scammers

Renowned cybersecurity expert Troy Hunt falls victim to a phishing attack, resulting in the exposure of thousands of subscriber details, and don't lose your life savings in a whisky scam...All this an...

2 Huhti 202552min

Unleash the AI bot army against the scammers - now!

Unleash the AI bot army against the scammers - now!

A YouTuber has unleashed an innovative AI bot army to disrupt and outwit the world of online scammers, and a New York Times investigation looks into the intricate web of global money laundering.All th...

26 Maalis 202533min

Peeping perverts and FBI phone calls

Peeping perverts and FBI phone calls

In episode 409 of the "Smashing Security" podcast, we uncover the curious case of the Chinese cyber-attack on Littleton's Electric Light Company, and a California landlord's hidden camera scandal. All...

19 Maalis 202535min

A gag order backfires, and a snail mail ransom demand

A gag order backfires, and a snail mail ransom demand

What happens when a healthcare giant’s legal threats ignite a Streisand Effect wildfire… while a ransomware gang appears to ditch the dark web for postage stamps?Find out about this, and more, in the ...

12 Maalis 202532min

HP's hold music, and human trafficking

HP's hold music, and human trafficking

Journey with us to Myanmar's shadowy scam factories, where trafficked workers are forced to run romance-baiting and fake tech support scams, and find out why a company's mandatory hold time for tech s...

5 Maalis 202553min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
ootsa-kuullut-tasta-2
rss-ootsa-kuullut-tasta
rss-pinnalla
rss-vaalirankkurit-podcast
tervo-halme
rss-podme-livebox
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
rss-asiastudio
aihe
the-ulkopolitist
otetaan-yhdet
et-sa-noin-voi-sanoo-esittaa
rss-girls-finish-f1rst
rikosmyytit
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit
rss-50100-podcast
linda-maria