Transcript
Jim Lough (0:00)
Canadians lost a reported $638 million to fraud in 2024. Researchers jailbreak deepseek API and exposed the system prompt and a new SMS phishing scam targets U.S. toll road users. This is Cybersecurity Today. I'm your host Jim Lough. Canadians reported losing more than $638 million to fraud last year, according to the Canadian Anti Fraud Centre. Nearly half of that, almost $310 million, was lost due to investment fraud. Meanwhile, identity fraud was the most frequently reported scam with 9,487 cases. But the report is clear that the real number could be far worse. The Canadian Anti Fraud center estimates that only 5 to 10% of fraud victims report their losses, suggesting that the true total could be in the billions. Regardless, we have some information about the types of frauds that are occurring and although we might not have a complete picture, we do have a better picture of what's happening. After investment fraud, the most common scams were service fraud and bank investigator scams, which impersonate financial officials and resulted in $16.4 million in reported losses. Spear phishing, where attackers use targeted email fraud, cost victims a reported $67.3 million, while romance scams led to $58 million. In addition to reporting this data, the CAFC also has some useful advice on their site. For people who have been scammed or defrauded, it's worth looking at. They do advise Canadians to use strong passwords, enable multi factor authentication and avoid unsolicited financial offers. On this last point, fraudulent investment ads disguised as news stories are a growing problem and some of these look pretty good. In Canada, they impersonate the cbc, our national broadcaster, and do stories that try to hook people in. Now these are appearing on social media and search engines. Are you listening? Facebook and Microsoft Edge on your news page you are replete with fraudulent ads that are going after innocent people. Do something. So I got that off my chest. Authorities are urging Canadians to report scams to law enforcement and the Canadian Anti Fraud center. And if there's an American equivalent to this or a program that I haven't heard about, please let me know at editorialechnewsday ca Glad to report that as well. Researchers have successfully jailbroken Deepseek, an open source AI model from China that made the news last week. They've exposed its hidden system instructions and a lot more. The discovery raises some major security concerns, not just for Deep Seek, but for all AI safety. Wallarm, a cybersecurity firm, found a way to trick Deep Seek into revealing its internal rules and constraints, CEO Ivan Novikov explained. We convinced the model to respond in certain ways, breaking its internal controls. Now, the jailbreak suggests Deepseek safeguards are weaker than expected, raising some concerns about this and other open source models. But in reality, the concern really is with the speed we're moving at AI, are we paying appropriate attention to security? The answer is probably no. The compromised AI may have, and I stress may have even supported some of the claims that OpenAI was making about Deep Seq using its model to train Deep Seek. Though no proof of intellectual property theft was found, the speed of deepsea's development has raised questions, and this breach adds to that. Now, Deep Seek developers have since patched the issue and Wall ARM has withheld the technical details to prevent further abuse. But the incident highlights a broader issue how easily can AI models be manipulated? And as new challengers entered the market, and as everyone's trying to win that AI race and get there first, we may find more examples of where speed trumps security. We have an exclusive interview with Ivan Novikov, which will air after the show. Just stay on after the credits for the feature. We call afterward. And Brian Krebs of Krebs on Security has done an excellent piece on the wave of phishing scams hitting toll road users across the US with fake messages demanding payment for unpaid tolls. Researchers are linking the attacks to China based phishing kits that are adapted to impersonate toll operators with alarming accuracy. Victims receive texts pretending to BE from E ZPass, SunPass or State Toll agencies directing them to fraudulent payment sites. The Massachusetts Department of Transportation recently warned about phishing attacks targeting its Easy Drive MA program. Victims are tricked into entering payment details and one time passwords, allowing criminals to bypass even two factor authentication. The scam has been spotted in Florida, Texas, California, Connecticut and other states, and it appears to be tied to Lighthouse, a China based SMS phishing service that now includes fake toll payment pages among its products. These sites are mobile only, making them harder to detect as scams. In fact, security experts are warning that phishing attacks are evolving. Criminals are now using iMessage and rich communication services RCS to bypass spam filters, making these messages look even more legit legitimate. The FBI urges users to report phishing attempts to the Internet crime complaint center IC3 and never never click on unsolicited texts. But the bottom line texts are a new attack vector. They are finding ways to get past screening and we have to train ourselves and our users to be very, very skeptical and very cautious when they respond to A text, especially an unsolicited one. That's our show for today. Stay tuned for afterward and hear our interview with Ivan Novikov. I'm your host, Jim Love. Thanks for listening. And now welcome to Afterword. My guest today is Ivan Novikov, CEO of Wallarm, a security company that specializes in API security. They've recently done a major study on API security and found some major vulnerabilities, particularly in Deepseek, which allowed them to download the entire system prompt and more. I hadn't heard of Wallarn before and maybe that's my failing, but can you tell me a little bit about the company? Because you've hit me twice in a week now. I got a great study from you on APIs, really liked it, very detailed, very great. And then this press release today. So tell me a little bit about the company.
