
Loading summary
Chris Williamson
What's happening with Scattered Spider?
Joe Tidy
Well, Scattered Spider is the name of this very loosely coordinated collective of hackers that are, we think, currently causing havoc around the UK and the US as well. So I don't know if you've heard about the news of the M and S cyber attack and the Co Op cyber attack. So there's a really big. If you're not in the uk, there's a really big chain of supermarkets called M and S, very much loved, over 100 years old, one of the pillars of the high street. And around Easter time, there was a cyber attack which started causing problems for Ms. And it just got worse and worse and worse for them because initially they said, actually we can't take orders on the Internet, which for a massive company like M and S is really bad. Then we started seeing logistics problems, empty shelves in some stores. And then around this same time, there was a very similar attack on the Co Op, again, another big supermarket chain in the uk. They also do funeral services and insurance as well. That attack wasn't as bad. But again, we're seeing disruption at stores, empty shelves, real chaos behind the scenes. And around the same time we saw an attack on Harrods, obviously, the luxury retailer in London. So everyone's wondering what on earth is going on? And things have got progressively worse. And then we hear the last couple of days there are attacks on US retailers as well. And everyone is pointing towards this really infamous group called Scattered Spider. And they're not a normal cybercrime gang. They haven't named themselves that. They are, you know, not very organized. They come together on Discord and Telegram, a little bit like. Have you heard of Anonymous?
Chris Williamson
Yes.
Joe Tidy
Yeah. So they're a little bit like that, but more out for cybercrime and money and infamy than sort of hacktivism. So One company called CrowdStrike started looking at this activity coming from this sort of corner of the cybercrime ecosystem. And they said, who are these people? They're doing the same kind of tricks to get into places. So they nicknamed them Scattered Spider. Spider's the name that CrowdStrike gives cybercrime groups. And scattered is. Is what they. The term they give for, you know, because they're loose and they're all over the place. And actually, I'm looking right now at the CrowdStrike scattered spider figurine. It's very controversial, actually, that they've done this, but here you go. So this is the. So they sell these on their merch website. And like I say, quite controversial, actually, because it Kind of glamorizes these guys. And there are some people who say we shouldn't really glamorize cybercriminals because the type of individuals that we think scattered spider are very young, probably teenagers in the US and uk. They will love the attention of having their own figurine.
Chris Williamson
Do you think that social media platforms like Twitter have sort of changed what hackers motivations are from just exploration or exploitation to now fame, cloud chasing, stuff like that?
Joe Tidy
Absolutely, yeah. When I wrote this book, my publisher, on the first draft, my publisher said, yeah, that's all great, but can you answer some questions as to how this has happened and why this has happened? And they really kind of challenged me. And I work for the BBC, so normally, you know, we've got to be very careful about giving opinions and, and putting our necks on the line in terms of theories about things. But it was quite good because I landed on this. There are two kind of factors which I think have turned teenage hackers from largely benevolent groups of people that are out to, you know, they're out to, to make a name for themselves, but they're also out to make the Internet a safer place to where we are now, where we've got cybercrime gangs, teenage gangs that are causing mayhem and trying to make money. And I think Twitter is a very. That you could kind of see at that point when Twitter becomes mainstream, this shift starting to take place. Because of course, before Twitter, social networks were about being social with your network, whereas Twitter sort of invented the idea of followers and retweets and likes and, you know, clout online. And that's when we started seeing, in 2011, when Twitter was really on the ascendancy, we saw LulzSec, the first of this conveyor belt of teenage cybercrime gangs.
Chris Williamson
Yeah, there's no one flexing their recent ransomware exploitation on their personal Facebook account, that wouldn't work. But on Twitter that would be great.
Joe Tidy
Yeah, absolutely. And we know from interviews with arrested hackers and convicted hackers, they loved it, they loved the attention back then. And I think where we are now is slightly different because I think what we're seeing is they have come off Twitter, or X, whatever they're calling it, and now it's more in the kind of insular communities. But they're still after that online clout and that infamy. It's just they're in their own channels. In Telegram and Discord.
Chris Williamson
I was going to say, where do these people live?
Joe Tidy
Yeah, Telegram and Discord. Yeah. So if we're talking about Scattered Spider, which very much formed the last part of my book because I talk about the kind of this gradual shift to where we are now. But Scattered Spider, they're part of this larger collective known as the comm, the community, which is a group of thousands of online delinquents, really largely boys, obviously. It always is. And they're causing mayhem and in some cases doing some really nasty stuff, like sextortion. Do you know what sextortion is?
Chris Williamson
No.
Joe Tidy
So sextortion is this horrible sort of criminal harassment campaign where you trick someone into sending you nudes. So I would, I might befriend someone on the Internet and strike up a relationship, a romantic relationship, send them some nudes that they think are of me, but I'm a criminal, I'm a man, not the young girl they think I was. Convince them into sending me nudes and then you start extorting them, saying, if you don't pay me, then I'm going to release all these pictures. So we see that kind of activity in the comm and we see some really nasty stuff. Some other stuff. Like there's some. It's really nasty, but like cut signs. Have you heard of cut signs?
Chris Williamson
No.
Joe Tidy
So like, you know a fan sign where if you're a big fan of someone, you will hold a sign up saying I love them or you hold their name or their band name. A cut sign is like that. But you literally cut into your own skin. The names of hackers, the names of hackers that are extorting you or.
Chris Williamson
Wow. So the hackers are saying that you need to show me that you've self harmed my name into your arm.
Joe Tidy
Yeah. To show devotion or to make them feel powerful. There's a. Excuse me. There's a, a bit in my book where we. There's a gang called Lizard Squad that was around in 2014, 15, and they destroyed someone's online life. They hacked all of this kid's accounts and in order to get them back, he had to make a cut sign and say, lizard Squad made me do this. So although people are really shocked about what we're seeing in the comm now, this kind of activity has been around for a while. We know it's there. We've got the history for it. So Scattered Spider are part of this larger online cyber crime nastiness. They're a very kind of small niche of this much larger group of largely unskilled cyber people. You wouldn't even call them cybercriminals. But then they come together with a little Bit of skill and a lot of balls and take on these big hacking campaigns it seems.
Chris Williamson
I don't know. I have to assume that although MNS is a hundred year old institution, I would like to think that their cybersecurity isn't 100 years old. How, if you've got to have someone with talent, I assume. How do they get into a system of any kind? Is this cyber hacking or is this social engineering or is this some combination of the two?
Joe Tidy
Yeah, it's a combination of the two. I think the initial entry is usually through social engineering. But to be honest with you, I mean a lot of hacking is that to get into a system. It's not really like in the movies where you kind of hunch over a laptop typing code furiously to get in. Normally it starts with like an email that you can trick someone into downloading an attachment. Or you call up this, this is what we think happened with the latest attacks is that they call up the IT help desk and they pretend to be a member of staff and they say, you know, I forgot my password, can you let me in please? And it sounds so stupid, but it works. And then what? That what often happens is once they are in, that's when you would argue the hacking starts. That's when they find a vulnerability that allows them to spread themselves throughout the network. Deployment ransomware, which is this type of malicious software that scrambles a company or a victim's computer and systems and servers, makes that data completely unreadable, useless, brings computers to their knees and that is where they send the ransom note saying if you want the key, pay us in Bitcoin certain amount and we'll give it back to you. And ransomware is by far the number one problem in cyber right now.
Chris Williamson
Right, so this is social engineering. Pretend to be Julie from the front fucking from reception who's locked herself out. Find the person who is sufficiently gullible or doesn't stick to protocol and actually allows you in in some ways then you've got access to some intranet type system. That means that you can access other bits, maybe some more sort of spreading from there, I would imagine maybe you as that person emails someone else an attachment which gets you more access to higher admin level.
Joe Tidy
You're cybercriminal.
Chris Williamson
Look, what can I say? I'm. I am a young British man, but no, I mean my password manager's a fucking mess, so I would be bad at that.
Joe Tidy
It's good that you've got one. Yes, you're way step ahead of most people. If You've got a password manager.
Chris Williamson
I had. Who was the FBI's most wanted guy? That hacker for a while.
Joe Tidy
Fuck Kevin Mitnick?
Chris Williamson
No, maybe he was on the show probably about three years ago or so. And, you know, he'd gone through all of this stuff that he'd done. He'd broken himself out of jail twice and all of this bullshit. And I got to the end of it and I was like, hey, man, I'm fucking terrified. Like, what do I do? And he's like, dude, just use a password Manager. Like, the TLDR9010 solution is just get a password manager and use that.
Joe Tidy
So, uh, someone once said to me, there are. There are buckets of how difficult you are to hack. And hackers will always go for the easiest bucket. Who can I hack? Who uses the same passwords across multiple accounts? Who uses weak passwords? If you take yourself out of that easy bucket into the slightly harder bucket, massively reduce your chance of getting hacked.
Chris Williamson
Yeah. Why? Like, even if you're the target, but you're a difficult target. There's so many more easy targets. Fuck it, we might as well go for them. Okay, so ransomware, what this is, this can just totally debilitate computer systems companies. If MNS can't get eggs on the shelves, it seems it's pretty comprehensive.
Joe Tidy
Yeah, absolutely. Ransomware completely cripples an organization. It's like going back to medieval times. You're pen and paper. You really are. And sometimes we've had situations where ransomware has hit hospitals, for example, and they can't even function in any way. You'd imagine. Like some of the systems, some of the scanning systems they use in hospitals, for example, they've been infected by ransomware, so they're down as well. So, yeah, I would not want to be in an organization where they've been hit with ransomware. MNS is going through a tough time.
Chris Williamson
I wonder whether, or probably more likely when we will see the first vehicle hack. Autonomous driving vehicles. I was in an. I drove from Palm Springs to Newport beach last week.
Joe Tidy
Very nice.
Chris Williamson
And I was in a. It was lovely. I mean, it was way too hot in Palm Springs, but. And I was in a Nissan, a rented Nissan Rogue, a new one. And it had normal, run of the mill, medium level trim Nissan Rogue. And it had this radar guided cruise control and lane assist that was keeping in lanes and would, if you just knocked the indicator on, would allow you to change it. I was like, this is assisted autonomous driving in a fucking Nissan Rogue. Right? Old school, petrol, 2 liter chug chug, chug. American car, like Japanese American car in America. And I just remember thinking, I've been in Waymo's. Waymo is now available on Uber here in Austin. And I thought, holy shit. Like if these ransomware attacks, you need. As the level of kinetic importance to people's lives increases, the level of security around those systems needs to increase in kind. I have to assume you've thought about this autonomous driving and the potential risks to cybersecurity.
Joe Tidy
Yeah, yeah. We haven't seen anything like you're talking about, but I mean, yeah, it's just, it does seem almost inevitable that someone will find a way to cause havoc with autonomous driving. It's, it's a bleak thought. But of course the companies that, that are behind these, these cars, they know that too. And you hope and, and you pray that they are pretty much on top of security.
Chris Williamson
Have you ever got to the, We've got to the point of hope and prayer as a forget your password manager, just get on your knees and know.
Joe Tidy
Have you read a book called Robopocalypse?
Chris Williamson
No.
Joe Tidy
It's, it's so good. Spielberg brought the rights to it a few years ago. He never actually did anything with them, but it would make and is going to make an awesome movie if they ever make it one day. So in that, in that book it's about how AI kills us all. And the, one of the ways that they initially get that first kind of like 50% of humanity dead is they take over the driverless cars. And the description of what can happen is it's always stuck with me. But not to scare anyone. That's not gonna happen. It's gonna be fine. It's gonna be fine. They are super duper cyber secure, I'm sure.
Chris Williamson
Yeah, well, yeah, up until you're reporting on it for BBC News, mate. And then I'm going to ring in, I'm gonna say Joe said to me, I'm locked inside of my Tesla, which I don't yet own in Austin, Texas. People from outside are trying to Molotov cocktail it. People from inside are trying to hack it. I'm okay, so on that point there.
Joe Tidy
Was, there was very recently, only like three weeks ago, some tech CEO in some American company city, I can't remember which one, it was a self driving city.
Chris Williamson
So whatever, maybe San Fran or Austin.
Joe Tidy
Or something, something like that. He was stuck in one of these cars and it just kept going around the, the car park and he couldn't get it to stop. And it was funny but also like.
Chris Williamson
Bit Worrying I've got, look, you're the guy for me to give this take to. I've said this before, but I have switched off the autonomous toggle on Uber in Austin. So you just. It's on. On the back end of the settings. Do you want to be more likely to be matched with an autonomous vehicle? And I've said no. Reason being, every time that there is a vehicle that's 10 minutes away, that's a Awaymo, it takes 20 minutes to get to me every single time. And every single time that we do the journey, they say it's going to take 15 minutes for me to get home from the east side of town or whatever. And it always takes nearly double. And I realized why. And it's because Waymos outwardly are so obvious. They're these big, like bulbous, clunky things. Blidar on top and, you know, additional Jaguar shit. And it's white, right? So it really stands out. I think there's two reasons why humans behave on the road. One is because of fear of retribution, especially in America with a very heavily armed populace. And the second one is guilt at sort of inconveniencing somebody else. So it's safety and human fucking decency, I suppose, as the two. The problem is when you see a Waymo, there's no one in the driver's seat and you can't see if there's anybody in the back. So they just get cooked at every single junction, no one lets them out. Everybody's like, pedestrians will just. I will too. When I go on a walk around Austin, I'll just happily walk out. I'm like, it's 100ft away. It's going at 30 miles. It'll slow down. I'll be fine. You wouldn't do that if there was a human driving the car. So it means that until you can program in retributive tailgating and beeping the horn and flashing the lights from the Waymo to somebody else, or until you end up with more than 50% of the cars on the road being autonomous, you don't have this level of coordinate. It's an arms race, right? It's an arms race of like being mean as drivers. And unfortunately, the Waymo has come without any ammunition. Tesla self driving people got a hold of this take online and said that that's different because Tesla self driving is trained on real drivers. So you do have more natural merging, sort of more aggressive driving styles, a built in. Because competent drivers are the drivers that this is being built on. Whereas Tesla focused on software, Waymo focused on hardware. And yeah, with Waymo it's just, it's like being in the back of the car with your mum all the time.
Joe Tidy
Is that Tesla thing true? Have you done a comparison?
Chris Williamson
No, I've never been in a Tesla that's got full self driving. But I also know that the Tesla full self driving community online is like very evangelist, it's like oddly militant. So I don't know, I guess I'll wait and see until I get into one. But yeah, that's my current working thesis on autonomous vehicles.
Joe Tidy
I thought you were going to say you don't do that because of the safety concerns, but actually yeah, I also thought you were going to say they're slow because they're slow and they're very safe, aren't they? But no, I hadn't appreciated other people on the road.
Chris Williamson
Before we continue, if your sleep's not been right, you're taking ages to nod off. Waking up at random times and feeling groggy in the morning. Momentous sleep packs are here to help. They are not a typical knock you out supplement that's just overloaded with melatonin. Only the most evidence based ingredients are perfect doses to help you fall asleep more quickly, stay asleep throughout the night and wake up feeling more rested and revitalized in the morning. Which is why I take these every single night and why I trust Momentous with my life or at least my sleep. Because they make the highest quality supplements on the planet. What you read on the label is what's in the product and absolutely no nothing else. And if you're still unsure, they've got a 30 day money back guarantee so you can buy it completely risk free, use it every night for a month and if you do not like it for any reason, they'll just give you your money back. That's how confident they are that you'll love it. Plus they ship internationally. Right now you can get a 35% discount on your first subscription and that 30 day money back guarantee by going to the link in the description below or heading to livemomentous.com modernwisdom and using the code modernwisdom at checkout. That's L I V E M O M E N t o u s.com ModernWisdom and ModernWisdom a checkout going back to the youth. These youths online. I think I've heard you say that today's youth hacking culture has tipped from chaotic good into chaotic evil. Apart from clout, is there anything else that's triggered some moral decline in this scene.
Joe Tidy
Yeah. So we mentioned earlier about the rise of Twitter. I would put that very much as one of the reasons we've seen this shift. I would also say the rise of bitcoin as well. Because if you think about when bitcoin started becoming valuable and useful as a store of value or as something you could buy things with, sort of 20, 11, 12, 13, that's when we saw this shift. And certainly looking at some of the people I do in my book, they go from not even thinking about money, just doing it for the, for the lulls and for the clout, to thinking, hang on a minute, I can make some money here. And as soon as you start introducing bitcoin into the lives of young teenage boys, you're looking at trouble.
Chris Williamson
So without cryptocurrency, would this be even harder?
Joe Tidy
Again, yeah, I think without cryptocurrency, a lot of cybercrime that happens these days would be a lot harder. Because the great thing about crypto, of course, if you're a cybercriminal, is that I can steal crypto or I can extort crypto from someone and then it goes to my wallet and people don't know who I am, no banks can stop that. And if I can find a way, and it's becoming harder now, but if I can find a way to launder that bitcoin, I can get it out of the system, turn it into money I can use. Happy days. If without bitcoin, you get things like bank card fraud, that kind of thing. And we did see that in some of the early days of hacking, but of course that's easy to trace and track and stop if you're a bank. And one of the guys in the book, the main hacker that we follow, who started as a teenage cyber criminal, ended up becoming one of the most wanted criminals in the world. He started by carding, which is where you take credit cards and you use the numbers and the details to spend without the owner knowing. And the banks usually reimburse the owner. And what's interesting about that is they, when they first arrest him and they're going through all the bank receipts, they work out he spent about €33,000, which you'd think like, that's quite a lot of money for. I think he was like 15, 16, and when you look at the things he's spending the money on, it's of course what you would do. We've both been 14, 15 year old boys. It's PlayStation games, it's the latest Phone. It's Netflix subscription. He even went and bought some land. He brought like a little bit of land. Call himself a lord, like his highland titles. And you know that's what you would do if you had unlimited money. But of course the problem with that is when you get arrested, it's all there and the police have got it all. And you know, it's very hard to hide from. Whereas cryptocurrency makes that way easier. The other way that you could do it. I'm not giving anyone any ideas because this is how some cybercriminals work is through gift cards. So you don't say to someone, send me $200 in a ransom, for example. You say, send me $200 worth of gift cards and then you can sell those online for $190. So then you get, you know, you have to shave a little bit off each time.
Chris Williamson
Oh, okay, that's interesting.
Joe Tidy
But they're untraceable. So.
Chris Williamson
You'Ve said teenage hackers are sort of a kind of digital cartel. Should we be thinking about them more like organized crime than bored kids in bedrooms? What's the tension there?
Joe Tidy
Well, I think modern ransomware groups, for example, these really, really well run, highly organized, money oriented gangs, like, I don't know, Evil Corps or Lockbit, there's loads of them. Conti was another one. They are like modern cartels. They are run with, you know, there's a, there's someone who develops the malware, there's someone that sends out the phishing emails, there's someone that does the extortion negotiations. There's 24,7 customer service on the darknet websites for these things. But the teenage hacking gangs, they are slightly different. They're becoming more organized now with the likes of Scattered Spider. But it is a different type of culture. It's more of a hacking culture than a, than a hacking organization. I wouldn't necessarily put them in the same bracket, but certainly if you look at the rise of the teenage hacking gangs, every single step of the way, they've been underestimated. There's a researcher called Alison Nixon who she features quite a lot in my research and she came up with this new phrase for these types of gangs. She calls them NPTs, which stands for Noob Persistent Threats. So they're newbies and noobs, but it's play, it's a play on this very famous and well used term, apts, which stands for Advanced Persistent Threat. So she's sort of poking fun at them, but she says, you know, they're not Advanced, but they are persistent and they are a threat and we should take them seriously. And to be honest, I've been doing this job quite a long time now and we don't, we don't take them seriously. Every time there's a case like we're seeing right now in the uk, people are shocked. How can this be done by teenagers from their bedrooms? Well, we know from history that this is how they work.
Chris Williamson
They've just rolled the dice enough times, they just keep on going.
Joe Tidy
Yeah. And also they don't really care about getting caught. This is the other thing about these teenage gangs. Unlike the cybercrime gangs that are based in Russia or places where, you know, law enforcement in the west can't really get them, these guys are very grabbable, they're very gettable. In the last about year and a half, there's been six arrests of teenagers and sort of early 20s hackers that are thought to be from the scattered spider culture or community because they're in the uk, in the US and they don't, they don't protect themselves very well. They don't actually disguise their voices when they call up IT desks, pretending to be someone else, stuff like that, you know, like, it's called operational security. And These groups, these NPTs, are terrible at it because they don't seem to care.
Chris Williamson
What are the patterns or dynamics about how young kids get pulled into these communities online? What's the typical trajectory of one of these people?
Joe Tidy
It's nearly always the same. Every single hacker I've ever met has had the same pathway. It's computer games. So Minecraft or runescape or whatever it is, probably Fortnite these days, probably still Minecraft, it's so popular, so you get into gaming and you play with your mates and then you start wanting to be better, so you buy some extra bits for your character or you find some shortcuts, some cheats. Then you find yourself on a hacking forum and you find ways to become better at the game and cheat the game. Then you find yourself sort of drawn away from the game and drawn towards more fun ways to have fun on the Internet, I. E. Hacking. And it always starts off as just a bit of fun. See what happens if I type that in there? What happens if I go into this server over here? Oh, where am I? This is exciting. And then it's, oh, quick, you escape. Oh, that was, that was wrong, I shouldn't have been there. And then it's, hang on a minute, what else can I do? And then it goes on from There and then as soon as you start bringing money into it, Bitcoin, then it can quite quickly become serious cybercrime. And that is the path that I've personally seen speaking to all the hackers I've interviewed over the years, but also the NCA, the National Crime Agency. In 2015, they did a kind of massive research of all the convicted cybercriminals and it was exactly the same. It was step one gaming, step two gaming cheats, all the way down until serious cybercrime. So it is a cliche, but it's true.
Chris Williamson
Where are most of these people you mentioned? Russia. I always, when I think hacking group, I just think, oh, it's the, what is it, IRA or whatever in Russia or some.
Joe Tidy
Oh, gru, gru, sorry, whatever. There's loads of them, loads of acronyms.
Chris Williamson
What is it? Where are the role of these. You mentioned these two notable, or at least scattered spiders notable because they're primarily English speaking in the US and the uk, but. But that, that's a rarity.
Joe Tidy
I guess it is, yeah. That's probably why they're so interesting as well. Because we're like, well, hang on a minute, they could be upstairs in the bedroom. So if you're looking at the kind of, if we take the whole cybercrime ecosystem, these are the people that are out to make money, defrauding, stealing money, extortion, ransomware, all that kind of stuff, they could be anywhere. But the biggest gangs are organized and run, we think from Russia, Eastern Europe. And we know this because there are lots of kind of like hints that you get. So for example, I spoke to a guy who deals with ransomware negotiations and I said, how can you be so sure that they're in Russia? And he said, well, they speak and they plan in Russian on Russian forums, they work in Moscow hours and they don't ever answer you on public holidays in Russia. So, you know, there's a few hints there. But of course the actual affiliates, the people that are carrying out the everyday attacks, we don't know where they are. They could be anywhere. And there was a very famous arrest of an IT expert in Canada who was, you know, an upstanding citizen of the Canadian IT scene and he was working for a Russian cybercrime gang called netwalker. And I actually on that one it was really interesting because someone, one of my contacts sent me the negotiation portal for when netwalker was extorting this university. And it was during the pandemic. And I was, over the course of about three weeks, I watched this negotiation this extortion take place.
Chris Williamson
What do you mean? By the portal? Like a chat. Like a private chat type thing.
Joe Tidy
Yeah. So if you get hit with ransomware, you'll have on your screen, on your computer, or pop up saying, hey, you've been hit by ransomware. Go to this Darknet website, which is like a jumble of numbers and letters, dot, onion, and we can start the. Start the negotiation. They always. It's really, really kind of like irritating and frustrating, but they always, like, frame themselves as. We are here to help. Follow this link. We will help you. You know, we'll get you through this. And of course, they're the. They're the bastards who are trying to. You did it. But it was fascinating watching this networker ransomware group extort San Francisco. I think it was. It was the Southern California University or something. And they were like, this is during the pandemic. We are working on a vaccine. Please, we haven't got any money. Leave us alone. And they're like, how much you got? And they're like, oh, no, $750,000. That's nothing. I can't even buy McDonald's with that. Send more. And it ended up. They paid, I think it was $1.2 million to these guys anyway, so he turned out to be in Canada. But most. We think if you look at the arrests, they could be anywhere, but they are normally based in Russia. Then you've got North Korea. They are very, very big on the hacking scene. But what's really interesting about North Korea is they're the only country that. That we know of in the world, that as well as doing cyber spying, which we all do, every country does it, UK and US all over it. But North Korea does that. Plus they steal cryptocurrency. And they are very, very good at it. They just stole. Oh, my. What was it now? I think it was like. I can't even remember. It was. It was. It was like 1.5 billion.
Chris Williamson
The country of North Korea, or the.
Joe Tidy
Country of North Korea has a cyber team that. They've always denied this, of course, but they have a cyber team that is dedicated to making money for the regime by hacking. They used to do banks, but now they do cryptocurrency companies. But they're unusual. Most countries don't have that. Most countries just have their cyber spies and they're out to project power, steal secrets. In some cases, they'll be used in military. So Russia, we know, has hacked against Ukraine in the war, for example. But most cybercrime is done by Criminals who could be anywhere but are. Yeah, largely kind of organized in Russia and Eastern Europe.
Chris Williamson
Why is that area of the world such a hotbed? Have they got lax internal scrutiny from the law enforcement? Is it sort of side eye allowed by the state to try and fuck up everybody else? What's going on?
Joe Tidy
Well, yes. So there's this golden rule if you're a Russian cybercriminal, which is you do not hack Russia or former Soviet states. It's like a kind of unwritten rule. If you do, you get in lots and lots of trouble. And there was a cybercrime gang called Revil or Are Evil. And they were allowed to kind of just run amok for years and years, hacking left, right and center Western companies, causing huge amounts of problems. But then, so the story goes, they accidentally hacked Russia and then suddenly there were some arrests. So, yeah, there is that kind of, that kind of culture in Russia. Obviously, the Russian government denies this every single time it comes up. There was this, this summit between Biden and Putin. When was that? Now? 2021. I think it came off the back of some absolutely horrendous ransomware attacks, one of which was against Colonial Pipeline, which is a really important part of the US petrol and oil infrastructure. And it meant that there was shortages at pumps and panic buying and there was no fuel going up and down the East Coast. So this conversation between Biden and Putin, according to him, was like, you've got to stop your people hacking. This is no good. And Putin was like, it's not us, we get hacked too. But the evidence really is not really there for that.
Chris Williamson
This episode is brought to you by whoop. Your body is constantly sending you signals, but without real data, it's easy to overtrain, under, recover and miss your best performance. Which is where Whoop's brand new 5.0 comes in. It is the newest version of the wearable I've trusted for like 2000 nights now, giving you everything that you need 24. 7. Tracking of your heart rate, your sleep, your recovery, your workouts, and more. All translated into clear, personalized, simple data. And now it's 7% smaller. It's got 14 days of battery life, healthspan to track your pace of aging, and hormonal insights for women who want smarter support during their cycle and pregnancy and all of that stuff. Basically, it is everything that was awesome about whoop, plus tons of new tools to help you optimize your health and performance. Right now you can get the brand new Whoop 5.0 by going to the link in the description below by heading to join.whoop.com modern wisdom. That's join.whoop.com/modern wisdom. How close are we to seeing cyber attacks being treated as act of war?
Joe Tidy
Oh, well, there's this. Yeah, there's this thing called, I think it's Article 5 in NATO, which means that when you get attacked and it's a confirmed attack, then everyone else is, you know, piles in and it's one of the founding, you know, parts of NATO, one of the tenets. And some people have said what we've seen in, in Ukraine, sorry, in with the attacks against Colonial Pipeline and others is, oh, could this be Article 5? There was another attack on US government Solar Winds attack, thought to be from Russia. People are saying maybe that crosses the threshold, but I think people are very, very scared to bring cyber in the same, anywhere near the same kind of seriousness as a, as a missile, when in fact, sometimes the damage can be, you know, can be just as bad.
Chris Williamson
What was that one that tried to get. Was it Iranian nuclear reactors? And it waited around the Stuxnet? Can you tell me the story behind that?
Joe Tidy
Oh, just like, unbelievable. You have to take your hats off to them. So Stuxnet was a, an attack by. They've never admitted it, but Israel and the US against Iran and they were very worried about the uranium enrichment helping to create nuclear weapons for Iran. So according to the story, the President at the time said, right, well, what can we do to slow them down? And someone said, let's hack them. And the Stuxnet virus was so specifically and perfectly targeted that it only infected that certain system. And I think they spread it through USB sticks or something. They dropped them in the car park. Absolutely brilliant. It's dumb, but it works. That's what they always say in cyber. It sounds dumb, but if it works, it's not dumb. And it managed to get inside the system of this very specific machinery that they were using in the Natanz refinery. And it sped up the refinery centrifuges so fast that it caused, apparently, we don't know because obviously Iran would never admit it, but we think it caused physical damage and potentially broke some of those centrifuges and slowed them down. We don't know how much it slowed them down. We don't know how much damage was done, but it's largely been you know, hailed as one of the most impressive cyber attacks of all time, didn't it?
Chris Williamson
It was infected some insane percentage of computers around the world as well. Loads and loads of machines had it, but it just. It didn't do anything. It was just. Is this. Is this computer attached to an Iranian nuclear facility? No. All right, just chill out. Nothing for you to do. Maybe you'll get. Maybe you'll meet someone in future. That is. And it just did that over and over again.
Joe Tidy
That's it. And it's really targeted, really precise. And there have been cases where a country is blamed for releasing something like that, you know, an uncontrollable worm that's got out of hand. So there's this one called NotPetya, which was 2017, I think it was. And it was. Well, again, Russia would never admit this, but it was thought to be from Russia against Ukraine. And they hacked into a really popular accountant accountancy sort of software that the Ukrainians used, and it was a worm that spread uncontrollably. And it was a fake ransomware. So normally the thing comes up and it says, pay this and you'll get your files back. But with Notpetya, it was a shredder. It was fake. Even if you paid, you wouldn't get anything back. And that spread from Ukraine all over the world. Hundreds of countries affected by this, and it caused, they think, the most damage of any hack ever. I can't remember the figure now, but it was. I know one company lost a billion. Maersk, the logistics company, they were back to pen and paper. So they had ships coming into harbors. They didn't even know what was on the ships. They didn't know how to unload it, where it was going. Absolute carnage. And it cost them well over a billion. I can't remember the details of this.
Chris Williamson
This is like the Wuhan Institute of Virology equivalent of a. A online worm.
Joe Tidy
Exactly. And you can't stop it. The only way to stop it is to inoculate all the computers so that if you get it, they don't get ill. It's like a vaccine around the world. Yeah.
Chris Williamson
What are the ways that cybersecurity firms find these sorts of hackers? Like, what is it? I know TTPS is sort of part of this, but I don't know if you're good enough to construct a worm that does ransomware and scrambles and does all the rest of it. I have to assume that you're good enough to be able to hide your track, so it's. Yeah. How do the security companies track down who caused it?
Joe Tidy
Well, a lot of it is follow the money, because if you can follow the trail of cryptocurrency and Bitcoin, then you might be able to get them. But thinking about that, there's a part in my book where Julius Kivimaki, this guy that we follow all the way through, he gets caught. One of the ways that they find out it's him is because he does the biggest self own in cybercrime history. An absolute monster of a blunder. Someone in the book called Anti Kuritu, who's a cyber expert, he says that everyone thinks that cybercriminals are masterminds when they're carrying out the hacks, but they're not masterminds at covering their tracks. They often get a bit lazy or a bit, you know, arrogant about that part of it, because operational security is. Is really, really hard. So this guy Kivamaki, he starts sending out. He's got all these. The patient data of psychotherapy patients all over Finland, 33,000 people. He's managed to steal all the notes from the. From the therapists. So he starts extorting the company by releasing every day 100 new records. And, yeah, this is the kind of stuff that, you know, you do not want on the Internet. Like the stuff you say to your therapist is the most sensitive information probably that you could ever hope that, you know, stays safe. So day one, 100 records. Day two, this is on the darknet. Day two, another 100 records. Day three, another hundred records. But then he says to make it easier for all the people on the forum, here's a bulk download so you can download all 300 patient data notes instead of having to do one after the other. Then he goes to bed, and then what he doesn't realize is he's accidentally uploaded the entire database of 33,000 patients. So he's given away all his bargaining chips, but also he's accidentally uploaded his entire home directory for his computer. So it's like, for example, I want to send you an email. I accidentally send all the emails in my inbox and all the attachments and every folder on my desktop as well.
Chris Williamson
Wow.
Joe Tidy
So the police found this in the morning, and they obviously downloaded it as quick as they could. He woke up and he realized that what he'd done, and he starts deleting files from the server. The police find an IP address which is a Internet protocol, which is like, tells you roughly where the physical computer is. They find an IP address in that home directory, you know, accidental dump for a computer server, a cloud server company, which is only half an hour away from them in Helsinki. So there's this race against ransom, man. That's what he's called deleting everything as he's going. Cause they've got this massive server that could potentially give them all the clues they need. They get to the server farm, pull out the Internet cable severing ransom man from his server. I put it like this. If you imagine a drug dealer, the cops are arriving, he's trying to flush all the cocaine, but then suddenly, I.
Chris Williamson
Don'T know, they cut off the water or something.
Joe Tidy
Exactly, something like that. So he, he's nothing he can do. So then they had this, they had this massive server full of all the evidence they needed to track him down. It was a little bit harder than that. He did, he did try and use aliases and that kind of thing, but there was just so much there on that server that led them back to him and that's what led to, ultimately led to his conviction. So it's that kind of thing, those mistakes that can be made.
Chris Williamson
It's Russell Bricht. Gmail.com.
Joe Tidy
Yes, that kind of thing.
Chris Williamson
Yeah, yeah, yeah, yeah. Like if you're going to start the biggest online drug selling network in human history, make sure that your old forum posts aren't linked to your namemail.com.
Joe Tidy
But that's a really good example, isn't it, of how someone's online presence can start, you know, innocently enough. You're building something. You're a software developer, you're just asking for advice. You don't know that in five years time you're a massive mastermind.
Chris Williamson
Cyberpunk. You've got to future proof yourself. Be careful what Runescape username you use in 2012 because God knows where you're going to end up 14 years later.
Joe Tidy
Yeah, okay, so we're giving advice now to cyber.
Chris Williamson
I welcome Internet overlords. My operational security is horrible. Okay, so another hack that I knew about, one of the most famous ones, the Christmas hack of computer games. And it seems like this sort of kicks off a lot of the story that you've been following. So what first drew you to this? What's the story behind Lizard Squad? Give me the Overview.
Joe Tidy
Yeah, so 2014, Christmas time, there was a ginormous DDoS attack, which is a very low level form of hacking. It's like, I liken it to when Glastonbury tickets go on sale, everyone lands on the website and accidentally the website crashes. It's like that really. In cybercrime, if you get enough traffic into a server or a website, you can bring it down. So the Lizard Squad were part of this. As I said earlier, this conveyor belt of these teen hacking gangs, these NPTs, that emerged in 2000 and tens. And they decided they were going to go after not just Xbox Live, but PlayStation Network as well. And I don't. I still don't really know how they did it, but they managed to bring these services down for hours and hours on what was, you know, the busiest time of year, Christmas Eve, Christmas Day, Boxing Day. So that was coincidentally, like. That was the first story I ever covered. And I went into the Sky News to work for Sky News. And I walked into the Sky News newsroom. I think it was like, very early on Boxing Day, or the day after Boxing Day. And they said to me, have you heard about this massive hack these kids have done? I was like, what are you talking about? No. So then I looked into it, and I couldn't believe the power that these kids could wield. I found it absolutely fascinating. So my news editor came over to me and he said, riley's called who's the head of Sky News. He says he wants a lizard on air tonight. So I was like, right, how on earth am I gonna get one of these anonymous Lizard Squad hackers to do a TV interview in, you know, six hours, seven hours, whatever it was. So anyway, I managed to find one, and it turned out to be this kid who was. I think he was 16 at the time, 17, calling himself Ryan. And we did an interview, and it was.
Chris Williamson
Hang on, you jumped ahead. How'd you find him?
Joe Tidy
Oh, just like going after person who says they're involved and then that turns out they're not. Then another person, then another. I don't even know. I couldn't tell you how I got to him. But in. I went through. I know one of the people I went through was this guy called Vinnie, who was part of Lizard Squad. It's kind of like an adjacent member. He didn't. He said he didn't really do anything for them, and I believe him. And he was cleared of all wrongdoing. And he actually lived in Twickenham, which was like three miles away from the Australian newsroom. So he promised he would get me this kid Ryan, who was a part of the gang that took out these gaming services. So anyway, I did this interview with Ryan, who it turned out was Julius Kivimaki. That's one of the aliases he used, was Ryan. And that kind of really sparked off in my mind, this fascination I've had ever since with cybercrime. And, um. And I've tried to keep tabs on. On. On Ryan or Julius Ever since. But then the trail ran cold because he disappeared for a while. So then when he pops up as potentially the person behind this ginormous hack in Finland on the psychotherapy centers called Vestamo, I thought, wow, he has had a career. And my money, Kivamaki is the most hated hacker in history. Not just because of the Vestamo hack and the PlayStation and an Xbox One, but also there are lots of times in that sort of 10, 12 year cybercrime career where he has done some really hateful, nasty stuff to not only people that he wanted to go after, but fellow hackers as well.
Chris Williamson
What, like.
Joe Tidy
So there was a Sony executive called John Smedley who fought back a bit on Twitter against Lizard Squad. He was like, he wouldn't. It was used to be a prolific tweeter and he. He sort of fired back some tweets against these kids and they didn't like it, so they went after him pretty badly. And one of the things that Kidamaki did was he found out that John Smedley was flying from, oh, I think it was from Phoenix to Houston or somewhere, I can't remember it was. And he convinced the airline that there was a bomb on Jordan Smedley's flight and it had to get escorted by fighter jet to a different airport where he was questioned at gunpoint and all sorts, stuff like that. And there is a litany of situations and incidents where Kivamaki has done some really horrible things.
Chris Williamson
What you said about what he's done to other hackers as well, what's in that list?
Joe Tidy
Well, there's a. There was a kid called Blair Strater who I spoke to in the book, and Kivamaki led probably a three year harassment campaign against him. Have you heard of swatting? Not swatting?
Chris Williamson
Yes. Yes.
Joe Tidy
Where you pretend you call up the police and you say there's a. Whatever. Yeah. And the SWAT team arrive and. And it's really dangerous and people have died. So they would do that all day, all night for months against Blair. Straighter, they've also got this weird thing, which is still a thing now, I don't really understand it, but it's when you get doxed, your documents come online. So that means that everyone knows where you live, your real name, all that stuff. So for a hacker, that's a pretty bad situation to be in if you're doxed, because the whole point of it is you're anonymous and you're powerful and you're, you know, you can disappear at any moment. So with Blair, they Doxxed him. And then Kivamaki and others would send him pizzas, Chinese takeaways, all these kind of deliveries. At one stage, a lorry load of sand and gravel arrived at his house. Personally, like, if a free pizza turned up at my house, I'd be happy about it. But when you talk to people who have been victims of this for months, it becomes horrible because you are on edge the whole time and the delivery drivers want paying if you haven't paid them and they get annoyed with you. So you know that kind of harassment is not nice. There was an article written by another journalist called Kevin Roose, who interviewed the Straighter family around this time when it was really bad. And the article was called Haunted by Hackers. And I've always thought that's such a good headline because for Blair Strater and his family, that's what it was like.
Chris Williamson
A quick aside. Grooming isn't just about looking good. It's about feeling good. And the right tools make all the difference. That's where Manscaped's beard and balls bundle comes in. It comes with their beard hedger lawnmower 5.0 ultra and all the essentials that you need to keep looking sharp from head to toe. The beard Hedger is your precision trimmer, featuring 20 adjustable lengths so you can dial in the perfect style, whether it's light stubble or a full Burt Reynolds stache. Like I'm rocking here. And for downstairs, the Lawnmower 5.0 Ultra has a cutting edge ceramic blade to reduce grooming accidents, 75 minute battery, waterproof technology and an LED light so you could use it as a flashlight if you needed to scare off an intruder. Perhaps right now you can get 20% off and free shipping on the beard and balls bundle by going to the link in the description below or heading to manscaped.commodernwisdom and using the code modernwisdom20 at checkout, that's manscaped.commodernwiry and modernwisdom20 a checkout. Yeah, it's ruthless, man. Okay, so you sit down with this guy, you don't know. I mean, this is what, 20.
Joe Tidy
2014. 2014? Yeah, yeah.
Chris Williamson
The first time you do it, what stuck with you from that first interview?
Joe Tidy
Just. Just complete lack of remorse, caring, smirking throughout the entire interview. A lot of honesty. He didn't sort of make up, sort of.
Chris Williamson
So he didn't hide his face?
Joe Tidy
No, not at all. Not at all? No, no. He turned up to the Sky News interview on Skype fully Didn't disguise his voice, his face, didn't give a damn.
Chris Williamson
Surely that's a bad idea.
Joe Tidy
This is why I'm saying OPSEC is.
Chris Williamson
Terrible, these npc, but surely that's something different. That, to me, seems like operational security is covering your tracks. That seems more like a purposeful middle finger.
Joe Tidy
Absolutely. Oh, yeah, and don't. And don't forget, well, you don't know this. I don't know how far you got in the book, but at this point, Kivamaki was already under investigation. He'd already been arrested, he was on bail, so you got to factor that in.
Chris Williamson
Wow.
Joe Tidy
But, but. But you know Kibamaki, and there's a few others like him in the last kind of 10, 15 years. They're a different breed. So you've got the MPTS who don't care. They're out to cause chaos, get some money, bit of infamy. Then you've got the kind of. Alison Nixon, the researcher I mentioned earlier, she calls them the centers of gravity. There are certain teenage hacking hackers who. They are, they. They are the center of their gangs, and everyone follows their lead. And you don't necessarily have to be the most technical to be that center of gravity, but you have to be the most ballsy, anarchistic, charismatic, charismatic, and you don't care. And the thing about that Christmas Day hack was he appeared on the interview fully face and voice. And yes, it came very quickly afterwards. There was a knock on his door by the Finnish police, but they never got him on anything. All the things he told me, either they didn't find evidence or they were too busy on his other cases to. To look into it. But as far as I'm aware, and it's. Look, if you look at his. At his court records, none of that was taken into account with any subsequent convictions.
Chris Williamson
Do you know what he did in between that and the mental health hack?
Joe Tidy
Not really. I know that he traveled a lot. I know that he was carrying a lot of bitcoin. I spoke to one fellow lizard squad hacker who he went out with in. In the Netherlands on a. On a jolly. And he was carrying a. A hardware crypto wallet, and it had something like $50,000 worth of Bitcoin in. And that was apparently just his holiday spending money. And of course, that bitcoin now would be worth Something like 12 million. You know, but you're right, there is this gap in his story, which I would love to find out what happened, but the. The actual hack happened in 2018. So he stole the vestamo database of psychotherapy patient notes in 2018. So there wasn't like a huge gap. You didn't go to 2020, but, yeah, there was a gap. There are. There is a suggestion by a Finnish journalist which is yet to be confirmed, and it's all alleged and, you know, huge pinch of salt with this, because I haven't. We don't know if this is true, but he thinks that Kivamaki might be involved in a. In a. In a hacking, sort of hacking, cybercrime thing that happened around that time, which was Kivamaki aside, whoever did this, it's like the perfect crime. So what they did. I'm not going to say Kivamaki, because we don't know if it was him. But what they did was they found a website on the clear web. So that's the Internet that we all know and love, that was advertising Darknet drugs marketplaces. So it had links for the. The Darknet links. So, like, as I say, jumble of numbers and letters, dot, onion. He hacked into that and then changed the links for those Darknet websites to his own fake Darknet marketplaces, which had all the things you would imagine like, buy your coke here, buy your MDMA here, but all the money going into that marketplace was going into his pocket. And I spoke to the police about this. I was like, if that is Kivamaki, why aren't you looking into that? Like, why isn't that part of your investigations now that he's behind bars? Aren't you investigating this? And the guy, Marco Leponen, the Finnish police officer, said, we haven't got any complaints. There are no victims because, of course, no one's complaining.
Chris Williamson
No one's complaining to cocaine that I tried to buy on the dark Web. I didn't receive my order for that.
Joe Tidy
Exactly. It's the perfect crime. The perfect crime. But anyway, I don't know who. I don't know who's behind that one, but there is some vague suggestion that some. Some journalists have made.
Chris Williamson
How did he do the Vestamo hack? Do you know?
Joe Tidy
Yes, it was. It took about four minutes. It was. It was awful. The security at Vestamo was terrible. And there have been convictions. The CEO has been convicted. He's appealing it. But, um, the cybersecurity practices at that company were very, very poor. So he did a scan of open servers with no passwords. He logged in, saw it all there, downloaded, must have been. Well, no one knows why he did it in 2018, but then he didn't do the extortion until 2020. But my theory is he couldn't believe his luck. He downloaded it and then sort of sat with it for a while, waiting.
Chris Williamson
To see if someone's realized.
Joe Tidy
I think so. Because, of course, at some point, we don't know why, in 2020, he decided to extort the company, ran out of.
Chris Williamson
Bitcoin to party with. You know what I mean? I need to get a party fund.
Joe Tidy
But the other really mysterious thing about this character is that we don't know why he did it, because apparently he did have enough money, apparently he was and is very wealthy, the court fees alone, the lawyer's fees, to try and defend himself. Absolutely humongous. And part of his defense was, why would I do this? I've got loads of money. And then they say, well, how much money have you got? And he says, I can't remember. It's all in bitcoin.
Chris Williamson
It fluctuates by the day based on what the price of bitcoin is. So why did that hack hit differently? What was it about the Vestamo hack that caused such uproar?
Joe Tidy
Well, data breaches happen all the time. Data's stolen from people all the time, from companies all the time. And to be honest, it's a kind of just like a little bubbling thing that happens in life all the time. And we kind of, like, take it for granted there aren't many situations where people actually are badly affected by that. But when you've got a group of people who are already vulnerable because they're in therapy, some of them have had horrendous lives, childhoods. Some of them are children. And when you get that kind of like, insight into their lives through the patient, through the psychotherapy notes at the top, the therapist is writing down, like I said earlier, I mean, that kind of data is the most precious of them all, isn't it? So that in itself is pretty bad. Stealing that data is pretty bad. But then what happened next was run of the mill. So he went to the CEO of Vestamo and he said, Give me €400,000 worth of bitcoin and I won't publish the data on the Internet. That didn't work. So then he started releasing them on the Internet on the darknet, as I described, a hundred a day, which would have carried on if he hadn't messed it up. And then after that, he went this step even further, and he sent out emails to every single one of the victims he could find email addresses for, which is about 27,000 people. And they all received an email in their Inbox on Saturday night after they got out of the sauna in Finland, because everyone has a sauna in Finland on a Saturday night. And they saw in their inboxes an email from ransom man saying, I have got your notes. Pay me now or I will put them on the Internet. And if you can imagine the kind of impact that would have on you or on me, that's horrendous. But you've got to put yourself in the position of people who are already in the lowest of low. And I spoke to lots of the victims and, you know, some of these people have still got ptsd and some of these people are scared to leave the house. And the impact, the long term impact, is absolutely horrendous. Although the evidence has never been presented. The lawyer that represents about 4,000 of the victims, she says that two of the families have said that people have taken their lives over this.
Chris Williamson
Did he send that extortion email after he accidentally leaked all 33,000?
Joe Tidy
Yep.
Chris Williamson
Right, okay. So he.
Joe Tidy
I think it was a last roll of the dice to see if he could make some money out of it.
Chris Williamson
Yeah, yeah, yeah, yeah. Okay. So he face plan. He, Russell brickmail.com's his own computer onto a server. The police realize it's 30 minutes away. They get in the car, they run down there, they unplug the computer, the Internet from the servers, they now have the servers, and they start to do cyber forensic. Yeah, stuff. Yeah.
Joe Tidy
Took a long time, but they managed to come up with a name. The funny thing was, of course, even before the servers, people were wondering, could this be Julius Kivamaki? Because he was so infamous in Finland by that. By that stage, as all the teenage stuff he'd done. And then they. In 2000, I think it's 2022, they decided they had their man and they wanted to start finding him, but they couldn't find him. So I think it was late 2023 that they. No, it was late 2022 that they put out an Interpol red notice for him. So they didn't know where he was. They had a feeling that he was somewhere in Europe, but they didn't know where. So they put out that. It's a bit of a nuclear option, actually, and a bit controversial because Kivamaki has always said they could have just asked me and I'd have come back. Whether or not he would have done, I don't know. Anyway, so this. This Interpol red notice went out for him, and the detectives in Finland kind of just got on with other cases.
Chris Williamson
I don't know what a red notice is. What is that?
Joe Tidy
Oh, sorry. It means that if you are found anywhere in the world, if you've got a red notice out for your arrest, they can arrest you like that. And then they send you back to wherever the Interpol red notice came from.
Chris Williamson
Assuming you're somewhere that's got extradition, I imagine.
Joe Tidy
Oh, yeah, yeah, yeah.
Chris Williamson
Should have gone to North Korea. Could have been around.
Joe Tidy
That's his mistake. So they put this notice out and then they kind of gone with other things. And then remarkably, there was this stroke of luck in Paris whereby someone called in a domestic incident disturbance in the early hours of, I think it was February 2024. And the police, the French police went to the house and they were expecting it to be, you know, a, a woman being abused or something like that. And they opened the door and everything was fine and there wasn't any danger. And this man sort of. It was after a night out, so I think he was a bit hungover and still asleep. They dragged him out of his bed and he. They just did some it, some ID checks and he was traveling on a passport for someone called Asan Ahmed, which is a Romanian passport. And they were like, well, hang on a minute. This guy is 6 foot 4, green eyes, does not look like a Romanian called Asan Ahmet. So they ran some checks and somehow they unearthed the fact that this was Julius Kivamaki. So they arrested him on, on the spot and took him back to the.
Chris Williamson
Do you know what the disturbance was?
Joe Tidy
Well, the call went out from a woman who'd been out with the woman and Kivamaki that night and apparently there'd been a big row and she hadn't answered her phone and he was being abusive and aggressive. But then if you ask Kivamaki, which some journalists did afterwards, apparently it was someone who knew that he was hiding and they did it deliberately to get police to know where he was. Again, not a very liked person.
Chris Williamson
Yeah, he doesn't seem like a good guy. Okay, so he then gets extradited from.
Joe Tidy
France back to Finland. Yep, back to Finland. And then so begins this months long time period where they were putting together the case against him in time for the trial, which was in 2014. No, 2024. Sorry. And led to his conviction.
Chris Williamson
And what was the court trial process like claims defenses and, and the sentence and all of that?
Joe Tidy
Yeah. So the police had a giant folder of evidence against him, not only for the hacking, but also for the blackmail. It took police ages to get that evidence together for the actual blackmail part of it, because they had to go to. They wouldn't say which US tech giant, but they had to go and kind of get some evidence from them. And it literally took like 18 months for Google or Amazon, whoever it was, to send back some details about it. But that was one of the crucial pieces of evidence that they needed. And eventually, yeah, he was convicted. In Finland, they don't have juries. They do it all by judges. There's three judges that decide, and they found him guilty on all counts. But what was really interesting is that every single time that it said in the paperwork, kivamaki, either by himself or with others. So every charge came with that because they're never quite sure whether or not he did it on his own or not. They think he might have had help from somewhere, but they don't know where. There's some discussions right now happening in Finland, like this week, about whether or not there's a suspect in Estonia that might have helped in some way, but we don't know. But the conviction happened. They said they didn't have anything that. They said that in the totality of the evidence, he's guilty. But if you take each individual one, they couldn't quite pin him on each individual one. It's a strange thing, but the prosecutors are very happy. The police are very happy. They said that they took everything kind of holistically and said, right, yes, he did it because of all these bits. None of them are kind of like a smoking gun, but all of them together were enough to convict him.
Chris Williamson
What was your reaction to the arrest and the trial and stuff as you were following this going on? Cause obviously this was, you know, know, a decade after you first sat down with this guy. That must have been a slightly, I don't know, out of body experience for you to see it occurring.
Joe Tidy
Yeah, it was bizarre because I just had a feeling all those years ago that this kid would be worth watching. And there were rumors at the time that he'd kind of fled with a. A stash of billions of Bitcoin and stuff. And I've always been fascinated about what happened after the Lizard squad takedown of Christmas. And being in the courtroom, seeing him as Now, I think, 26, 27 years old, still cocky, still smiling, still not really caring about anything, was. Was absolutely fascinating. There was this bizarre moment in the. In the trial where he applied for bail because he was in prison, and he was having to leave prison each day to go to the courthouse, and he applied for bail to be Released so he could, you know, be a free man until. Until the end of the case. And although the police objected because they were worried he'd be a flight risk, the judges agreed. So he was let out. And then the police were like, whoa, whoa, whoa, whoa, what are you doing? This guy is not going to be. We can't pin him down. Why have you let him go? So they very quickly appealed and the judges were like, oh, yeah, okay, quick, get him back in. He wouldn't come in. He disappeared. They couldn't find him.
Chris Williamson
Just like, where did he go?
Joe Tidy
Well, they. The police kept calling him and said, you've got to come back in. Court order. He's like, I'll see you on Tuesday. This was like, Saturday, I'll see you Tuesday when the case starts again. They're like, no, no, come in now. He's like, no, no, I'm fine. So anyway, they. They found his social media handles or somehow, like some forum handle that he was using in the past. And he posted a picture of himself, his hand holding a bottle of really expensive champagne. And they saw from the background that it looked potentially like a kind of Airbnb. And then they figured out that there's no way he could have got an apartment. He's not in any hotels, so he's like, there's very only small places he could be. And they looked at all the pictures of all the Airbnbs in Helsinki and then got the right one, rang the doorbell, and there he was.
Chris Williamson
Holy fuck. They geoguessed their way to finding him.
Joe Tidy
Yeah, but all the court cases I have covered in my time as a journalist, people arrive in a suit and they're really polite and they try really hard to make the jury and the judges realize they're good guys, but just. It's classic, you know, that's that character of that teenage cybercriminal who's just got away with it for so long.
Chris Williamson
What is it?
Joe Tidy
He doesn't care.
Chris Williamson
Yeah. What is it about his psychology? Is he completely detached? Is this guy a psychopath? Is he just really cocky and out for recognition? What do you think's driving him?
Joe Tidy
Well, one thing that kept. One word that kept coming up is sociopath. And it's really difficult and dangerous, I think, to kind of throw these things around. I'm not a clinical psychologist. I can't. I can't decide on that kind of thing. But one of the guys that used to hack with him back in the teenage days says that the thing about him was he just wanted to sort of see, watch the world burn. He just wanted to cause chaos and, and damage. One of the cops said that it's like the kind of guy who likes to get in a fight in a bar, but he can do it from behind the computer to protect his bone structure, which I always quite liked. But I don't know. I don't know. I'd like to sit down with him. I tried to get an interview with him during the trial and he said yes and his lawyer said yes, but the judge blocked it at the last minute, so I wasn't able to. And then we were talking on text and then he just stopped talking to me. That was about when he disappeared actually. So maybe that's why he stopped talking to me. And I've tried many times to contact him while he's been in prison, but he won't answer my. My letters.
Chris Williamson
Dang it.
Joe Tidy
So, yeah, he remains a bit of an enigma.
Chris Williamson
How long's the sentence?
Joe Tidy
Very short. He'll be out in probably a year and a half from now.
Chris Williamson
You should have just waited to publish the book. You didn't need to publish it now. I mean, you can do a follow up like the paperback. The paperback. Paperback can have, yeah, a little appendix, additional chapter. That's the usual way that authors do.
Joe Tidy
With what's happening right now with MNS Co Op and Harrods. I think there could be enough for another chapter when the paperback comes out.
Chris Williamson
A. That's. We've just brought up a. We've doubled sales. We've doubled sales, haven't I? So I'm interested in this Maxim Jacobet guy as well that you went and, and tried to track down. It seems like you have a. A penchant for trying to find Eastern European young men and no accusation, but you do seem to have a skill for it. So what's the story of him and Evil Core and stuff like that?
Joe Tidy
Yeah. So Evil Corps are the kind of OGs of Russian cybercrime. They were there from the beginning and they evolved as the cybercrime ecosystem evolved. And they've been kind of run and led by a family, the Yakubets family. And Maxim Jakubets is, was the most wanted cybercriminal in the world. There's a 10,000, $10 million reward out for his arrest, him and his right hand man, Igor Turyshev. So we decided in. I think it was just, just for the pandemic, so 2019, that we would try and go and find him in Russia because one of the things that I became a bit annoyed about Was that the west points fingers at these people, uk, us, and says, ah, they're cybercriminals. They're guilty. They've done this, that and the other. They've stolen $100 million worth of money from innocent people around the world. But you never hear from the actual cybercriminals themselves. You never actually. They never get a chance to kind of have their say. I know that sounds silly, but as a journalist, like, that's kind of like my job. And that's the bit that interests me is like hearing both sides. So I was. I remember I was sat in the garden there and I was just like thinking, one, one afternoon, why don't we go? Why don't we try and find these people? So we did, and we searched around Moscow and we got all the addresses that were known about them and tracked down their supercars and tried to take. Go to the garages that they were at. And I managed to find an address that we thought was Matkim Yakubec, but it was actually his dad. But we went there and his dad opened the door and we had this absolutely, for me, unforgettable interview with. With Jacob at Senior, where he was like, so angry with the. With the west, accusing his son of being a cybercriminal. And I was saying things like, you know, speaking through my producer, reporter, translator, like, well, how do you explain the Lamborghinis? He's like, well, they could be rented. So how do you explain the quarter of a million dollar wedding? Well, we don't know how much it was. Have you seen the paperwork? It's like, well, no, but I went there and spoke to the wedding organizer, you know, and he had an answer for everything. And what was fascinating about that, and what's become even more fascinating is we went there in 2019 and put the documentary out. And I think it was. Yeah. Last year the National Crime Agency gave us loads more information about Evil Corps. And they said it wasn't just these seven or eight men. It was also the dad. He's a part of it. He's in some way involved money laundering.
Chris Williamson
You met the mastermind, he was in front of you. You could have snagged him there the whole time.
Joe Tidy
Yeah, yeah. So, yeah, that was an amazing trip, but I didn't enjoy it. It was the worst assignment I've ever been on. It was so. And I went to Ukraine as well during the war. But this was worse. The Moscow trip was worth. Well, you're in a. What is a. There aren't many countries that you go to that are kind of like adversarial countries that, that, you know, that, that are. They're not friends of the UK and the BBC out there is seen as an arm of the British government, even though of course we're completely independent. So, like, there's that. Plus I'm going there to track down cyber criminals who we know have got links to the Kremlin. And it was really intimidating. The entire time we thought we were followed. At one stage we flew out to this place called Yoshka Ola, which is about a thousand kilometers east, to try and find Igor Turyshev. And we were convinced there were guys in the airport who we saw, who we then saw at our hotel. So that kind of thing, you know, isn't nice and I'm here complaining, but really the one that got off the worst was my fellow reporter on the story with me, Andrei Zakharov, who was and is a very talented cyber reporter. But he helped me out with the whole story and he was there the whole time. And maybe it was that or maybe it was something else, but he was very quickly put on the enemy of the state list after. Shortly after that. And he had to flee the country.
Chris Williamson
No way. Because of the work that you did together.
Joe Tidy
We don't know if it was that because he's done a lot of provocative to the Kremlin.
Chris Williamson
Right, okay, okay. An illustrious way of pissing off the Kremlin.
Joe Tidy
It was after that, he thinks that it was possibly the straw that broke the camel's back. But before he, before he decided to leave, he was followed around the entire city by some nasty looking men for weeks and weeks and weeks. Horribly intimidating for him. He is a superb journalist and I'm still friends with him and I know he's doing well now, but yeah, I can't complain about my handling or treatment. When Andre had a really tough time. Wow.
Chris Williamson
I got scared in a hotel. Wow. At least I get to stay in my country, though, you know? At least I'm in my home country still. That's nice.
Joe Tidy
I'll tell you though, when I got back, I installed a security camera system around my house because I was. I just started feeling a little bit intimidated because I once interviewed a guy who. He decrypts ransomware. So, like when ransomware is deployed in the system, it scrambles your files. You have to pay them to get the key to unlock it. This guy, Fabian Wasser, is an anonymous researcher from a company called McSoft. And he is so good at building his own decryptors that the hackers absolutely hate him when he's searching through a piece of malware he has found on more than one occasion. You, Fabian, stuff like that. Right in there.
Chris Williamson
In case he's looking.
Joe Tidy
In case he finds it. Yeah, because they hate him so much. And he fled his country, he fled Germany because he was so scared of. You know, some of these gangs are. Are very, very rich. And it wouldn't be much to drop, you know, 20 grand to go and get someone's legs. Yeah, broken or whatever.
Chris Williamson
Wow. What was the fallout from that CrowdStrike thing? Because you've just held up a cool toy model thing. So. CrowdStrike, cybersecurity organization, maker of cool figurines. But, yeah, also subject of a lot of bad press only at the start of this year. What? What? First off, what the fuck happened? And secondly, is this. Is that. What was the comeuppance of that? Because I kind of heard about it. It was a huge deal. Loads of shit happened and then nothing.
Joe Tidy
Well, give it time. There are some big court cases against CrowdStrike right now. There are companies like, oh, is it United, the airline in the U.S. they are. They are trying to sue CrowdStrike for something like 7,000 flight cancellations across the day that CrowdStrike caused the world to implode. So the CrowdStrike problem was, was it this year? This year has flown by. Maybe it was this year. Anyway, so they did an Update for their CrowdStrike software, and they're like an antivirus.
Chris Williamson
And it was a year ago, 19th of July, 2024.
Joe Tidy
Oh, it was okay last year. And so CrowdStrike is a kind of, like, antivirus company, one of the biggest and best in the world and used by some ginormous corporations, including United, to protect systems from cyber attacks. They did a really innocuous update where they sent through some really, like, tiny bits of information to keep the software up to date. It completely bricked the system. It caused the blue screen of death on something like. I think it was two and a half million computers around the world. And that's not just computers like we're talking on now. That's servers that run airlines, those kind of computers. So, yeah, the world went mad for, I think, like, three days. No computers running, flights canceled, online services down, shops offline. Massive, massive problems. It was like some sort of apocalypse was. Was unfolding. But we bounced back. We're still here.
Chris Williamson
The best image that I saw of that was someone's smart fridge, front screen of a smart fridge, which is. Yeah, yeah, you got BSOD'd on a, on a fucking Samsung American Chiller. Yeah, it's just, you know, there is kind of like the uncanny valley, but the equivalent of that for smart homes. And I still don't think that we're out of the other side of it. I think that most houses would benefit from a physical switch on the wall for most things and that a nice, quite simple up and down your fridge does not need an app. No, I mean, look, EcoWater, that's a hydrogen water company that I love, I love hydrogen water. I think it's awesome. This like big revolution in health.
Joe Tidy
What's hydrogen water?
Chris Williamson
So it's a special type. I haven't got it here but like imagine that this flask was able to hydrogenate the water so it's actually all self contained within the unit itself. So it's a kind of hot thing. It'll be in the UK in five years time. It's big in America. It's coming big in America. It'll transport over the Atlantic in about five years time. They have an app for your fucking. Yeah, you don't need that for your flask. And it allows you to change the color of the LED and it tracks how much water you've drank. And I'm like, look, it's cool, I love the product but the app to me. And then there's, they did a battery update that you need to over the air update your flask from your phone. I'm like, guys, yeah, yeah, I know it's cool. But there is a, there is just a little this and I think, look, if you know, CrowdStrike issues another update and I can't get my hydrogen water out of my Echo Echo Water flask, I'm going to be pissed. So I think the way that you, or the way at least that this seems to be explained is that the hackers are always going to be out ahead of governments of they're going to be coming up with increasingly innovative ways to circumvent both security systems and law enforcement to try and track them down. Is regulation ever going to catch up with how fast dark web hackers, crypto economy stuff can evolve? Like is this, is there a light note at all here or are we just kind of in it for the long haul? Make sure that you've got a password manager downloaded.
Joe Tidy
Yeah, I think, I think there are some things that we can do right now, today that would make it so much harder for hackers, but we don't because there's a thing of like security versus convenience so reusing passwords, keeping your software up to date. Actually, you know, when you think about CrowdStrike, that was one of the things about CrowdStrike that was so bad was that the people that kept their software up to date, which is what we're being told all the time, they were the ones that got hit. If you were, if you weren't, if you hadn't have done the software update, then you were fine because it was that thing that bricked your system. But no, generally speaking, CrowdStrike aside, keep your software up to date. Do two factor on your or multifactor good passwords and it sounds so obvious and I'm bored saying it and I know I can see you falling asleep, but if we all did this, then the world would be, the cyber world would be a safer place. But, but we don't. There's a lot of things at the moment about, you know, quantum computing and AI and deep fakes and stuff and how this is how the hackers are getting in these days with all these whiz bang new things. They're not. If you look at the list of how hackers are getting in, it's the same old stuff. Someone said the other day that nothing in cyber has changed for 20 years.
Chris Williamson
Social engineering. Find a person who's prepared to let you into the system, go from there. Yeah, yeah.
Joe Tidy
But also, you know, once you get in, they're not using the latest and greatest techniques to move around a system. They're going through something that should have been patched a year ago or two years ago.
Chris Williamson
How much truth is there to this? Quantum computing will be able to make all encryption totally obsolete because it can work out prime numbers in the split of a second. And everyone's fucking bitcoin is going to be owned by one guy and all of our passwords are going to be released.
Joe Tidy
Yeah, they call it Q day, the day when the quantum computers can break encryption. And there's this thing called, I think it's something like grab now, encrypt later, or decrypt later. So the idea being that if you asset harvest now and decrypt later. So if you're a spy agency, for example China or the UK or the US you can grab all of this data that at the moment is encrypted. So all the most important vital communications are done with really high grade encryption. So if I'm, if I'm President Trump talking to Prime Minister Starmer, we will talk on a really, really secure line which if I grab that, it just comes out as Gibberish. But if I grab it now, I might be able to make it un gibberish when Q day.
Chris Williamson
Oh, fuck.
Joe Tidy
That's that. That's the worry, is that. Yeah. Is that Q Day will mean that kind of thing happens. But I'm trying to be positive. It is. It is a concern. The National Crime Agency recently put out advice saying, like, the deadline is 2030. I think they said you need to get everything encrypted in a way that is post quantum encryption safe or post quantum safe. Now, because of what I just described.
Chris Williamson
I'm just having a look here. This is a friend's. A job advertisement for the new head of cybersecurity at His Majesty's treasury in Britain provoked derision because of its stated pay of 57,000 pounds a year. That was the total annual salary, around about $70,000 for the head. The head of cybersecurity of His Majesty's treasury in the uk.
Joe Tidy
Yeah, yeah. It's a big problem.
Chris Williamson
Have we considered low pay as a vector of risk? Like just disgruntled workers as a potential. You know, I mean, you don't.
Joe Tidy
Yeah, yeah. They call it. They call it insider threat. They call it insider threat because sometimes there will be people in high levels of power who could be corrupted. But, you know, that, that's. I don't want to start. You know, I think that's rare. That's a rare thing that we see. They think potentially this is all alleged and all, you know, reports have come out. So I'm not saying this is what's happened, but there's a big thing at the moment right now with Coinbase, where lots and lots of people have had their crypto stolen or exposed and they think that might be inside a threat. But, yeah, you mentioned the salary there. The problem with cyber jobs is that you can get paid a lot of money, but not really in the public sector. It's all in the private sector. We need very good people to be in the public sector protecting the way more important stuff.
Chris Williamson
Yeah. Joe, you're fucking awesome, dude. You're really great. Book's fantastic. You're a wonderful communicator. Where should people go? They want to check out all of your stuff.
Joe Tidy
Oh, it's. It's. Yeah. So my book is called Control Alt, How Teenage Hackers Hijack the Internet, and it's out on the 3rd or the 5th of June. The book launches the 3rd of June. That's why I got confused. And then it'll be in all the usual places and on audiobook as well and it's also coming out in Finland and it'll come out in the US in January as well.
Chris Williamson
Hooray dude, you're brilliant. Good luck doing more investigations. I look forward to speaking to you again when you've found some more awful people from the Eastern Europe that we can. I can talk about stories to do it.
Joe Tidy
Thank you mate. Thanks for having me on.
Chris Williamson
If you are looking for new reading suggestions, look no further than the Modern Wisdom Reading list. It is 100 books that you should read before you die. The most interesting, life changing and impactful books I've ever read with descriptions about why I like them and links to go and buy them. And you can get it right now for free by going to ChrisWillX.com books that's ChrisWillX.com books.
Modern Wisdom Episode #954: Joe Tidy - Chasing The Most Hated Hacker In History
Release Date: June 14, 2025
In this gripping episode of Modern Wisdom, host Chris Williamson engages in a deep and insightful conversation with cybersecurity expert Joe Tidy. They explore the murky world of modern cybercrime, focusing on the notorious group Scattered Spider and the infamous hacker Julius Kivamaki. The discussion delves into the evolution of hacker motivations, the techniques employed in cyberattacks, and the broader implications for global security.
[00:04] Joe Tidy introduces Scattered Spider, a loosely coordinated collective of hackers responsible for significant cyberattacks targeting major UK and US retailers. Recent incidents include:
Marks & Spencer (M&S) Cyber Attack: Caused disruptions such as inability to take online orders and empty store shelves around Easter time.
"If you're not in the UK, there's a really big chain of supermarkets called M&S... logistics problems, empty shelves in some stores." — Joe Tidy [00:04]
Co-op Cyber Attack: Similar disruptions in another prominent UK supermarket chain.
"We saw disruption at stores, empty shelves, real chaos behind the scenes." — Joe Tidy [00:04]
Harrods Attack: Targeting the luxury retailer in London.
"Attacks on US retailers as well." — Joe Tidy [07:52]
These attacks have been attributed to Scattered Spider, a name coined by cybersecurity firm CrowdStrike to describe this decentralized group.
Joe elucidates that Scattered Spider differs from traditional cybercrime gangs. Unlike highly organized syndicates, they operate on platforms like Discord and Telegram, loosely akin to the hacktivist group Anonymous but driven more by financial gain and notoriety.
"They're not a normal cybercrime gang... more out for cybercrime and money and infamy than sort of hacktivism." — Joe Tidy [01:46]
CrowdStrike's nomenclature underscores the fragmented nature of these groups, emphasizing their lack of centralized structure.
[03:01] Chris Williamson probes the shift in hacker motivations, particularly the role of social media platforms like Twitter.
"Do you think social media platforms like Twitter have sort of changed what hackers motivations are from just exploration or exploitation to now fame, clout chasing, stuff like that?" — Chris Williamson [03:01]
[03:15] Joe confirms this transformation, attributing the rise of social influence and cryptocurrencies to the change.
"There are two kind of factors which I think have turned teenage hackers from largely benevolent groups... to... cybercrime gangs." — Joe Tidy [03:15]
He highlights how Twitter introduced the concept of followers and clout, encouraging hackers to seek recognition and financial rewards.
Joe details the common methods employed by hackers, emphasizing the combination of social engineering and technical exploitation.
"I think the initial entry is usually through social engineering... pretending to be a member of staff." — Joe Tidy [08:15]
Key techniques discussed include:
Ransomware is identified as the leading cyber threat, crippling organizations by rendering their data inaccessible.
"Ransomware completely cripples an organization. It's like going back to medieval times." — Joe Tidy [09:33]
The conversation shifts to the vulnerabilities in autonomous driving systems.
"If these ransomware attacks, you need. As the level of kinetic importance to people's lives increases, the level of security around those systems needs to increase in kind." — Chris Williamson [12:22]
Joe concurs, acknowledging the inevitability of cyber threats targeting autonomous vehicles and the need for robust security measures.
"It seems almost inevitable that someone will find a way to cause havoc with autonomous driving." — Joe Tidy [13:31]
A central focus of the episode is Julius Kivamaki, labeled as the "most hated hacker in history." Joe recounts his journey tracking Kivamaki's cybercrimes, culminating in the high-profile Vestamo hack.
[43:46] The Vestamo Hack involved:
"He did a scan of open servers with no passwords. He logged in, saw it all there, downloaded..." — Joe Tidy [57:21]
The botched extortion attempt led to his rapid identification and arrest, showcasing how operational lapses can lead to the downfall of even the most elusive hackers.
Joe discusses regions that are prolific sources of cybercriminal activity, particularly Russia and North Korea.
"The biggest gangs are organized and run, we think from Russia, Eastern Europe." — Joe Tidy [28:13]
Key points include:
Russia: Home to advanced cybercrime groups like Evil Corps, with a culture that tacitly allows extensive hacking as long as Russian infrastructure remains untouched.
"The golden rule if you're a Russian cybercriminal, which is you do not hack Russia or former Soviet states." — Joe Tidy [32:44]
North Korea: Engages in cyber espionage and cryptocurrency theft to fund the regime.
"They are the only country that, that we know of in the world, that... steal cryptocurrency." — Joe Tidy [32:30]
Joe emphasizes the critical role of Operational Security (OpSec) and how its failures often lead to the capture of cybercriminals.
"These groups are terrible at it because they don't seem to care." — Joe Tidy [26:02]
He illustrates this with the case of Kivamaki, whose mistakes allowed authorities to track and convict him despite his sophisticated hacking activities.
"He sends out all these records and then accidentally uploads his entire home directory." — Joe Tidy [43:46]
Law enforcement agencies utilize strategies like following the money, tracing cryptocurrency transactions, and exploiting OpSec failures to apprehend criminals.
The episode touches upon a significant incident involving cybersecurity firm CrowdStrike, highlighting the widespread consequences of major cyber disruptions.
"They sent through some really, like, tiny bits of information to keep the software up to date. It completely bricked the system." — Joe Tidy [79:24]
In July 2024, an innocuous update from CrowdStrike inadvertently caused the Blue Screen of Death on approximately 2.5 million computers globally, affecting critical infrastructure and leading to widespread chaos.
"Flights canceled, online services down, shops offline. Massive problems." — Joe Tidy [80:01]
This incident underscores the fragility of our interconnected systems and the far-reaching impact of cybersecurity failures.
Looking ahead, Joe discusses the potential ramifications of quantum computing on encryption and cybersecurity.
"Quantum computing will be able to make all encryption totally obsolete because it can work out prime numbers in the split of a second." — Chris Williamson [85:10]
He explains the concept of "Q Day", a hypothetical future event when quantum computers can break current encryption standards, posing a significant threat to data security.
"The National Crime Agency recently put out advice... the deadline is 2030... post-quantum encryption safe." — Joe Tidy [86:53]
Joe Tidy emphasizes the importance of basic cybersecurity practices to mitigate risks:
Use Password Managers: Prevents password reuse and enhances security.
"Get a password manager and use that." — Joe Tidy [10:22]
Enable Multifactor Authentication (MFA): Adds an extra layer of protection.
Keep Software Updated: Ensures vulnerabilities are patched promptly.
Despite the evolving landscape of cyber threats, Joe remains optimistic that adherence to fundamental security measures can significantly reduce vulnerabilities.
"If we all did this, then the world would be a safer place." — Joe Tidy [84:56]
Joe Tidy is a renowned cybersecurity journalist and author of the forthcoming book, "Control Alt: How Teenage Hackers Hijack the Internet". His investigative work sheds light on the intricate dynamics of modern cybercrime, bringing awareness to the vulnerabilities and challenges faced in the digital age.
For more information, visit Joe Tidy's website or follow him on his social media channels.
Disclaimer: This summary is based on a transcript provided and aims to capture the essence and key points of the podcast episode. For a comprehensive understanding, listening to the full episode is recommended.