Hunting Warhead Introduces: Click Here

Hunting Warhead Introduces: Click Here

BonusReleased Monday, 18th July 2022
Good episode? Give it some love!
Hunting Warhead Introduces: Click Here

Hunting Warhead Introduces: Click Here

Hunting Warhead Introduces: Click Here

Hunting Warhead Introduces: Click Here

BonusMonday, 18th July 2022
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

hi, i'm kapana i canadians

0:02

living in britain to push myself out of

0:04

my comfort zone and try new things i

0:06

went to birmingham and the west midlands it's

0:08

one of britain's most region

0:10

and also the hosts as the 2022

0:13

commonwealth games join me in the

0:15

new video series as series has all

0:17

the culture, food music and

0:19

outdoor adventures, you could pack into four

0:21

days see another side of britain

0:24

watch this paid content series on

0:26

cbc see a flash visit

0:28

britain today

0:32

this is a cbc podcast

0:36

hackers are out there for all types

0:38

of reasons to spread misinformation

0:41

extort companies or send

0:43

a message you don't often get an inside

0:45

look at how read somewhere groups operate

0:48

but there's a new podcast that does

0:50

just that it's called click

0:53

here are production of the record by

0:55

recorded future and each episode

0:57

introduces listeners to the people and

0:59

ideas shaping our digital world

1:02

click here host dina temple rast

1:04

and reported on a russian read somewhere

1:06

group called conti who's internal

1:08

chat logs were anonymously leaked

1:10

online after conti said it's supported

1:13

president vladimir putins invasion

1:15

of ukraine what those chat

1:17

logs revealed rock the cyber world

1:19

and made clear that running a world

1:21

class ransom were operations isn't

1:24

as easy as it sounds have

1:26

a listen

1:35

back in the fall of twenty twenty two

1:37

hackers started a message threat fingers

1:40

on a keyboard set to launch of wave

1:43

of ran somewhere attacks against some

1:45

four hundred hospitals in the us and

1:47

good

1:48

the cost a bit of a panic and

1:50

developing right now and we're learning about

1:52

learning credible cyber threat targeting healthcare

1:55

system snow we have we have criminal

1:57

hackers from moscow and st petersburg squeezing

1:59

computer systems that are hospitals or to the man

2:02

millions of dollars and ransom payments

2:08

hackers were members of a root for cyber game

2:10

that goes by the name hunting and

2:12

they are what's known in hacking circles

2:14

as big game hunters they

2:17

target single high value targets

2:19

lot of their data and exact suit

2:21

ransoms among other things before

2:23

they take and has to stay still

2:26

important patient and like customer data

2:28

and then these people don't wanna pay up

2:31

a threatened to release they have

2:33

have block where they post

2:35

every didn't change for them in february that's

2:38

what it took a stand on the russian invasion

2:40

in ukraine it said it supported

2:42

mosque

2:47

just a day or two later a new account

2:49

appeared on twitter calling itself plenty

2:51

leagues

2:52

the provided a lead to something extraordinary

2:55

the hands of thousands of the groups internal

2:57

messages so chat logs

3:00

i called this like the the panama papers

3:02

around so actors i think that is a a

3:04

case study be to be done for many years

3:07

the panama papers provided an inside

3:10

look at how the super rich that up offshore

3:12

accounts

3:13

the country leaks are the ransom were equivalent

3:15

because they provide everything from

3:17

mundane details of day to day operations

3:20

that editor

3:21

edit

3:23

i'm been arrested and this

3:26

is quick here today to leak

3:28

everyone in the cyber world is obsessing

3:30

about

3:39

it all began with the short post on twitter

3:42

were using a little ai voice to read

3:44

it

3:45

greetings

3:46

here is a friendly says absorb

3:48

the can't against has lost its it

3:54

it was a link was a wimp will be

3:56

you to download on the the

3:59

one click

3:59

and anyone could download more than

4:02

years wasn't a good internal chat

4:04

messages we promise if is

4:06

very interesting

4:07

needless to say lots of people clicked

4:10

and downloaded

4:12

including this guy emilio guns outs

4:15

he's some canada

4:16

wow how

4:18

, up in a i was just browsing twitter

4:21

and i saw someone someone

4:23

about the candidates

4:26

about thought i was really cool and i i wanted

4:28

to get my i my hands on

4:30

the gonzales is a security analysts

4:32

in canada he was for a financial

4:34

company in defense it's computer network

4:36

from ransom were actors like context

4:39

the stop us from his home office swinging

4:42

back and forth and one of those big

4:44

ergonomic is that gamers have his

4:46

finger nails painted black he

4:48

says the stumbled onto the chat logs by accident

4:51

when he finds himself sneaking moments

4:53

to read through time i've done that for us

4:55

where i think three days now i

4:57

have a day job so i only do it on the

4:59

said that during lunch and

5:02

the evening but

5:04

the price in his how much she identifies with

5:07

cody hackers they do seem

5:09

to be just like us asking for paid

5:11

leave the sharing office gossip enduring

5:14

difficult bosses consider

5:16

the case of the hacker when by the name target

5:19

turns out he's a bit of a jerk boss

5:21

the one of those guys his shows is impatient

5:23

by sending one word emails and success

5:25

it like were

5:29

the saturday before the hospital attacks

5:31

we talked about before he put out in all

5:33

call in the chat not a request for help

5:36

the demand everyone is

5:38

working today he declared no

5:40

explanation no apologies we've

5:43

all had buses like that and go

5:45

down the says after reading all their chat messages

5:48

he couldn't help but

5:49

identify with the want to connect with people

5:51

and they wanna they wanna live their

5:53

life even life there where

5:56

do we consider bad guys

6:01

i would assume that these ran somewhere

6:03

groups were kind of a big ball

6:05

here coalition her collectors and

6:07

the people didn't join ran somewhere groups

6:09

how much is temporarily associate

6:11

with of sort of like com

6:13

that work

6:14

after good hackers wanted it that way they

6:16

could be let loose the world and create

6:18

chaos i assumed they

6:20

didn't like structure

6:22

the county league suggest something else

6:24

entirely

6:25

we clearly see a yorkie of of

6:28

, so you you have the bus yeah team

6:30

leagues and there are different teams

6:32

that were together and as

6:35

he said as he between both

6:37

the colleagues i have a a message

6:40

right arm guns and find it

6:41

the has to chat logs up on computer screen

6:44

so i one of the first things i saw was

6:46

that was ,

6:48

at of candy requesting days of

6:51

the job so as the

6:55

group has more than one hundred salaried workers

6:57

on stacks they have middle managers

6:59

like target managers like we told you about before

7:02

they have worker bee programmers who

7:04

right malicious code that makes ransom were work

7:07

nike team and maintains their servers

7:10

exeter data and can quickly break it

7:12

all down disconnects it's essentially

7:14

if it looks like the already her onset

7:19

there are other things have a surprise you about conti

7:22

for one gonzales says and his very

7:24

french canadian way

7:26

from what he's seen some of the code they used

7:28

to say store encrypted data isn't

7:31

all that

7:31

right so i have a computer science

7:33

background so i know out a program in this

7:35

is not a this , not

7:38

like how

7:40

can i say it respectfully world

7:43

glasgow

7:46

which makes you wonder what else

7:49

isn't quite right about contact

7:51

how could such a sophisticated hacking

7:53

group not in the through chat so

7:55

much as standard practice

7:57

particularly if you're a secret hacker

8:00

you to that question we decided to turn

8:02

to someone who's all about secrecy

8:05

someone associated with the have to this collective

8:07

anonymous

8:08

that a dumb question

8:10

i don't think that's a dumb question and the all

8:13

the dumb part of this is the

8:15

way they did it

8:17

in an unencrypted matter

8:19

that's an unthinkable

8:21

right

8:22

discord yeah a kind of spokesperson

8:24

for anonymous i make those said

8:26

videos with the text to speech voices

8:29

and they're anonymous imagery

8:31

you've probably heard some of his work they

8:33

sound like something out of mister robot

8:35

the breeding citizens of the white this

8:38

is a message to lot of you're coming from

8:40

anonymous

8:41

there was no right the press release on for

8:44

those videos

8:45

anonymous to stay anonymous

8:47

you could say is all about operational

8:50

security

8:51

food is good in his dumbfounded by

8:53

in attention to what they

8:55

must be seeking in their boots right now because

8:57

a lot of their as identities will be revealed through

8:59

these leaks a lot of the

9:01

way they do their operations is gonna

9:04

be exposed so yeah i wouldn't want

9:06

to be them at the moment

9:07

which crazy about all this set

9:10

the leak seems to have taken a page from contests

9:12

on playbook remember one

9:14

of the ways the group pressures people to pay ransom

9:17

is by stealing information and threatening

9:19

to leak companies that encrypt

9:21

their information can't be extorted

9:24

that way and encourage his case

9:26

if this old to a sophisticated aca group

9:28

had just done the most basic thing

9:31

encrypt it's chat we wouldn't

9:33

be talking about the country leaks it all

9:35

it probably wouldn't have happened

9:44

john parker has been tracking conti and

9:46

it's predecessor right for years

9:48

these the head of investigations at trilipix

9:50

a cyber security company and i used

9:53

to be part of the national high tech crime team

9:55

and the netherlands

9:56

and we conducted multiple

9:58

of our rents were invest jason's and that

10:01

kind of flow through

10:02

and our within the work i do now

10:04

we follow all the major groups and conti was

10:06

one that he and his team as intelligence

10:08

analysts are coming through this country lox and

10:11

users that there are lots of interesting things

10:13

in there because

10:14

the very interesting

10:16

conversations that they talk about nicknames

10:18

have we seen before another and summer groups

10:21

the

10:22

we see passwords

10:24

they are connecting the dots

10:26

and two of these dots involve new indications

10:28

that country has some weird ties to

10:30

russian law enforcement and maybe even

10:32

the government the group denies it

10:35

moscow does to the focuses

10:37

taste

10:37

conti leaks does become

10:40

pretty clear now

10:41

consider one of the chat log exchanges in

10:43

which to county hackers are talking

10:45

about a source inside telling cat

10:48

that's the netherlands based investigative

10:50

journalism they focus on fact checking

10:52

in open source intelligence the

10:54

hooker seem to be searching the bell and cat network

10:57

for someone else

10:58

and what really stood out was the

11:00

conversation took place that they

11:02

said like okay this very interesting information

11:05

we need to save this an

11:07

they were really said okay safety says

11:09

that look for stuff that's related

11:12

to nepali

11:13

i'm afraid of only as a jailed russian opposition

11:16

leader who

11:17

the put it mildly is prudent nemesis

11:20

like he knows what

11:22

i saw her

11:23

and twenty twenty after surviving an assassination

11:26

attempt love only worked with building

11:28

cat to identify his would be

11:29

he by soil would him a physical

11:32

doubled over selfish

11:33

the audio from one of those assesses any

11:35

actually confesses to the operation over

11:37

the phone

11:38

nada

11:42

the couch she'll county members talking

11:44

about wanting to grab anything related to know

11:46

on the in the belly cat network you

11:48

don't have to have that suspicious of mine to

11:50

think that's an interesting coincide

11:52

they were really said okay safety

11:54

says that look for stuff that's related

11:57

to nepali

11:58

save it in a folder on the ball

12:00

me fsb

12:02

the fsb russia's federal security

12:04

service it does counter intelligence and

12:06

internal security so this basically

12:08

confirms

12:10

a lot of what we always been suspected obviously

12:13

we don't know if they were actually guided by

12:15

estate that it could indicate

12:17

mike okay looking at this

12:20

they might have been a relationship or

12:23

they are they were already on

12:25

the radar and this is their way of continue

12:27

operations had stayed allowed as

12:29

my call this also

12:31

for me

12:33

finding things like this these low

12:35

links

12:36

what's the claim what they did

12:38

just before the leaks what is at all which

12:40

is affiliation with the russian federation and

12:42

this one that in a clear

12:44

daylight

12:49

hacking group don't usually take sides

12:51

in international disputes or a very

12:54

simple reason it gets in

12:56

a way of making money which is why

12:58

conscious declarations support for russia

13:00

struck people so odd no

13:03

one's exactly sure why twenty did it but

13:05

it could have something to do with it's relationship

13:07

with russian authorities

13:09

they talk about people have to lay

13:11

low because they might be on a list

13:13

from law enforcement it is it's you take

13:16

a day to day business where they try to okay

13:18

we just need to lay low and we

13:20

do our thing and and okay than if

13:22

you lay low for low but then you could continue on later

13:24

so it really seems that they

13:27

were getting some level of protection

13:30

aaron maybe getting kicked off to avoid

13:32

an arrest

13:33

cyber security officials have long sought

13:35

ingrid in russian authorities had been in a marriage

13:38

of convenience can't you makes

13:40

provide a glimpse

13:40

the how that might work sometimes the

13:43

truth is more amazing them with we

13:45

could see goes but for now this is the

13:47

running hypothesis that there is some level

13:49

was interaction has taken place

13:51

and how

13:52

hi that interaction is how close

13:54

relationship is

13:56

i don't know we have to see

14:04

so extraordinary about the conti leaks

14:07

this at the messages allow us to examine the

14:09

group at close range and i'm

14:11

real time with all his eccentricities

14:14

and personalities in the past

14:16

the information we got from these groups came

14:18

in snippets

14:19

some got arrested

14:21

gives us a peek inside conti when

14:23

the hackers guards are down when

14:26

you're just going about their daily lives

14:28

where are they gonna buy or rent the hacking tools

14:30

they need the real somewhere victim

14:32

pay getting paid what you

14:35

know normal office chatter that

14:38

is interesting is all this normal see is

14:40

the chats also do something else

14:42

something far more worrying for clarity

14:45

they provide law enforcement all over the world

14:47

with tens of thousands of leads

14:50

do think this is the end of conti

14:52

maybe is the end of county

14:54

in the fashion that we know the

14:56

bird mind you there's a big difference between

14:59

of being outed or

15:01

be dogs being identified

15:04

being indicted and being arrested so

15:07

there's a big deficit move within that space

15:09

there's still room

15:11

for ah i'm setting

15:13

up a new ransom overseas

15:15

kind of son of conti or clunky

15:17

to

15:18

one of these people are still not arrested

15:21

they can still come at the same crime the

15:23

skill doesn't fade in that regard

15:25

they can would still regroup somewhere else

15:28

which brings us to the unintended thank

15:30

you for a week the way ransom were

15:33

gangs are likely to react

15:35

parker respects the groups will borrow from

15:37

al qaeda in the terrorism model

15:39

that of being a cohesive army they

15:41

could turn into more independent cells

15:43

which are much harder to track

15:46

i wouldn't be surprised long story

15:48

short that this whole eco

15:50

climate of ransom where becomes more fluid

15:53

there's more to sell sustained groups that

15:55

will work less in

15:57

a hierarchy as we saw with conti but

15:59

more network the basis i

16:01

thought to the i wouldn't be surprised to see something

16:03

like that

16:05

more chat came out in early march revealing

16:07

a messages that have been written only days

16:09

before it appears county has

16:11

started dismantling all it's botnet farts

16:13

and it's cleaning out their servers and

16:16

we now know they have a department

16:18

for that i'm dina temple

16:20

reston and desist click here

16:23

the right

16:41

this is click here welcome back

16:44

russia's invasion of ukraine has unfolded

16:46

like an old fashioned kinetic war

16:48

know cluster bombs buyers shattered

16:51

glass and tears information

16:53

wars have always been a bit quieter

16:56

the shaving of beaches here an

16:58

exaggeration there in

17:00

russia so we've been particularly adept

17:02

at weaponizing that old adage

17:05

that elias half way around the world before

17:07

the to can get exclusive

17:09

the here's a surprise

17:11

the conflict lies aren't moving

17:13

as fast as they used to and so

17:16

think that maybe because there's a concerted

17:18

effort to slow them down

17:21

the western officials are pre empting

17:23

russia's misinformation campaign with

17:26

intelligence

17:28

welcome to a new click here feature we

17:31

call three questions the idea

17:33

behind is a simple we talked a smart

17:35

people who thinking about cyber intelligence

17:38

in new ways and then have them explain

17:40

how it's shaping our world today's

17:43

guest is stanford

17:44

amy the dark

17:45

the theater and lies lies in

17:48

algorithms the history and

17:49

the future and american intelligence and

17:52

for decades see guard has been researching american

17:54

intelligence

17:59

the shift in the way to us approaches

18:02

information warfare

18:03

that was sort of our a harbinger of

18:06

how is technology fundamentally reshaping

18:09

the threat landscape the ability

18:11

of intelligence agencies to understand

18:13

it and who is a customer that

18:15

needs intelligence

18:17

this is something that is been really interesting

18:19

is that as russia was trying to sort of

18:21

gin up of misinformation campaign the

18:23

biden administration did something really

18:26

unusual in releasing intelligence

18:28

to kind of short circuit the misinformation

18:30

campaign were you surprised they did that

18:33

our surprise and i think impressed

18:36

they did i think they're really three different

18:38

themes or effects of that strategy the

18:41

first his inauguration the russians

18:43

are pros at deception operations and

18:45

they usually when where they often

18:47

when because once people believe

18:49

a falsehood it's really hard

18:52

to get them the change their beliefs and

18:54

so which one gets that first

18:56

actually really matters

18:57

the writing part of a strategy has been less

18:59

informed the world that they're about to be conned

19:02

by vladimir putin the second goals

19:04

he got says

19:05

it's friction

19:06

the more prudent is put on his backstory the

19:08

harder it is for him to stir up trouble

19:10

elsewhere

19:11

and then the third go i

19:13

think could be what i call for covert

19:16

action in reverse the world

19:18

can't stand on the sidelines hiding behind

19:20

a fig leaf of his false narrative or

19:23

it makes it much harder when all this information

19:25

is in the public or other

19:27

countries to stand on the sidelines

19:29

they have to take a side so i think it's all three of those

19:31

things plane

19:33

you know he needs uses always been that

19:35

there was a sources and methods problem rights

19:37

so how did they get that through this

19:39

time were there weren't you know people shrieking

19:42

sources and methods we can't let this out they'll figure

19:44

out how we notice

19:45

you know if i were gambling woman i would bet

19:48

that there were people shrieking the can't let this

19:50

out right i'm sure there are some interesting conversations

19:52

inside the administration but clearly

19:54

there was there was reward suffer

19:57

if ever you're going to use intelligence

19:59

to try

19:59

the to prevent something bad from happening

20:02

wouldn't be the largest territorial

20:04

aggression in europe

20:06

the world war two

20:07

and so i think that we have

20:09

to be more forward leaning it using intelligence

20:12

not just holding onto those collection stream

20:15

the do you think that this the

20:17

release of intelligence worked do

20:19

think that we have maybe found one way

20:21

to deal with misinformation

20:23

how do we define success

20:26

with a strategy will success i think shouldn't

20:28

be preventing poop and from invading my he

20:30

didn't they that doesn't mean the strategy was misguided

20:33

but i think there's a real glimmer of hope

20:35

in the use of this strategy

20:38

to combat deliberate this information

20:41

operations on mine is

20:43

taking advantage of that time

20:45

dimension i think a lot policies don't take enough

20:47

advantage of what we should speed up and

20:49

, we should slow down and so

20:51

when you give truth a chance to get at first

20:54

get at that's a very promising strategy innocent

20:59

that was amy's he got she's a senior

21:01

fellow at the hoover institution and

21:03

the freeman's vocally institute a stanford

21:06

university she's also the author of the

21:08

new book spies lies and alvarez

21:10

the history

21:11

in future of american intelligence

21:25

you are the big cyber and and

21:27

origin story of the week

21:29

go underground citing intensifies in

21:31

ukraine there's a new volunteer

21:33

force taking the fight into cyberspace

21:36

the ukrainian government calls it is

21:38

ickes rooms

21:39

the cop ukrainian cyber security

21:41

officials sister sarah says hundreds

21:44

of thousands

21:45

during their ranks ukrainians

21:47

all over the globe are ,

21:50

united , our

21:52

country in cyberspace enter

21:56

i know that so russians things

21:58

that only super countries

22:01

super states can provide these attacks

22:04

but , we see more than

22:06

four hundred thousand people

22:09

are united in this eighty ah

22:12

army

22:13

just i was set to the solent here's our

22:15

is unclear russian government website

22:17

has been under a huge number of de

22:19

dos attacks but they've been able to recover

22:22

from the analysts are are worried

22:24

that this

22:25

either called arms violates

22:27

international nord

22:30

the defense department's chief information

22:32

officer john sherman told the record

22:34

in an interview that in anticipation

22:36

of possible cyber attacks from russia he's

22:39

in daily contact with us cyber

22:41

command and an essay chief general poll

22:43

numbers sony while , wouldn't talk

22:45

about the discreet steps to us is taking

22:47

to guard against as attacks he

22:49

said he's working with combatant commands to

22:52

make sure america's most sensitive networks

22:54

are being taken care of in a proactive

22:56

way he says is tending to that constantly

23:00

and finally the cyber security firm

23:02

proof ploy has discovered what

23:04

it says is likely

23:05

isn't campaign

23:08

targeting edu officials dealing

23:10

with the refugee crisis in ukraine

23:12

proof points as hackers may have compromised

23:15

a ukrainian armed forces email

23:17

account in order to target edu

23:19

officials managing logistics

23:21

the the refugees

23:23

email pretended to be about information

23:25

about a un security council decision

23:27

and when opened planted say seat malware

23:30

her for linked to attack to a group known as

23:32

ghostwriter

23:33

in there thought to be linked to belive ruth

23:45

episode was produced by sean powers

23:47

and will jarvis it was edited by karen

23:50

doesn't and levinson composed

23:52

our theme in original needs to the episode

23:54

the weed additional music from blue dot

23:56

such

23:57

what years a production of the

23:59

record media

23:59

and we'd want to hear from you please

24:02

leave us a review and rating wherever you get

24:04

your podcasts and you can connect

24:06

with us at click your show dot com

24:09

i'm you know temple rested

24:10

we'll be back on tuesday

24:15

this has been an episode

24:17

from click here a podcast

24:19

about the world of cyber and intelligence

24:21

you can listen to more episodes every tuesday

24:24

wherever you get your podcasts

24:27

for more cbc podcasts go

24:29

to cbc dot ca slash

24:31

podcasts

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features