Logo
    Search

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    enJune 16, 2024

    Podcast Summary

    • North Korean IT scamNorth Korean agents exploit US corporate registration processes to orchestrate IT scams using fake US companies, hiring Americans to set up laptops with remote access software for North Korean workers, funneling money back to North Korea under the guise of legitimate IT services.

      North Korean agents have been using US-registered companies with fake identities, such as Riley Park, to orchestrate a large-scale IT scam. These companies hired Americans to set up laptops with remote access software, allowing North Korean workers to perform IT work remotely. The scheme then funnels money back to North Korea, making it appear as if legitimate IT services were being provided. This operation, which is likely used by many companies, raises concerns about the ease with which North Korean agents can exploit US corporate registration processes to fund their activities, including potentially illegal ones. The FBI has been investigating this scheme extensively, and it's important for businesses to be aware of the risks associated with hiring freelance IT workers through anonymous registration services.

    • North Korean IT services operationNorth Korea operates a large-scale IT services operation using registered agents in the US, providing legitimate services while circumventing economic sanctions

      North Korea's cyber activities extend beyond ransomware and hacking, as they have been running a large-scale IT services operation using registered agents in the United States. This operation, which allows people to register businesses anonymously, has been used to provide legitimate IT services while circumventing economic sanctions. The operation was discovered to be based in North Korea, with IT workers posing as digital assistants working from the US. The story is surprising as it doesn't fit the typical narrative of North Korean cybercrime, and the use of IT services to fund potentially harmful activities is an ironic twist. The Wyoming Secretary of State took action by revoking the business licenses of three implicated companies. The operation has been ongoing for a while and involves a significant number of people in the US. The story raises questions about the ethical implications of the free market and the capabilities of untrustworthy actors to monetize their tech capacity. While this story is not about defending North Korea, it's worth noting that other companies and individuals have also experienced significant breaches, such as TikTok, which had a no-click, zero-day exploit that compromised the accounts of high-profile individuals and companies.

    • TikTok vulnerabilityRecent TikTok vulnerability allows hackers to gain access without user interaction, highlighting the importance of staying informed and taking precautions to protect against advanced attacks

      The cybersecurity landscape is constantly evolving, as demonstrated by the recent discovery of a vulnerability in TikTok that could allow hackers to gain access to user accounts without any user interaction. This comes at a time when TikTok's security practices have been under intense scrutiny due to concerns over potential surveillance by the Chinese government. This type of attack, which requires no user action, is considered the holy grail of hacking as it allows the attacker to gain access with minimal effort. It's a reminder that even seemingly harmless actions, like opening an email or clicking a link, can have serious consequences. The use of advanced technology, such as IMSI catchers, to carry out these attacks is becoming more common, making it crucial for individuals and organizations to stay informed and take necessary precautions to protect themselves. Additionally, the ease of access to such technology raises questions about its use by law enforcement and the potential for misuse.

    • Technology threats and cybersecurityStay informed about the latest technology threats and vulnerabilities, and implement robust cybersecurity measures to prevent incidents and ensure continuous protection.

      The use of technology for illegal activities, such as setting up fake cell towers for phishing scams or selling WMDs, is a serious concern. However, it's important to also focus on legitimate uses of technology, such as building a successful business with the help of platforms like Shopify. In the realm of cybersecurity, staying informed about the latest threats and vulnerabilities is crucial. For instance, in 2023, 10 vulnerabilities accounted for over half of the incidents responded to by Arctic Wolf. By accessing the Arctic Wolf Labs 2024 Threats Report, businesses can gain valuable insights into attack types, root causes, and top vulnerabilities. Additionally, implementing robust cybersecurity measures like ThreatLocker's Zero Trust Endpoint Protection Platform can help prevent threats and ensure 24/7/365 protection. Overall, it's essential to stay informed and proactive in both the tech world and the cybersecurity landscape.

    • Microsoft's new recall featureMicrosoft's new recall feature for Windows, which takes frequent screenshots for a searchable database, has sparked privacy concerns and criticism for potentially gathering excessive data and security risks.

      Microsoft's new recall feature for Windows, which aims to create a searchable database of user activity through frequent screenshots, has sparked concerns about privacy and data collection. The system, which is part of Microsoft's broader AI integration announcement, has been criticized for potentially gathering excessive data and the potential security risks associated with screenshots. Microsoft initially planned to launch the feature as an opt-out option, but quickly changed course due to backlash from the security community. The debate raises questions about the implications of increasing reliance on technology for memory and cognitive tasks, and the potential impact on mental health and privacy. It's important for individuals and organizations to consider these issues as technology continues to evolve.

    • Creative Cloud data ownershipAdobe's new terms of service raised concerns about data ownership and privacy for creatives using their Creative Cloud software, leading to a public backlash and clarification from Adobe

      Adobe's new terms of service for their Creative Cloud software sparked controversy among creatives and raised concerns about data ownership and privacy. Adobe, which dominates the creative industry with its suite of tools, came under fire for the new terms that would allow the company to perpetually license any content created using their software, effectively claiming ownership of creators' work. The backlash led Adobe to clarify their stance, but the incident highlights the complex relationship between creators, their work, and the software companies that enable their productivity. It also underscores the growing importance of data and AI in the creative process and the potential implications for artists and designers. The incident also reflects Apple's reputation as a company that values user privacy and security, which stands in contrast to Adobe's handling of the situation.

    • Apple's Private Cloud ComputeApple's Private Cloud Compute is a new solution to balance local processing with server access for advanced AI features, while preserving privacy through encryption and partnerships. However, concerns exist about increasing off-device processing and potential privacy slippages.

      Apple has long positioned itself as a champion of privacy, but with the integration of AI services into devices, the company has had to find a way to balance local processing with the need to reach out to servers for more advanced features. Apple's solution, called Private Cloud Compute, aims to preserve privacy by limiting data sent to servers, but it also creates a massive target and raises concerns about a slippery slope of increasing off-device processing. Despite these concerns, Apple has taken steps to ensure privacy and security with the use of encryption and partnerships with trusted companies. However, Apple's late entry into the AI game, and its decision to partner with OpenAI, which Elon Musk has criticized, has raised eyebrows and questions about the company's commitment to privacy. Overall, Apple's Private Cloud Compute represents a significant shift in the tech industry, and it will be interesting to see how it evolves and how it is received by users and privacy advocates.

    • Apple's focus on enhancing SiriApple is improving Siri's understanding of plain language sentences and integrating it with other apps, showcasing the potential of LLMs and their ability to work collaboratively in a hierarchical model, leading to significant improvements in efficiency.

      Despite Siri's 15-year existence and Apple's reputation for innovation, the functionality and integration with external apps have been lacking, leaving users disappointed. The recent explosion of generative AI technology forced Apple to pivot and focus on enhancing Siri's capabilities locally on devices. However, the benefits of these advancements do not directly concern OpenAI. Instead, Apple has been improving Siri's understanding of plain language sentences and integrating it with other apps, which are all Apple's local developments. The research using GPT-4 to find zero-day vulnerabilities showcases the potential of LLMs and their ability to work collaboratively in a hierarchical model, leading to significant improvements in efficiency. This shift in perspective opens up new possibilities for the growth potential of LLMs and the role they play in our technology landscape.

    • AI organizational structuresImplementing a hierarchical structure with task-specific AI agents can lead to a 150% improvement in productivity and efficiency compared to a single AI agent.

      The organizational structure and management of AI agents, such as language models (LLMs), can significantly increase their productivity and efficiency. This was highlighted in a study that showed a 150% improvement when a hierarchical structure with task-specific agents was implemented, compared to a single LLM. This concept is reminiscent of the nonlinear gains in AI quality output from human reinforcement. As AI continues to advance, the way we organize and manage these agents will become increasingly important, potentially leading to new developments in the field of AI organizational behavior. This could allow for greater specialization and coordination among AI agents, leading to more efficient and productive outcomes. The potential implications of this are vast, from improving IT projects to raising ethical concerns about the use of AI resources. The study of AI organizational structures is an exciting and developing field, and it will be interesting to see how it unfolds.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices