How clicking a single link can cost millions | Ryan Pullen
TED TechApril 19, 202416:5915.55 MB

How clicking a single link can cost millions | Ryan Pullen

Is cybercrime getting easier? Cybersecurity expert Ryan Pullen dives into his work investigating massive digital breaches and testing security blindspots — which led to him gaining access to the software controls of a well-known building in London. Learn more about how cybercriminals exploit human vulnerabilities and hear the latest on how to recognize and protect yourself from scams.



Hosted on Acast. See acast.com/privacy for more information.

Is cybercrime getting easier? Cybersecurity expert Ryan Pullen dives into his work investigating massive digital breaches and testing security blindspots — which led to him gaining access to the software controls of a well-known building in London. Learn more about how cybercriminals exploit human vulnerabilities and hear the latest on how to recognize and protect yourself from scams.



Hosted on Acast. See acast.com/privacy for more information.

[00:00:00] .

[00:00:05] .

[00:00:10] .

[00:00:15] The first time I fell for a scam, it was 8 o'clock at night. I was tired. I had just made it home to my New Jersey apartment after a late class and long train ride out of New York City.

[00:00:27] My phone rang as I was unloading my laptop from my book bag and rummaging through the fridge for a quick dinner. An 800 number glared at me from the screen.

[00:00:36] It looked like it may have been important, especially a call from a corporation after regular business hours.

[00:00:42] The guy on the other end of the phone said he was calling from my bank and needed to verify some information to upgrade my credit card.

[00:00:49] I told him I wasn't interested in another card, but he insisted it was a special promotion. And since the bank was phasing out my existing card, he just needed to verify my birthday.

[00:00:58] Besides, this new card had more perks. After a few minutes of back and forth and a bit of confusion, I relented and verified, confirming my address, age, and the last few charges.

[00:01:11] The guy was polite and friendly, but something still felt off.

[00:01:16] Afterward, I called the bank and they told me they would never call me after hours or pitch me a credit card in that way.

[00:01:23] I asked them to block it immediately, but the damage was done.

[00:01:30] I'm Sherelle Dorsey and this is TED Tech.

[00:01:33] The talk we're going to listen to today is from cybersecurity expert Ryan Pullen, who shares with us that even as the technology behind scams grows more sophisticated,

[00:01:43] it's still human-led behavior that causes us to let down our defenses.

[00:01:48] He goes on to share some simple principles on how we can all stay diligent so that the scammers don't win.

[00:02:07] This show is brought to you by Schwab.

[00:02:10] You're here because you like to keep a pulse on trends in technology.

[00:02:14] Well, now you can invest in what's trending – in artificial intelligence, big data, robotic revolution, and more – with Schwab investing themes.

[00:02:24] It's an easy way to invest in ideas you believe in.

[00:02:28] Schwab's research process uncovers emerging trends, then their technology curates relevant stocks into themes.

[00:02:36] Choose from over 40 themes, buy all the stocks in a theme as-is or customize to better fit your investing goals – all in a few clicks.

[00:02:46] Schwab investing themes is not intended to be investment advice or a recommendation of any stock or investment strategy.

[00:02:55] Learn more at schwab.com slash thematic investing.

[00:03:02] This episode is brought to you by Progressive.

[00:03:04] Most of you aren't just listening right now. You're driving, cleaning and even exercising.

[00:03:09] But what if you could be saving money by switching to Progressive?

[00:03:12] Drivers who save by switching save nearly $750 on average, and auto customers qualify for an average of 7 discounts.

[00:03:20] Multitask right now. Quote today at progressive.com.

[00:03:24] Progressive Casualty Insurance Company and Affiliates.

[00:03:26] National average 12-month savings of $744 by new customers surveyed who saved with Progressive between June 2022 and May 2023.

[00:03:35] Potential savings will vary. Discounts not available in all states and situations.

[00:03:41] Hey listeners, before we kick off today's episode, I want to give a shout out to one of our favorite podcasts, Masters of Scale.

[00:03:48] Every week on Masters of Scale, Reid Hoffman, co-founder of LinkedIn, meets with some of the world's most successful entrepreneurs discussing the strategies that got them to where they are.

[00:03:57] You'll hear from entrepreneurs like former Burberry CEO Angela Arendt, Imagine Entertainment's Ron Howard and Brian Grazer, Airbnb's Brian Chesky and many other iconic founders.

[00:04:08] Be sure to search for Masters of Scale wherever you get your podcasts.

[00:04:12] I received a phone call from somebody who needed my help.

[00:04:16] And they explained to me that this organization had suffered a cyber attack, more specifically a ransomware attack which is designed to both steal your data and make it unusable.

[00:04:29] It replicates itself throughout the business and can drive you down to paper-based controls.

[00:04:36] And this was an opportunity that I saw where I could influence something positively.

[00:04:42] And it was my job to investigate what had happened, how it happened and why.

[00:04:50] And I saw something that I hadn't experienced before firsthand.

[00:04:55] In 2017 the NHS suffered something similar and it cost nearly 100 million pounds to recover.

[00:05:03] This incident cost around five million pounds to recover and took 14 months.

[00:05:08] Yet what I saw was the human impact.

[00:05:12] How this happened, a single individual clicked a link and a single individual enabled this unknowingly to happen to an organization.

[00:05:21] Multiple people were signed off sick due to stress and multiple people weren't able to go to work the next day and carry out their job.

[00:05:31] Now for me cyber security is a very technological focused term.

[00:05:37] And yet IBM did a study in 2021 and 95% of cyber attacks used the human element.

[00:05:48] Now that's all well and good, but what does that actually mean?

[00:05:53] It means people can be exploited too.

[00:05:57] There's no lines of code and there's no fancy software.

[00:06:00] Cyber security is, as far as the media is concerned, maybe teenagers in their bedrooms causing trouble, stealing things and learning how to use them.

[00:06:11] Yet what people don't see is the impact and how is day-to-day life.

[00:06:17] And this incident for me made me think slightly differently around cyber security.

[00:06:23] And recently I had an opportunity which presented this thought process.

[00:06:30] I was commissioned to evade security controls for a very well-known building in London.

[00:06:38] That's a snazzy way of saying break in.

[00:06:41] And effectively it was my job to see if I could get past the security controls and get into the building.

[00:06:48] And so for me thinking kind of outside of the box, this building has floor to ceiling doors, 24-7 security team, endless budget for this kind of thing based on where they are.

[00:06:59] And so thinking slightly outside I needed to come up with a different plan.

[00:07:06] And what I did was I tried to go down the social engineering route, which is the art of kind of deception and making people believe something without the full information.

[00:07:19] And what I did was I walked in the front door dressed quite similarly to this and I was greeted by eight people.

[00:07:29] I thought, oh, it's a bit over the top.

[00:07:33] And it's because every single person should have the right information and should know where they're going.

[00:07:41] It's very rare for them to be visitors.

[00:07:43] And this person asked me, why are you here? Who are you here to see?

[00:07:48] And I explained I didn't have an appointment but I was here to see a specific person.

[00:07:52] And they said, yeah, there's no chance of getting in.

[00:07:54] And I thought, oh, goodness, I'll travel this way.

[00:07:58] And yet what I know is people are empathetic and people want to help each other.

[00:08:03] And so I made up a story and I said I was here for a legal matter and I was only able to achieve what I needed to achieve on these premises.

[00:08:11] And they said, yeah, sorry, we're still...

[00:08:14] And I explained the urgency and I made them feel sorry for me.

[00:08:19] And when I was thinking about giving this talk I was going to pause and I was going to pretend that I was struggling.

[00:08:25] And that motion that you would have felt where you wanted to help me or you wanted me to continue is exactly how this person felt.

[00:08:33] They felt they were stopping me from doing my job, which they were, but not for how they expected it.

[00:08:41] And so I pretended to be on the phone in the foyer, pacing up and down, pretending to be aggravated.

[00:08:47] And then the manager came across with a QR code for me and said, so sorry, so sorry for the issues, no problem.

[00:08:53] And they showed me around a side passage away from the two rounds of security.

[00:08:58] So I had my laptop bag with me with the evidence and it wasn't checked and I was able to go in and I was able to go to the floor that I needed to.

[00:09:09] And I was paid as a cyber security expert to evade the controls of this building and all I did was ask for access and make someone feel sorry for me.

[00:09:19] And so that's two very different perspectives.

[00:09:23] One, the five million pound job and took 14 months to recover where I was helping people, but the second I was the aggressor or the person trying to get in.

[00:09:32] Now this is all enabled through the way that humans exist and human behavior.

[00:09:38] And cyber security as a whole doesn't really represent that in a way that is sufficient, I don't think.

[00:09:45] And so I have one more narrative and different perspective to share and it's when I was a victim.

[00:09:52] This happened only a few weeks ago.

[00:09:56] And what happened was I received a phone call.

[00:09:59] It was around 8 p.m. I received a phone call from a phone number.

[00:10:05] And they said, hello is this Mr. Pullen?

[00:10:07] And I said yes.

[00:10:09] And they said, we've seen your bank cards be used in a different part of the country.

[00:10:14] And I thought, oh goodness.

[00:10:17] And what they explained was they explained there's been three different transactions and would they like to block them for me?

[00:10:22] I said, yes, please. That would be really helpful.

[00:10:26] And I Googled the number out of instinct and it was the phone number from the fraud line in the bank.

[00:10:34] And something didn't add up.

[00:10:37] I'm a bit of a pessimist. I don't really trust people.

[00:10:41] And so I was instantly on the back foot and they're saying all of these things and they were confirming my identity.

[00:10:47] They told me where I lived.

[00:10:48] They told me my mother's maiden name.

[00:10:50] And they told me a few other bits of information that a bank would know.

[00:10:54] And all of this is to build a perception of credibility.

[00:10:58] Why shouldn't I trust you?

[00:11:00] And why shouldn't you be phoning me to help me?

[00:11:04] And we go back and forth for around an hour and a half.

[00:11:08] And there was a few things that didn't sit right with me.

[00:11:11] And so when I was a hold when they were blocking my transactions,

[00:11:16] I phoned the actual fraud line and I said, is there a way that I can verify their identity?

[00:11:20] The person on the phone said they sound very professional and legitimate.

[00:11:24] And they were. I asked for their name and they had a fake LinkedIn profile.

[00:11:28] They had a fake crime reference number for me.

[00:11:32] And me experiencing this firsthand, having investigated things like this on a regular basis for mortgages and transactions ending up in the wrong place,

[00:11:43] I knew something wasn't sitting quite right.

[00:11:45] And this the true person put a note on my account and I explained to the person, can you tell me what the note says, please?

[00:11:54] That was the first time they got a little bit flustered.

[00:11:57] And it took them five minutes and they said, yeah, we'll go and check with the accounts team.

[00:12:00] But in the meantime, can you tell me the code that it says in your mobile app?

[00:12:04] At which point I hung up, got my cards replaced and I was okay.

[00:12:08] But these three narratives of cyber crime or scams or criminal behavior are all technology focused with the end goal but are human led.

[00:12:21] And you may ask, how is this possible?

[00:12:25] Why can this be so easy?

[00:12:27] I've literally just walked into a building and asked someone to let me in with a fake story.

[00:12:33] And someone's phoned me up with a small piece of information and built this incredible picture around.

[00:12:38] Okay, yes, I should trust you.

[00:12:41] And it's because data has a value in different pockets.

[00:12:47] And with small bits of information, you can build quite a narrative, as you can see.

[00:12:54] And so today what you would be able to do on the kind of criminal underground, if you like, would be buy a thousand email addresses and passwords for around six US dollars.

[00:13:06] A cup of coffee in some places, right?

[00:13:09] That's a thousand people's account details that you may be able to log into or have tangible information to create a case.

[00:13:17] And that might be pretending to be Amazon for a password reset.

[00:13:20] It might be what location you went on holiday and we're going to do a bit more of a targeted attack that way.

[00:13:27] And this information is available because of vulnerabilities from a technical standpoint, yet this is to exploit the human behaviors.

[00:13:37] Take my parents, for example. I think I'm in cybersecurity because my parents give me a balance.

[00:13:42] My mom is 110 percent optimist. Nothing's going to go wrong.

[00:13:46] Everything's okay. No one's going to hurt my little boy and all of this sort of stuff.

[00:13:50] And my dad's much more on the pessimistic end where why do you want to know me? Why do you want this information?

[00:13:57] And so that balance for me brings kind of both sides of the story.

[00:14:04] And my mom is the sort of person that would have shared the traditional WhatsApp messages, 250 pounds at Christmas,

[00:14:11] how lovely that would be, pay for your Christmas lunch and all those sorts of things.

[00:14:16] And that then becomes a whole different attack vector because it's coming from someone you trust and they're sharing your link

[00:14:23] and they're sharing something you might want to click and you begin to trust even more.

[00:14:28] So my talk is around really focusing on the ways in which human behavior is exploited and how we can benefit and protect each other.

[00:14:38] And it's okay to call these things out.

[00:14:40] And so there's some basic things you can do, such as resetting passwords and making sure you're not using the same password for your accounts.

[00:14:47] Because if one of your passwords did get leaked, you would like to know, okay, it's just this one account.

[00:14:51] And I understand that's the one I need to look after when many people will use the same profile Facebook, their bank, their online banking, sorry,

[00:15:00] and sites that you can purchase things.

[00:15:03] So you might be able to go on Amazon and buy an iPhone with someone's username and password, right?

[00:15:08] Bank account details are stored.

[00:15:11] And that creates a whole different perspective of risk and cybercrime.

[00:15:16] And so for me, I don't believe any generation can avoid this anymore.

[00:15:23] Children are being raised with iPads and older generations are online shopping because of convenience and accessibility to services they may not have had before.

[00:15:32] And so I believe that understanding how these things may happen and putting some light on them

[00:15:40] can really impact the way in which people conduct themselves and challenge when things may not feel quite right.

[00:15:49] And so for me, going through this journey, and there's three different perspectives.

[00:15:54] The one where I was the person helping five million pounds and seeing people really suffer.

[00:16:00] The second one where I was putting people potentially in that position, however, fully ethically, and I was meant to be there for my job.

[00:16:07] And the third where I was the victim.

[00:16:10] It shows that it can take many different shapes based on information and information can come from social media.

[00:16:18] And so if you're going on holidays in Mexico, say for your honeymoon, you've saved up all of this money.

[00:16:24] Wonderful. Have a lovely time.

[00:16:27] Yet someone you know or an acquaintance or you have public visibility of your arrangements

[00:16:36] if someone knows that information and they know the bank you may work with,

[00:16:41] they could phone you whilst you land and say we've seen your card be used in this location.

[00:16:48] Now, how are you going to feel if someone saying your cards being used and it's you?

[00:16:53] You're going to feel, OK, cool. Yeah, this is me. No problem.

[00:16:57] And they say, OK, can you just confirm your identity because we want to make sure this is you.

[00:17:04] Can you just tell me your card number?

[00:17:06] So you do. And then you ask why you're there. I'm on my honeymoon.

[00:17:09] Have a lovely time. All of these social engineering empathetic side of behaviors.

[00:17:16] And then you get down into the more conversational elements.

[00:17:19] OK, can you just confirm your card isn't going to expire? When does it expire, please?

[00:17:23] There's many different ways you can pose questions to make people feel acceptance.

[00:17:28] And then lastly, can you just check the security pin so I know which card I'm going to disable?

[00:17:34] And by that time what you've done is you've told someone you've got money in your bank

[00:17:38] because you've been saving for this wonderful occasion.

[00:17:41] And also you're not going to be in the country to do anything about it.

[00:17:45] And so from a cybersecurity perspective, exploitation can happen in many different ways

[00:17:50] and I don't think it's publicized around the human elements enough.

[00:17:54] And so if you take one thing from today, I ask that you see this as your opportunity

[00:18:00] to make sure that you protect your own information and your loved ones and your identity online.

[00:18:08] There's no problem with using social media.

[00:18:10] All I ask is you consider who you're sharing that information with.

[00:18:14] The reason being that information is valuable even if it's not to you.

[00:18:18] It could build a picture and it could cause you some trouble.

[00:18:23] Consider who you share your information with. Thank you.

[00:18:31] This podcast is supported by Tools and Weapons, the podcast hosted by Microsoft Vice Chair and President Brad Smith.

[00:18:38] Each episode features insight you won't find anywhere else from the center of the conversation surrounding emerging technologies like AI.

[00:18:45] Right now on the podcast you can hear a special episode where Brad Smith lays out Microsoft's vision

[00:18:50] for a vibrant marketplace driving the new AI economy.

[00:18:54] To hear more, follow or subscribe to Tools and Weapons with Brad Smith wherever you get your podcasts.

[00:19:02] You're growing a business and you can't afford to slow down.

[00:19:05] If anything, you could probably use a few more hours in the day.

[00:19:08] That's why the most successful growing businesses are working together in Slack.

[00:19:13] Slack is where work happens with all your people, data, and information in one AI-powered place.

[00:19:19] Start a call instantly in huddles and ditch cumbersome calendar invites.

[00:19:24] Or build an automation with Workflow Builder to take routine tasks off your plate, no coding required.

[00:19:30] Grow your business in Slack. Visit slack.com to get started.

[00:19:43] TED Tech is part of the TED Audio Collective.

[00:19:46] This episode was produced by Nina Lawrence, edited by Alejandro Salazar, and fact-checked by Julia Dickerson.

[00:19:53] Special thanks to Maria Ladias, Ferre de Grange, Corey Hajime, Daniela Valerezo, and Michelle Quint.

[00:20:01] I'm Sherrell Dorsey. Thanks for listening and talk to you again next week.

[00:20:16] you