Share this post

🔑 Key Takeaways

  1. Playing poker requires skill and practice, and while online poker may seem convenient, cheating is not worth the risk. Honesty is still the best policy, even with high stakes involved.
  2. Don't ignore your instincts in unfamiliar surroundings. Take necessary precautions and report any suspicious activities to the hotel staff for a safe and enjoyable stay.
  3. Always keep your electronic devices password-protected and use more secure keycards or access methods to avoid data theft and hackers.
  4. The magstripe technology used in hotel room keys is vulnerable to damage from powerful magnets, allowing intruders to prevent access to a specific room. LoCo magstripes used in hotel room keys can be easily damaged, making them more vulnerable to attack and possibly theft. It's important to be aware of these vulnerabilities and take measures to protect your belongings when staying in hotels.
  5. Cybersecurity is crucial in protecting sensitive data while traveling. Always remain vigilant and seek expert help if suspicious activity is detected.
  6. Professional poker players should take precautions to safeguard their laptops from third-party malware, as cyber-criminals use Trojanized pot odd calculators to steal money. Tournament organizers should involve law enforcement to handle such cases.
  7. At least seven high stakes poker players fell victim to an 'Evil Maid Attack,' where someone with access to their hotel room hacked their computer and planted malware to gain an advantage. The investigation has stalled, and the authorities have limited authority to investigate.
  8. Protect yourself from cyber fraud with a trusted antivirus program and be cautious of downloading anything online.
  9. Online poker hackers can go to any length to win, and experts like Mikko are needed to unravel their malicious activities.
  10. The first PC virus, created in 1986, had no malicious intent and was made for a chuckle. It paved the way for the emergence of PC viruses, which we still battle today. Malware historian Mikko Hypponen has analyzed its impact.
  11. Early virus writers created viruses for fun whereas current ones do it for money or organized crime. Early viruses were harmless and even artistic, but encryption has become their weakness.
  12. Running malware in a virtual machine can help to detect encrypted viruses. The discovery of the first Windows virus in 1992 marked a shift in the computer industry towards Windows systems, and away from MS-DOS.
  13. The rise of e-mail worms and botnets in the early 2000s posed a significant threat, but with the development of antivirus updates, Mikko and his team were able to save the world from destruction.
  14. Fighting malware requires collaboration between antivirus companies, authorities, and internet operators, and sometimes alternative communication methods must be used to protect against the spread of the virus.
  15. As technology becomes more connected and vulnerable, cybersecurity professionals like Mikko Hyppönen strive to protect users and celebrate victories while F-Secure creates a positive culture.

📝 Podcast Summary

The Game of Poker: Skill, Cheating, and Honesty

Poker is a game of skill where the player who plays the person, not the cards, wins. While online poker offers convenience, it also invites cheating. Players may go to great lengths to gain an edge, like Darren Woods who set up fifty different accounts on an online poker site and played multiple accounts at once to cheat. However, his cheating was detected, and he was banned and sentenced to prison. Another player, Jens Kyll nen, has been successful in playing poker both online and in-person over the years. Being a good poker player requires practice and skill, and even with high stakes involved, honesty is still the best policy.

Trusting Your Gut Instincts to Ensure Safety in Hotels

Jens decided to play in a poker tournament, putting a million of his own dollars at stake despite it being a gamble. He lost his chips on day two of the tournament and went up to his room. Upon entering, he realized his laptop was missing but found his charger in its place. Henri's key wasn't working that day either and Jens questioned his sanity when the laptop suddenly appeared ten minutes later where he left the charger. He got scared and left the room to talk with Leia, the guest relations supervisor, who re-coded their keys and the lock on the door. It's always important to ensure safety when staying in hotels and trust your gut instincts.

A Hacker-Induced Security Breach in a Hotel Room.

A hacker stole Jens' heavy Fujitsu Celsius laptop from his hotel room after deactivating his key card. Despite the hotel security's lack of proper investigation, Jens found his laptop with the help of the poker tournament security team. However, he noticed that the laptop was hacked as it was no longer password-protected. This incident left Jens feeling defiled and eroded his sense of security. While it is speculated that someone could have cloned his card, it is unlikely as it was a magstripe card that requires swiping the card through a machine to be cloned.

Vulnerability of Hotel Room Keys to Intruders

The magstripe technology used in hotel room keys is susceptible to damage from powerful magnets, which can explain why Jens' keycards were ruined. This could be used as a way to prevent someone from entering a particular room by an intruder. The use of LoCo magstripes in hotel room keys, which can be easily damaged, makes them more vulnerable to this type of attack. It's possible that the theft of the key and cloning of the card was carried out by someone who had access to the reprogrammed keycards, possibly an inside job. The hotel's security does not seem interested in helping, which adds to the suspicion. Despite being provided with a printout of keycard logs, Jens is still unsure of how to proceed.

Cybersecurity breach on high-stakes poker player

Jens suspects his stolen laptop was targeted at him as a high-roller online poker player. F-Secure Corporation's analysis reveals that his laptop was infected with a Java-based remote access toolkit that allowed someone to see his poker cards. This proves that there was a planned attack on Jens, and not just a random theft. Hotel security failed to see the same log entry that was alarming to Jens. Frustrated with the lack of help, Jens decides to leave the hotel and head straight to F-Secure Corporation in Finland. The incident reveals the importance of cybersecurity and highlights the need to be vigilant while traveling with sensitive personal or business data.

High-rollers Beware: Online Poker and Cybercrime

High-rollers who play poker online are at a risk of losing hundreds of thousands or even millions of dollars to cyber-criminals who use Trojanized pot odd calculators to steal money. Professional poker players should be careful while using laptops for transactions involving large sums of money. They should avoid installing random junk on it, and not use it for playing games or watching porn. They should keep the laptop safe if they are not using it. Cyber-criminals outsource malware development to third parties to cover their tracks. WHOIS records can help track down cyber-criminals, but they generally register domains anonymously. Poker tournament organizers should consider involving law enforcement authorities to handle such cases.

High Stakes Poker Players Targeted by 'Evil Maid Attack'

High stakes poker players have fallen victims to 'evil maid attack' where someone with access to their hotel room hacks their computers. The hacker plants malware that allows them to see their hole cards, giving the hacker an edge in playing the same online table as their victims. The attack has affected at least seven high stakes poker players. The investigation has stalled, and the authorities have limited authority to investigate. PokerStars, the tournament run where the affected players met, has confirmed the incidents and is doing what they can to investigate. However, it is not safe for some victims to come out and tell their story, either out of fear or other reasons.

Hacker sentenced for stealing millions from high stake poker players

A hacker broke into homes of high stake poker players between 2008 and 2014, planted Trojans on their laptops and gained access to their cards which were clearly visible on his own computer. Danish police seized four million US dollars worth of Danish money and sentenced a thirty-two-year-old Danish hacker, possibly Peter Jepsen, to two and a half years in prison in December 2019. Jepsen was once a member of a poker team but his blog and social media have been silent, suggesting he might have been imprisoned. A trustworthy antivirus program could have avoided such cyber fraud hence internet users should be wary of downloading anything online.

The Intricacies of the High-Rolling Poker Player Hacking Case Unveiled.

The high-rolling poker player hacking case involved a Swedish biker gang, and while one hacker (Peter Jepsen) was caught and imprisoned, others may still be at large. This shows the extreme lengths some hackers go to get an edge in online poker. Mikko, a renowned information security expert, was born around the same time as the creation of the internet and has spent his whole life focusing on it. He started programming at age 14, in 1984, after his family got a Commodore 64. His mother also worked in the technology field. Technology and computers seem to run in his family.

The First PC Virus and Its Historical Significance

The first PC virus, Brain, was created in 1986 and the early malware writers did not have motives. Malware writing was not illegal and there were no laws against it. The motive of the early malware writers was just a chuckle that their malware is spreading worldwide. The first PC virus has a historical significance because it can be seen as the root from which the PC virus emerged, and we still fight PC viruses even today. Mikko Hypponen is a security-type worker who started working at F-Secure in 1991 and has been there since then. He is a malware historian and he has analyzed the Brain virus when he started professionally doing malware analysis.

Evolution of Virus Writing from Art to Criminal Activity

Early virus writers did it for fun and thrill, unlike current online criminals who do it for money, spying, or organized crime. Early viruses either did nothing except spread further or were destructive. Many of them played music, showed animations, or even games with users, which is considered art today. The original code of viruses from the 1980s and 1990s can now be executed safely in your browser by visiting the Malware Museum at the internet archive. Early viruses started to use encryption to evade detection, but the weak point of that technique is that antivirus software can pick up a detection signature from the decryption loop.

The Rise of Polymorphic Encryption in Viruses

The use of polymorphic encryption in viruses made it difficult to detect them with static signatures or byte offsets. Researchers discovered that executing the malware in a virtual machine allowed the virus to decrypt itself, thus making it detectable. The first Windows virus, called Winvir, was discovered in 1992, which was a groundbreaking discovery, and the company Data Fellows wrote and released the first press release in English, rather than their native Finnish, announcing the discovery. This discovery marked a significant shift in the computer industry, as Windows systems began to gain traction, and the use of viruses began to move away from MS-DOS and towards Windows systems.

The Evolution of Malware in the 90s and 2000s

The 90s saw viruses mutating, and Mikko was busy detecting malware and working with companies to fix bugs which allowed viruses to run. The era of e-mail worms started in 2000, with viruses like Happy99, Melissa, and Love Letter, which propagated through e-mail attachments. Love Letter virus spread rapidly, sending e-mails to everyone in the victim's address book, and overwriting valuable files on the computer. F-Secure developed antivirus updates to tackle the virus, saving the world from destruction. However, outbreaks continued, such as the botnet called Sobig, which used existing botnets and clever e-mails to fool people into opening attachments. It was an exhausting time for Mikko and his team.

F-Secure's Battle Against Sobig.F Malware

Sobig.F was a botnet malware that infected millions of computers worldwide, which were under the control of hackers. Antivirus companies like F-Secure tried to crack the encrypted code to stop the virus, but it was hard because good encryption is hard to break. In order to take down the command and control servers, F-Secure had to work together with authorities and internet operators to shut them down before Friday evening, when the activity would start. The outbreak was still massively spreading that e-mail wasn't functioning, so F-Secure had to rely on fax and hand-delivery. In the end, they were able to shut down all servers except the last two.

The Feeling of Taking Down a Botnet and Staying on the Good Side of IoT Security

Taking down a botnet is a great feeling and makes a difference in protecting the whole world. Hyppönen's law on IoT security states that the more functionality and connectivity we add to things, the more vulnerable they become. Traditional, unhackable items with limited functionality, like old wristwatches, are becoming replaced by smart, hackable devices including cars, houses, cities, and grids. However, Mikko Hyppönen chooses to stay on the good side, protecting users, clients, and customers. The feeling that one is making a difference in the world keeps him in the industry year after year. Additionally, F-Secure has a culture of celebrating victories with a sauna party and beer, making cybersecurity seem less daunting.