How Hackers Steal Your ID Panorama


How Hackers Steal Your ID

Similar Content

Browse content similar to How Hackers Steal Your ID. Check below for episodes and series from the same categories and more!

Transcript


LineFromTo

They've got your name and they know where you live.

:00:08.:00:10.

The rush you get from hacking is quite phenomenal.

:00:11.:00:12.

I nearly fainted when I saw they'd practically cleared the account out.

:00:13.:00:20.

As soon as you log in, they've got everything.

:00:21.:00:25.

Hackers have stolen information from thousands and thousands of us.

:00:26.:00:30.

Major companies have failed to keep our private data safe.

:00:31.:00:41.

What's happening now is a big wake-up call.

:00:42.:00:46.

Tonight on Panorama I'll be finding out just how easy it is for cyber

:00:47.:00:49.

Every day we hand over sensitive information about ourselves.

:00:50.:01:28.

I thought I was safe, until I saw this.

:01:29.:01:31.

A major cyber attack on the broadband

:01:32.:01:33.

Millions may have had their personal details stolen.

:01:34.:01:37.

As a TalkTalk customer I could be one of them.

:01:38.:01:41.

Finding out my personal details could have been stolen - personal

:01:42.:01:44.

details I trusted them with - is alarming to say the least.

:01:45.:01:48.

The company says it doesn't yet know how many customers

:01:49.:01:50.

What I want to know is, what happens when hackers get

:01:51.:01:56.

TalkTalk now say nearly 157,000 customers had

:01:57.:02:06.

There have been some big hacks of late targeting big companies -

:02:07.:02:17.

There's more bad guys than there are good guys, and

:02:18.:02:28.

the bad guys only to need to find one vulnerability, just one single

:02:29.:02:31.

This map shows just a fraction of cyber attacks as they happen

:02:32.:02:37.

Millions of attacks - targetting websites day and night.

:02:38.:02:44.

A bank robber, why would you walk into a bank with

:02:45.:02:51.

a sawn-off shotgun taking a big risk, getting a relatively

:02:52.:02:53.

small haul compared to being able to commit a crime remotely from

:02:54.:02:56.

another country where you have got very little chance of being caught?

:02:57.:03:01.

Cyber criminals hide in the shadows, but hackers attack computers

:03:02.:03:04.

for a variety of reasons and some are willing to talk.

:03:05.:03:12.

I'm on my way to meet the man who has been accused

:03:13.:03:15.

by the United States authorities of being one of the most sophisticated

:03:16.:03:18.

He's acccused of hacking into the US military,

:03:19.:03:28.

Yeah, so this is the indictments that were issued.

:03:29.:03:36.

He faces extradition next year, which he will fight.

:03:37.:03:39.

They should have spent the money and the resources to secure them

:03:40.:03:44.

if somebody, especially somebody sitting in their

:03:45.:03:47.

bedroom in a dressing gown, was able to hack all of those things.

:03:48.:03:51.

The major problem isn't that person, the problem is the US Government.

:03:52.:03:56.

If someone can breach some of the most secure websites in the world,

:03:57.:04:01.

how hard must it be for companies like TalkTalk to defend themselves?

:04:02.:04:07.

They're not special, in the sense that everybody has

:04:08.:04:10.

Nobody in this business is without the sin of being insecure, of not

:04:11.:04:16.

having paid sufficient attention and resources to their security.

:04:17.:04:20.

Lauri says he has been shown the code used to attack TalkTalk.

:04:21.:04:25.

He says the hackers exploited a vulnerability that's been

:04:26.:04:28.

Pretty much this TalkTalk hack, they didn't write any software,

:04:29.:04:35.

they didn't think hard about the problem, they used a tool somebody

:04:36.:04:38.

else had, they ground away at it and eventually pop goes the weasel.

:04:39.:04:45.

TalkTalk customers have been hacked three times in less than a year.

:04:46.:04:50.

The latest hack, last month, was the most damaging.

:04:51.:04:54.

15,500 TalkTalk customers had their bank account details stolen.

:04:55.:05:02.

Ma'am, this is Shane Williams from TalkTalk.

:05:03.:05:04.

The voice of a scammer targeting TalkTalk customer Tamsin Collison.

:05:05.:05:10.

Her bank details weren't taken, but some

:05:11.:05:12.

of her customer details were, in the first major hack last December.

:05:13.:05:18.

Phone call, good afternoon Miss Collinson, this is TalkTalk calling,

:05:19.:05:28.

Phone call, good afternoon Miss Collison, this is TalkTalk calling,

:05:29.:05:30.

we understand you have a problem with your broadband connection

:05:31.:05:33.

Which made sense to Tamsin, because she'd reported a fault to TalkTalk.

:05:34.:05:37.

The people that were on the telephone knew our name

:05:38.:05:41.

and our telephone number and that we were TalkTalk customers,

:05:42.:05:45.

and they said that somebody else had been using our computer.

:05:46.:05:50.

82-year-old Barbara Manley and her husband, Harold,

:05:51.:05:53.

also believed they were dealing with a genuine TalkTalk employee

:05:54.:05:56.

I'd got to know her quite well because she said her name was

:05:57.:06:04.

Michelle and we'd had quite a chat to her.

:06:05.:06:06.

It seemed quite feasible that there was something wrong with

:06:07.:06:08.

They were on the phone to me for about an hour-and-a-half fixing

:06:09.:06:14.

my computer, showing me all kinds of terrible things.

:06:15.:06:17.

Both Tamsin and the Manleys were talked

:06:18.:06:20.

into giving the scammers access to their computer and online banking.

:06:21.:06:24.

They were tricked into thinking they were getting

:06:25.:06:28.

a refund from TalkTalk but instead the thieves were raiding their bank

:06:29.:06:31.

I went to the bank and I nearly fainted when I saw they'd

:06:32.:06:39.

It was an absolutely horrific moment to discover that I had been mugged,

:06:40.:06:49.

basically, and that I had sort of said, help yourself.

:06:50.:06:52.

I'd been complicit in my own mugging.

:06:53.:06:55.

Tamsin says TalkTalk only confirmed her personal data had been stolen

:06:56.:06:58.

She says she should have been told much sooner.

:06:59.:07:05.

I would have been armed and I would have been protected.

:07:06.:07:09.

I believe that TalkTalk did not protect their customers

:07:10.:07:12.

TalkTalk say they wrote to customers twice to warn them

:07:13.:07:21.

of scams following last December's data breach.

:07:22.:07:32.

They are not to blame for the losses suffered by Tamsin

:07:33.:07:35.

and the Manleys because the scams would not have been possible without

:07:36.:07:38.

either of them giving the thieves banking information.

:07:39.:07:43.

It's as if somebody is outside the house looking through the window.

:07:44.:07:50.

If they can get us on the computer, how do we know they can't get to our

:07:51.:08:05.

house. We feel unsafe. If we want to use the internet,

:08:06.:08:09.

we have to trust companies with I've come to King's Cross Station

:08:10.:08:12.

in London to meet a group of We're heading up to Edinburgh

:08:13.:08:20.

to set them a challenge. I have dabbled in writing code

:08:21.:08:30.

and playing with code and design. But nothing piqued my interest

:08:31.:08:32.

as much as learning how to hack. I know how to use a computer, these

:08:33.:08:35.

people know how to take them over. I got kicked out of school,

:08:36.:08:40.

so when I was at home I just started self teaching myself programming

:08:41.:08:44.

and then moved up to finding how to make a vulnerability,

:08:45.:08:47.

how vulnerability works. Hacking is a culture more than

:08:48.:08:50.

an activity. It doesn't have to be breaking

:08:51.:08:52.

things it can be creating things The Cyber Academy at

:08:53.:08:55.

Edinburgh Napier University train We've asked them to set up

:08:56.:08:59.

an experiment - create the kind of company website

:09:00.:09:06.

many of us place our trust in So the challenge that we have set

:09:07.:09:09.

for you we have created So we've got things like credit

:09:10.:09:17.

card details, passwords. Can the hackers break

:09:18.:09:24.

into our fictitious website, British Broadband, and steal

:09:25.:09:27.

its customers' valuable data? How long are you expecting them to

:09:28.:09:32.

take to get to these databases? We would think in total to find

:09:33.:09:45.

all the vulnerabilities will The academics had created

:09:46.:09:48.

a number of vulnerabilities, ways to hack into British Broadband,

:09:49.:09:55.

but our hackers found one of the easiest routes within

:09:56.:10:00.

minutes. There is

:10:01.:10:04.

an admin user here called John. So you have found one

:10:05.:10:06.

of the user names for the database? So they've done that in

:10:07.:10:11.

about five minutes. The password took about one second

:10:12.:10:13.

to crack because it was very basic. Mustafa has already cracked

:10:14.:10:17.

the password Most passwords are easy to hack

:10:18.:10:20.

because most of us use similar A few minutes later,

:10:21.:10:26.

British Broadband's customer details Because it's not surprising

:10:27.:10:30.

how easy it is. I think it shows how easy it is

:10:31.:10:47.

sometimes for intruders to get into databases if the credentials

:10:48.:10:52.

are not protected properly. So they've got access to all

:10:53.:10:55.

the information on the database, But that's something they're

:10:56.:10:57.

going to try and do is it? Our hackers have complete control

:10:58.:11:05.

of the website. With just a few clicks they

:11:06.:11:15.

take down the entire site. So if that was a real business,

:11:16.:11:20.

suddenly the customers will all find that if they go to the web page

:11:21.:11:25.

it's not there anymore. British Broadband's customers

:11:26.:11:28.

wouldn't be able to use the website, and their names, addresses, phone

:11:29.:11:34.

numbers and credit card details are Mustafa, how do you feel

:11:35.:11:37.

about the suspended sentence? I have to go now,

:11:38.:11:54.

so I can't really talk. In 2013,

:11:55.:11:57.

Mustafa was given a suspended prison sentence for attacking the Serious

:11:58.:11:59.

Organised Crime Agency and the CIA. He is now one of the good guys

:12:00.:12:03.

and currently completing So, how typical was that website

:12:04.:12:06.

in terms of its defences? A lot of credit card details

:12:07.:12:12.

are hacked in that way. In the real world it will be much

:12:13.:12:20.

tougher, and obviously an attack But are there some websites out

:12:21.:12:23.

there that will be as vulnerable Yeah,

:12:24.:12:28.

certainly the smaller websites that don't have a security team managing

:12:29.:12:34.

it 24/7 will typically be weak. In the age of cyber crime,

:12:35.:12:43.

criminals are waiting to invade Most of us have received

:12:44.:12:46.

a dodgy e-mail we shouldn't click on,

:12:47.:12:53.

but what happens if we do? I spend my time digging around in

:12:54.:12:55.

the cyber criminals' latest pieces of malicious code, figuring out

:12:56.:13:01.

how they're attacking people, and James Lyne is

:13:02.:13:04.

an internet security expert Cyber crime is a multi-billion pound

:13:05.:13:08.

enterprise, creating hacking programmes which can steal

:13:09.:13:18.

our data on an industrial scale. There were estimated to be nearly

:13:19.:13:22.

2.5 million internet-related crimes in England and Wales

:13:23.:13:25.

last year. At the top of the tree you have

:13:26.:13:39.

a number of people - a number of gangs producing these software

:13:40.:13:42.

packages that are used for the You have multiple parties selling

:13:43.:13:45.

competing cyber crime products, We see them do price drops to

:13:46.:13:48.

acquire more customers. They have commercialised

:13:49.:13:51.

and professionalised cyber crime to Hundreds of thousands of new pieces

:13:52.:13:53.

of malware are released every day. We see about 30,000 new

:13:54.:14:00.

infected websites a day. You land

:14:01.:14:15.

on a legitimate website that's been attacked that will exploit

:14:16.:14:18.

your computer and that will silently in the background instal a piece

:14:19.:14:21.

of code that lets the attackers So as soon as you log into any

:14:22.:14:24.

of these services, they've got everything,

:14:25.:14:31.

they own your entire digital life. Anything that might contain links to

:14:32.:14:33.

financial information will be mine - social media accounts,

:14:34.:14:44.

store accounts, e-mail accounts. It's funny, people don't think

:14:45.:14:51.

about e-mail accounts as being valuable, but e-mail accounts

:14:52.:14:56.

actually unlock a surprising amount And they can also

:14:57.:15:00.

unlock life savings. In June this year,

:15:01.:15:03.

Vivian Gabb was completing on the purchase of a house -

:15:04.:15:06.

which she'd planned as a retirement investment - when she got an e-mail

:15:07.:15:11.

she thought was from her solicitor. Dear Viv,

:15:12.:15:14.

we have changed who we bank with. I forgot to inform you

:15:15.:15:17.

of the changes Our new banking details

:15:18.:15:21.

are stated below. Kindly transfer the balance

:15:22.:15:27.

of ?46,703.20 into our new client account,

:15:28.:15:32.

and then it gives the bank details. It looks totally genuine,

:15:33.:15:35.

doesn't it? Vivian went ahead and transferred

:15:36.:15:36.

almost ?47,000 - her life savings. I phoned the solicitors because I

:15:37.:15:42.

hadn't heard anything and said, "Oh, So that's when everything

:15:43.:15:45.

started to fall apart. I think at the end of that day, at

:15:46.:15:57.

the end of that evening, when I was and I felt very vulnerable

:15:58.:16:01.

and violated. Vivian doesn't know how

:16:02.:16:04.

she came to be targeted. She still bought the house,

:16:05.:16:06.

but she had to borrow to replace the stolen money and is now working

:16:07.:16:09.

seven days a week to pay it off. It just seems that

:16:10.:16:17.

the criminals are getting better. It just seems like they are always

:16:18.:16:22.

big steps ahead. These are complex crimes carried

:16:23.:16:25.

out by criminals who could be Society is struggling with this,

:16:26.:16:30.

and we're certainly not dealing with it the way we are able to deal with

:16:31.:16:44.

other types of criminality. There's no doubt about that,

:16:45.:16:47.

and nobody's trying to deny that, and we're wrestling with how do we

:16:48.:16:50.

do this differently? Look at the scale

:16:51.:16:53.

and volume we're dealing with. It is very, very difficult to expect

:16:54.:16:57.

policing to detect these crimes. What do criminals do with

:16:58.:16:59.

hacked information? How do they turn it into cash

:17:00.:17:01.

and get away with it? An anonymous,

:17:02.:17:05.

underground world of cyber secrets - the perfect blackmarket

:17:06.:17:11.

for hackers hawking stolen data. James took us

:17:12.:17:20.

in using a Dark Web browser. People can't see where

:17:21.:17:26.

you're browsing or where In fact at the moment this

:17:27.:17:29.

website thinks I'm in Romania. Hacked mobile phone accounts,

:17:30.:17:35.

subscription TV accounts, All bought

:17:36.:17:37.

and sold here using Bitcoin, And what you've got here is

:17:38.:17:43.

a list of various credit cards James searched

:17:44.:17:58.

for UK credit cards. So we've got a couple here,

:17:59.:18:05.

haven't we. One from Gloucestershire,

:18:06.:18:07.

one from Devon there. Am I right

:18:08.:18:09.

in saying this is just one of Only one of them,

:18:10.:18:11.

but there several others. Cal Leeming knows all about

:18:12.:18:21.

using other people's credit cards. He started raiding websites to

:18:22.:18:23.

steal them aged just 11. The rush that you get

:18:24.:18:34.

from credit card fraud hacking is Within two years he was running riot

:18:35.:18:40.

I started ordering very small things and then it got progressively

:18:41.:18:45.

I ended up buying cars as well in the end, and that got me sent to

:18:46.:18:53.

At 18, he was sentenced to 15 months for hacking the details

:18:54.:18:56.

of 13,000 credit card users to buy ?750,000 worth of goods.

:18:57.:19:05.

I was by no means the best hacker in the world, or the country.

:19:06.:19:10.

I mean, I may have been the youngest, but not the best.

:19:11.:19:13.

Cal is now a software engineer and security adviser.

:19:14.:19:15.

It was the police who saw the potential

:19:16.:19:17.

Once I was released from prison, the police officer

:19:18.:19:25.

involved in my case actually got me my two work references

:19:26.:19:29.

He really helped me change my life around.

:19:30.:19:34.

Cal might have turned his life around - the trouble is,

:19:35.:19:36.

he says, business has not turned itself around.

:19:37.:19:42.

It's easier now to do credit card fraud than it was back in 2001

:19:43.:19:45.

On the Dark Web, James Lyne bought the credit and debit card details

:19:46.:19:54.

That's what we bought and I presume that is your card number

:19:55.:20:09.

If I was a criminal, I could have raided Janet's bank account.

:20:10.:20:30.

Yeah, that's exactly the same, isn't it?

:20:31.:20:35.

That's the number on the back, isn't it, yeah?

:20:36.:20:42.

How do you think someone might have got hold of this?

:20:43.:20:50.

I don't know, because I do so much shopping online

:20:51.:20:52.

With just a few more details - like Janet's National Insurance

:20:53.:20:56.

number - a hacker could have stolen her whole identity leaving her

:20:57.:20:59.

What has staggered me more than anything is how easy you

:21:00.:21:05.

I mean I've never been burgled or anything, but you're feeling

:21:06.:21:11.

You know, that somebody can access all this

:21:12.:21:18.

private information and it's out there for anybody to use.

:21:19.:21:22.

So, it's not a very nice feeling at all.

:21:23.:21:24.

As soon as we alerted Janet that her card details were for sale,

:21:25.:21:27.

she called her bank and cancelled her card.

:21:28.:21:33.

It is better to know than not know, isn't it?

:21:34.:21:35.

We managed to contact 12 of the 13 cardholders, whose details

:21:36.:21:41.

Ten people confirmed their cards were current.

:21:42.:21:49.

Two had already cancelled their cards because of fraud.

:21:50.:22:00.

You can do a lot to protect yourself in this space.

:22:01.:22:03.

80% of all the frauds we deal with can be prevented.

:22:04.:22:07.

And it's the most basic thing using anti-virus and yet still the bulk

:22:08.:22:12.

Make sure you are using a different password on each

:22:13.:22:17.

Make sure you update your computer,

:22:18.:22:20.

And last, but not least, be a bit of a cynic.

:22:21.:22:25.

For some companies, it's the hackers themselves who can help

:22:26.:22:34.

They invite them to test their systems and can offer rewards

:22:35.:22:39.

Enter Dubai-based hacker Yasser Ali.

:22:40.:22:50.

I have found serious flaws in a lot of big companies,

:22:51.:22:54.

like Paypal, like Ebay, Facebook, Microsoft, Adobe, Sony...

:22:55.:22:56.

Last August, Yasser breached Paypal's web security discovering he

:22:57.:22:59.

could take over customer accounts with one click

:23:00.:23:03.

Instead he told the company about the flaw.

:23:04.:23:09.

They fixed it and he received a $10,000 reward.

:23:10.:23:15.

All the other companies made fixes too.

:23:16.:23:18.

We're setting him our own challenge, which doesn't

:23:19.:23:20.

I've got a selection of big British brand names, and I'd like you to

:23:21.:23:32.

look at their websites for me, please, and carry out a

:23:33.:23:35.

reconnaissance on them and tell me how vulnerable you

:23:36.:23:37.

Once it's a passive reconnaissance then it's OK.

:23:38.:23:47.

Passive reconnaissance is like a burglar working out how to

:23:48.:23:49.

break into a house without actually doing it.

:23:50.:23:53.

And then we can talk after that and let me know what

:23:54.:23:56.

Yasser is what's known as a white hat hacker - using

:23:57.:24:05.

Not as lucrative as crime but it still pays.

:24:06.:24:09.

Apple or Microsoft, all the big names, they have

:24:10.:24:16.

recognised that white hat hackers are sometimes better at finding

:24:17.:24:19.

So, what they've done is it's like the Wild West, they've said

:24:20.:24:25.

It can sometimes be hundreds of thousands of dollars

:24:26.:24:31.

if you alert us to a vulnerability rather than disclose it or sell it

:24:32.:24:35.

We don't suffer the losses, our customers don't

:24:36.:24:41.

suffer the losses and we'll pay you for the privilege.

:24:42.:24:43.

So, you've had a look at those company websites that I

:24:44.:24:46.

Except just one website, they had pretty good security measures.

:24:47.:24:55.

I know you've only done a passive reconnaissance, but can

:24:56.:25:02.

you give a couple of examples of the ways in which they're vulnerable?

:25:03.:25:06.

One of the companies, I could grab a lot of information from the

:25:07.:25:09.

administration panel, like a lot of e-mail addresses, a lot of phone

:25:10.:25:12.

numbers of the employees, which can be used by criminals.

:25:13.:25:15.

It is very easy to find this information and also to exploit

:25:16.:25:18.

Yasser's research is a small snapshot of UK

:25:19.:25:25.

We're not naming names because if he's right it will alert

:25:26.:25:32.

criminals to any potential weaknesses in their websites.

:25:33.:25:37.

What the criminals know as well as the security industry, they know

:25:38.:25:40.

when those vulnerabilities occur and so they go out and look for them.

:25:41.:25:46.

So, if you're one of those who hasn't locked your door properly,

:25:47.:25:48.

there's been a fault in your lock, and they

:25:49.:25:50.

checking your door so, if you haven't corrected it, they will find

:25:51.:25:55.

If a business holding our personal data is hacked, you'd think

:25:56.:25:58.

TalkTalk came clean, but some companies don't.

:25:59.:26:04.

In the UK, only phone and internet providers are legally

:26:05.:26:06.

The legislation is fairly light at the moment.

:26:07.:26:18.

But we could ask the question whether or not

:26:19.:26:21.

the regulations are tight enough about how information should be

:26:22.:26:24.

And I think it's an important question to ask where we see an

:26:25.:26:30.

increasing number of breaches taking place and we therefore know that

:26:31.:26:32.

whatever the standards are they're not actually effective in protecting

:26:33.:26:35.

Following last month's hack on TalkTalk, it says it has

:26:36.:26:38.

significantly increased the level of website protection.

:26:39.:26:42.

Lauri Love, the man accused of hacking the US Government has

:26:43.:26:45.

Me and some friends had a look at TalkTalk and there's probably

:26:46.:26:56.

about three or four different ways you could still hack them today

:26:57.:26:58.

But I don't want to say it's negligence on their part

:26:59.:27:06.

The tide of complexity of computer systems has come in

:27:07.:27:13.

so fast that we haven't realised that we're behind it now.

:27:14.:27:16.

The UK cyber security industry is worth ?17 billion.

:27:17.:27:20.

TalkTalk says it is continually reviewing and updating its systems.

:27:21.:27:29.

I discovered at the end of last week I am not one of the 157,000

:27:30.:27:32.

TalkTalk customers whose personal details have been stolen but can I

:27:33.:27:35.

trust TalkTalk to keep my personal details safe in the future?

:27:36.:27:39.

Or for that matter any of the companies I deal with online?

:27:40.:27:44.

Their trust in the internet has been shattered.

:27:45.:27:50.

We're completely bewildered about the whole thing and I don't

:27:51.:27:55.

know now how we're going to cope because we don't believe anybody.

:27:56.:28:02.

Every time you put your data in the hands of an organisation it

:28:03.:28:05.

is a risk, you know, you are taking a gamble doing that.

:28:06.:28:09.

What you've got to hope for is that organisation takes

:28:10.:28:12.

It's a really, really bad situation at the moment,

:28:13.:28:18.

One that's not going to get better until there is a complete change in

:28:19.:28:22.

I don't say that to be alarmist, I say that because it's the truth.

:28:23.:28:28.

Internet security is the responsibility of us all.

:28:29.:28:31.

A responsibility many of us don't yet appear to be taking

:28:32.:29:04.

# These streets are yours You can keep them... #

:29:05.:29:08.

Download Subtitles

SRT

ASS