Logo

74: Mikko

en-us

September 15, 2020

TLDR: Mikko Hypponen of F-Secure shares his malware research experience, including a story about poker player cheats being detected with hacking methods.

1Ask AI
  • The Game of Poker: Skill, Cheating, and HonestyPlaying poker requires skill and practice, and while online poker may seem convenient, cheating is not worth the risk. Honesty is still the best policy, even with high stakes involved.

    Poker is a game of skill where the player who plays the person, not the cards, wins. While online poker offers convenience, it also invites cheating. Players may go to great lengths to gain an edge, like Darren Woods who set up fifty different accounts on an online poker site and played multiple accounts at once to cheat. However, his cheating was detected, and he was banned and sentenced to prison. Another player, Jens Kyll nen, has been successful in playing poker both online and in-person over the years. Being a good poker player requires practice and skill, and even with high stakes involved, honesty is still the best policy.

  • Trusting Your Gut Instincts to Ensure Safety in HotelsDon't ignore your instincts in unfamiliar surroundings. Take necessary precautions and report any suspicious activities to the hotel staff for a safe and enjoyable stay.

    Jens decided to play in a poker tournament, putting a million of his own dollars at stake despite it being a gamble. He lost his chips on day two of the tournament and went up to his room. Upon entering, he realized his laptop was missing but found his charger in its place. Henri's key wasn't working that day either and Jens questioned his sanity when the laptop suddenly appeared ten minutes later where he left the charger. He got scared and left the room to talk with Leia, the guest relations supervisor, who re-coded their keys and the lock on the door. It's always important to ensure safety when staying in hotels and trust your gut instincts.

  • A Hacker-Induced Security Breach in a Hotel Room.Always keep your electronic devices password-protected and use more secure keycards or access methods to avoid data theft and hackers.

    A hacker stole Jens' heavy Fujitsu Celsius laptop from his hotel room after deactivating his key card. Despite the hotel security's lack of proper investigation, Jens found his laptop with the help of the poker tournament security team. However, he noticed that the laptop was hacked as it was no longer password-protected. This incident left Jens feeling defiled and eroded his sense of security. While it is speculated that someone could have cloned his card, it is unlikely as it was a magstripe card that requires swiping the card through a machine to be cloned.

  • Vulnerability of Hotel Room Keys to IntrudersThe magstripe technology used in hotel room keys is vulnerable to damage from powerful magnets, allowing intruders to prevent access to a specific room. LoCo magstripes used in hotel room keys can be easily damaged, making them more vulnerable to attack and possibly theft. It's important to be aware of these vulnerabilities and take measures to protect your belongings when staying in hotels.

    The magstripe technology used in hotel room keys is susceptible to damage from powerful magnets, which can explain why Jens' keycards were ruined. This could be used as a way to prevent someone from entering a particular room by an intruder. The use of LoCo magstripes in hotel room keys, which can be easily damaged, makes them more vulnerable to this type of attack. It's possible that the theft of the key and cloning of the card was carried out by someone who had access to the reprogrammed keycards, possibly an inside job. The hotel's security does not seem interested in helping, which adds to the suspicion. Despite being provided with a printout of keycard logs, Jens is still unsure of how to proceed.

  • Cybersecurity breach on high-stakes poker playerCybersecurity is crucial in protecting sensitive data while traveling. Always remain vigilant and seek expert help if suspicious activity is detected.

    Jens suspects his stolen laptop was targeted at him as a high-roller online poker player. F-Secure Corporation's analysis reveals that his laptop was infected with a Java-based remote access toolkit that allowed someone to see his poker cards. This proves that there was a planned attack on Jens, and not just a random theft. Hotel security failed to see the same log entry that was alarming to Jens. Frustrated with the lack of help, Jens decides to leave the hotel and head straight to F-Secure Corporation in Finland. The incident reveals the importance of cybersecurity and highlights the need to be vigilant while traveling with sensitive personal or business data.

  • High-rollers Beware: Online Poker and CybercrimeProfessional poker players should take precautions to safeguard their laptops from third-party malware, as cyber-criminals use Trojanized pot odd calculators to steal money. Tournament organizers should involve law enforcement to handle such cases.

    High-rollers who play poker online are at a risk of losing hundreds of thousands or even millions of dollars to cyber-criminals who use Trojanized pot odd calculators to steal money. Professional poker players should be careful while using laptops for transactions involving large sums of money. They should avoid installing random junk on it, and not use it for playing games or watching porn. They should keep the laptop safe if they are not using it. Cyber-criminals outsource malware development to third parties to cover their tracks. WHOIS records can help track down cyber-criminals, but they generally register domains anonymously. Poker tournament organizers should consider involving law enforcement authorities to handle such cases.

  • High Stakes Poker Players Targeted by 'Evil Maid Attack'At least seven high stakes poker players fell victim to an 'Evil Maid Attack,' where someone with access to their hotel room hacked their computer and planted malware to gain an advantage. The investigation has stalled, and the authorities have limited authority to investigate.

    High stakes poker players have fallen victims to 'evil maid attack' where someone with access to their hotel room hacks their computers. The hacker plants malware that allows them to see their hole cards, giving the hacker an edge in playing the same online table as their victims. The attack has affected at least seven high stakes poker players. The investigation has stalled, and the authorities have limited authority to investigate. PokerStars, the tournament run where the affected players met, has confirmed the incidents and is doing what they can to investigate. However, it is not safe for some victims to come out and tell their story, either out of fear or other reasons.

  • Hacker sentenced for stealing millions from high stake poker playersProtect yourself from cyber fraud with a trusted antivirus program and be cautious of downloading anything online.

    A hacker broke into homes of high stake poker players between 2008 and 2014, planted Trojans on their laptops and gained access to their cards which were clearly visible on his own computer. Danish police seized four million US dollars worth of Danish money and sentenced a thirty-two-year-old Danish hacker, possibly Peter Jepsen, to two and a half years in prison in December 2019. Jepsen was once a member of a poker team but his blog and social media have been silent, suggesting he might have been imprisoned. A trustworthy antivirus program could have avoided such cyber fraud hence internet users should be wary of downloading anything online.

  • The Intricacies of the High-Rolling Poker Player Hacking Case Unveiled.Online poker hackers can go to any length to win, and experts like Mikko are needed to unravel their malicious activities.

    The high-rolling poker player hacking case involved a Swedish biker gang, and while one hacker (Peter Jepsen) was caught and imprisoned, others may still be at large. This shows the extreme lengths some hackers go to get an edge in online poker. Mikko, a renowned information security expert, was born around the same time as the creation of the internet and has spent his whole life focusing on it. He started programming at age 14, in 1984, after his family got a Commodore 64. His mother also worked in the technology field. Technology and computers seem to run in his family.

  • The First PC Virus and Its Historical SignificanceThe first PC virus, created in 1986, had no malicious intent and was made for a chuckle. It paved the way for the emergence of PC viruses, which we still battle today. Malware historian Mikko Hypponen has analyzed its impact.

    The first PC virus, Brain, was created in 1986 and the early malware writers did not have motives. Malware writing was not illegal and there were no laws against it. The motive of the early malware writers was just a chuckle that their malware is spreading worldwide. The first PC virus has a historical significance because it can be seen as the root from which the PC virus emerged, and we still fight PC viruses even today. Mikko Hypponen is a security-type worker who started working at F-Secure in 1991 and has been there since then. He is a malware historian and he has analyzed the Brain virus when he started professionally doing malware analysis.

  • Evolution of Virus Writing from Art to Criminal ActivityEarly virus writers created viruses for fun whereas current ones do it for money or organized crime. Early viruses were harmless and even artistic, but encryption has become their weakness.

    Early virus writers did it for fun and thrill, unlike current online criminals who do it for money, spying, or organized crime. Early viruses either did nothing except spread further or were destructive. Many of them played music, showed animations, or even games with users, which is considered art today. The original code of viruses from the 1980s and 1990s can now be executed safely in your browser by visiting the Malware Museum at the internet archive. Early viruses started to use encryption to evade detection, but the weak point of that technique is that antivirus software can pick up a detection signature from the decryption loop.

  • The Rise of Polymorphic Encryption in VirusesRunning malware in a virtual machine can help to detect encrypted viruses. The discovery of the first Windows virus in 1992 marked a shift in the computer industry towards Windows systems, and away from MS-DOS.

    The use of polymorphic encryption in viruses made it difficult to detect them with static signatures or byte offsets. Researchers discovered that executing the malware in a virtual machine allowed the virus to decrypt itself, thus making it detectable. The first Windows virus, called Winvir, was discovered in 1992, which was a groundbreaking discovery, and the company Data Fellows wrote and released the first press release in English, rather than their native Finnish, announcing the discovery. This discovery marked a significant shift in the computer industry, as Windows systems began to gain traction, and the use of viruses began to move away from MS-DOS and towards Windows systems.

  • The Evolution of Malware in the 90s and 2000sThe rise of e-mail worms and botnets in the early 2000s posed a significant threat, but with the development of antivirus updates, Mikko and his team were able to save the world from destruction.

    The 90s saw viruses mutating, and Mikko was busy detecting malware and working with companies to fix bugs which allowed viruses to run. The era of e-mail worms started in 2000, with viruses like Happy99, Melissa, and Love Letter, which propagated through e-mail attachments. Love Letter virus spread rapidly, sending e-mails to everyone in the victim's address book, and overwriting valuable files on the computer. F-Secure developed antivirus updates to tackle the virus, saving the world from destruction. However, outbreaks continued, such as the botnet called Sobig, which used existing botnets and clever e-mails to fool people into opening attachments. It was an exhausting time for Mikko and his team.

  • F-Secure's Battle Against Sobig.F MalwareFighting malware requires collaboration between antivirus companies, authorities, and internet operators, and sometimes alternative communication methods must be used to protect against the spread of the virus.

    Sobig.F was a botnet malware that infected millions of computers worldwide, which were under the control of hackers. Antivirus companies like F-Secure tried to crack the encrypted code to stop the virus, but it was hard because good encryption is hard to break. In order to take down the command and control servers, F-Secure had to work together with authorities and internet operators to shut them down before Friday evening, when the activity would start. The outbreak was still massively spreading that e-mail wasn't functioning, so F-Secure had to rely on fax and hand-delivery. In the end, they were able to shut down all servers except the last two.

  • The Feeling of Taking Down a Botnet and Staying on the Good Side of IoT SecurityAs technology becomes more connected and vulnerable, cybersecurity professionals like Mikko Hyppönen strive to protect users and celebrate victories while F-Secure creates a positive culture.

    Taking down a botnet is a great feeling and makes a difference in protecting the whole world. Hyppönen's law on IoT security states that the more functionality and connectivity we add to things, the more vulnerable they become. Traditional, unhackable items with limited functionality, like old wristwatches, are becoming replaced by smart, hackable devices including cars, houses, cities, and grids. However, Mikko Hyppönen chooses to stay on the good side, protecting users, clients, and customers. The feeling that one is making a difference in the world keeps him in the industry year after year. Additionally, F-Secure has a culture of celebrating victories with a sauna party and beer, making cybersecurity seem less daunting.

Was this summary helpful?

Recent Episodes

77: Olympic Destroyer

77: Olympic Destroyer

Darknet Diaries

During the Winter Olympics in Pyeongchang South Korea, a cyber attack struck, wiping out much of the Olympic's digital infrastructure. Andy Greenberg discussed this incident as part of his book Sandworm.

October 27, 2020

76: Knaves Out

76: Knaves Out

Darknet Diaries

Hacker(s) broke into JP Morgan Chase for reasons not immediately apparent; LastPass and SentinelOne provide security solutions.

October 13, 2020

75: Compromised Comms

75: Compromised Comms

Darknet Diaries

Between 2009 and 2013, the CIA's communication channels were compromised, leading to catastrophic consequences for their assets in foreign countries. Guests Jenna McLaughlin and Zach Dorfman appear on this episode.

September 29, 2020

73: WannaCry

73: WannaCry

Darknet Diaries

In May 2017, a massive ransomware attack known as WannaCry occurred, affecting victims like the UK's national health service. Security researchers investigated the incident, with John Hultquist from FireEye involved, trying to identify who was behind it.

September 01, 2020

Related Episodes

Tuomas Sandholm: Poker and Game Theory

Tuomas Sandholm: Poker and Game Theory

Lex Fridman Podcast

Professor Tuomas Sandholm created Libratus, an AI system that beats top human players at Heads-Up No-Limit Texas Hold'em. His research and companies have had wide-reaching impact in the real world.

December 28, 2018

FraudGPT + Chip Wars + Hacking Poker Machines + The Problem with Credit Bureaus

FraudGPT + Chip Wars + Hacking Poker Machines + The Problem with Credit Bureaus

Hacked

Discusses emerging ChatGPT alternatives like WormGPT and FraudGPT, mentions chip wars briefly, and shares stories about a poker hacking scandal and a Telegram bot for trading social security numbers.

September 01, 2023

#344 – Noam Brown: AI vs Humans in Poker and Games of Strategic Negotiation

#344 – Noam Brown: AI vs Humans in Poker and Games of Strategic Negotiation

Lex Fridman Podcast

Research scientist Noam Brown co-created AI that achieved superhuman level performance in Texas Hold'em and Diplomacy. He also explored human-AI negotiation, geopolitics, ethics of AI, and AGI with possible advice to beginners.

December 06, 2022

How I Manipulated The World's Richest Men: “They Lost $100 Million In One Night!” - Molly Bloom (Molly's Game)

How I Manipulated The World's Richest Men: “They Lost $100 Million In One Night!” - Molly Bloom (Molly's Game)

The Diary Of A CEO with Steven Bartlett

Molly Bloom, nicknamed the ‘Poker Princess’, is a former Olympic skier, and at 21 years old was ranked No. 3 in North America in moguls. After an accident, she left skiing and took a years sabbatical from the University of Colorado - Boulder to move to LA in 2004. Initially bartending, she began to run poker games in The Viper Room. These games attracted A-list celebrities such as Leonardo DiCaprio, Tobey Maguire, and Ben Affleck, playing for millions of dollars. In 2013, she was arrested for taking part in underground poker games and faced 10 years in prison, but was eventually sentenced to 1 year of probation. In 2014, she released her memoir ‘Molly’s Game’ which was made into an award winning film of the same name in 2017. In this conversation Molly and Steven discuss topics, such as: How her upbringing was based around competition and achievement Why she was obsessed with achieving glory from a young age Moving to LA and finding her way into running poker games How she started running illegal poker games and made them different from others The psychological lessons she learned from watching poker games How she made herself indispensable to the game and its players What it took to run the world's most exclusive poker nights Having her poker game and income taken from her Learning to pivot quickly from failure to success Seeing someone lose $100 million in one night Kicking Dan Bilzerian out of her poker game How she was making $4-6 million a year from tips The mafia showing up at her door What she was able to learn from listening to the elite players of her game How she had access to the world’s most powerful people Becoming addicted to drinking and drugs Her legal troubles with the FBI and facing 10 years in prison Why she refused to snitch to the authorities for millions of dollars The lessons she has learned coming out of the world of poker Being comfortable with risk and the necessity of taking risks in life How she was able to sell her story into a Hollywood movie You can purchase Molly’s memoir, ‘Molly’s Game’, here: https://amzn.to/47oDhDS Follow Molly: Instagram: https://bit.ly/3KKe0Lk Twitter: https://bit.ly/45tjBOe Watch the episodes on Youtube - ⁠https://g2ul0.app.link/3kxINCANKsb⁠ My new book! 'The 33 Laws Of Business & Life' pre order link: ⁠https://smarturl.it/DOACbook⁠ Follow me:  Instagram: ⁠http://bit.ly/3nIkGAZ⁠ Twitter: ⁠http://bit.ly/3ztHuHm⁠ Linkedin: ⁠https://bit.ly/41Fl95Q⁠ Telegram: ⁠http://bit.ly/3nJYxST⁠ Sponsors: Huel:⁠ ⁠⁠https://g2ul0.app.link/G4RjcdKNKsb⁠ Learn more about your ad choices. Visit podcastchoices.com/adchoices

August 17, 2023

AI

Ask this episodeAI Anything

Darknet Diaries

Hi! You're chatting with Darknet Diaries AI.

I can answer your questions from this episode and play episode clips relevant to your question.

You can ask a direct question or get started with below questions -

Sign In to save message history