{"id":33054,"date":"2024-04-01T12:34:31","date_gmt":"2024-04-01T10:34:31","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/beekeepers-against-cybercrime\/33054\/"},"modified":"2024-04-01T12:34:31","modified_gmt":"2024-04-01T10:34:31","slug":"beekeepers-against-cybercrime","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/beekeepers-against-cybercrime\/33054\/","title":{"rendered":"Beekeeper vs. cybercrime"},"content":{"rendered":"<p>Did you know that cybersecurity and\u2026 <em>beekeeping<\/em> are like two peas in a pod? If not, you probably missed the introduction, back in 2019, of our <a href=\"https:\/\/www.kaspersky.com\/blog\/beehiveoristic-engine\/26261\/\" target=\"_blank\" rel=\"noopener nofollow\">bee-hive-oristic engine<\/a>, which protects ATMs from physical break-ins through integration with an actual beehive (while also providing the ATM\u2019s owners with honey, beeswax, and propolis). To implement the engine, we proposed training ATM maintenance workers and cash-in-transit personnel in applied beekeeping for information security.<\/p>\n<p>So, when the new movie with Jason Statham, <a href=\"https:\/\/www.imdb.com\/title\/tt15314262\/?ref_=nv_sr_srsg_0_tt_8_nm_0_q_beekeep\" target=\"_blank\" rel=\"nofollow noopener\">The Beekeeper<\/a>, came out earlier this year, I knew right away it had to be about cybersecurity. And wouldn\u2019t you know it, I was right. Now, let\u2019s break down the cybersecurity cases shown in \u201cThe Beekeeper\u201d. Sure, there\u2019ll be spoilers, but come on, you don\u2019t watch a Statham movie for the plot twists now do you? It\u2019s all about the action, right?<\/p>\n<p>The main character, Adam Clay, is a retired beekeeper \u2014 in the sense that he\u2019s a former member of a beekeeper special-ops unit. The Beekeepers are a secret organization that answers to nobody, keeps order in the country, and follows the philosophy drawn from the book \u201cBeekeeping for Beekeepers\u201d. After retirement, Clay moves in with a sweet old lady, Eloise Parker, and devotes himself to his favorite pastime: beekeeping. That\u2019s right, Adam is a beekeeper. Literally. Breeding bees in his free time. (Look, I didn\u2019t write the movie, OK?) Of course, as usually happens in any Jason Statham movie, some bad guys show up, mess with Adam\u2019s loved ones, and then spend the rest of the movie trying to mess with the man himself \u2014 to no avail. All this happens against a backdrop of some sinister cybercrimes, which actually seem way more realistic than the action sequences.<\/p>\n<h2>Vishing: robbery over the phone<\/h2>\n<p>The first to get stung is poor Eloise. One day, when she opens her list of banking transactions, she receives a well-crafted warning that her computer\u2019s hard drive is infected with two viruses. Very conveniently, the warning displays a tech-support number to help her get rid of the malware.<\/p>\n<p>Of course, it\u2019s scammers on the line \u2014 using their social engineering tricks to rob the poor woman blind. Here\u2019s how they do it: first, they convince her to visit the website friendlyfriend.net and download a certain app (which actually gives them control of the victim\u2019s computer). Then, as an apology for the inconvenience, the fraudsters promise to wire $500 to Eloise, but \u201caccidentally\u201d transfer $50,000 and ask her to return the excess. She seems to consider contacting the bank, but the guy on the phone convinces her he\u2019ll lose his job if she does, and persuades her to transfer the money directly. This is how the scammers get Eloise to enter her \u201cpassword for all accounts\u201d, which they promptly intercept and use to drain not only all her savings and retirement funds but also two million dollars from the charity fund she runs.<\/p>\n<h3>Lessons from the vishing attack<\/h3>\n<p>Gotta hand it to the writers, they did their homework on online scams. The attack depicted in the movie combines real-life <a href=\"https:\/\/www.kaspersky.com\/blog\/fake-technical-support\/26500\/\" target=\"_blank\" rel=\"noopener nofollow\">fake tech-support<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/on-the-line-korean-movie\/47293\/\" target=\"_blank\" rel=\"noopener nofollow\">vishing<\/a> tactics with a clever twist \u2014 the \u201caccidental\u201d overpayment. Eloise is portrayed as a completely inexperienced user (precisely the type scammers target in real life), and she makes a bunch of mistakes we can learn from.<\/p>\n<ul>\n<li>Don\u2019t call phone numbers that pop up in random windows. Best case, it\u2019s a shady ad; worst \u2014 a scam.<\/li>\n<li>Don\u2019t install software just because some stranger tells you to \u2014 especially if they admit it\u2019s for remote access; double especially if the website is called friendlyfriend.net and the advertising slogan reads \u201cA remote desktop solution that makes sense\u201d. That definitely doesn\u2019t make sense.<\/li>\n<li>If you know you have remote access software on your computer, don\u2019t enter any sensitive information \u2014 especially your payment passwords.<\/li>\n<li>Having a single password for all your bank accounts is a very bad idea; use unique passwords for everything.<\/li>\n<\/ul>\n<p>In any case, Eloise should have been wary of the promise to be transferred $500. Nobody gives money away. The right move would have been to hang up and call a family member \u2014 \u00a0in her case best would have been her daughter, who works in law enforcement. And her daughter should have installed a reliable <a href=\"https:\/\/www.kaspersky.co.za\/premium?icid=en-za_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">protective solution<\/a> on the computer in advance. That would have stopped the \u201cviruses\u201d along with the pesky pop-up windows.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n<h2>Beekeepers\u2019 showdown<\/h2>\n<p>It wouldn\u2019t be a Jason Statham movie if he didn\u2019t spend most of it violently killing bad guys, and so, as expected, that\u2019s just what he does \u2014 specifically wasting the cybercriminals, their guards, and actually anyone else who gets in his way. But at some point, it turns out that the call-center network scamming all these retirees is run by some high-ranking villains who know about the Beekeepers and have connections in the intelligence agencies. These agencies pressure the Beekeepers to stop Clay, so the latter send his former colleague, Anisette, who took over Adam\u2019s job after he retired. She dies heroically, and the Beekeepers conduct their own investigation and then decide to stay out of it. Hey, listen, I told you already \u2014 I didn\u2019t write this stuff.<\/p>\n<p>What\u2019s interesting about these inter-hive disputes is how Adam decides to upgrade his arsenal at the expense of his deceased colleague. For this, he cuts off her finger, breaks into her beekeeping facility (which also houses a weapons cache), and uses her fingerprint to open several biometric locks. Besides weapons and ammo, Clay also gets her password (DR07Z, printed on a piece of paper) and hacks into the Beekeepers\u2019 information systems. So much for the super-secrecy of this organization. Using the Beekeepers\u2019 systems, he finds the addresses of the call centers, prints them out on a dot matrix printer, and goes back to his warpath.<\/p>\n<p>Silly as it may seem, there\u2019s a serious lesson here: don\u2019t rely solely on biometrics, and protect important things (and data) with at least two-factor authentication. Plus, of course, use strong passwords (five characters is just way too short) and store them in a dedicated <a href=\"https:\/\/www.kaspersky.co.za\/password-manager?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<h2>Misuse of cyberweapons<\/h2>\n<p>By the end of the film we see the whole picture of the crime. Turns out the mastermind of the operation is the CEO of a company developing software for intelligence agencies. He uses some \u201cclassified algorithmic data-mining software package developed by the intelligence community\u201d to find lonely retirees with substantial savings. When cornered, he flat-out admits he taught the software \u201cto hunt for money, not terrorists\u201d. What utter gibberish.<\/p>\n<p>However, the idea behind this plot twist is bang on the money \u2014 all these mass surveillance and espionage tools governments develop, along with other cyberweapons, could easily fall into the wrong hands and be used to attack innocent people. And that\u2019s no longer fiction \u2014 just look at the <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-history-lessons\/45234\/\" target=\"_blank\" rel=\"noopener nofollow\">WannaCry attack<\/a>. The EternalBlue exploit and DoublePulsar backdoor used in it were supposedly stolen from intelligence agencies and made publicly available.<\/p>\n<p>So, this seemingly nonsensical action flick actually teaches us that dangerous tools can be used in mass cyberattacks at any moment. Therefore, it pays well to be prepared for anything and use reliable security tools both on personal devices and <a href=\"https:\/\/www.kaspersky.co.za\/enterprise-security\/endpoint-detection-response-edr?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">for corporate protection<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"29628\">\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity lessons from the movie &#8220;The Beekeeper&#8221;. <\/p>\n","protected":false},"author":700,"featured_media":33055,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021,2670],"tags":[875,3720,1130],"class_list":{"0":"post-33054","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"category-threats","10":"tag-cyberweapons","11":"tag-fake-support","12":"tag-movies"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/beekeepers-against-cybercrime\/33054\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/beekeepers-against-cybercrime\/27248\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/beekeepers-against-cybercrime\/22553\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/beekeepers-against-cybercrime\/29922\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/beekeepers-against-cybercrime\/27420\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/beekeepers-against-cybercrime\/37226\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/beekeepers-against-cybercrime\/50882\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/beekeepers-against-cybercrime\/27594\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/beekeepers-against-cybercrime\/33427\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/movies\/","name":"movies"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/33054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=33054"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/33054\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/33055"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=33054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=33054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=33054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}