00:00:00.740What if I told you there was something that cost the world more than natural disasters in the illegal drug trade combined?
00:00:07.240What if I told you that this crime, if it was a country, would have the third biggest GDP on the planet?
00:00:13.080I'm talking about cybercrime. In 2024, it cost all of us around the world $9 trillion, and there are times we feel completely and totally helpless to stop it.
00:00:23.380What can we do? We have someone that'll tell you what we can do.
00:00:30.000I'm thrilled to be joined by Montreal's Terry Cutler.
00:00:41.780Terry is an ethical hacker and a psychologist from PsyologyLabs.com and an expert on cybercrime in Canada and around the world.
00:00:54.020So, Auditor General Karen Hogan in 2004 warned that 30% of RCMP cybercrime posts remain unfilled, slowing incident responses and intelligence sharing.
00:01:05.300Terry, from your vantage point, PsyologyLabs, how do these staffing gaps translate into real-world risks for Canadians when it comes to cybercrime?
00:01:14.120Look, we have a problem in our industry where there's over 3 million personnel short in our industry.
00:01:20.180So, the problem is you can't just jump into cybersecurity and get up to speed.
00:01:24.260You have to have a bit of an IT background in order to jump into cyber, or else it's not going to work very well.
00:01:29.120So, right now, they're severely understaffed and undertrained.
00:01:32.780So, think of it as, you know, firemen responding to a fire and they show up with a garden hose.
00:01:38.840Because cybercrime is happening so much that there's so much piling up on their desk that they just can't keep up.
00:01:45.040Well, I know in education, they're always focusing different streams because they think the country needs physicians, engineers, accountants.
00:01:53.160Should there not be a bigger push for computer scientists to get into IT security and cybersecurity?
00:01:58.020There is, but there is the content that exists.
00:02:00.780The problem is our field is very, very specialized and people burn out very, very quickly.
00:02:07.020It's very, what's what we're looking for, it's very, a lot of stuff in our industry is not working the way it should.
00:02:15.520Okay, so it's very discouraging because a lot of stuff that we recommend or try to implement is somewhere between not working and barely working at all.
00:02:22.840So, it's very, very difficult to stop the cybercriminals because they can be hiding their tracks coming from anywhere in the world.
00:02:28.060And to be able to do attribution to these guys and find out where they're coming from is very, very difficult.
00:02:32.880And not only that, you're stuck with jurisdictional problems too because if this guy's coming in from another country, how are you going to go and prosecute?
00:02:38.880Or how do you even know it's that guy behind the screen when it happened?
00:02:42.140So, right now, everything favors the bad guys.
00:02:44.220In Canada, I know there's plans for tracking cybercrime, but it's been delayed.
00:02:50.720In your view, what steps should Ottawa and different levels of government take right now to accelerate development and reduce sort of the drag from the bureaucracy to accelerate cybercrime investigations?
00:03:03.000Look, they're going to have to come to a point where they're going to have to start working with private companies that are vetted to work with them.
00:03:11.320So, we just went through certification for the Canada Controlled Goods Program.
00:03:15.440This allows us to work with the military, defense, critical infrastructure government.
00:03:19.960It means that we've been vetted to work with this highly classified information.
00:03:23.440And so, they're going to have to start looking at companies that have this designation that can help bring forth better technology and such.
00:03:32.280Because we work a lot with municipalities as well, right?
00:03:34.940And a lot of times, these guys are just so overwhelmed, understaffed, and they just can't keep up with the threats that are occurring.
00:03:41.980And, Terry, I think it seems like every week or two weeks in Canada, there is a municipality, a public library, a government building that's been hacked, and they're held ransom.
00:03:51.620Absolutely. And the challenge to that is that because they don't have a very large IT team, sometimes they have one person.
00:03:59.020And, like, some of the ones we work with, maybe they have maybe three, four people.
00:04:03.780And just when we do vulnerability scanning, as an example, so we do scanning on a weekly basis to show them what's new, what did they fix, what did they miss.
00:04:12.780And just with that alone, they're overwhelmed by how much stuff gets found.
00:04:16.700They just can't keep up with the updates and today's threats.
00:04:26.460Joined by Terry Cutler from PsyologyLabs.com and Canada's own spy agency has flagged Russia and Iran, for example, as safe havens for organized cybercrime groups.
00:04:36.160Terry, in your opinion, how should law enforcement in this country use maybe a PsyologyLabs-style ethical hacker to collaborate and push back against these state-sponsored criminals who are affecting Canadians and people around the world every day?
00:04:49.000I think the biggest problem is going to be bureaucracy, red tape.
00:05:19.120And a lot of times they have technology in place that is not giving them the proper alerts.
00:05:24.420So, they don't even know that they are being attacked.
00:05:27.720So, in one case, when we get brought in to do intrusion tests where we get hired to legally hack their business, you know, we run these attacks.
00:05:33.680And one of the things we provide to the customers is what's called an activity report.
00:05:37.320It's like every time we run an attack, there's a timestamp.
00:05:40.720And their own technology is not even picking it up.
00:05:43.500So, they never get a call from their managed provider saying, hey, are you guys under attack?
00:05:52.380So, the response time is just out of whack right now.
00:05:55.640And, Terry, I've heard stories that in some of these state-sponsored cybercrime organizations, there's actual office buildings filled with cybercriminals working around the clock every day trying to hack into places.
00:06:20.780It even provides like a target list of companies that are vulnerable right now because they maybe have proof of life that's on the dark web saying, we have access to this guy's infrastructure right now.
00:06:32.920So, if you pay us $50 or $100 for this access, we'll share the profits of the ransom.
00:06:41.340And, Terry, you brought up a good point about the red tape can take up the two years.
00:06:45.220And, at the same time, you're saying the ransomware that's happening to Canadians around the world is happening at a lightning speed.
00:06:52.760So, what is the current ransomware threat in Canada that we need to be concerned with?
00:07:15.360So, they've been in their system the whole time, shuffling through people's emails, through the servers.
00:07:21.160They're there to stay as long as they can undetected so they can siphon out this data right under their nose.
00:07:27.360So, even if they ransom the municipality and say, we're not going to pay it, like they didn't pay it, they could threaten to leak the data online and still charge them for that, for them not to leak it.
00:07:39.620And, you know, still to this day, years later, they don't have all their infrastructure still up and running.
00:07:45.820Because once an attacker is in your environment, like, it's very, very hard to find out what did they get access to.
00:08:14.940So, we have a managed security service where we can look at your network, your endpoint, and your cloud all in one dashboard, and it's bilingual.
00:08:22.620Where the magic secret sauce for us is in what's called an appliance.
00:08:26.640We ship you a physical server that does what's called a port mirror off your firewall.
00:08:30.980So, we look at all the information coming in and out of your organization, and we see in real time what's going on.
00:08:36.440Most companies today are using what's called log-based solutions.
00:09:54.480But we're paid to legally do this because we can walk into, let's say, City Hall and trick an employee into divulging information that they shouldn't have given us.
00:10:06.440So, you know, one example, we did an attack on a retail company.
00:10:11.640And I walked into one of their stores and I looked to see the least-looking paid employee that was stocking the shelves with his headphones on.