Skip to content
Home » How Clicking a Single Link Can Cost Millions: Ryan Pullen (Transcript)

How Clicking a Single Link Can Cost Millions: Ryan Pullen (Transcript)

Here is the full transcript of Ryan Pullen’s talk titled “How Clicking a Single Link Can Cost Millions” at TED conference.

SUMMARY: Cybersecurity expert Ryan Pullen’s TED talk, “How Clicking a Single Link Can Cost Millions,” provides a compelling examination of the human aspects behind cybersecurity threats and their profound impacts. He narrates three personal experiences that span the spectrum of cybercrime, emphasizing that these incidents are not just about the technology but significantly about human vulnerability.

Pullen highlights a case where a simple action, like clicking a link, led to a massive financial loss and significant human stress, illustrating the severe consequences of seemingly minor actions in the digital realm. He delves into the psychological aspects of cyberattacks, including how trust and social engineering are exploited by attackers to breach security. Furthermore, Pullen discusses the ease with which personal data can be obtained and misused, showing how inexpensive information can fuel cybercrime.

He advocates for greater awareness and education on cybersecurity, stressing the importance of protecting personal information and understanding the value of seemingly insignificant data. Pullen’s talk is a powerful reminder of the critical need for vigilance and proactive measures in the digital age to safeguard against cyber threats.

Listen to the audio version here:

TRANSCRIPT:

Cybersecurity in Action

I received a phone call from somebody who needed my help. They explained to me that this organization had suffered a cyberattack, more specifically a ransomware attack, which is designed to both steal your data and make it unusable. It replicates itself throughout the business and can drive you down to paper-based controls. And this was an opportunity that I saw where I could influence something positively.

And it was my job to investigate what had happened, how it happened, and why. And I saw something that I hadn’t experienced before firsthand. In 2017, the NHS suffered something similar, and it cost nearly 100 million pounds to recover. This incident cost around five million pounds to recover and took 14 months.

Yet, what I saw was the human impact. How did this happen? A single individual clicked a link, and a single individual enabled this, unknowingly, to happen to an organization. Multiple people were signed off sick due to stress, and multiple people were unable to go to work the next day and carry out their job.

The Human Element in Cybersecurity

Now, for me, cybersecurity is a very technology-focused term. And yet, IBM did a study in 2021, and 95 percent of cyberattacks used a human element. Now, that’s all well and good, but what does that actually mean? It means people can be exploited, too. There’s no lines of code, and there’s no fancy software.

Cybersecurity is, as far as the media is concerned, maybe teenagers in their bedrooms causing trouble, stealing things, and learning how to use them. Yet, what people don’t see is the impact on day-to-day life. And this incident for me made me think slightly differently about cybersecurity.

And recently, I had an opportunity which presented this thought process. I was commissioned to evade security controls for a very well-known building in London. That’s a snazzy way of saying “break in.” And effectively, it was my job to see if I could get past the security controls and get into the building.

So, for me, thinking kind of outside of the box, this building has floor-to-ceiling doors, a 24/7 security team, and an endless budget for this kind of thing based on where they are. And so, thinking slightly outside, I needed to come up with a different plan.

The Art of Social Engineering

What I did was I tried to go down the social engineering route, which is the art of kind of deception and making people believe something without the full information. And what I did was I walked in the front door, dressed quite similarly to this, and I was greeted by eight people and I thought, oh, that’s a bit over the top. And it’s because every single person should have the right information and should know where they’re going; it’s very rare for them to be visitors.

ALSO READ:  How to Sound Smart in Your TEDx Talk: Will Stephen at TEDxNewYork (Transcript)

And this person asked me, “Why are you here? Who are you here to see?” And I explained, I didn’t have an appointment, but I was here to see a specific person. And they said, “Yeah, there’s no chance you’re getting in.” And I thought, oh goodness, I traveled all this way.

Exploiting Empathy for Access

And yet what I know is people are empathetic, and people want to help each other, right? And so I made up a story and I said I was here for a legal matter, and I was only able to achieve what I needed to achieve on these premises. And they said, “Yeah, sorry, we’re still …” And I explained the urgency, and I made them feel sorry for me.

And what I was thinking about giving this talk, I was going to pause and I was going to pretend that I was struggling. And that emotion that you would have felt where you wanted to help me or you wanted me to continue, is exactly how this person felt. They felt they were stopping me from doing my job, which they were, but not for how they expected it.

And then I pretended to be on the phone in the foyer, pacing up and down, pretending to be aggravated. And then the manager came across with a QR code for me and said, “So sorry for the issues, no problem.” And they showed me around a side passage away from the two rounds of security.

Reflections on Cybersecurity Perspectives

So I had my laptop bag with me with “the evidence,” and it wasn’t checked and I was able to go in, and I was able to go to the floor that I needed to. And I was paid as a cybersecurity expert to evade the controls of this building. And all I did was ask for access and make someone feel sorry for me.

And so that’s two very different perspectives.