Logo
    Search

    Podcast Summary

    • The Power and Danger of Computers: Matt's StoryWhile computers offer limitless possibilities, they also come with risks. It's essential to understand the dangers of certain online activities, including hacking, and take measures to protect ourselves. It's also important to recognize the positive role computers can play in shaping our experiences and learning.

      Computers are powerful devices that allow people to do many activities like building a career, getting an education, and accessing entertainment. However, they can be dangerous as well. A simple combination of keystrokes like hacking into a bank can have serious consequences. Matt's story reflects how computers and the internet have been growing since his childhood. It has allowed him to explore different websites and learn to create his own. He started with video game cheating and then shifted to modding the Xbox. For a teenager like him, the Anonymous group was a formative force to be reckoned with. They hung out in online chat rooms, shared memes, and formulated their ideas.

    • How a Curious MLT Found TriCk in the Hacking Community and Targeted the English Defense LeagueHacking can be a form of activism to fight against injustice without physical confrontation. Collaboration and partnership can lead to greater technical knowledge and experience.

      MLT was drawn to the hacker community out of curiosity but found Anonymous to be filled with distractions and trolls. He stumbled upon TriCk through poison.org, a generic hacking forum, and they hit it off, eventually targeting the English Defense League with a zero-day exploit. While MLT wasn't religious, TriCk was a devout Muslim and couldn't stand groups like the EDL with anti-Islamic beliefs. TriCk found hacking to be a way to fight back without physically confronting them. MLT gained more technical knowledge and experience and became interested in hacking as a result of their partnership.

    • MLT's Moral Compass in TeaMp0isoN Hacker GroupMLT's experience shows how some hackers prioritize learning and developing their craft over political motives, and how moral considerations can guide their actions.

      MLT became the co-leader of the TeaMp0isoN hacker group to gain more skills and see whether he was capable of it. While TriCk was politically motivated, MLT was not. Though initially, TeaMp0isoN's objective was to deface target websites, MLT's moral compass made him consider which websites deserved to be defaced and which did not. He believed that if it was a terrorist organization, then it was morally justified to attack its website. MLT's willingness to learn with a group drew him to TeaMp0isoN since he was not as skilled as TriCk. His experience shows how some hackers are motivated by the challenge of developing their craft rather than politics.

    • The rise and fall of TeaMp0isoN: a politically motivated hacking groupTeaMp0isoN used hacking to bring attention to their causes and exploit web vulnerabilities, but their actions led to investigations and arrests.

      TeaMp0isoN was a group of hackers led by TriCk, who was politically motivated and had a Muslim background. They targeted various individuals and organizations, including Facebook and Tony Blair. Through their hacks, they aimed to bring attention to their causes and exploit vulnerabilities in web platforms. MLT, a member of the group, learned a lot about hacking from TriCk and other members, but it seems like he was not really involved in many of the high-profile hacks. Despite their activities, it is unclear whether TeaMp0isoN considered themselves to be hacktivists or extremists. The group's behavior eventually drew the attention of the authorities, which led to investigations and arrests.

    • TeaMp0isoN's Feud with LulzSec and Hacking AchievementsTeaMp0isoN's cyberattacks were driven by revenge and political motives. However, they also showed their ability to access high-profile targets and use their skills for charitable purposes.

      TeaMp0isoN, a hacker group affiliated with Anonymous, hacked into the computers of Sabu from LulzSec after he spread lies about them, which escalated the situation. LulzSec allegedly started DDossing the poison.org website and trying to deface it. This incident led to a Twitter spat between the two groups. MLT, a member of TeaMp0isoN, SQL-injected his school's website resulting in him getting into trouble at school and being grounded from using computers. TeaMp0isoN hacked into the hotel's network and managed to access P. Diddy’s credit card number. They donated a few hundred thousand dollars to charity and bought pizzas for anyone who asked on Twitter.

    • TeaMp0isoN's Unique Social Engineering Method to Hack BlackBerryTeaMp0isoN hack BlackBerry using a social engineering method by pretending to be from Google to gain access to the system and post a message on their website. The hack sparked controversy with mixed opinions on its justifiability.

      TeaMp0isoN used a unique method of social engineering to gain access to BlackBerry by pretending to be from Google. They called up BlackBerry employees, pretended their Gmail account was locked due to a brute force attempt, and obtained the unlock code. They then did a password reset request on the Gmail account, which gave them access to BlackBerry's WordPress site, where they posted a message crafted by TriCk. This hack had mixed reactions, with some seeing it as a good thing and others condemning it. MLT was personally curious about the social engineering method but didn't necessarily agree with the hack. TriCk was the driving force behind TeaMp0isoN's actions and messaging.

    • The story of TeaMp0isoN's hacking career and MLT's involvement and departureHacking can be addictive and thrilling, but it comes with serious consequences. Even those who join for the thrill eventually realize the dangers and choose to leave the group.

      TeaMp0isoN was a group of Muslim hackers from the UK who, between 2010 and 2013, targeted several organizations including the United Nations, NATO, and US, Australian, and UK government websites, among other random sites. MLT, who was involved with the group, claimed they hacked at least a few thousand sites. Even though most of their hacks were not for political reasons, they gained a reputation on the Zone-H website that hackers use to post their exploits. MLT said he joined the group for the thrill of hacking and to learn from his knowledgeable friends. The adrenaline rush of taking control of a government server was addictive, but eventually, he left the group.

    • TeaMp0isoN's Attack on UK's Counter-Terrorism Hotline and its Consequence.Anarchist hacktivist group TeaMp0isoN attacked UK's counter-terrorism hotline to protest against extradition but caused unrest among police. Cyber attacks have severe consequences and can harm members of the group.

      TeaMp0isoN, an anarchist hacktivist group, attacked the UK's counter-terrorism hotline with a denial-of-service attack which caused panic among law enforcement and attracted police's attention. TriCk, a member of the group, did this out of protest against the extradition of alleged terror suspects from Britain to the US. However, the reasoning behind it was basically in support of terrorism, which MLT, another member of the group, did not support. MLT suggests that TriCk went too far and started attacking the Met Police, which caused further problems. The consequence of TriCk's actions was the arrest of a seventeen-year-old member of the group and paranoia among other members, including MLT who started wiping his computer and phone and covering his tracks.

    • MLT's Arrest and TriCk's ReleaseLaw enforcement may take unexpected actions after evidence is erased. Incarceration can change the behavior of individuals, leading to more extreme and violent views.

      MLT erased all the evidence before returning home to the UK. He expected to get arrested at the airport but nothing as such happened. Later, the police raided his house, broke the door down and arrested him. They confiscated his computers and kept him in a holding cell for three days. MLT was tried as a minor and sentenced to two years supervised release. TriCk, the first to go to court, was sentenced to six months in prison. After serving a month and a half, he was released. MLT noticed a change in TriCk's behavior after he got out; he became more extreme and advocated for violence.

    • How Twitter led to radicalization and joining ISISSocial media can be a powerful tool for radicalization. Those close to individuals who have become radicalized should look for signs and try to intervene before it's too late. Refusing to support extremist activities is important.

      The story discusses the radicalization of TriCk and Sally Jones, who went from being regular people to joining ISIS in Syria. TriCk and Sally met on Twitter while Sally was sympathizing with Muslims and becoming a Muslim herself. After TriCk got out of prison, they got married, but TriCk became more radicalized while in prison. He joined ISIS and started a new hacker group called the Cyber Caliphate. Sally and her son went to Syria to join TriCk. They changed their names and became citizens of ISIS. Sally even began training her 10-year-old son to become a child soldier. MLT, a friend of TriCk, was asked by TriCk to do hacking and credit card work for ISIS, but he refused.

    • The Consequences of a Hacker turned Recruiter for ISISJunaid Hussain's death by a US drone strike indicates the severity of the consequences when hackers aid terrorism. It highlights the need for greater vigilance and accountability to prevent such activities.

      Junaid Hussain, a hacker turned recruiter for ISIS, was Number 3 on CENTCOM's kill list because of his involvement in instructing foreign members to conduct acts of violence. Junaid and his wife urged people to commit acts of terror, making them targets of the US military. When they learned of Junaid's location, they sent out an attack drone, which eventually killed him. Junaid is the only known hacker to be killed by a US drone strike. This shows the severity of the consequences when hackers cross the line into aiding terrorism.

    • Elimination of a notorious British Jihadist and a hacktivist turned ethical hacker.While one person chose a path of destruction and harm, the other realized the impact of his actions and chose to use his skills ethically, creating a positive impact on society.

      The notorious British Jihadist, Sally Ann Jones, who trained her son to be a child soldier for ISIS, was targeted and killed by a drone strike in Syria along with her 12-year-old son. The details are unclear as to whether the strike was intended for her or not. MLT, a former black hat hacker, shifted his focus to legal hacking by developing zero-day vulnerabilities and selling them ethically. He rather chooses to stick with lower payouts and sell the exploits to Trend Micros Zero-Day Initiative who develops anti-virus signatures for them and reports them to the software maker so that they can be fixed. This is the right thing to do and at the same time, he also has a clear conscience.

    Recent Episodes from Darknet Diaries

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Hack Naked News #204 - January 22, 2019

    Hack Naked News #204 - January 22, 2019

    This week, a flaw in MySQL could allow rogue servers to steal files, a state agency exposes 3TB of data including FBI info, how cybercriminals clean their dirty money, a critical RCE flaw in Linux APT allows remote attackers to hack systems, and how to protect against a new breed of cyber attack! Jason Wood from Paladin Security joins us for expert commentary on how attackers used a LinkedIn job ad and Skype call to breach a bank's defense!

     

    Full Show Notes: https://wiki.securityweekly.com/HNNEpisode204

    Visit https://www.securityweekly.com/hnn for all the latest episodes!

     

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    BZ’s BBS, Thursday, 3-10-22, with Cybersecurity Expert MIKE FITZPATRICK On US, Russia, and Ukraine, Pt I:

    BZ’s BBS, Thursday, 3-10-22, with Cybersecurity Expert MIKE FITZPATRICK On US, Russia, and Ukraine, Pt I:
    Cybersecurity expert Mike Fitzpatrick returned as he and BZ spoke about Russian cyberattacks aimed at the United States, what can be expected, how affective could they be, at what are the Russians aiming, and any other "actors" that may be involved.

    Plus, the Chicago Death Toll, and Happy Stories!

    One of the last featured shows in Kalifornia, BZ will becoming back after he rebuilds the SHR Media studio in an actual free state!

    Our website is always up at http://SHRMEDIA.COM!

    LinkedIn, MySQL, & Cyber Attacks - Hack Naked News #204

    LinkedIn, MySQL, & Cyber Attacks - Hack Naked News #204

    A flaw in MySQL could allow rogue servers to steal files, a state agency exposes 3TB of data including FBI info, how cybercriminals clean their dirty money, a critical RCE flaw in Linux APT allows remote attackers to hack systems, and how to protect against a new breed of cyber attack! Jason Wood from Paladin Security joins us for expert commentary on how Attackers used a LinkedIn job ad and Skype call to breach a bank's defense!

    Full Show Notes: https://wiki.securityweekly.com/HNNEpisode204 Visit http://hacknaked.tv to get all the latest episodes!

    BZ’s BBS, Thursday, 3-10-22, with Cybersecurity Expert MIKE FITZPATRICK On US, Russia, and Ukraine, Pt II:

    BZ’s BBS, Thursday, 3-10-22, with Cybersecurity Expert MIKE FITZPATRICK On US, Russia, and Ukraine, Pt II:
    Cybersecurity expert Mike Fitzpatrick returned as he and BZ spoke about Russian cyberattacks aimed at the United States, what can be expected, how affective could they be, at what are the Russians aiming, and any other "actors" that may be involved.

    Plus, the Chicago Death Toll, and Happy Stories!

    One of the last featured shows in Kalifornia, BZ will becoming back after he rebuilds the SHR Media studio in an actual free state!

    Our website is always up at http://SHRMEDIA.COM!