Logo

70: Ghost Exodus

en-us

July 21, 2020

TLDR: Guest storyteller Ghost Exodus describes his experiences as a hacker who documents online activities on YouTube. IT Pro TV is thanked for sponsoring this episode and offering free training with promo code DARKNET25.

1Ask AI
  • Understanding the Risk of Insider ThreatsWhile fear of the consequences may deter employees from reporting insider threats, companies have mechanisms to identify them, and the consequences of not addressing them can be severe for both the employee and the company.

    Insider threats are employees who exploit their position in a company for personal gain. Over 50% of companies claim to be victims of insider threats. This could have severe consequences for both the employee and the company. An example of this is the story of the server at the nightclub who scammed customers, making herself extra cash and putting the business at risk. The fear of reporting insider threats is understandable as it can have life-changing consequences for the person involved, but companies have mechanisms to identify such threats. This episode of Darknet Diaries features Ghost Exodus, a classical concert pianist who became involved in hacktivism, causing major consequences. The story highlights how seemingly unrelated events can lead to significant changes.

  • Ghost Exodus: From Troubled Past to Cyber-VigilanteGhost Exodus turned to hacking to help those who couldn't defend themselves online. He saw himself as a cyber-vigilante seeking to rectify harm caused by internet trolls and bullies.

    Ghost Exodus, after a troubled upbringing and brief stint with a strict church, turned to hacking as a means of helping those who couldn't defend themselves against cyber-bullying and other injustices. He joined a hacking crew, learned a lot from them, and eventually started his own group called ETA (Electronik Tribulation Army) with a focus on social justice. He saw himself and his group as vigilantes and sought to rectify the harm caused by internet trolls and bullies. Ghost Exodus had a soft spot for those suffering due to online harassment, and his experiences with being controlled and ridiculed motivated him to take action and try to help others in need.

  • The Evolution of HackingCuriosity can lead to innovation, but it's crucial to stay true to one's initial objectives and not lose sight of ethical conduct. Power can be intoxicating and attract dangerous individuals, leading to chaos and a loss of control.

    Hacking started as a sheer exploration of the internet for the ETA group, driven by curiosity and the love for solving puzzles. However, as the group evolved, they lost sight of their initial objectives and started to engage in cyber vigilantism and dark activities. Ghost Exodus, the group leader, became a pathological hacker and lost control of himself. His escapades with botnets gave him too much power that he could wield to manipulate and leverage on others. The group's growth attracted different individuals with diverse motives, which led to chaos, and Ghost Exodus was forced to seek help from the Internet Crime and Complaint Center, which failed to intervene.

  • Violating Security Protocols - A Cautionary Tale of Ghost ExodusAccessing secure systems without authorization is a crime and can compromise the entire network. Companies should regularly educate employees on cybersecurity best practices to prevent such incidents.

    Ghost Exodus committed a crime by taking the law into his own hands by infecting computers to launch a botnet attack against some websites. In doing so, he violated the rules of being a security guard while working at the Carrell Clinic. He exploited a server controlling HVAC to access more reliable internet connections to remote access from his laptop at his guard station. He wandered through the halls of the clinic to find potential computers he could exploit and stumbled upon locked ones. He discovered a tool called Ophcrack, which can find passwords for Windows computers, and decided to use it. This shows how easy it can be to violate computer security protocols and put a network at risk.

  • A Hacker's Infiltration of a Clinic to Build a Botnet and Inspire OthersGhost Exodus used his job as a security guard to build a botnet and inspire other hackers through a controversial propaganda video. He used various tactics like Ophcrack CD and Rxbot to avoid detection and warned others that his actions may not always turn out in his favor.

    A hacker named Ghost Exodus infiltrated a clinic where he worked as a security guard to join a new node on his botnet and released a propaganda video to inspire other hackers to emulate his actions. He used Ophcrack CD to discover passwords and Rxbot to build his botnet. Ghost deactivated McAfee antivirus on some systems to avoid getting detected by antivirus software. He made this video to inspire others and promote his botnet. The reactions to his video were mixed, some warning him that it could backfire, and others appreciating his actions. Ghost wanted it to be controversial and not always go his way.

  • The Euphoria of Hacking and Its Legal ConsequencesHacking may give a thrill of accomplishment, but it can lead to severe legal consequences. Just as in the case of Ghost Exodus, making unethical choices can be detrimental not only personally but to society as a whole.

    Ghost Exodus, a hacker, used a botnet to attack multiple computers and cause them to go offline. He felt euphoric at the feeling of winning and being relevant. He posted screenshots of the HVAC computer he hacked into, and a new recruit in his group posted them on a security blog. Wesley McGrew, a PhD research associate, received the screenshots and was contacted by Immortal, who was bragging about his hacking accomplishments and wanted to be famous. Immortal showed Wesley a target for his attacks, thinking it was North Korean, but it turned out to be South Korean. Hacking can be a pathological activity that can result in legal consequences.

  • Healthcare Facilities Vulnerable to HackingHacking into healthcare facilities can cause harm to patients and their personal information. Report such crimes to authorities and utilize open-source intelligence to track and catch perpetrators. Leave investigation to law enforcement to prevent future harm.

    Hacking into healthcare facilities poses a serious risk to patient information and can potentially cause harm to medical equipment and supplies. The FBI takes such crimes seriously even if it's not a high-damage case as personal healthcare information is sensitive. It is important to report such crimes as they can have a real impact on individuals and organizations. Open-source intelligence can be useful in identifying and tracking down perpetrators, as demonstrated by Wesley's investigation into Ghost Exodus. Although it may be thrilling to investigate and gather information, it is necessary to hand it over to law enforcement to prevent future harm.

  • The Consequences of Self-IncriminatingSelf-incrimination may lead to confession which can seal a person's fate. The FBI can employ tactics to convince a person that confessing will work in their favor, but it's not always the case. Being arrested doesn't mean law enforcement knows everything and confession is needed to build their case.

    Self-incriminating can seal a person's fate as it gives law enforcement a confession. They may use tactics like convincing a person that things will work in their favor as long as they confess, but this is not always true. The experience of being raided by the FBI can be terrifying and leave lasting effects. Jesse McGraw, aka Ghost Exodus, confessed to everything related to the Carrell Clinic, except for giving up his friends. He spent two years in jail while fighting his case. Being arrested does not necessarily mean that law enforcement knows everything about a person as they may need confession to build their case.

  • The Consequences of Hacking a Medical ClinicHacking, even without malicious intent, can lead to severe real-life consequences, as shown by the case of Ghost Exodus who received a longer sentence than many for manslaughter, highlighting the potential danger of crossing certain lines when it comes to hacking.

    The consequences of hacking a medical clinic can be severe, as shown by the case of Ghost Exodus who received a nine-year sentence for non-malicious actions with no intent to cause harm. His sentence was longer than many for manslaughter and spending so long in prison had a lasting impact on him. Furthermore, even after his arrest, there was a lot of online harassment towards his associates. Despite knowing the risks, he wasn't sure what to expect. This highlights the potential danger of crossing certain lines when it comes to hacking, even if it's done without malice or harmful intent. In the end, hacking can have severe real-life consequences.

  • The Physical and Emotional Effects of Long-Term ImprisonmentLong-term imprisonment can cause physical and emotional turmoil, leading individuals to take extreme measures such as attempting escape. Reentry into society can also be difficult, especially with the lack of trust and support from loved ones.

    The experience of being in prison for a long time can change you physically and emotionally. Ghost Exodus' year in solitary confinement affected him physically by causing fluid to collect in his lungs, causing him to lose a lot of weight, and mentally as he described it as torture. When he got out of prison, his wife was afraid that he was trying to hack again and couldn't trust him. The need to escape is common among prisoners, and Ghost Exodus's time in prison made him research and eventually board a cargo ship undetected to go to Nigeria. Being financially co-dependent and having nowhere else to go, he chose to take this extreme step.

  • Ghost Exodus' journey from prison to redemption.Even small actions can have major consequences. It's important to take responsibility, learn from mistakes and give deserving second chances.

    Ghost Exodus shares his story of living on the run and ultimately serving a total of nine years and eight months in prison, all because he installed software on computers he wasn't supposed to. After being released, he plans to study digital forensics to prevent anyone else from having their life ruined by an incompetent forensic examiner. He currently works as a fry cook and is focusing on rebuilding his life with no probation or prison time. It is important to be aware of the consequences of breaking the law and how it can impact one's life, but it is also important to be given a second chance to make a positive change in one's life.

Was this summary helpful?

Recent Episodes

73: WannaCry

73: WannaCry

Darknet Diaries

In May 2017, a massive ransomware attack known as WannaCry occurred, affecting victims like the UK's national health service. Security researchers investigated the incident, with John Hultquist from FireEye involved, trying to identify who was behind it.

September 01, 2020

72: Bangladesh Bank Heist

72: Bangladesh Bank Heist

Darknet Diaries

Bank robber Geoff White wrote a book called 'Crime Dot Com' about the largest bank robbery orchestrated via computer. He also partnered with IT Pro TV and Blinkist for support on this episode.

August 18, 2020

71: Information Monopoly

71: Information Monopoly

Darknet Diaries

The hosts recreate one of the greatest hacks in history to inject information into North Korea's totalitarian regime system. Guests Yeonmi Park and Alex Gladstein share their stories about this hack.

August 04, 2020

69: Human Hacker

69: Human Hacker

Darknet Diaries

Security consultant Christopher Hadnagy shares his experiences as a social engineer before the term existed, discussing techniques to manipulate humans with their stories from his long career in penetration testing.

July 07, 2020

Related Episodes

131: Welcome to Video

131: Welcome to Video

Darknet Diaries

Andy Greenberg discusses his book 'Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency', which explores how investigators used bitcoin tracing techniques to disrupt child sex abuse dark web websites. Varonis and Axonius support this show, providing solutions for ransomware detection and IT asset correlation.

December 27, 2022

79: Dark Basin

79: Dark Basin

Darknet Diaries

Adam Hulcoop and John Scott-Railton of Citizen Lab discuss assisting targets of massive hacking campaigns with research and bringing hackers to justice, while Shadowfall's Matthew Earl is also interviewed.

November 24, 2020

124: Synthetic Remittance

124: Synthetic Remittance

Darknet Diaries

Evaldas Rimašauskas allegedly committed crimes combining social engineering and other tactics for financial gain in big tech.

September 20, 2022

Ep 47: Project Raven

Ep 47: Project Raven

Darknet Diaries

An ex-NSA agent worked for a secret hacking group in the UAE, utilizing their skills and resources to enhance their operations and cover their tracks.

September 17, 2019

AI

Ask this episodeAI Anything

Darknet Diaries

Hi! You're chatting with Darknet Diaries AI.

I can answer your questions from this episode and play episode clips relevant to your question.

You can ask a direct question or get started with below questions -

Sign In to save message history