goodlisten

Chapter

The Process of Hacking Crypto Accounts
listen on Spotify
47:05 - 53:44 (06:39)

The podcast discusses the steps that hackers take to gain access to crypto accounts, including obtaining the username and password, phone number, account balance, and checking for 2FA.

Clips
By using a simple email verification trick, it is possible to check if someone has an account on a crypto exchange without knowing their password.
47:05 - 49:10 (02:05)
listen on Spotify
Crypto security
Summary

By using a simple email verification trick, it is possible to check if someone has an account on a crypto exchange without knowing their password. However, even if a thief has a valid email and password to a crypto account, there are still security measures in place to protect against unauthorized access.

Chapter
The Process of Hacking Crypto Accounts
Episode
112: Dirty Coms
Podcast
Darknet Diaries
Security flaw in Coinbase allowed anyone to check the balance of any valid password and username for a month.
49:10 - 51:48 (02:37)
listen on Spotify
Coinbase
Summary

Security flaw in Coinbase allowed anyone to check the balance of any valid password and username for a month. Sim swap hackers are known to use this flaw to identify how much is in an account before stealing the phone number.

Chapter
The Process of Hacking Crypto Accounts
Episode
112: Dirty Coms
Podcast
Darknet Diaries
A hacker can use geolocation techniques and people searches to find a phone number and carrier, as well as the corresponding username, password, and account balance for a potential hack.
51:48 - 53:44 (01:55)
listen on Spotify
Phone Security
Summary

A hacker can use geolocation techniques and people searches to find a phone number and carrier, as well as the corresponding username, password, and account balance for a potential hack.

Chapter
The Process of Hacking Crypto Accounts
Episode
112: Dirty Coms
Podcast
Darknet Diaries