Episode
112: Dirty Coms
Description
This episode we talk with a guy named “Drew” who gives us a rare peek into what some of the young hackers are up to today. From listening to Drew, we can see that times are changing for the motive behind hacking. In the ’90s and ’00s it was done for fun and curiosity. In the ’10s Anonymous showed us what Hacktivism is. And now, in the ’20s, the young hackers seem to be profit driven. Sponsors Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Support for this show comes from Juniper Networks. Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper Secure Edge can help you keep your remote workforce seamlessly secure wherever they are. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
As older generations rely on younger generations to navigate digital spaces, it’s important to educate and prepare youth for online safety.
00:00 - 04:34 (04:34)
Summary
As older generations rely on younger generations to navigate digital spaces, it’s important to educate and prepare youth for online safety.
Episode112: Dirty Coms
PodcastDarknet Diaries
The podcast discusses how game creators can make money by creating games that kids are willing to pay to play and how in-game currency can be valuable for both kids and creators.
04:36 - 08:38 (04:02)
Summary
The podcast discusses how game creators can make money by creating games that kids are willing to pay to play and how in-game currency can be valuable for both kids and creators.
Episode112: Dirty Coms
PodcastDarknet Diaries
Fraudsters set up fake websites for gift card balance checking, as a way to obtain users’ card details.
08:38 - 13:14 (04:36)
Summary
Fraudsters set up fake websites for gift card balance checking, as a way to obtain users’ card details. They invest in Google Ads to get their sites to show up first in search results.
Episode112: Dirty Coms
PodcastDarknet Diaries
Users on OG users buy stolen usernames and immediately change the username to avoid any chance of the original account holder recovering it.
13:14 - 19:16 (06:01)
Summary
Users on OG users buy stolen usernames and immediately change the username to avoid any chance of the original account holder recovering it. This prevents the old username from being associated with the old account and reduces the risk of being caught.
Episode112: Dirty Coms
PodcastDarknet Diaries
Scammers are known to use various tactics to extort people online, such as making them write their Instagram username on their bodies, stealing social security numbers, and opening loans in victims' names.
19:17 - 25:15 (05:57)
Summary
Scammers are known to use various tactics to extort people online, such as making them write their Instagram username on their bodies, stealing social security numbers, and opening loans in victims' names.
Episode112: Dirty Coms
PodcastDarknet Diaries
The podcast discusses the importance of not reusing the same email and password combination and filling the garage with boxes to protect personal information from potential hackers.
25:15 - 30:03 (04:47)
Summary
The podcast discusses the importance of not reusing the same email and password combination and filling the garage with boxes to protect personal information from potential hackers.
Episode112: Dirty Coms
PodcastDarknet Diaries
The Online Counterculture of the early 2000s was a time of innovation and experimentation, but also moral contemplation for those involved, and begs the question of nostalgia for current teens.
30:03 - 35:45 (05:42)
Summary
The Online Counterculture of the early 2000s was a time of innovation and experimentation, but also moral contemplation for those involved, and begs the question of nostalgia for current teens.
Episode112: Dirty Coms
PodcastDarknet Diaries
Learn about the dangerous trend of sim swapping and how hackers use it to commit bank fraud, stealing people’s money and evading traceability with real-world knowledge of money laundering and leak databases.
35:45 - 42:25 (06:40)
Summary
Learn about the dangerous trend of sim swapping and how hackers use it to commit bank fraud, stealing people’s money and evading traceability with real-world knowledge of money laundering and leak databases.
Episode112: Dirty Coms
PodcastDarknet Diaries
Cyber criminals are using stolen pizza accounts to search through email accounts for valuable information and to create fraudulent pizza orders.
42:25 - 47:05 (04:39)
Summary
Cyber criminals are using stolen pizza accounts to search through email accounts for valuable information and to create fraudulent pizza orders. This is a small part of a larger trend of cyber crime involving the sale of valid login information.
Episode112: Dirty Coms
PodcastDarknet Diaries
The podcast discusses the steps that hackers take to gain access to crypto accounts, including obtaining the username and password, phone number, account balance, and checking for 2FA.
47:05 - 53:44 (06:39)
Summary
The podcast discusses the steps that hackers take to gain access to crypto accounts, including obtaining the username and password, phone number, account balance, and checking for 2FA.
Episode112: Dirty Coms
PodcastDarknet Diaries
The speaker discusses a plan to steal a manager's tablet, but notes that it requires the password and suggests an alternative of contacting IT help desk to get the tablet disabled and the manager's account disabled.
53:44 - 57:46 (04:02)
Summary
The speaker discusses a plan to steal a manager's tablet, but notes that it requires the password and suggests an alternative of contacting IT help desk to get the tablet disabled and the manager's account disabled.
Episode112: Dirty Coms
PodcastDarknet Diaries
Phone number port-out scams typically require an insider to begin the process of moving the phone number from the customer's phone to the thief's phone in Telegram.
57:46 - 1:01:13 (03:26)
Summary
Phone number port-out scams typically require an insider to begin the process of moving the phone number from the customer's phone to the thief's phone in Telegram. Verizon is extremely well secured but it is still possible if you have the right equipment like a branch manager login.
Episode112: Dirty Coms
PodcastDarknet Diaries
Michael Turpin, a long-time believer and investor in cryptocurrency, lost $23 million worth of crypto due to a SIM swapping hack in 2018.
1:01:13 - 1:06:06 (04:53)
Summary
Michael Turpin, a long-time believer and investor in cryptocurrency, lost $23 million worth of crypto due to a SIM swapping hack in 2018. He sued AT&T for $200 million claiming they promised his phone number was secure, but the perpetrator was still able to steal his funds.
Episode112: Dirty Coms
PodcastDarknet Diaries
The importance of having unique and strong passwords for your online accounts and avoiding sharing personal information that can be used for hacking and unauthorized access.
1:06:06 - 1:11:12 (05:05)
Summary
The importance of having unique and strong passwords for your online accounts and avoiding sharing personal information that can be used for hacking and unauthorized access.
Episode112: Dirty Coms
PodcastDarknet Diaries
The IT security space has some individuals who want to be respected as good security researchers but are also involved in illegal or unethical activities.
1:11:12 - 1:14:54 (03:42)
Summary
The IT security space has some individuals who want to be respected as good security researchers but are also involved in illegal or unethical activities. A recent NFT scam involved tricking people into giving away their 24-word seed phrase resulting in the theft of valuable NFTs from their MetaMask crypto wallets.
Episode112: Dirty Coms
PodcastDarknet Diaries
The use of crypto influencers to promote NFT scams through social media, particularly Instagram, is a growing concern in the industry.
1:14:54 - 1:18:59 (04:05)
Summary
The use of crypto influencers to promote NFT scams through social media, particularly Instagram, is a growing concern in the industry. These influencers often use shadow packages from verified individuals to lend credibility to their promotions.
Episode112: Dirty Coms
PodcastDarknet Diaries
This podcast episode discusses the recent arrest of 21-year-old Joel Ortiz, who conducted SIM swapping scams resulting in $7 million stolen.
1:18:59 - 1:23:25 (04:26)
Summary
This podcast episode discusses the recent arrest of 21-year-old Joel Ortiz, who conducted SIM swapping scams resulting in $7 million stolen. Many young people, including minors, have been arrested for this activity.
Episode112: Dirty Coms
PodcastDarknet Diaries
The lack of education in online security leaves users vulnerable to cyber attacks.
1:23:25 - 1:28:17 (04:51)
Summary
The lack of education in online security leaves users vulnerable to cyber attacks. An initiative is needed to educate and encourage them to adopt the best practices to secure their online environment.
Episode112: Dirty Coms
PodcastDarknet Diaries
The transcript highlights the danger of using the same password for multiple accounts and the importance of implementing strong security measures.
1:28:17 - 1:31:33 (03:15)
Summary
The transcript highlights the danger of using the same password for multiple accounts and the importance of implementing strong security measures.