In this engaging discussion, Mob Man, the elusive creator of the infamous Sub7 malware, shares his journey from anonymity to acknowledgment as a key figure in cybersecurity. He delves into the ethical dilemmas of coding, revealing the fine line between innovation and criminality. The conversation also explores the complexities of digital identity, as multiple individuals with the same name emerge to clarify claims. With humor, they tackle programming languages and the legacy of Sub7, sparking debates about authorship and the nature of digital personas.
43:10
forum Ask episode
web_stories AI Snips
view_agenda Chapters
auto_awesome Transcript
info_circle Episode notes
question_answer ANECDOTE
First Online Post
Jack Rhysider's first online post, a video game guide, was met with harsh criticism.
This experience taught him the value of online feedback and led to unexpected friendships.
question_answer ANECDOTE
Mob Man Controversy
Jack Rhysider interviewed Greg, who claimed to have created the Sub7 malware.
Many listeners doubted Greg's claims, leading to online discussions and skepticism.
insights INSIGHT
Real Mob Man's Motivation
Ill Will found the real Mob Man, a Romanian programmer who confirmed creating Sub7.
The real Mob Man's motivation was initially fun and pranks, but he later left the scene due to Sub7's malicious use.
Get the Snipd Podcast app to discover more snips from this episode
In Episode 20 of Darknet Diaries, we heard from Greg aka “mobman” who said he created the sub7 malware. Something didn’t sit right with a lot of people about that episode. It’s time to revisit that episode and get to the bottom of things.
Sponsors This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet.
Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.
Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.