AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
This podcast episode delves into the introduction of alcohol to communities in the newly formed Canadian territory of Nunavut. With the older generation lacking firsthand experience and wisdom on responsible drinking, the younger generation is left to navigate the dangers and consequences. Bootlegging has become rampant, exacerbating alcohol-related crimes. The hope for a better future lies in better education and a more developed economy to create a generation of responsible individuals.
This podcast explores the potential dangers of the internet for the younger generation who are the first to navigate it. Lack of guidance from an older generation who grew up without internet access leaves them vulnerable to various online risks, from viruses and scams to social media dangers. The absence of education and awareness in school curriculums further compounds the issue. The hope lies in future generations being raised by parents who have experienced the darker side of the internet and can guide them in navigating safely.
This podcast episode dives into the growing trend of SIM swapping, a method of stealing phone numbers to gain control of online accounts. The focus has shifted towards targeting individuals with high-value cryptocurrency wallets, as it offers an easy way to grab and cash out the funds. The process involves mining leaked databases for valid logins, cross-referencing them, and exploiting vulnerabilities in platforms like CoinBase. The ultimate goal is to gain access to the victim's cryptocurrency accounts and transfer the funds to anonymizing services for cashing out.
This podcast sheds light on the underground market for buying and selling account logins. Hackers and scammers acquire valid login credentials through data breaches and combo lists, which are then used to access accounts on various platforms. These stolen logins range from social media accounts to banking and cryptocurrency accounts. Valuable accounts can be sold for profit, while others are exploited, such as ordering food with stolen accounts or performing chargebacks. This underground economy thrives due to the widespread practice of reusing passwords and the lack of awareness surrounding online security.
Sim exchangers select targets based on various factors, such as the extent of their cryptocurrency balance and reputation. The process involves extensive research and building a massive profile on potential victims, often leveraging leaked data, including usernames, passwords, and phone numbers. The thieves then exploit vulnerabilities in mobile carriers' security systems to gain control of victims' phone numbers. This allows them to bypass two-factor authentication and gain access to the victims' cryptocurrency accounts. The thefts are lucrative and organized, with different individuals specializing in different phases of the operation.
Once the thieves have control of a victim's phone number, they move quickly to execute the SIM swap and gain control of the victim's cryptocurrency accounts. They often employ insider help, such as regional managers at mobile carriers, and coordinate the swap in Telegram chat rooms. The process involves utilizing proxies near the victims' location, switching passwords, and navigating cryptocurrency platforms to complete the theft. Thieves then transfer the stolen funds to different wallets to avoid detection. The complexity of these operations highlights the need for increased security measures by mobile carriers and cryptocurrency platforms.
The world of NFTs (non-fungible tokens) has become a breeding ground for scams and thefts. Scammers employ various tactics, including deceiving users into unknowingly providing access to their wallets or participating in fraudulent NFT projects. Many scams target unsuspecting individuals during frenzied launch events, manipulating discord channels, and using fake accounts to trick users into providing sensitive information. The surge in NFT thefts underscores the need for users to exercise caution, educate themselves about potential risks, and prioritize cybersecurity practices to protect their digital assets.
This episode we talk with a guy named “Drew” who gives us a rare peek into what some of the young hackers are up to today. From listening to Drew, we can see that times are changing for the motive behind hacking. In the ’90s and ’00s it was done for fun and curiosity. In the ’10s Anonymous showed us what Hacktivism is. And now, in the ’20s, the young hackers seem to be profit driven.
Sponsors
Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.
Support for this show comes from Juniper Networks. Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper Secure Edge can help you keep your remote workforce seamlessly secure wherever they are.
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode