

Mic Drop: The ego exploit
29 snips Jun 13, 2025
Dan Guido, a cybersecurity expert and founder of Trail of Bits, dives into the art of hacking and human error. He shares his firsthand experience with Elusive Comet's strategies, revealing how hackers exploit trust and emotions, like urgency and ego. Guido highlights the vulnerabilities in popular communication tools like Zoom and discusses the shifting tactics in cryptocurrency attacks. Emphasizing the need for skepticism, he reminds us that the weakest link in security often lies within ourselves, not the technology.
AI Snips
Chapters
Transcript
Episode notes
Hacker Poses as Bloomberg Reporter
- Dan Guido was targeted by a hacker posing as a Bloomberg Crypto reporter on Twitter.
- He used an old Chromebook to take the suspicious Zoom call as a defense strategy.
Zoom's Risky Remote Access Feature
- Zoom’s built-in remote access feature can let someone control your screen, keyboard, and mouse remotely.
- This feature combined with social engineering can easily lead to unauthorized access.
Psychological Tricks in Zoom Hacks
- Hackers use pressure and ego stroking to trick victims into granting remote access on Zoom.
- People often click permissions without understanding the potential consequences.