The Great Tech Game Podcast: Geopolitics, Technology, Business and Global Affairs, with Anirudh Suri

Anirudh Suri
undefined
Jun 13, 2025 • 5min

How North Korean Hackers Pulled Off a $1B Bank Heist | Ft. Geoff White, host of BBC Podcast. (Clip 1 - Ep 33)

In this video, Geoff White, host of BBC Podcast 'Lazarus Heist', dives into the shocking story of the Lazarus Heist — one of the most infamous cybercrime operations in the world. North Korea’s state-backed hackers have allegedly stolen billions of dollars through highly sophisticated attacks on banks, cryptocurrency firms, gaming platforms, and financial institutions worldwide.From the infamous 2016 Bangladesh Bank hack, where hackers attempted to steal $1 billion and successfully got away with $80 million, to the Cosmos Cooperative Bank ATM heist in India, which led to a $12 million loss, these operations reveal just how advanced and calculated North Korea’s cyber strategies are.The conversation also explores how the Lazarus Group shifted focus toward cryptocurrency and gaming platforms, leading to one of the biggest hacks in history — the Axie Infinity breach in 2022, where $625 million was stolen through blockchain vulnerabilities. With the rise of digital finance, crypto exchanges and gaming ecosystems have become prime targets for global cybercriminals.We also discuss how these hackers launder stolen money through underground networks, shell companies, and poorly regulated sectors, making their financial trails nearly impossible to track. This video unpacks the motives, methods, and global impact of North Korea’s state-sponsored cybercrime machine.If you’re interested in cybersecurity, cryptocurrency, or digital warfare, this is a must-watch.Watch Full Episode: https://youtu.be/66u1zeJVKLI
undefined
Jun 11, 2025 • 60min

Ep. 33 - The Dark Web Uncovered: Who are the World's Deadliest Cyber Criminals? Ft. Geoff White, Author of Rinsed and Host of the Hit BBC Podcast, Lazarus Heist

Join us in this episode of The Great Tech Game Podcast as we delve into the murky world of cybercrime with investigative journalist and author, Geoff White. We discuss why few states succeed in building effective military cyber forces, the evolution of ransomware into a national security crisis, and the actors behind major cybercrime networks. Geoff maps out where these networks function geographically and in cyberspace, and identifies both state and non-state cyber actors, including Russia's ransomware economy, North Korea's Lazarus group, and fraud networks in Southeast Asia and West Africa. We also explore how technology has revolutionized money laundering for the world's deadliest crooks, as seen in Geoff latest book, 'Rinsed,' and touch on key geopolitical impacts, defense strategies, and the intersection of gaming and cybercrime.Key Chapters00:00 Introduction and Recap of Previous Episode02:28: Introducing Today's Guest: Geoff White03:51 The Evolution of Cyber Espionage Post-Snowden Leaks07:45 Mapping the Global Cyber Landscape11:35 Non-State Cyber Actors: A Closer Look17:18 The Infamous Lazarus Group and North Korean Cyber Operations20:08 The Rise of Cryptocurrency in Cybercrime23:44 The Black Axe Group: A Global Threat29:24 Money Laundering in the Digital Age32:20 The Din sisters Double Life33:28 Bitcoin as a Money Laundering Tool34:06 The Arrest and Aftermath35:23 Gaming and Cybercrime37:43 How Cybercriminals Get Caught41:10 Crypto Tech Firms Under Scrutiny52:10 Global Responses to Crypto Crime55:21 Geopolitics and Crypto58:07 Conclusion and RecommendationsBook Links:by Geoff White:Rinsed: From Cartels to Crypto: : https://amzn.in/d/48PaZjNThe Lazarus Heist: https://amzn.in/d/f0xbAofBy Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: http://www.anirudhsuri.com/Book and Podcast: http://www.greattechgame.com/
undefined
Jun 4, 2025 • 4min

Inside the Cyber Battlefield: States and Non-State Actors | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 6)

In this clip, Max Smeets unpacks the global ransomware threat landscape—mapping out where the major cybercriminal groups operate from, who they target, and how geopolitics plays into it all.While Russia remains the epicenter of many ransomware operations, these groups often have multinational member bases across Belarus, Ukraine, and beyond, operating with a tacit agreement not to target Russian allies.We also explore how English-speaking countries like the U.S. are primary targets, not only for ideological reasons, but also because of language familiarity and financial payoff.This conversation dives into groups like Conti, the fragmentation of ransomware gangs, and the shift in targets toward Latin America, as attackers evolve both strategically and politically.If you’re curious about cybercrime, digital geopolitics, or how language shapes attack strategies, this is a must-watch.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
Jun 3, 2025 • 6min

How Governments Hunt Ransomware Gangs | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 5)

In this clip, Max Smeets explores how governments—despite lacking the power of agencies like the FBI or NSA—are still finding smart, effective ways to push back against ransomware attacks.Whether it’s disrupting the cybercriminal ecosystem, targeting crypto wallets, or damaging the reputations of ransomware gangs, governments are learning to fight smarter, not just harder.This conversation dives deep into how international cooperation, public pressure, and infrastructure disruption are becoming powerful tools in this digital arms race.If you're interested in cybersecurity, ransomware policy, or global digital threats, this clip will give you fresh insights into what’s really happening behind the scenes.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
Jun 2, 2025 • 6min

What Actually Happens in a Ransomware Attack? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 4)

In this clip, Max Smeets walks us through a real-world example of how a ransomware attack unfolds — from the initial phishing email to the final ransom negotiations.It usually starts with a simple hook, like a fake Amazon gift card email, designed to get someone inside the organization to click. Once inside, attackers move laterally, using everyday tools already in the system — a tactic known as living off the land. Their goal is to reach critical systems and backups, staying hidden as long as possible.Eventually, they reveal themselves with a ransom note — not just demanding money, but proposing a business-like conversation. Discounts, cryptocurrency preferences, and even “customer service” come into play. But behind the scenes, it’s rarely the victim negotiating directly. Professional ransomware negotiators often step in, and in many cases, they’ve dealt with the attackers before.This clip offers a rare look at the detailed anatomy of a ransomware operation.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
Jun 1, 2025 • 4min

What Is the PETIO Framework in Cyber Strategy? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 3)

In this clip, Max Smeets explains his PETIO framework — a practical model for how countries can build effective cyber capabilities.PETIO stands for People, Exploits, Tools, Infrastructure, and Organization, but as the guest emphasizes, it all starts with People — recruiting, training, and retaining the right talent, both technical and non-technical.Surprisingly, the most discussed element, exploits, might actually be the least essential. As NSA’s Rob Joyce once said, success in cyber operations often comes not from flashy zero-days, but from knowing your adversary’s network better than they do.This clip is a must-watch for anyone curious about how cyber power is really built behind the scenes.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
May 31, 2025 • 3min

Who Are the Hacktivist Groups Attacking Governments? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 2)

In this clip, Max Smeets explores two lesser-known but highly significant players in the cyber domain — Cyber Partisans and Predatory Sparrow — who are reshaping the boundaries of cyber conflict beyond traditional nation-states.Cyber Partisans is a Belarusian resistance group that has conducted multiple disruptive cyberattacks against the Belarusian government. Their operations have included halting railway networks, exposing passport scans of top officials including President Lukashenko, and leaking sensitive personal details of officers. Remarkably, the group is attempting to build a responsible framework around its actions, deciding what to target, whom to notify, and where not to operate — setting a precedent for organized digital resistance.Predatory Sparrow, on the other hand, is an elusive actor claiming to be hacktivist-led, though signs suggest a likely connection to a state actor. They are known for highly sophisticated attacks on Iranian infrastructure, including a steel mill and energy facilities. In a rare move, they notified emergency services before launching attacks to minimize civilian harm, raising deep questions about ethics, attribution, and the rules of engagement in cyber operations.In both cases, these groups deserve more analytical attention for how they blur the lines between activism, cyberwarfare, and covert state action in a rapidly evolving digital battlefield.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
May 30, 2025 • 6min

What Sets US and Chinese Cyber Commands Apart? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 1)

In this clip, Max Smeets unpacks the contrasting cyber strategies of two global superpowers: the United States and China. The U.S. operates with a centralized and aggressive approach, led by U.S. Cyber Command and the NSA. Through a strategy known as persistent engagement, it actively disrupts adversaries, even across foreign networks, demonstrating a global mindset in cyber operations. Historical cases like Stuxnet reveal the extent to which the U.S. has been willing to conduct destructive and disruptive cyber activities.China, on the other hand, adopts a more decentralized and evolving model, involving a wide range of actors from PLA-affiliated units to universities and independent hacker groups. Much of China’s known activity revolves around IP theft and espionage, with increasing emphasis on Operational Preparation of the Environment (OPE) — quietly infiltrating systems and holding them at risk for potential future attacks.This conversation explores not only their strategic differences but also the structural contrasts between a tightly coordinated U.S. system and China’s more complex, layered cyber ecosystem. It also looks ahead to how both countries may continue to evolve, especially as China moves toward more centralized coordination of its cyber capabilities.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
May 29, 2025 • 1h 34min

Ep. 32 - Ransom Wars: Are States Losing Control of Cyberspace? ft. Cyber Expert Max Smeets

In the latest episode of The Great Tech Game podcast, cyber conflict expert Max Smeets—senior researcher at ETH Zurich and co-director of Virtual Routes—draws on his books “No Shortcuts” and “Ransom War” to explore why most states struggle to build effective cyber forces and how ransomware has become a major national security threat. He breaks down the contrasting cyber strategies of the US, China, and Russia, the rise of professionalized ransomware groups like Conti, and what it takes for governments to build capable cyber commands. A must-watch for anyone seeking to understand the evolving frontlines of cyber conflict.Chapters00:00 Trailer03:37 Introduction to the Great Tech Game Podcast03:51 Meet Max Smeets: Cybersecurity Expert06:04 Max's Journey from Finance to Cyber Warfare08:22 Discussing No Shortcuts: Challenges in Cyber Command17:11 Global Cyber Strategies: US vs China27:09 Building Cyber Capacity: The PETIO Framework46:38 Ransomware: A Growing National Security Threat52:03 Evolution of Ransomware53:30 The Rise of Conti55:03 Global Ransomware Landscape59:14 Ransomware Trust Paradox1:02:48 Conti Group and the MOB Framework1:09:45 Ransomware Attack Lifecycle1:19:36 Government Responses to Ransomware1:25:25 Comparing Ransomware to APTs and Terrorist Groups1:29:14 Book Recommendations and Final ThoughtsBook Links:By Max SmeetsNo Shortcuts: Why States Struggle to Develop a Military Cyber-Force:-https://a.co/d/03FfTolRansom War: How Cyber Crime Became a Threat to National Security:-https://a.co/d/2FuXaWSBy Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: http://www.anirudhsuri.com/Book and Podcast: http://www.greattechgame.com/#cyber #cybersecurity #cyberwarfare #ransomware #cybercrime #hackers #tech #geopolitics #thegreattechgame #thegreattechgamepodcast #tgtgpodcast #anirudhsuri #maxsmeets
undefined
May 19, 2025 • 6min

Short Clip- How China’s Tech Focus Threatens India's Security Ft. Lt Gen Shukla (Ep 31 - Clip 6)

In this powerful clip, Lt Gen Shukla breaks down how China’s military is deeply integrated with its tech and university ecosystems from AI and battery innovation to rocket science and shipbuilding. While India debates, China executes. He warns that unless India builds serious civil-military-tech fusion and prioritizes algorithmic innovation, we risk being outpaced in future wars—not just militarily, but technologically.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app