Darknet Diaries cover image

Darknet Diaries

Latest episodes

undefined
21 snips
Oct 27, 2020 • 47min

77: Olympic Destroyer

Andy Greenberg, a senior writer at Wired and author of Sandworm, dives into the startling cyber attack during the 2018 Winter Olympics in Pyeongchang. He reveals how critical IT systems were crippled, creating chaos at the event. The discussion takes a sinister turn as Greenberg examines potential state-sponsored attackers like North Korea and Russia, showcasing the complexity of cyber warfare. He also highlights the implications of the landmark indictment of the hacking group Sandworm, emphasizing the urgent need for accountability in the realm of cybersecurity.
undefined
Oct 13, 2020 • 1h 25min

76: Knaves Out

Dive into the audacious hacking of JP Morgan Chase, where deceitful knaves exploited a charity website to breach 83 million customer records. Discover the negligence of cybersecurity that allowed this massive data theft. The story reveals a web of crime, detailing the complex schemes of hackers and the alluring temptation of wealth. As investigations unfold, the connection between cybercrime and broader criminal networks highlights the dramatic consequences of unchecked ambition.
undefined
17 snips
Sep 29, 2020 • 35min

75: Compromised Comms

Jenna McLaughlin, a national security and investigations reporter for Yahoo News, and Zach Dorfman of the Aspen Institute, delve into a chilling period when the CIA's communications were compromised from 2009 to 2013. They discuss the devastating impact on intelligence operations and the tragic loss of agents due to a breach involving an Iranian double agent. The conversation sheds light on the vulnerabilities of communication systems, the need for secure methods in intelligence, and the bureaucratic hurdles whistleblowers face in raising alarms.
undefined
8 snips
Sep 15, 2020 • 1h 10min

74: Mikko

Mikko Hypponen, Chief Research Officer at F-Secure and a malware analysis expert, shares fascinating insights into the dark intersections of cybersecurity and poker. He discusses how hackers exploit online poker games, using malware to gain unfair advantages. Mikko also recounts a gripping story involving a hotel guest's mysteriously returned laptop, highlighting serious security vulnerabilities. Furthermore, he reflects on the evolution of malware over the decades and the ongoing battle against cyber threats, emphasizing the need for cybersecurity awareness in our increasingly connected world.
undefined
31 snips
Sep 1, 2020 • 45min

73: WannaCry

In this engaging discussion, Matt Suiche, founder of Comae Technology and an expert in incident response, dives deep into the infamous WannaCry ransomware attack of May 2017. He shares firsthand accounts from the UK’s NHS, revealing the chaos as medical staff scrambled to maintain patient care without their usual tech aids. Unpacking the attack's global disruption, Matt highlights the cybersecurity community's rapid response and the pivotal discovery of a 'kill switch' that halted the ransomware, tying it to larger threats from North Korea's notorious Lazarus Group.
undefined
12 snips
Aug 18, 2020 • 37min

72: Bangladesh Bank Heist

Geoff White, an investigative journalist for BBC News and Channel 4, dives into the audacious billion-dollar Bangladesh Bank Heist. He unpacks the meticulous planning and execution by hackers, showcasing how they exploited network vulnerabilities to pull off the largest bank robbery in history. The conversation also reveals the chaos that erupted at the bank when unauthorized transactions came to light. White discusses the laundering of $81 million through Philippine casinos and the troubling connections to North Korean cyber activity, shedding light on modern cybercrime's global implications.
undefined
Aug 4, 2020 • 1h 8min

71: Information Monopoly

Yeonmi Park, a North Korean defector and human rights advocate, shares her harrowing escape story from a totalitarian regime. Alongside Alex Gladstein, Chief Strategy Officer at the Human Rights Foundation, they discuss the innovative ways of smuggling information into North Korea, like using USB drives to access banned content. The conversation dives into the severe realities of life under oppression, the risks defectors face, and how technology serves as a beacon of hope for those seeking freedom. It's a compelling exploration of resilience and the fight against censorship.
undefined
11 snips
Jul 21, 2020 • 57min

70: Ghost Exodus

In this riveting discussion, Ghost Exodus, a former hacker turned musician, shares his journey from a troubled upbringing and a life of cybercrime to seeking redemption. He reflects on his dangerous escape from law enforcement and the moral dilemmas of hacking for justice. Wesley McGrew, a researcher who reported Ghost's activities to the FBI, provides insight into the impact of hacking culture and the relentless pursuit of criminals. Together, they explore the blurred lines of activism and the consequences that followed.
undefined
17 snips
Jul 7, 2020 • 1h 5min

69: Human Hacker

In this engaging discussion, Christopher Hadnagy, a renowned security consultant and master social engineer, dives deep into the world of human hacking. He shares thrilling tales from his career, including audacious infiltration attempts and the evolution of phishing tactics. Hadnagy emphasizes the vulnerabilities that arise from human interaction with technology and explores the fascinating dynamics of trust and deception. With insights on effective communication and security awareness, this conversation is a captivating look into the art of manipulating human psychology.
undefined
21 snips
Jun 23, 2020 • 1h 13min

68: Triton

Julian Gutmanis, an industrial incident responder, along with Marina Krotofil from FireEye and Robert M. Lee, CEO of Dragos, dive into the Triton malware attack on a Saudi chemical plant. They discuss how this sophisticated malware jeopardizes safety systems, highlighting the dire consequences of cyber threats in industrial settings. The trio uncovers the complexities of cybersecurity and safety protocols, emphasizing the risks posed by insider threats. Moreover, they address the urgent need for robust security measures and international regulations to mitigate potential disasters.

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner