

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Jul 17, 2025 ⢠47min
Itâs all glitter, no gold.
This week, our hostsâ â â â â â â â â â â â â â â â â Dave Bittnerâ â â â , â â â â â â â â â Joe Carriganâ â â â â â â â â , and â â â â â â â â â Maria Varmazisâ â â â â â â â â (also host of the â â â â â â â â â T-Minusâ â â â â â â â â Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts share some follow-up, including a Rick Roll after the last episode. They also highlight a listener note from Evaldas in Lithuania, who explains that companies often use alternate domains for marketing emails to protect their main domainâs reputationâso marking them as spam is actually expected. Joeâs got a story of a billion-dollar AI-fueled scam where criminals impersonate celebrities like Keanu Reeves and Kevin Costner to exploit lonely fansâconvincing them to send money, fall in love, and keep the relationship secret, all while Hollywood scrambles to fight back. Maria has the story of how a federal court blocked the FTCâs new âclick-to-cancelâ ruleâmeant to make canceling subscriptions easierâdue to a procedural misstep, just days before it was set to take effect. Dave shares a story from Reddit about a disturbing extortion scam where a victim received a fake photo of their car outside a strip clubâwith their real license plateâdemanding $1,000 to keep it quiet, raising questions about data scraping and AI manipulation. Our catch of the day comes from the scams subreddit, where a user shares a tale of a scammer promising big returns for investing in gold and diamondsâspoiler alert: itâs all glitter, no gold.
Complete our annual â â audience surveyâ â before August 31.
Resources and links to stories:
This Is Not Keanu: Inside the Billion-Dollar Celebrity Impersonation Bitcoin Scam
A âclick-to-cancelâ rule, intended to make canceling subscriptions easier, is blocked
[US] Extortion text message with fake strip club photo but real license plate â how did they get my info?
â â â â â â â â â â â Have a Catch of the Day you'd like to share? Email it to us at â â â â â â â â â â â â â â â â â â â hackinghumans@n2k.comâ â â â â â â â â â â .

Jul 15, 2025 ⢠7min
Universal 2nd Factor (U2F) (noun) [Word Notes]
Please enjoy this encore of Word Notes.
An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.
Cyberwire Glossary link: â â https://thecyberwire.com/glossary/u2fâ â
Audio reference link: ââ â Rise of the Machines: A Cybernetic Historyâ â ,â by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.

Jul 10, 2025 ⢠51min
Convinced, compromised, and confirmed.
This week, our hostsâ â â â â â â â â â â â â â Dave Bittnerâ â â , â â â â â â â â Joe Carriganâ â â â â â â â , and â â â â â â â â Maria Varmazisâ â â â â â â â (also host of the â â â â â â â â T-Minusâ â â â â â â â Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a ton of follow-upâfrom a sextortion scam that triggered a bot frenzy on Facebook, to sandboxed scam-baiting with fake credit cards, to a surprise magazine subscription that may or may not involve chicken gods. Plus, one listener wonders: do people really know what a strong password is? Daveâs story is on a massive China-linked scam where hackers are spoofing big-name retail websitesâlike Apple, PayPal, and Hermesâto trick shoppers into handing over their payment info on convincing fake storefronts, with thousands of fraudulent sites still live and targeting victims worldwide. Joe's got the story of a sneaky spear-phishing campaign targeting financial execs with fake job offers that ultimately install a legit remote access tool, NetBird, to gain stealthy, persistent accessâpart of a growing trend where attackers use real software and clever social engineering to fly under the radar. Maria's got the story of a young homebuyer who lost $109,000 to a payment redirection scam, prompting Australian banks to finally roll out a âConfirmation of Payeeâ system to prevent similar fraudâthough critics say the fix still puts too much blame on victims. Our catch of the day comes from the Scams sub-Reddit, where we hear about a scam getting people to click on a fake job that's too good to be true.
Complete our annual â audience surveyâ before August 31.
Resources and links to stories:
â China-linked hackers spoof big-name brand websites to steal shoppers' payment info
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
After Louis lost $109k to scammers, banks are finally combatting the 'flaw' the scammers used
â â â â â â â â â Have a Catch of the Day you'd like to share? Email it to us at â â â â â â â â â â â â â â â â hackinghumans@n2k.comâ â â â â â â â â â .

Jul 8, 2025 ⢠10min
adversary group naming (noun) [Word Notes]
Please enjoy this encore of Word Notes.
A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.

Jul 3, 2025 ⢠44min
Brushed aside: The subtle scam you didn't order.
Diving deep into the world of social engineering, the hosts discuss the alarming rise of travel scams, revealing that one in five Americans has been duped, often losing hundreds of dollars. They highlight the cunning tactics used by scammers, such as fake websites and AI-altered photos. Insights on recent impersonation scams targeting insurance companies are shared, showcasing the growing threat landscape. Lastly, they uncover brushing scams, where scammers send unsolicited packages to manipulate online reviews, emphasizing the need for vigilance in today's digital age.

Jul 1, 2025 ⢠39min
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]
Please enjoy this encore of Only Malware in the Building.
Welcome in! Youâve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about todayâs most interesting threats. Your host is â â Selena Larsonâ â , â â Proofpointâ â intelligence analyst and host of their podcast â â DISCARDEDâ â . Inspired by the residents of a building in New Yorkâs exclusive upper west side, Selena is joined by â â N2K Networksâ â â â Dave Bittnerâ â and our newest co-host, â Keith Mularskiâ , former FBI cybercrime investigator and now Chief Global Ambassador at â Qintelâ .
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.

Jul 1, 2025 ⢠6min
BSIMM (noun) [Word Notes]
Please enjoy this encore of Word Notes.
A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops.
CyberWire Glossary link: â https://thecyberwire.com/glossary/bsimmâ
Audio reference link: ââ OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Securityâ .â YouTube Video. YouTube, September 19, 2014.

Jun 26, 2025 ⢠42min
The many faces of fraud.
This week, our hostsâ â â â â â â â Dave Bittnerâ , â â â â â â Joe Carriganâ â â â â â , and â â â â â â Maria Varmazisâ â â â â â (also host of the â â â â â â T-Minusâ â â â â â Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from listener Abdussobur, who wonders if a pair of suspicious text messagesâone sent to his wife and another to him with a nearby addressâcould be the result of a data breach. Joe's story is on a surge of financial aid fraud where identity thieves, often using AI chatbots as âghost students,â are enrolling in online college courses to steal federal fundsâleaving real people like Heather Brady and Wayne Chaw with fake loans and months of bureaucratic cleanup. Dave's got the story on how the FIN6 cybercriminal group is posing as job seekers on LinkedIn to trick recruiters into opening malware-laced resumes, using deceptive tactics like fake portfolio sites and the MoreEggs backdoor to steal credentials and launch ransomware attacks. Maria's story is on a Pennsylvania woman who scammed over $800,000ânearly $466,000 from a Cedar Rapids churchâby hacking emails and rerouting payments, claiming she did it under the direction of a famous British actor she was allegedly dating. Our catch of the day is on a convincing but bogus text claiming an overdue traffic fine under a fake regulationâcomplete with threats of license suspension and credit damageâall designed to trick recipients into clicking a malicious link.
Resources and links to stories:
â â â â â â How scammers are using AI to steal college financial aid
FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
Woman scams church out of over $450,000, says famous British actor told her to do it
â â â â â Have a Catch of the Day you'd like to share? Email it to us at â â â â â â â â â â hackinghumans@n2k.comâ â â â â â â â .

Jun 24, 2025 ⢠8min
OWASP vulnerable and outdated components (noun) [Word Notes]
Please enjoy this encore of Word Notes.
Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version.
Audio reference Link: "â The Panama Papers: A Closer Lookâ ," Late Night with Seth Meyers, YouTube, 12 April 2016

Jun 19, 2025 ⢠46min
Gold bars and bold lies.
Please enjoy this encore of Hacking Humans.
On Hacking Humans, â Dave Bittnerâ , â Joe Carriganâ , and â Maria Varmazisâ (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First we start off with some follow up, our hosts share some more information on VIN swapping, and a clarification on bank participation in FinCEN. Maria shares a telling tale about a Bethesda couple loosing $367,000 in gold bars to a sophisticated scam involving fake officials and elaborate deceptions, but a police sting led to the arrest of a suspect, highlighting a growing nationwide trend of elderly victims targeted by gold bar fraud. Joe's story comes from KnowBe4 and is on DavidB, their VP of Asia Pacific, thwarting a sophisticated social engineering attack via WhatsApp by recognizing inconsistencies in the impersonatorâs behavior and verifying directly with the colleague they claimed to be. Dave's story comes from the FBI on how criminals are exploiting generative AI to enhance fraud schemes, including using AI-generated text, images, audio, and video to create convincing social engineering attacks, phishing scams, and identity fraud, while offering tips to protect against these threats. Our catch of the day comes from a listener who received an urgent email from someone claiming to be an FBI agent with a rather dramatic tale about intercepted consignment boxes, missing documents, and a ticking clockâbut let's just say this "agent" might need some better training in both law enforcement and grammar.
Resources and links to stories:
â âVIN swap scam costs Las Vegas man $50K, new truck"â
â FinCENâ
â Gold bar scammers claimed hackers could fund Russian missiles, police sayâ
â Real Social Engineering Attack on KnowBe4 Employee Foiledâ
â Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraudâ
You can hear more from the T-Minus space daily show â hereâ .
Have a Catch of the Day you'd like to share? Email it to us at â hackinghumans@n2k.comâ .