Bite Sized Cyber Crime

Bite Sized Cyber Crime

A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime

Episodes

April 22, 2024 6 mins

MFA is becoming more and more common, but with every security innovation, threat actors figure out ways around them. Recently it came out that an unknown actor was bribing employees at T-Mobile and Verizon to perform SIM swapping attacks, which can compromise SMS based MFA codes.

 

Sources: https://pastebin.com/h47Mijdt

Mark as Played

In 2007 clickbait emails could make you part of a botnet that silenced cybersecurity professionals and performed attacks for anyone on the dark web willing to pay. Not a worm, but a Trojan, this is how the Storm Worm was ahead of its time.

Sources: https://pastebin.com/nPbinx0i

Mark as Played

There's a reason you should use a unique password for every website you use, but most people simply don't. How are you supposed to make and remember dozens of passwords for each site that are completely unique and can't be written down?

What if I told you it doesn't have to be that difficult?

Mark as Played

XZ Utils is an inconspicuous program in many Linux distributions that allows you to compress files. However, it seems one maintainer of the open source project had much more malicious plans.

 

Sources: https://pastebin.com/awZzM7qk

Mark as Played

Denial of Service attacks are annoying at best, and can endanger people at worst. Usually you need a lot of manpower to launch one, but a new method was developed recently that requires just one machine.

 

Sources: https://pastebin.com/NS7RuYSi

Mark as Played

Change Healthcare is a major medical clearinghouse, nearly half of all insurance transactions go through them, so when ransomware struck the effect was felt all over the healthcare industry. However it gets stranger, as the group responsible seems to have scammed their affiliates and faked a takedown.

Sources: https://pastebin.com/PRmnEGnL

Mark as Played

Tesla is a tech company as much as it is a car company, which can present unique challenges when trying to incorporate security. Even intended features can end up being major vulnerabilities, like the feature to add a car key to a cell phone.

Sources: https://pastebin.com/S7Sb2KCb

Mark as Played

VPN gateways are supposed to securely connect you to an environment, however Ivanti gateways are rather exploitable, and their built in integrity checker may give you a false sense of security.

Sources: https://pastebin.com/G7H6f4kL

Mark as Played
February 26, 2024 7 mins

Lockbit is one of the most notorious ransomware gangs out there, and recently a multinational operation arrested several people involved, stole back extorted cash, and released a decryptor for the ransomware. However, Lockbit isn't quite dead yet.

Sources: https://pastebin.com/Y6rTab6R

Mark as Played
February 19, 2024 8 mins

Email encryption is important for keeping confidential information safe, as well as communicating over unsecured networks, or in potentially hostile nations. One bug in 2017 was able to break this encryption though, exposing the plaintext content of encrypted emails.

 

Sources: https://pastebin.com/UZ2r4Pcq

Mark as Played

One of the best renowned children's hospitals, Lurie, in Chicago has been experiencing an outage for nearly two weeks, with parents feeling as they've been left in the dark. Recently it was revealed that a "known cyber threat" was responsible.

Sources: https://pastebin.com/1CwAkQ7Q

Mark as Played

Data breaches are the worst nightmare of many organizations that collect sensitive data. Europcar was going to be the next company breached, except on closer inspection, none of the data posted was real.

Sources: https://pastebin.com/wDwTunKb

Mark as Played
January 29, 2024 7 mins

The fear that the government or someone else is spying on you is a common one, moreso with modern technology. In some cases, that fear is not unreasonable. Pegasus is spyware developed by Israeli cyber-arms company NSO Group, and it has been sold to many governments and fallen into the wrong hands.

Sources: https://pastebin.com/9JHz3ZDU

Mark as Played

Mobile devices are everywhere, carried with us everywhere we go in our day. This makes them perfect targets for Spyware. Recently a new method was discovered to uncover hidden Spyware on suspected infected phones.

Sources: https://pastebin.com/5pYN9bnj

Mark as Played

Russia and Ukraine are at war, but these days war is not always boots on the ground. The internet and modern technology introduced a whole new way to attack enemies, and after Russia took down Ukraine's biggest telecoms provider a Ukrainian group decided to take revenge.

Sources: https://pastebin.com/SwDJiy1r

Mark as Played

A new attack method against the SSH protocol, the very first of its kind, was recently discovered by German researchers. It leaves millions of servers at risk of attack, and it practical to exploit, but is it as bad as it sounds? Find out today!

 

Sources: https://pastebin.com/kTpwXexy

Mark as Played

Rockstar Games recently released the trailer for GTA6, around the same time a Lapsus$ hacker was sentenced indefinitely to a secure hospital. This sentence has stirred up some controversy and misunderstanding that i will try to contextualize and clarify.

 

Sources: https://pastebin.com/dsSb7uDX

Mark as Played
December 25, 2023 7 mins

After infiltrating a prolific ransomware gang, the FBI seized their website and decrypted data for hundreds of companies for free! But instead of going out peacefully, ALPHV may be out with a vengeance.

Sources: https://pastebin.com/VgL3MRii

Mark as Played

Typically the cybercrime gangs we see launch major ransomware attacks, holding even the biggest companies hostage. However, there are also groups that provide fake accounts and services to those attackers to make their attacks quicker and easier. One of them, Storm-1152 was shut down by Microsoft and Arkose labs. Listen all about it today!

Sources: https://pastebin.com/BeJEAybk

Mark as Played

Bluetooth is a wireless protocol we all know and love that has freed us from headphone wires getting caught on anything. But recently an old flaw in Bluetooth was discovered that allows hackers to trick your phone into thinking a Bluetooth keyboard is connected, allowing a lot of access.

 

Sources: https://pastebin.com/z9pZxPVd

Mark as Played

Popular Podcasts

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.

    Death, Sex & Money

    Anna Sale explores the big questions and hard choices that are often left out of polite conversation.

    Stuff You Should Know

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Crime Junkie

    If you can never get enough true crime... Congratulations, you’ve found your people.

    Start Here

    A straightforward look at the day's top news in 20 minutes. Powered by ABC News. Hosted by Brad Mielke.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2024 iHeartMedia, Inc.