Logo for Darknet Diaries

Darknet Diaries

Jack Rhysider

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

Jack Rhysider

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

Jack Rhysider
134hr 60min
Thumbnail for "149: Mini-Stories: Vol 3".
Mini-Stories: Vol 3
Thumbnail for "148: Dubsnatch".
Dubsnatch
Thumbnail for "147: Tornado".
Tornado
Thumbnail for "146: ANOM".
ANOM
Thumbnail for "145: Shannen".
Shannen
Thumbnail for "144: Rachel".
Rachel
Thumbnail for "143: Jim Hates Scams".
Jim Hates Scams
Thumbnail for "142: Axact".
Axact
Thumbnail for "141: The Pig Butcher".
The Pig Butcher
Thumbnail for "140: Revenge Bytes".
Revenge Bytes
Thumbnail for "139: D3f4ult".
D3f4ult
Thumbnail for "138: The Mimics of Punjab".
The Mimics of Punjab
Thumbnail for "137: Predator".
Predator
Thumbnail for "136: Team Xecuter".
Team Xecuter
Thumbnail for "135: The D.R. Incident".
The D.R. Incident
Thumbnail for "134: Deviant".
Deviant
Thumbnail for "133: I'm the Real Connor".
I'm the Real Connor
Thumbnail for "132: Sam the Vendor".
132: Sam the Vendor
Thumbnail for "131: Welcome to Video".
Welcome to Video
Thumbnail for "130: Jason's Pen Test".
Jason's Pen Test
Thumbnail for "129: Gollumfun (Part 2)".
Gollumfun (Part 2)
Thumbnail for "128: Gollumfun (Part 1)".
Gollumfun Part 1
Thumbnail for "127: Maddie".
Maddie
Thumbnail for "126: REvil".
REvil
Thumbnail for "125: Jeremiah".
Jeremiah
Thumbnail for "124: Synthetic Remittance".
Synthetic Remittance
Thumbnail for "123: Newswires".
Newswires
Thumbnail for "122: Lisa".
Lisa
Thumbnail for "121: Ed".
Ed
Thumbnail for "120: Voulnet".
Voulnet
Thumbnail for "119: Hot Wallets".
Hot Wallets
Thumbnail for "118: Hot Swaps".
Hot Swaps
Thumbnail for "117: Daniel the Paladin".
Daniel the Paladin
Thumbnail for "116: Mad Dog".
Mad Dog
Thumbnail for "115: Player Cheater Developer Spy".
Player Cheater Developer Spy
Thumbnail for "114: HD".
HD
Thumbnail for "113: Adam".
Adam
Thumbnail for "112: Dirty Coms".
Dirty Coms
Thumbnail for "111: ZeuS".
ZeuS
Thumbnail for "110: Spam Botnets".
Spam Botnets
Thumbnail for "109: TeaMp0isoN".
TeaMp0isoN
Thumbnail for "108: Marq".
Marq
Thumbnail for "107: Alethe".
Alethe
Thumbnail for "106: @Tennessee".
@Tennessee
Thumbnail for "105: Secret Cells".
Secret Cells
Thumbnail for "104: Arya".
Arya
Thumbnail for "103: Cloud Hopper".
Cloud Hopper
Thumbnail for "102: Money Maker".
Money Maker
Thumbnail for "101: Lotería".
Lotería
Thumbnail for "100: NSO".
NSO
Thumbnail for "99: The Spy".
The Spy
Thumbnail for "98: Zero Day Brokers".
Zero Day Brokers
Thumbnail for "97: The Pizza Problem".
The Pizza Problem
Thumbnail for "96: The Police Station Incident".
The Police Station Incident
Thumbnail for "95: Jon & Brian's Big Adventure".
Jon & Brian's Big Adventure
Thumbnail for "94: Mariposa".
Mariposa
Thumbnail for "93: Kik".
Kik
Thumbnail for "92: The Pirate Bay".
The Pirate Bay
Thumbnail for "91: webjedi".
webjedi
Thumbnail for "90: Jenny".
Jenny
Thumbnail for "89: Cybereason - Molerats in the Cloud".
Cybereason - Molerats in the Cloud
Thumbnail for "88: Victor".
Victor
Thumbnail for "87: Guild of the Grumpy Old Hackers".
Guild of the Grumpy Old Hackers
Thumbnail for "86: The LinkedIn Incident".
LinkedIn
Thumbnail for "85: Cam the Carder".
Cam the Carder
Thumbnail for "84: Jet-setters".
Jet-setters
Thumbnail for "83: NSA Cryptologists".
NSA Cryptologists
Thumbnail for "82: Master of Pwn".
Master of Pwn
Thumbnail for "81: The Vendor".
The Vendor
Thumbnail for "80: The Whistleblower".
The Whistleblower
Thumbnail for "79: Dark Basin".
Dark Basin
Thumbnail for "78: Nerdcore".
Nerdcore
Thumbnail for "77: Olympic Destroyer".
Olympic Destroyer
Thumbnail for "76: Knaves Out".
Knaves Out
Thumbnail for "75: Compromised Comms".
Compromised Comms
Thumbnail for "74: Mikko".
Mikko
Thumbnail for "73: WannaCry".
WannaCry
Thumbnail for "72: Bangladesh Bank Heist".
Bangladesh Bank Heist
Thumbnail for "71: Information Monopoly".
FDFF
Thumbnail for "70: Ghost Exodus".
Ghost Exodus
Thumbnail for "69: Human Hacker".
Human Hacker
Thumbnail for "68: Triton".
Triton
Thumbnail for "67: The Big House".
The Big House
Thumbnail for "66: freakyclown".
freakyclown
Thumbnail for "65: PSYOP".
PSYOP
Thumbnail for "64: The Athens Shadow Games".
The Athens Shadow Games
Thumbnail for "63: w0rmer".
w0rmer
Thumbnail for "62: Cam".
Cam
Thumbnail for "61: Samy".
Samy
Thumbnail for "60: dawgyg".
dawgyg
Thumbnail for "59: The Courthouse".
The Courthouse
Thumbnail for "58: OxyMonster".
OxyMonster
Thumbnail for "57: MS08-067".
MS08-067
Thumbnail for "56: Jordan".
Jordan
Thumbnail for "55: NoirNet".
NoirNet
Thumbnail for "54: NotPetya".
NotPetya
Thumbnail for "53: Shadow Brokers".
Shadow Brokers
Thumbnail for "52: Magecart".
Magecart
Thumbnail for "Ep 51: The Indo-Pak Conflict".
The IndoPak Conflict
Thumbnail for "Ep 50: Operation Glowing Symphony".
Operation Glowing Symphony
Thumbnail for "Ep 49: Elliot".
Elliot
Thumbnail for "Ep 48: Operation Socialist".
Operation Socialist
Thumbnail for "Ep 47: Project Raven".
Project Raven
Thumbnail for "Ep 46: XBox Underground (Part 2)".
XBox Underground (Part 2)
Thumbnail for "Ep 45: XBox Underground (Part 1)".
XBox Underground (Part 1)
Thumbnail for "Ep 44: Zain".
Zain
Thumbnail for "Ep 43: PPP".
PPP
Thumbnail for "Ep 42: Mini-Stories: Vol 2".
Mini-Stories: Vol 2
Thumbnail for "Ep 41: Just Visiting".
Just Visiting
Thumbnail for "Ep 40: No Parking".
No Parking
Thumbnail for "Ep 39: 3 Alarm Lamp Scooter".
3 Alarm Lamp Scooter
Thumbnail for "Ep 38: Dark Caracal".
Dark Caracal
Thumbnail for "Ep 37: LVS".
LVS
Thumbnail for "Ep 36: Jeremy from Marketing".
Jeremy from Marketing
Thumbnail for "Ep 35: Carbanak".
Carbanak
Thumbnail for "Ep 34: For Your Eyes Only".
For Your Eyes Only
Thumbnail for "Ep 33: RockYou".
Data Breach
Thumbnail for "Ep 32: The Carder".
Carder
Thumbnail for "Ep 31: Hacker Giraffe".
Hacked Printers
Thumbnail for "Ep 30: Shamoon".
Logic bomb hit a huge company.
Thumbnail for "Ep 29: Stuxnet".
Virus took out a nuclear enrichment facility.
Thumbnail for "Ep 28: Unit 8200".
Israel's NSA
Thumbnail for "Ep 27: Chartbreakers".
Investigation of who's corrupting the Apple Podcasts charts and how they do it.
Thumbnail for "Ep 26: IRS".
The IRS had a huge data breach in 2015. Listen to the episode to hear the whole story.
Thumbnail for "Ep 25: Alberto".
Illegal hacker or security professional?
Thumbnail for "Ep 24: Operation Bayonet".
Darknet markets are online black markets. They are highly illegal, and dangerous to run. Hear exactly how dangerous it was for Alphabay and Hansa dark markets.
Thumbnail for "Ep 23: Vladimir Levin".
Ep 23: Vladimir Levin
Thumbnail for "Ep 22: Mini-Stories: Vol 1".
Three stories in one! In this episode we hear about a penetration test from Mubix that he'll never forget, a incident response from Robert M. Lee which completely stunned him, and a social engineering mission from Snow.Podcast recommendation: Moonshot.
Thumbnail for "Ep 21: Black Duck Eggs".
Ep 21: Black Duck Eggs
Thumbnail for "Ep 20: mobman".
Ep 20: mobman
Thumbnail for "Ep 19: Operation Aurora".
Ep 19: Operation Aurora
Thumbnail for "Ep 18: Jackpot".
A man addicted to gambling finds a bug in a video poker machine that lets him win excessive amounts of money.
Thumbnail for "Ep 17: Finn".
A 14-year-old kid who finds himself bored in class decides to hack someone's twitter account and ends up with more than he bargained for.
Thumbnail for "Ep 16: Eijah".
Ep 16: Eijah
Thumbnail for "Ep 15: Ill Tills".
A major retailer was hacked. Their point of sales machines were riddled with malware. Listen to hear how digital forensics and incident responders handled the situation. What malware was found? Where was it found? How was it stopped? And most importantly, how much data was leaked?
Thumbnail for "Ep 14: #OpJustina".
In 2013 a hospital was accused of conducting a medical kidnapping against a young girl name Justina. This enraged many people across the country, including members of anonymous. A DDOS attack was waged against the hospital.
Thumbnail for "Ep 13: Carna Botnet".
Ep 13: Carna Botnet
Thumbnail for "Ep 12: Crypto Wars".
Ep 12: Crypto Wars
Thumbnail for "Ep 11: Strictly Confidential".
What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result.
Thumbnail for "Ep 10: Misadventures of a Nation State Actor".
In today's world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exactly how it's done.
Thumbnail for "Ep 9: The Rise and Fall of Mt. Gox".
Mt. Gox was the largest bitcoin exchange in the world. It suddenly went offline. What happened?
Thumbnail for "Ep 8: Manfred (Part 2)".
Manfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual goods and currency for real money. This was his full time job. Listen to this episode to hear exactly how he did this.
Thumbnail for "Ep 7: Manfred (Part 1)".
Manfred has had the most epic story of all online video game stories. For the last 20 years, he's been hacking online games.
Thumbnail for "Ep 6: The Beirut Bank Job".
Jayson E. Street tells us a story about the time he broke into a bank in Beirut Lebanon.
Thumbnail for "Ep 5: #ASUSGATE".
Security researcher Kyle Lovett bought a new Asus router in 2013. He found it was riddled with security vulnerabilties. He set out on a mission to resolve these vulnerabilities not only for his own router, but for thousands of others who were also vulnerable.
Thumbnail for "Ep 4: Panic! at the TalkTalk Board Room".
Mobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metropolitan Police investigate the breach. We get a rare glimpse of how the CEO handles the crisis.
Thumbnail for "Ep 3: DigiNotar, You are the Weakest Link, Good Bye!".
The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached.
Thumbnail for "Ep 2: The Peculiar Case of the VTech Hacker".
VTech makes toy tablets, laptops, and watches for kids. In 2015, they were breached. The hacker downloaded gigs of children's data. Discover what the hacker did once he took the data.
Thumbnail for "Ep 1: The Phreaky World of PBX Hacking".
Ep 1: The Phreaky World of PBX Hacking

149: Mini-Stories: Vol 3

Thumbnail for "149: Mini-Stories: Vol 3".
September 3, 202448min 4sec

In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.

Sponsors
Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Thumbnail for "149: Mini-Stories: Vol 3".
149: Mini-Stories: Vol 3
00:00
48:04