Malicious Life

Malicious Life

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Dig into a history you never knew existed.

  • 30 minutes 43 seconds
    Cuckoo Spear [B-Side]

    APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin Ito & Loic Castel, researchers from Cybereason's IR Team, uncovered a new tool used by the group: NOOPDOOR, which incorporates highly sophisticated persistence mechanisms, allowing APT-10 to evade detection and remain inside enterprise networks for two or even three years.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    20 November 2024, 6:30 am
  • 38 minutes 5 seconds
    The Man Who Went To War With Anonymous - And Lost

    Aaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary Federal, he came up with a plan to unmask the key leaders of Anonymous, the infamous hacker collective. People who worked with Aaron warned him that his data was sub-par, but the determined vet claimed he had a strong "gut feeling" that he was on the right track.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    13 November 2024, 10:31 am
  • 35 minutes 51 seconds
    What Can Organizations Learn from "Grim Beeper"? [B-Side]

    On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by Hezbollah, exploded simultaneously across Lebanon and Syria, killing at least 42 terrorists and wounding more than 3,000. 

    Devon Ackerman, Cybereason’s Global Head of Digital Forensic and Incident response and a former Special Agent at the FBI's Operational Technology Division, discusses the lessons organizations can learn from this ultra-sophisticated supply chain attack. How such traumatic events impact the mindset of hacked organizations, what kind of threat actors are capable of pulling off long-term attacks like these, and the three most important steps organizations can take to minimize the chance of a supply chain attack.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    5 November 2024, 7:00 am
  • 29 minutes 31 seconds
    The Fappening/Celebgate

    Could thousands of people keep a secret? Common sense says no—secrets spread, and people talk. But for over a decade, from 2006 to 2017, a website managed to stay under law enforcement’s radar, despite the fact that its many users were participating in illegal activities. The website’s users managed to keep it a secret for such a long time, because they shared one thing in common: they were creeps who traded nude photos. Until one user, driven by simple greed, brought it all crashing down.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    29 October 2024, 3:20 pm
  • 30 minutes 28 seconds
    Operation Snow White, Part 2

    Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents, infiltrating enemy lines, and blackmail. However, a suspicious librarian and a determined FBI agent brought the largest single spy operation in US government history to an end. 



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    15 October 2024, 2:36 pm
  • 29 minutes 10 seconds
    Operation Snow White, Part 1

    In 1963, the FDA raided the headquaters of a budding new and esoteric religion - The Church of Scientology. In response to this and similar incidents to come, the church's founder - an eccentric science fiction author named L. Ron Hubbard - would go on to lead the single largest known government infiltration operation in United States history



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    1 October 2024, 2:46 pm
  • 26 minutes 18 seconds
    Caught in the Crossfire: Infighting and Treason in Russia’s Cyber World

    On Dec. 5, 2016, two senior Russian Intelligence officers and two civilians were arrested and accused of treason. A few weeks later, when Western journalists were finally able to speak with the men’s lawyers, they learned that the case was based on events that were, oddly enough, already widely known. This made the arrests even more peculiar.

    As more details emerged over time, the picture became clearer, offering Westerners a rare glimpse into the typically secretive world of Russian intelligence.





    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    17 September 2024, 12:35 pm
  • 29 minutes 15 seconds
    SNAP Fraud: Getting Rich by Stealing from the Poor

    SNAP - better known as food stamps - goes back to the Great Depression. ,The physical stamps were replaced with EBT cards in the 1990s, but since these cards are without the secure EMV chip techonolgy, enterprising crimilas found ways to drain funds meant for low-income families.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    3 September 2024, 1:50 pm
  • 31 minutes 29 seconds
    The Hollywood Con Queen, Part 2

    Nicole Kotsianas, an investigator with K2 Intelligence, made it her personal mission to hunt down the Hollywood Con Queen, who crulley tormented her victioms and shattered their dreams. Nicole's efforts bore unexpected fruits, when she discovered that the Con Queen was actually... a man.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    20 August 2024, 2:45 pm
  • 34 minutes 17 seconds
    The Hollywood Con Queen, Part 1

    In 2015, two aspiring script writers flew to Indonesia to meet with executives of a large Chinese film corporation. It was a trap: the Hollywood Con Queen not only coned them out of tens of thousands of dollars, she also cruelly ruined their friendship. Two years later, a corporate investigator working for a big shot Hollywood producer, made a discovery that put her on the trail of this master of deciet.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    7 August 2024, 7:26 am
  • 30 minutes 2 seconds
    The Doomed Queen’s Secret Ciphers

    In the pre-internet era, encryption was a matter of life and death, and the motives behind these ciphers were varied and complex. Discover how George Lasry, a modern codebreaker, uncovered the secrets of Mary, Queen of Scots, hidden in the French National Library for over 400 years. This episode delves into the painstaking process and the historical impact of decoding these ancient messages, revealing the hidden motives and desperate actions of a doomed queen.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    23 July 2024, 7:07 pm
  • More Episodes? Get the App
© MoonFM 2024. All rights reserved.