Jack Recider
👤 PersonAppearances Over Time
Podcast Appearances
And yeah, shortly after this hack, Denmark changed the law. They made sex with animals illegal. And I can't tell if this hack had anything to do with the laws changing, but the timing is very coincidental. Now, stuff like this, hacking into places, making the news and getting people arrested and stuff, it's like a drug.
And yeah, shortly after this hack, Denmark changed the law. They made sex with animals illegal. And I can't tell if this hack had anything to do with the laws changing, but the timing is very coincidental. Now, stuff like this, hacking into places, making the news and getting people arrested and stuff, it's like a drug.
Let's take a quick ad break, but stay with us because when we come back, we're going off the trail. This episode is sponsored by Arctic Wolf. Arctic Wolf, an industry leader in managed security operations, surveyed a thousand security and IT professionals across the globe to better understand them. What are their top priorities, current challenges and future concerns?
Let's take a quick ad break, but stay with us because when we come back, we're going off the trail. This episode is sponsored by Arctic Wolf. Arctic Wolf, an industry leader in managed security operations, surveyed a thousand security and IT professionals across the globe to better understand them. What are their top priorities, current challenges and future concerns?
This survey revealed some startling findings, and you can discover them all in the State of Cybersecurity 2024 Trends Report. Learn why the number of insider threats spikes severely, what lessons can be learned from the year over year change, and how many organizations disclose a breach. and what cyber attacks struck 70% of organizations.
This survey revealed some startling findings, and you can discover them all in the State of Cybersecurity 2024 Trends Report. Learn why the number of insider threats spikes severely, what lessons can be learned from the year over year change, and how many organizations disclose a breach. and what cyber attacks struck 70% of organizations.
Download the State of Cybersecurity 2024 Trends Report today at arcticwolf.com forward slash darknet. That's arcticwolf.com forward slash darknet. Okay, so Default was on a path. He didn't know where the path was taking him, but he already made his way through Anonymous and into different hacker groups. AnonSec was the group where this first exciting stuff was happening.
Download the State of Cybersecurity 2024 Trends Report today at arcticwolf.com forward slash darknet. That's arcticwolf.com forward slash darknet. Okay, so Default was on a path. He didn't know where the path was taking him, but he already made his way through Anonymous and into different hacker groups. AnonSec was the group where this first exciting stuff was happening.
He kind of took over that group. But do you realize there's a whole infrastructure to these hacker groups? There's data stores to keep records of the stuff you collected or the passwords you've cracked. There's a tool shop to quickly grab hacking tools and how to use them. But to build on that infrastructure, they decided they needed to build a botnet.
He kind of took over that group. But do you realize there's a whole infrastructure to these hacker groups? There's data stores to keep records of the stuff you collected or the passwords you've cracked. There's a tool shop to quickly grab hacking tools and how to use them. But to build on that infrastructure, they decided they needed to build a botnet.
A botnet is just having control of a bunch of computers. You typically try to infect a huge swath of IPs and hope that a bunch of computers get infected and become under your control. But the reason why they wanted a botnet was to route their attacks through it.
A botnet is just having control of a bunch of computers. You typically try to infect a huge swath of IPs and hope that a bunch of computers get infected and become under your control. But the reason why they wanted a botnet was to route their attacks through it.
Instead of malicious traffic or connections coming from the non-sec members themselves, they set up this botnet to pipe their traffic through someone else's computer to get to their targets. But when you infect a bunch of computers with a botnet, start to get curious. what are these computers that are in our control now?
Instead of malicious traffic or connections coming from the non-sec members themselves, they set up this botnet to pipe their traffic through someone else's computer to get to their targets. But when you infect a bunch of computers with a botnet, start to get curious. what are these computers that are in our control now?
One of these servers belonged to the Windsor University. This is a medical school.
One of these servers belonged to the Windsor University. This is a medical school.
I saw a screenshot of this. He was in the admin panel of the university. And there, in front of him, was a list of all the students who owed money to the school. And it all added up to $9 million. And he started to think... Could I? Should I mess with this?
I saw a screenshot of this. He was in the admin panel of the university. And there, in front of him, was a list of all the students who owed money to the school. And it all added up to $9 million. And he started to think... Could I? Should I mess with this?
There were 391 students listed here. He scrolled to the bottom of the page. And there was a button. Delete all? Why was there a delete all button? I have no idea. But there it was.
There were 391 students listed here. He scrolled to the bottom of the page. And there was a button. Delete all? Why was there a delete all button? I have no idea. But there it was.