Menu
Sign In Search Podcasts Charts Entities Add Podcast API Pricing
Podcast Image

Darknet Diaries

#22
Language: en-us Technology

Activity Overview

Episode publication activity over the past year

Last Checked: 2025-11-02 07:42:49.387344
Showing episodes 1 to 100 of 164 total
«« ← Previous Page 1 of 2 Next → »»
Jump to:

164: Oak Cliff Swipers

07 Oct 2025

Contributed by Lukas

He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown...

163: Ola

02 Sep 2025

Contributed by Lukas

In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Ru...

162: Hieu

05 Aug 2025

Contributed by Lukas

All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found ...

161: mg

15 Jul 2025

Contributed by Lukas

In this episode we talk with mg (https://x.com/MG), the brilliant (and notorious) hacker and hardwar...

160: Greg

01 Jul 2025

Contributed by Lukas • Default Dataset

Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be...

159: Vastaamo

03 Jun 2025

Contributed by Lukas • Default Dataset

Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach...

158: MalwareTech

06 May 2025

Contributed by Lukas • Default Dataset

MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the...

157: Grifter

01 Apr 2025

Contributed by Lukas • Default Dataset

Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From ...

156: Kill List

18 Mar 2025

Contributed by Lukas • Default Dataset

The dark web is full of mystery. Some of it’s just made up though. Chris Monteiro wanted to see wh...

155: Kingpin

04 Mar 2025

Contributed by Lukas • Default Dataset

In this episode, we delve into the multifaceted career of Joe Grand, also known as “Kingpin.” A ...

154: Hijacked Line

04 Feb 2025

Contributed by Lukas • Default Dataset

Conor Freeman (x.com/conorfrmn) stole money online. Lot’s of it. In this episode we talk with him,...

153: Bike Index

07 Jan 2025

Contributed by Lukas • Default Dataset

Have you ever got your bike stolen? In this episode we dive into the world of stolen bikes. Who does...

152: Stacc Attack

03 Dec 2024

Contributed by Lukas • Default Dataset

Jarett Dunn, AKA StaccOverflow, stole millions of dollars from a website called Pump Fun, and he wan...

151: Chris Rock

05 Nov 2024

Contributed by Lukas • Default Dataset

Chris Rock is known for being a security researcher. But he’s also a black hat incident responder....

150: mobman 2

01 Oct 2024

Contributed by Lukas • Default Dataset

In Episode 20 of Darknet Diaries, we heard from Greg aka “mobman” who said he created the sub7 m...

149: Mini-Stories: Vol 3

03 Sep 2024

Contributed by Lukas • Default Dataset

In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubl...

148: Dubsnatch

06 Aug 2024

Contributed by Lukas • Default Dataset

Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tra...

147: Tornado

02 Jul 2024

Contributed by Lukas • Default Dataset

In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity a...

146: ANOM

04 Jun 2024

Contributed by Lukas • Default Dataset

In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone ma...

145: Shannen

07 May 2024

Contributed by Lukas • Default Dataset

Shannen Rossmiller wanted to fight terrorism. So she went online and did.Read more about her from he...

144: Rachel

02 Apr 2024

Contributed by Lukas • Default Dataset

Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few ...

143: Jim Hates Scams

05 Mar 2024

Contributed by Lukas • Default Dataset

Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating...

142: Axact

06 Feb 2024

Contributed by Lukas • Default Dataset

Axact sells fake diplomas and degrees. What could go wrong with this business plan?SponsorsSupport f...

141: The Pig Butcher

02 Jan 2024

Contributed by Lukas • Default Dataset

The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butcherin...

140: Revenge Bytes

05 Dec 2023

Contributed by Lukas • Default Dataset

Madison's nude photos were posted online. Her twin sister Christine came to help. This begins a biza...

139: D3f4ult

07 Nov 2023

Contributed by Lukas • Default Dataset

This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the st...

138: The Mimics of Punjab

03 Oct 2023

Contributed by Lukas • Default Dataset

This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show ...

137: Predator

05 Sep 2023

Contributed by Lukas • Default Dataset

A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, an...

136: Team Xecuter

01 Aug 2023

Contributed by Lukas • Default Dataset

Team Xecuter was a group involved with making and selling modchips for video game systems. They ofte...

135: The D.R. Incident

04 Jul 2023

Contributed by Lukas • Default Dataset

Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupt...

134: Deviant

06 Jun 2023

Contributed by Lukas • Default Dataset

Deviant Ollam is a physical penetration specialist. That means he’s paid to break into buildings t...

133: I'm the Real Connor

02 May 2023

Contributed by Lukas • Default Dataset

One day Connor Tumbleson got an email saying his identity has been stolen. And this was one of the s...

132: Sam the Vendor

04 Apr 2023

Contributed by Lukas • Default Dataset

Sam Bent, a.k.a. DoingFedTime, brings us a story of what it was like being a darknet market vendor.L...

131: Welcome to Video

27 Dec 2022

Contributed by Lukas • Default Dataset

Andy Greenberg (https://twitter.com/a_greenberg) brings us a gut wrenching story of how criminal inv...

130: Jason's Pen Test

13 Dec 2022

Contributed by Lukas • Default Dataset

Join us as we sit down with Jason Haddix (https://twitter.com/Jhaddix), a renowned penetration teste...

129: Gollumfun (Part 2)

29 Nov 2022

Contributed by Lukas • Default Dataset

Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Libr...

128: Gollumfun (Part 1)

15 Nov 2022

Contributed by Lukas • Default Dataset

Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Libr...

127: Maddie

01 Nov 2022

Contributed by Lukas • Default Dataset

Maddie Stone is a security researcher for Google’s Project Zero. In this episode we hear what it’...

126: REvil

18 Oct 2022

Contributed by Lukas • Default Dataset

REvil is the name of a ransomware service as well as a group of criminals inflicting ransomware onto...

125: Jeremiah

04 Oct 2022

Contributed by Lukas • Default Dataset

Jeremiah Roe is a seasoned penetration tester. In this episode he tells us about a time when he had ...

124: Synthetic Remittance

20 Sep 2022

Contributed by Lukas • Default Dataset

What do you get when you combine social engineering, email, crime, finance, and the money stream flo...

123: Newswires

06 Sep 2022

Contributed by Lukas • Default Dataset

Investing in the stock market can be very profitable. Especially if you can see into the future. Thi...

122: Lisa

23 Aug 2022

Contributed by Lukas • Default Dataset

In this episode we hear some insider threat stories from Lisa Forte.SponsorsSupport for this show co...

121: Ed

26 Jul 2022

Contributed by Lukas • Default Dataset

In this episode we hear some penetration test stories from Ed Skoudis (twitter.com/edskoudis). We al...

120: Voulnet

28 Jun 2022

Contributed by Lukas • Default Dataset

This is the story about when Mohammed Aldoub, AKA Voulnet, (twitter.com/Voulnet) found a vulnerabili...

119: Hot Wallets

14 Jun 2022

Contributed by Lukas • Default Dataset

In this episode we interview journalist Geoff White to discuss some of the recent crypto currency he...

118: Hot Swaps

31 May 2022

Contributed by Lukas • Default Dataset

This is the story of Joseph Harris (https://twitter.com/akad0c). When he was a young teen he got inv...

117: Daniel the Paladin

17 May 2022

Contributed by Lukas • Default Dataset

Daniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when i...

116: Mad Dog

03 May 2022

Contributed by Lukas • Default Dataset

Jim Lawler, aka “Mad Dog”, was a CIA case officer for 25 years. In this episode we hear some of ...

115: Player Cheater Developer Spy

19 Apr 2022

Contributed by Lukas • Default Dataset

Some video game players buy cheats to win. Let’s take a look at this game cheating industry to see...

114: HD

05 Apr 2022

Contributed by Lukas • Default Dataset

HD Moore (https://twitter.com/hdmoore) invented a hacking tool called Metasploit. He crammed it with...

113: Adam

22 Mar 2022

Contributed by Lukas • Default Dataset

Adam got a job doing IT work at a learning academy. He liked it and was happy there and feeling part...

112: Dirty Coms

08 Mar 2022

Contributed by Lukas • Default Dataset

This episode we talk with a guy named “Drew” who gives us a rare peek into what some of the youn...

111: ZeuS

22 Feb 2022

Contributed by Lukas • Default Dataset

ZeuS is a banking trojan. Designed to steal money from online bank user’s accounts. This trojan be...

110: Spam Botnets

08 Feb 2022

Contributed by Lukas • Default Dataset

This episode tells the stories of some of the worlds biggest spamming botnets. We’ll talk about th...

109: TeaMp0isoN

25 Jan 2022

Contributed by Lukas • Default Dataset

TeaMp0isoN was a hacking group that was founded by TriCk and MLT (twitter.com/0dayWizard). They were...

108: Marq

11 Jan 2022

Contributed by Lukas • Default Dataset

This is the story of Marq (twitter.com/dev_null321). Which involves passwords, the dark web, and pol...

107: Alethe

21 Dec 2021

Contributed by Lukas • Default Dataset

Alethe is a social engineer. Professionally she tries to trick people to give her passwords and acce...

106: @Tennessee

07 Dec 2021

Contributed by Lukas • Default Dataset

How much online abuse are you willing to take before you decide to let your abuser have what they wa...

105: Secret Cells

23 Nov 2021

Contributed by Lukas • Default Dataset

Joseph Cox (https://twitter.com/josephfcox), Senior Staff Writer at Motherboard (https://www.vice.co...

104: Arya

09 Nov 2021

Contributed by Lukas • Default Dataset

Arya Ebrahami has had quite a personal relationship with darknet marketplaces. In this episode you’...

103: Cloud Hopper

26 Oct 2021

Contributed by Lukas • Default Dataset

Fabio Viggiani is an incident responder. In this episode he talks about the story when one of his cl...

102: Money Maker

12 Oct 2021

Contributed by Lukas • Default Dataset

Frank Bourassa had an idea. He was going to make money. Literally. Listen to the story of a master c...

101: Lotería

28 Sep 2021

Contributed by Lukas • Default Dataset

In 2014 the Puerto Rico Lottery was mysteriously losing money. Listen to this never before told stor...

100: NSO

31 Aug 2021

Contributed by Lukas • Default Dataset

The NSO Group creates a spyware called Pegasus which gives someone access to the data on a mobile ph...

99: The Spy

17 Aug 2021

Contributed by Lukas • Default Dataset

Igor works as a private investigator in NYC. He’s often sitting in cars keeping a distant eye on s...

98: Zero Day Brokers

03 Aug 2021

Contributed by Lukas • Default Dataset

Zero day brokers are people who make or sell malware that’s sold to people who will use that malwa...

97: The Pizza Problem

20 Jul 2021

Contributed by Lukas • Default Dataset

What if someone wanted to own your Instagram account? Not just control it, but make it totally their...

96: The Police Station Incident

06 Jul 2021

Contributed by Lukas • Default Dataset

Nicole Beckwith wears a lot of hats. She’s a programmer, incident responder, but also a cop and a...

95: Jon & Brian's Big Adventure

22 Jun 2021

Contributed by Lukas • Default Dataset

Jon and Brian are penetration testers who both worked at a place called RedTeam Security. They’...

94: Mariposa

08 Jun 2021

Contributed by Lukas • Default Dataset

Chris Davis has been stopping IT security threats for decades. He’s currently running the company...

93: Kik

25 May 2021

Contributed by Lukas • Default Dataset

Kik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But som...

92: The Pirate Bay

11 May 2021

Contributed by Lukas • Default Dataset

The Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrigh...

91: webjedi

27 Apr 2021

Contributed by Lukas • Default Dataset

What happens when an unauthorized intruder gets into the network of a major bank? Amélie Koran aka ...

90: Jenny

13 Apr 2021

Contributed by Lukas • Default Dataset

Meet Jenny Radcliffe, the People Hacker. She’s a social engineer and physical penetration tester....

89: Cybereason - Molerats in the Cloud

06 Apr 2021

Contributed by Lukas • Default Dataset

The threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tra...

88: Victor

30 Mar 2021

Contributed by Lukas • Default Dataset

Victor looks for vulnerabilities on the web and reports them responsibly. This is the story about d...

87: Guild of the Grumpy Old Hackers

16 Mar 2021

Contributed by Lukas • Default Dataset

In 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Ha...

86: The LinkedIn Incident

02 Mar 2021

Contributed by Lukas • Default Dataset

In 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user detail...

85: Cam the Carder

16 Feb 2021

Contributed by Lukas • Default Dataset

This is the story of Cam Harrison, aka “kilobit” and his rise and fall as a prominent carder.Sp...

84: Jet-setters

02 Feb 2021

Contributed by Lukas • Default Dataset

How bad is it if you post your boarding pass on Instagram? Our guest, “Alex” decides to figure...

83: NSA Cryptologists

19 Jan 2021

Contributed by Lukas • Default Dataset

In this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their s...

82: Master of Pwn

05 Jan 2021

Contributed by Lukas • Default Dataset

The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers ...

81: The Vendor

22 Dec 2020

Contributed by Lukas • Default Dataset

This is the story of a darknet marketplace vendor we’ll name V. V tells his story of how he first ...

80: The Whistleblower

08 Dec 2020

Contributed by Lukas • Default Dataset

In this episode we hear a story from a social engineer who’s job it is to get people to do things ...

79: Dark Basin

24 Nov 2020

Contributed by Lukas • Default Dataset

What do you do when you find yourself the target of a massive hacking campaign, and you are getting ...

78: Nerdcore

10 Nov 2020

Contributed by Lukas • Default Dataset

Nerdcore music is music for nerds. In this episode we hear from some of the musicians who make Nerdc...

77: Olympic Destroyer

27 Oct 2020

Contributed by Lukas • Default Dataset

In February 2018, during the Winter Olympics in Pyeongchang South Korea, a cyber attack struck, wipi...

76: Knaves Out

13 Oct 2020

Contributed by Lukas • Default Dataset

This is the story about how someone hacked into JP Morgan Chase, one of the biggest financial instit...

75: Compromised Comms

29 Sep 2020

Contributed by Lukas • Default Dataset

From 2009 to 2013 the communication channels the CIA uses to contact assets in foreign countries was...

74: Mikko

15 Sep 2020

Contributed by Lukas • Default Dataset

Poker is a competitive game. Unlike other casino games, poker is player vs player. Criminal hackers ...

73: WannaCry

01 Sep 2020

Contributed by Lukas • Default Dataset

It is recommend to listen to episodes 53 “Shadow Brokers”, 71 “FDFF”, and 72 “Banglades...

72: Bangladesh Bank Heist

18 Aug 2020

Contributed by Lukas • Default Dataset

A bank robbery with the objective to steal 1 billion dollars. This is the story of the largest bank ...

71: Information Monopoly

04 Aug 2020

Contributed by Lukas • Default Dataset

In this episode, we’re going into the depths of North Korea to conduct one of the greatest hacks o...

70: Ghost Exodus

21 Jul 2020

Contributed by Lukas • Default Dataset

Ghost Exodus is a hacker. He conducted various illegal activities online. Some of which he documents...

69: Human Hacker

07 Jul 2020

Contributed by Lukas • Default Dataset

We all know that computers and networks are vulnerable to hacking and malicious actors, but what abo...

68: Triton

23 Jun 2020

Contributed by Lukas • Default Dataset

A mysterious mechanical failure one fateful night in a Saudi Arabian chemical plant leads a cast of ...

67: The Big House

09 Jun 2020

Contributed by Lukas • Default Dataset

John Strand is a penetration tester. He’s paid to break into computer networks and buildings to t...

66: freakyclown

26 May 2020

Contributed by Lukas • Default Dataset

Freakyclown is a physical penetration tester. His job is to break into buildings to test the securit...

65: PSYOP

12 May 2020

Contributed by Lukas • Default Dataset

PSYOP, or “Psychological Operations”, is something the US military has been doing to foreign aud...

«« ← Previous Page 1 of 2 Next → »»
Jump to: