Menu
Sign In Pricing Add Podcast
Podcast Image

Darknet Diaries

150: mobman 2

Tue, 01 Oct 2024

Description

In Episode 20 of Darknet Diaries, we heard from Greg aka “mobman” who said he created the sub7 malware. Something didn’t sit right with a lot of people about that episode. It’s time to revisit that episode and get to the bottom of things.SponsorsThis show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet.Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.Sourceshttps://www.youtube.com/watch?v=GDMc2PZM4V4https://www.illmob.org/notmymobman/https://darknetdiaries.com/episode/20

Audio
Featured in this Episode
Transcription

Full Episode

00:01 - 00:24 Jack Recider

I remember the first time I posted something online. It was a video game guide in the 90s. And there's an internet adage that I think is true. It goes like this. The best way to get the right answer on the internet is not to ask a question, but to post the wrong answer. I posted a guide on how to beat a video game, and it immediately got downvoted, mocked, ridiculed, and I was told to get good.

0

00:25 - 00:46 Jack Recider

At first, I thought they were joking, like I've beaten this game a hundred times with this strategy. What are you talking about? Get good. But then after some pushback, they started cluing me in, telling me exactly where my advice was wrong and giving me tips on how to properly do those parts of the game. I was blown away. What I thought was impossible to do in the game, people were actually doing.

0

00:47 - 01:09 Jack Recider

Now, dear listener, this experience shaped me for who I am today. If you post something genuinely helpful online and people mock you, that could be the end of you ever posting anything online again. It's enough to ruin your self-confidence and hate everyone online. But I had the opposite reaction. I loved this game and played it thousands of times.

0

01:10 - 01:31 Jack Recider

They were giving me tips and strategies on how to be way better than my best strategy that I had. And I genuinely wanted to be way better. Not only that, I got to make friends with other people who were really passionate about this game. It was an amazing experience. Fast forward to today. We're 150 episodes into this podcast. That's 134 hours of me yapping.

0

00:00 - 00:00 Jack Recider

I've got a lot of feedback over the years. Most of it is positive. But today, today I've got to correct something I got wrong. Really wrong. These are true stories from the dark side of the Internet. I'm Jack Recider. This is Darknet Diaries. This episode is sponsored by ThreatLocker.

00:00 - 00:00 Jack Recider

Ransomware, supply chain attacks, and zero-day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats. That's the power of ThreatLocker, Zero Trust Endpoint Protection Platform. Robust cybersecurity is a non-negotiable to safeguard organizations from cyberattacks.

00:00 - 00:00 Jack Recider

ThreatLocker implements a proactive, deny-by-default approach to cybersecurity, blocking every action, process, and user unless specifically authorized by your team. This least-privileged strategy mitigates the exploitation of trusted applications and ensures 24-7, 365 protection of your organization.

00:00 - 00:00 Jack Recider

The core of ThreatLocker is its Protect suite, including application, allow listing, ring fencing, and network control. Additional tools like the ThreatLocker detect EDR, storage control, elevation control, and configuration manager enhance your cybersecurity posture and streamline internal IT and security operations.

00:00 - 00:00 Jack Recider

To learn more about how ThreatLocker can help mitigate unknown threats in your digital environment and align your organization with respect and compliance frameworks, visit ThreatLocker.com. That's ThreatLocker. Locker.com. This episode is sponsored by Exonius. Complexity is inevitable in IT and security, and it's increasing. Exonius is here to help you control it.

Comments

There are no comments yet.

Please log in to write the first comment.