

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Nov 10, 2020 • 5min
remote access Trojan or RAT (noun) [Word Notes}
From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.

Nov 5, 2020 • 36min
Too good to be true.
Dave has a story about a fake Facebook copyright violation scam trying to trick you out of your TFA to get into your account, Joe story about the largest elder fraud scam in US history, The Catch of the Day is about a scam using a Google code for verification and includes Hacking Humans in the response, and later in the show, Dave's conversation with Mallory Sofastaii from WMAR Baltimore returns with her reporting on a fake website luring victims through social media ads.. Links to stories and Catch of the Day:
Facebook “copyright violation” tries to get past 2FA – don’t fall for it!
Feds Bust Massive Magazine-Subscription Scam Targeting Older Consumers
Feds in Minnesota charge 60 in $335M magazine fraud that defrauded seniors nationwide
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Nov 3, 2020 • 4min
business email compromise or BEC (noun) [Word Notes]
A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.

Nov 1, 2020 • 27min
David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]
On this Special Edition, our extended conversation with author and New York Times national security correspondent David E. Sanger. The Perfect Weapon explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another.

Oct 30, 2020 • 3min
The Malware Mash!

Oct 29, 2020 • 40min
New consequences, extortion and cyber insurance.
Joe has a story about a woman who called a fake customer service number and got scammed, Dave's story talks about how phishing kits are not that. hard to find, just check YouTube, The Catch of the Day is an opportunity for a listener remove their name from the BLACKLIST, and later in the show, Dave's conversation with John Pescatore from SANS on Thinking Through the Unthinkable: Should You Pay Off a Ransomware Demand. Links to stories and Catch of the Day:
Local Doctor Scammed After Calling Fake Customer Service Number
Phishing kits as far as the eye can see
Sawyer Dickey: " Your name is in the US.BLACKLIST which makes it impossible for you to send money"
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Oct 27, 2020 • 4min
anagram (noun) [Word Notes]
A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.

Oct 22, 2020 • 36min
What is true and important versus what is the spin.
Dave's story is about some cybercriminal gangs that have stolen $22 million from users of the Electrum wallet app, Joe's story talks about a business email compromise scam cost a US company $15 million, The Catch of the Day is a gift card scam that includes references to National Treasure movie, and later in the show, Dave's conversation with Bill Harrod, Federal CTO of MobileIron on election disinformation campaigns. Links to stories and Catch of the Day:
Bitcoin wallet update trick has netted criminals more than $22 million
The anatomy of a $15 million cyber heist on a US company
Uno reverses, 50000 credits worth of nitrous oxide,
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Oct 20, 2020 • 4min
rogue access point (noun) [Word Notes]
1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.

Oct 15, 2020 • 36min
Use a Dance Dance Revolution floor lock for your data centers.
Starting with some listener follow-up on password managers, Joe's story has an angel investor bilking people out of due diligence fees, Dave's story comes from Graham Cluley on a malware campaign talking about details on Donald Trump's COVID-19 status, The Catch of the Day is an animal vaccine phishing scam, and later in the show, we’ve got a special treat for you: David Spark from the The CISO/Security Vendor Relationship Series podcast joins us to play the Best Worst Idea game. Links to stories:
Promising Infusions of Cash, Fake Investor John Bernard Walked Away With $30M
Hackers disguise malware attack as new details on Donald Trump’s COVID-19 illness
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.


