Logo
    Search

    Podcast Summary

    • The Surprising Worlds of Beards and the Dark WebAppearances can be deceiving, even in the worlds of beards and the dark web. Surprising secrets can hide in plain sight.

      The world of beards and mustaches can be as intriguing and complex as the darkest corners of the Internet. Galvaleris, a dedicated beardsman, had his dreams of competing in the World Beard and Mustache Championship shattered when he was arrested by the DEA for his involvement in dark web drug dealings as the notorious Oxy Monster. The beard community may seem odd to outsiders, but for insiders, it's a place of unique identity and even reverence. Meanwhile, the dark web is a hidden world filled with intrigue and danger, where people like Oxy Monster can hide in plain sight. The story of Galvaleris serves as a reminder that appearances can be deceiving, and that the most unexpected places can harbor the most surprising secrets. Whether it's the world of beards or the dark web, there's always more than meets the eye.

    • The Surge in New Dark Web Marketplaces Post-Silk RoadThe closure of Silk Road led to a surge in new dark web marketplaces, inspiring entrepreneurs to replicate its success and profit from illegal activities, making it a persistent threat.

      The closure of the Silk Road dark web marketplace did not put an end to illegal activities on the dark web. Instead, it sparked a surge in new marketplaces like Dream Market, where users could buy and sell illicit goods anonymously. The case of Ross Ulbricht's arrest served as inspiration for new entrepreneurs, who saw an opportunity to replicate the Silk Road's success and make a profit. Gal, a long-time participant in the dark web drug trade, was one such entrepreneur who found success on Dream Market. Despite the risks involved, Gal saw an opportunity to start over and build a thriving business, eventually becoming the highest-rated seller on the site. The ease of setting up a dark web marketplace and the anonymity it provides make it a persistent threat, highlighting the need for continued efforts to combat criminal activity in the digital realm.

    • Following the Money Trail in the DarknetDespite the anonymity offered by cryptocurrencies and darknet markets, every transaction is recorded publicly. Law enforcement can trace illegal transactions and make significant arrests by following the money trail.

      While the darknet and cryptocurrencies like Bitcoin offer anonymity and seem impenetrable to law enforcement, every transaction is recorded on a public ledger. This was demonstrated in the case of Mt. Gox, the largest Bitcoin exchange at the time, which was hacked in 2014, resulting in the theft of 850,000 Bitcoins worth over $450 million. Despite the stolen funds going through multiple exchanges and an anonymous Bitcoin exchange service, investigators were able to trace the transactions using the public ledger. This investigation inspired the development of a Bitcoin tracing tool. Meanwhile, American law enforcement agencies were dealing with an influx of illicit marketplace cases and used undercover agents to infiltrate Dream Market, the largest darknet marketplace for drugs, and identified Oxy Monster as a top seller and administrator. By targeting Oxy Monster, law enforcement was able to make significant arrests and disrupt the operations of Dream Market. This case highlights the importance of following the money trail, even in the seemingly anonymous world of cryptocurrencies and darknet markets.

    • Using human error to trace Bitcoin transactionsAdvanced Bitcoin tracing techniques can reveal real-world identities, but human error and careless online behavior provide crucial leads for law enforcement.

      While the anonymity of cryptocurrencies like Bitcoin can make illegal activities harder to trace, human error and careless online behavior can provide crucial leads for law enforcement. The use of advanced Bitcoin tracing techniques, such as clustering, can help link multiple accounts to the same owner, revealing their real-world identity. However, the biggest challenge lies in unregulated Bitcoin exchanges where criminals can launder stolen cryptocurrency. Even with the help of forensics and technology, identifying criminals relies heavily on human intelligence and errors they make online. In the case of Oxy Monster, a rogue email address and careless vacation announcement provided the FBI with enough information to track him down. Despite the challenges, law enforcement continues to capitalize on human error to bring darknet criminals to justice.

    • A tweet about a beard and mustache contest led to the arrest of a darknet vendorA seemingly innocuous tweet led to the capture of a darknet vendor, revealing the importance of thoroughly investigating seemingly insignificant details and the role social media plays in criminal investigations.

      The capture of the notorious darknet vendor known as OxyMonster came down to the smallest of details and a strange connection made by an FBI analyst. With time running out before OxyMonster's vacation, agents worked tirelessly to find a suspect. A seemingly innocuous tweet from a Frenchman named Galvaleris about attending the Beard and Mustache finals in Austin, Texas, caught their attention. The event fell within the time frame OxyMonster was supposed to be traveling abroad, and Gal's public social media profile shared similarities with OxyMonster's. The DEA made the arrest with circumstantial evidence, and once they accessed Gal's laptop, they found Tor downloaded and OxyMonster's dream market login credentials. The investigation led to laundered funds in an offshore account, and Gal plead guilty to narcotics trafficking and money laundering. However, the closure of Dream Market, the darknet marketplace where OxyMonster operated, marked a turning point. Persistent DDoS attacks and a ransom demand forced the site to shut down permanently, leaving darknet marketplace creators anxious about the future of their operations and the safety of Bitcoin.

    Recent Episodes from Modem Mischief

    Colonial Pipeline Hack

    Colonial Pipeline Hack

    The savange ransomware attack of Colonial Pipeline was close to bringing travel in the United States to a standstill.

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by John Phillips

    Mixed & Mastered by David Swope

    Theme Song You Are Digital by Computerbandit

    Modem Mischief
    enJune 10, 2024

    Vault 7 Hack

    Vault 7 Hack

    Workplace bullying, the Nuclear Option, and why you should never write your passwords down in a notebook. This is the story of Josh Schlute and the Vault 7 Hack. 

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by Katie Fedigan-Linton

    Mixed & Mastered by David Swope

    Theme Song You Are Digital by Computerbandit

    Modem Mischief
    enMay 27, 2024

    Ransomware Attacks

    Ransomware Attacks

    Digital extortion. Hackers sieze your data and a ransom is paid to retrieve it. But this time, it turned deadly...

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by Lauren Minkoff

    Mixed & Mastered by David Swope

    Theme Song You Are Digital by Computerbandit

    Modem Mischief
    enMay 20, 2024

    Hector Monsegur (aka Sabu) & Lulzsec

    Hector Monsegur (aka Sabu) & Lulzsec

    We delve into the story of Hector Monsegur, also known as 'Sabu', a central figure in the hacktivist group Lulzsec. Explore his rise to infamy in the cyber world, his pivotal role in high-profile cyber attacks, and the dramatic turn of events that led him to collaborate with law enforcement. Join us for a gripping narrative on the complexities of cyber ethics, activism, and the thin line between right and wrong.

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by Ed Leer

    Edited, Mixed & Mastered by Greg Bernhard

    Theme Song "You Are Digital" by Computerbandit

    Modem Mischief
    enMay 13, 2024

    ILOVEYOU Computer Worm

    ILOVEYOU Computer Worm

    It infected over 10 million computers and caused millions of dollars of damage world wide. The ILOVEYOU computer worm compromised passwords through a bug in Microsoft Outlook. This is the story of ILOVEYOU and the creator, Onel de Guzman. 

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by Jim Rowley

    Mixed and Mastered by David Swope

    Theme Song You Are Digital by Computerbandit

    Related Episodes

    Use Your CRM. CISOs Are Tired of Repeating Themselves.

    Use Your CRM. CISOs Are Tired of Repeating Themselves.

    Just because you have a new salesperson, doesn't mean you have to restart the sales process. If you've been properly entering information into your CRM, you shouldn't have to.

    On this episode of the podcast we discuss:

    • Are you ready for...Black Hat: Techniques to get the most value out of the conference. We've got some really good post-conference suggestions.
    • What do you think of this pitch? We have one of those follow up pitches that just rubs CISOs and security professionals the wrong way.
    • It's time to play, "What's Worse?!" Both host and guest agreed on this one. It's possibly the worst of the worst.
    • Please, Enough. No, More: We discuss account takeover. What we've heard enough on this subject, and what we'd like to hear a lot more. Make sure to read Lyft's article about fingerprinting fraudulent behavior.
    • What's a CISO to do? Beyond blocking and responding, we discuss different tactics for offense and defense against cybercriminals. Which ones are most effective and which ones are ethically and morally wrong?
    • It's time for "Ask a Vendor!" Working off the same model as "Ask a CISO," we turn the tables and security professionals ask questions of vendors. This time, we asked about the use/non-use of CRMs.

    As always, the show is hosted by me, David Spark (@dspark), founder, Spark Media Solutions and Mike Johnson, CISO, Lyft. Our guest this week is Ted Ross (@tedross), CEO, SpyCloud.

    Special thanks to SpyCloud for sponsoring this episode. Learn more about how you can protect employees and customers from account takeover with SpyCloud.

    Contributions. Contributions. Contributions.

    I am cranking out a ton more content for not just the podcast, but also the entire series so I am very open and receptive to story ideas, suggestions for segments of the podcast, or anything else. Just connect with me on LinkedIn.

    Listen and Subscribe to the CISO/Security Vendor Relationship Podcast

    So many ways to connect and listen to the podcast.

    Part 2 - Fall of The Silk Road & Dread Pirate Roberts

    Part 2 - Fall of The Silk Road & Dread Pirate Roberts

    Despite the popularity of The Silk Road, life for Ross Ulbricht aka Dread Pirate Roberts is spiraling out of control and law enforcement is at his heels. This is the story of the downfall of The Silk Road.

    Created, Produced and Hosted by Keith Korneluk

    Written and Researched by Lauren Minkoff

    Mixed and Mastered by David Swope

    Theme Song, You Are Digital, composed by Computerbandit

    Support us on Patreon

    Passion for Solving Problems is Key to Security - Will Lin - CSP #16

    Passion for Solving Problems is Key to Security - Will Lin - CSP #16

    Will Lin, founding team member at ForgePoint Capital and co-creator of the CISO community Security Tinkerers, discusses his passion for technology and how it led him to a career helping security companies launch, as well as his work supporting CISOs through collaboration and knowledge sharing.

     

    Show Notes: https://securityweekly.com/csp16

    This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!

     

    Visit https://securityweekly.com/csp for all the latest episodes!

    Follow us on Twitter: https://www.twitter.com/cyberleaders

    Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/