Logo
    Search

    Podcast Summary

    • The Evolution of Phone Theft and BlacklistingPhone theft remains a problem despite blacklisting infrastructure, so it's essential to take precautions to protect your device.

      In today's world, where phones have become personal computers and are easily tracked, locked, and blacklisted when lost or stolen, one might wonder about the motivation behind stealing a phone. The speaker, John, who works at a technology company, was faced with this question when his wife's phone went missing at the mall. He delved into the phone theft world and discovered that until about a decade ago, there was no proper infrastructure for blacklisting stolen phones. The first step to combating this issue was creating a blacklist of stolen devices, which was established in Europe in 2004 and in Canada in 2013. These lists are shared among different networks, making it impossible for anyone but the owner to use the phone. Changing an IMEI number is difficult, especially on devices like iPhones, which can be remotely locked and encrypted through iCloud. Despite these measures, John's wife's new phone received a text message from a hacked site, indicating that stolen phones are sold on the black market. The speaker expressed his curiosity about this phenomenon, as he had always wondered what happens to these phones. The infrastructure for blacklisting stolen phones has come a long way, but it's essential to remember that phone theft still occurs, and it's crucial to take precautions to protect your device.

    • Reporting a lost phone to carrier and iCloudReporting a lost phone to your carrier and iCloud can render it useless, preventing data usage and unauthorized transactions.

      When your phone is stolen, it's crucial to take immediate action to protect your data and prevent unauthorized usage. John, whose wife's phone was stolen at the mall, effectively turned his wife's phone into a paperweight by reporting it as lost through his carrier and Apple's iCloud. This rendered the phone useless, preventing any data usage or unauthorized transactions. The thief, who stole multiple phones that day, was unable to access the stolen phones due to these protective measures. If you lose your phone, follow John's example and report it stolen to your carrier and iCloud to secure your data and prevent unauthorized usage.

    • Understanding the persistence of cybercriminalsBe aware of phishing attempts and safeguard online accounts. Cybercriminals can come from anywhere and threats can be global, requiring a comprehensive cybersecurity approach.

      Taking measures to protect your data goes beyond just securing your physical devices. In this story, a man named John took steps to wipe and lock his stolen iPhone, but the thieves were persistent and attempted to phish for his iCloud credentials. John, in turn, collected these attempts to understand the tactics used. This incident highlights the importance of being aware of potential phishing attempts and the need to safeguard online accounts as meticulously as one does their devices. Moreover, the incident also underscores the potential global reach of cybercriminals. The stolen phone was tracked down to Vietnam, and the phishing emails originated from there. This demonstrates the need for a comprehensive approach to cybersecurity, as threats can come from anywhere in the world. Lastly, the incident serves as a reminder to never click on suspicious links or give out sensitive information, even if the request appears to be legitimate. By staying vigilant and informed, individuals can significantly reduce their risk of falling victim to cybercrime.

    • Cybercriminals use homograph attacks and misspelled domain names to deceive usersBe aware of homograph attacks and misspelled domain names, double-check website and email authenticity, and use secure browsers and email providers to mitigate risk.

      Cybercriminals use various techniques to trick users into visiting fraudulent websites, such as homograph attacks and misspelling domain names. In the case discussed, the attackers used a homograph attack with Cyrillic characters to create a domain that looked identical to a legitimate one. They also used misspelled domain names to deceive users. These techniques can bypass security measures if not properly addressed by browsers and email providers. The attackers also sent emails with malicious identifiers to steal specific information about the targeted devices. It's crucial for individuals and organizations to be aware of these tactics and to double-check the authenticity of websites and emails before interacting with them. Additionally, using secure browsers and email providers that offer protection against such attacks can help mitigate the risk.

    • Phishing scams target iCloud credentials to unlock stolen phonesPhishing attacks use automation and exploits like Find My iPhone to target iCloud credentials and unlock stolen phones, making it crucial to stay vigilant and cautious.

      Phishing scams continue to evolve and pose a significant threat, particularly those targeting iCloud credentials to unlock stolen phones. The volume of phones targeted suggests a high-volume operation, making automation essential. John, a security enthusiast, discovered that these attacks utilized a PHP exploit called Find My iPhone. He found a proof-of-concept GitHub project that allowed users to validate iCloud credentials, potentially removing activation locks. These tools are part of malware or phishing toolkits, making it easier for attackers to deploy phishing texts at scale. By using a VPN, virtual machine, and compiling information about the domains involved, John was able to uncover this threat and understand the tactics used. Stay vigilant and be cautious when receiving unsolicited messages or requests for sensitive information.

    • Layers of cybersecurity defenseEffective cybersecurity requires multiple layers of defense, including strong credentials, and reporting abuse to registrars and hosting providers.

      Effective cybersecurity relies on multiple layers of defense. While having strong credentials is crucial, it's not enough to protect against sophisticated cyber threats. In this case, a stolen phone was turned back into a functional device using Icloud credentials. However, reporting abuse to registrars and hosting providers can help mitigate the impact of such threats. The Center for Internet Security emphasizes the importance of collaboration and innovation in creating a safer digital world, especially as business technology evolves and cyber threats become more prevalent. By staying informed and taking action against abuse, individuals and organizations can help protect themselves and contribute to a more secure connected world.

    • Tracking down a phone hacking operationInvestigators can follow digital breadcrumbs to uncover phone hacking operations, but the physical connection between the perpetrators may remain unclear

      John, an investigator, was able to track down and take down a phone hacking operation by following digital breadcrumbs. He discovered that the hackers had been using stolen phones to carry out their attacks. After identifying the last known location of one of the stolen phones in a Vietnamese restaurant in Toronto, John speculated that there might be a connection between the pickpockets in Eastern Canada and the hackers in Vietnam. However, the lack of a clear digital trail made it unclear how the phones were getting from the pickpockets to the hackers. The hacking operation was taken offline, but the physical connection between the two groups remains a mystery. This incident highlights the importance of following digital leads in cyber investigations and the potential complexities involved in tracking down international cybercriminal networks.

    • Profitable Business of Stolen and Bricked PhonesCriminals make money by stealing and selling functional phones from large batches of bricked or stolen ones. The process involves attempting to unbrick or unlock them, selling the functional ones, and discarding or selling for parts the rest.

      The illegal market for stolen and bricked phones is a lucrative business, but its success depends on the effectiveness of phishing scams and pickpocketing. The economics of this criminal activity can be quite profitable, with each stolen phone potentially selling for hundreds of dollars, even if only a fraction of them are functional. The process involves buying large quantities of bricked phones, attempting to unbrick or unlock them, and then selling the functional ones for a significant profit. The rest can be sold for parts or discarded. The value of a stolen phone can range from a few hundred dollars for parts to over a thousand dollars if it can be fully unlocked and resold. The hours spent on this process, from stealing the phones to selling them, can yield an hourly wage, but it's important to note that there are more productive and legal ways to contribute to society and earn a similar income. Additionally, the percentage of functional phones in the batch is crucial to the profitability of this criminal enterprise. It's a risky business with a high potential reward, but it's also a reminder of the importance of securing personal devices with strong passwords and being vigilant against phishing scams.

    • IPhones remain valuable targets for digital criminals despite activation locks and two-factor authenticationDigital criminals can use phishing scams to bypass activation locks and sell stolen iPhones for resale value or dismantle them for parts, making their theft a lucrative business

      While activation locks and two-factor authentication can make stolen iPhones seemingly useless, they are still valuable targets for digital criminals. These criminals can use phishing scams to bypass activation locks and sell the phones for resale value or dismantle them for parts. Even though the financial gain might not be as significant as hacking large systems, the theft of iPhones remains a lucrative business due to their market value. If you have an interesting cybercrime story to share, reach out to Hacked Podcast through their Patreon page. Thank you to John for sharing his experience and to our supporters, including Eric Bacon, Stewart Bowles, and Lisa Gonzalez Smith, for their continued support.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    What You Need to Know about Cybersecurity

    What You Need to Know about Cybersecurity

    Today's special episode features audio from a webinar that we had earlier this year. In the audio you will hear from Jordan and our special guest, CEO of Mapletronics, Wes Hershberger. We and Jordan discuss current cybersecurity threats and how you can begin to protect yourself and your business. 

    Discussion includes: email safety, phishing protection, educating employees, strong password policies, data encryption, geofencing, online shopping safety, and more. 

    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"

    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"
    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"

    Contenuto sponsorizzato

    Massimo Carlotti, pre sale team leader di CyberArk, è di nuovo al microfono per un podcast realizzato con il supporto di Radio IT. Insieme a Igor, parla della "piaga tecnologica" più diffusa durante il lockdown (il phishing), di sicurezza perimetrale e dei suoi limiti, dell'impatto sulle critical app (quelle senza le quali il business dell'azienda di blocca).

    E poi parla dei CISO, i Chief Information Security Officer (o direttori della sicurezza informatica), e di come troppo spesso in azienda il loro compito - fornire informazioni importanti per non avere problemi - sia spesso frainteso, e loro vengano visti come dei guastafeste.

    Un podcast ricco di spunti: buon ascolto!

    Altri contenuti su www.radioit.it

    Season 5 Episode 6 - VA CISO Outlines Cybersecurity Strategy

    Season 5 Episode 6 - VA CISO Outlines Cybersecurity Strategy

    Faced with growing ransomware threats, phishing attempts and more, the Department of Veterans Affairs is reevaluating what it means to be “secure” in a hybrid environment. VA CISO Lynette Sherrill outlines the agency’s cybersecurity strategy and emphasizes the importance of identity management through multi-factor authentication and least privileged access to secure critical IT systems and veteran data.

    Uncover the Secrets Behind the Screens: How to Maintain Your Privacy Online

    Uncover the Secrets Behind the Screens: How to Maintain Your Privacy Online
    In our interconnected digital world, safeguarding your online privacy is paramount. This episode delves into the alarming reality of identity theft and guides you on a transformative journey from mindless digital consumption to mindfulness. We unravel the startling frequency and impact of this cybercrime, shedding light on the urgency of protecting your digital identity.

    As we transition from mindless scrolling to cultivating mindfulness, you'll gain insights into how this shift can help you regain control over your digital existence, steering you away from the traps of distraction and over-stimulation.

    Unlock the transformative potential of the Be I AM practice – Be Intentional, Be Aware, Be Mindful. Discover how these principles can reshape your digital habits, leading to a safer and more mindful online experience. As we cultivate awareness, we equip ourselves with the best defense against online threats, recognizing subtle warning signs and taking proactive steps to shield your digital assets and personal information.

    Tune in now to uncover the secrets concealed behind the screens and embark on a transformative journey toward maintaining your online privacy and digital resilience.

    Sandra Estok is the founder of Way2Protect™, author of the international bestselling and award-winning Happily Ever Cyber!™ book, and the Cyber Literacy series for children. She is a Keynote Speaker and Corporate Trainer with over 20 years of experience in Cybersecurity, IT and Data Privacy. Her mission is to empower women to take charge of their cyber safety and have Peace of Mind Online.

    Website link: Sandra Estok
    Social media handle: @Way2Protect

    To watch Sandra Estok’s TEDx talk “What an identity theft victim can teach about cybercrime” click here. Or copy this link directly into your browser: https://www.ted.com/talks/sandra_estok_what_an_identity_theft_victim_can_teach_us_about_cybercrime