Logo
    Search

    Podcast Summary

    • Blurry Line Between Legal and Illegal Information GatheringThe pursuit of information, even through illegal means, can lead to severe consequences but may also create opportunities for those involved.

      The line between legal and illegal methods of obtaining information can be blurry, and the consequences of crossing that line can be severe. In this story, a former bodyguard named Carlos hires a private investigator, Mosier, to help him obtain evidence for a lawsuit against a competitor. Mosier then hires a hacker, Sumit Gupta, to hack into the competitor's emails. However, their actions are discovered, leading to lawsuits, raids, and guilty pleas for all involved except for Gupta. Instead, Gupta finds a lucrative business opportunity in providing hacked evidence to lawyers and private investigators. This leads to the creation of Beltrox, a hacking-for-hire operation that becomes notorious for its involvement in various lawsuits, including high-profile cases like WeWork, Wirecard, and Nigerian Oil. The story serves as a reminder that the pursuit of information, no matter the means, can have far-reaching and unintended consequences.

    • A hacking operation's emails reveal the interconnected world of private investigations and hacking for hireHackers, lawyers, and private investigators collaborate to obtain evidence, sometimes illegally, showcased in the Beltrac hacking operation's leaked emails.

      The world of private investigations and hacking for hire is more interconnected than one might think. The Beltrac story, a large-scale hacking operation, provides a glimpse into this ecosystem where hackers, lawyers, and private investigators work together to acquire evidence, often crossing ethical lines. This was highlighted in a recent data leak of 80,000 emails sent to 13,000 targets over a 7-year period, revealing the inner workings of the hacking group. The story begins with Sumit Gupta, who was inspired by a PowerPoint presentation from Appen, an IT company, to start his own hacking for hire business, Beltrox Infotech Services Private Limited. Gupta targeted private investigators and corporate lawyers as clients, and the leaked emails reveal the extent of their illegal activities. This collaboration between hackers and legal professionals shows how far some will go to obtain evidence, even if it means breaking the law.

    • Hacker's large profit margin leads to underpaying employees and high-volume phishing strategyA hacker's significant income disparity between employee wages and client fees can lead to underpaying staff and employing a high-volume phishing strategy.

      The hacker, Gupta, likely started his own operation due to the significant difference between what he was paying his employees and what he was charging clients. For instance, Beltrox charged approximately 20,000 US dollars per month, while Gupta's employees earned only about $350 a month. This large disparity may have motivated Gupta to underpay his staff and keep costs low by employing a high-volume phishing strategy. An intriguing example of Gupta's tactics can be seen in a $1.5 billion Nigerian oil lawsuit. In this case, Gupta allegedly hacked an email account of a Nigerian government lawyer and sent a fraudulent email to the Italian oil heirs, implicating the Nigerian government and Panosha in a bribery scheme. Despite the incriminating nature of the email, the Fabryo family ultimately lost their case, as the authenticity of the email was called into question due to the hack. This incident highlights the complex and murky world of hacking for hire, where hackers wedge themselves into the legal system and exploit vulnerabilities to gain access to sensitive information. It also underscores the importance of securing digital assets and maintaining a strong cybersecurity posture to prevent such attacks.

    • Hacking for Hire: Consequences and Unintended OutcomesHacking for hire services can lead to failed attempts, damaging repercussions, and ultimately, costly lawsuits and damaged reputations for those involved.

      Hacking for hire services can have significant consequences, often leading to failed attempts and damaging repercussions for those involved. The discussion revolves around two distinct cases: one involving Nigerian government lawyers and the other Adam Neumann of WeWork. In the first instance, Nigerian lawyers argued that hacked emails led to the dismissal of a case, potentially costing the government millions in legal fees. The Belltrox document leak revealed the extent of this operation, which targeted not only lawyers but also over 100 employees of Pan Ocean and other government lawyers. The hacking service aimed to expose corruption and grew into an advertising and lobbying effort. In the second instance, Adam Neumann, the founder of WeWork, was targeted by Belltrox. He discovered the hacking attempt and accused SoftBank of involvement during investment negotiations. Despite the accusations, no evidence was found, and Neumann walked away with a $500,000,000 settlement. Interestingly, in both cases, the people who had hired the hackers did not ultimately benefit from the attempts. Instead, these situations resulted in costly lawsuits and damaged reputations.

    • Navigating the complex world of cybersecurityThe Center for Internet Security provides valuable resources to help businesses stay informed and protected against cyber threats, collaborating with IT professionals and volunteers to develop and maintain best practices.

      The world of cybersecurity is full of complex and often hidden threats. As shown in the examples of Nigerian oil and Wirecard, companies and individuals can spend vast sums of money on what they believe to be high-level services, only to discover later that they have been victimized by hacking and espionage. In other cases, those responsible for the hacking go undetected, lurking in the shadows and targeting their victims from unexpected angles. Amidst all this, businesses must navigate constantly changing technology, increasing regulations, and limited resources to meet their security and compliance requirements. The Center for Internet Security offers valuable resources to help organizations stay informed and protected in this ever-evolving landscape. By collaborating and innovating with IT professionals and volunteers worldwide, CIS develops and maintains best practices that save time, money, and effort for businesses at every stage of their cybersecurity journey.

    • Collaboration and innovation in cybersecurity and aviationCIS strengthens cybersecurity through global collaboration and resource sharing. Aviation podcast offers insights into the world of air traffic control. Custom tools and phishing attacks pose risks to cybersecurity.

      Collaboration and innovation are key to creating a safer world in both the physical and digital realms. The Center For Internet Security (CIS) is an organization that does just that, working with IT professionals and volunteers around the world to develop and maintain security best practices. Their resources save time, money, and effort for businesses and governments alike. Additionally, CIS helps US state, local, tribal, and territorial government organizations share information to strengthen their cybersecurity together. On a different note, a podcast called "Air Traffic Out of Control" provides fascinating insights into the world of aviation, sharing recordings of conversations between pilots and air traffic controllers. In the cybersecurity realm, the value of non-public information can be significant, but it's essential to remember that if you really knew what was going to happen next, you wouldn't be sharing it. Lastly, an environmental campaign called Exxon New uncovered a concerning issue when staff and members of various environmental organizations received fake Google News articles and links to climate-related content from what appeared to be their colleagues and lawyers. CitizensLab, a cybersecurity watchdog group, discovered that these shortened URLs were not created with a publicly available URL shortener, but a custom tool. This incident highlights the importance of cybersecurity and the potential risks of custom tools and phishing attacks.

    • Uncovering a vast network of targeted individuals and organizations through reverse engineering of a database of 28,000 unique URLs.Reverse engineering of a database of URLs led to the discovery of a large-scale hacking operation targeting various individuals and organizations, including those involved in Exxon's campaign, and the identification of the company behind the attacks, Beltrox.

      The use of sequential URLs in a large-scale hacking operation allowed CitizensLab to uncover a vast network of targeted individuals and organizations, including those involved in Exxon's new campaign. This discovery was made possible through the reverse engineering of a database of 28,000 unique URLs, which revealed that the attacks on Exxon campaigners were not isolated incidents but an extensive operation. Interestingly, many of the test documents used in the early stages of the URL shortening tool were personal documents, such as resumes, which provided a clue leading to the identification of the company behind the attacks, Beltrox. This finding underscores the importance of securing personal information, even seemingly less sensitive documents, to prevent potential misuse. Despite Exxon's denial of any connection to the hacking operation, the evidence points to a wide range of targets, including activists, their families, friends, legal representation, and individuals with financially sensitive information.

    • Belltrox, a seemingly ethical hacking company, was exposed as Dark Basin, an unethical hacking serviceDespite posing as ethical hackers, Belltrox was revealed to be Dark Basin, an unethical hacking service. The true identities of their clients and the individuals who hired them remain unknown.

      The hacking group "Dark Basin" and the seemingly ethical hacking company "Belltrox" were one and the same. Despite extensive investigations, the identities of their clients and the individuals who hired them remain a mystery. Belltrox had endorsements from various government officials and law enforcement personnel prior to their exposure as an unethical hacking service. Many of the clients who engaged with Belltrox were likely in desperate situations and probably not winning their cases. The hackers, represented by Samut Gupta, continued to get paid regardless of the outcome. Gupta is a fugitive from the US courts and the Belltrox brand, once associated with hundreds of pages on social media platforms, is now temporarily closed but may make a comeback. With the digital age, information theft and access have become more prevalent and leave a trace in the form of digital fingerprints.

    • The Role of a Private Investigator in the 21st Century is Equivalent to a HackerPrivate investigators and lawyers might use ethical hacking services to win cases, emphasizing the importance of staying cool and supporting the show through Patreon. Organizations like Paws with a Cause change lives by custom training assistance dogs, and American Giant creates jobs in the USA, offering more than just income.

      The role of a private investigator in the 21st century might be equivalent to that of a hacker. There's a possibility of a new website offering ethical hacking services to private investigators and lawyers. The focus is on winning, regardless of the outcome for the client. Amidst the heat, the importance of staying cool and supporting the show through Patreon was emphasized. Additionally, the discussion touched upon the importance of various organizations like Paws with a Cause, which custom trains assistance dogs to perform tasks and change lives. The American work ethic was brought up, with American Giant being highlighted as a clothing company that creates jobs in the USA, providing more than just income but also pride and purpose.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Cyber Hygiene In the Era Of COVID-19

    Cyber Hygiene In the Era Of COVID-19

    They say if you fail to plan, you plan to fail.  In the current landscape that means putting your valuable data in the hands of criminals. 

    In this podcast, Brendan Read and Vishka Peiris of Korda Mentha discuss Cyber Hygiene during Covid-19.

    Brendan is a former detective from the Queensland Police High Tech Crime Investigation Unit.  He is highly experienced in investigating criminal and civil matters and helps clients to navigate technologies and their use in the collection and preservation of evidence. 

    Before joining Korda Mentha's forensic technology team in 2015, Vishka worked in various IT roles where he developed a diverse set of IT skills in computer systems and networks.  He has experience working on high profile investigations of cyber incidents, IP theft, corporate fraud and financial crime and forensic discovery matters.

    We hope you enjoy their presentation.

    This podcast is for reference purposes only. It does not constitute legal advice and should not be relied upon as such. You should always obtain legal advice about your specific circumstances. The views expressed in these podcasts are the speakers' own. They should not be taken as recommendations of the Society of Construction Law Australia.

    ISC StormCast for Tuesday, April 2nd 2019

    ISC StormCast for Thursday, January 9th 2020

    ISC StormCast for Wednesday, June 1st, 2022

    ISC StormCast for Tuesday, May 30th 2017