Logo
    Search

    Podcast Summary

    • Unintended Consequences of Technology: Virtual KidnappingsCriminals use technology to manipulate victims into believing loved ones are kidnapped, resulting in money transfers or valuable information.

      Technology, when used in unintended ways, can lead to unintended consequences, as seen in the case of "virtual kidnappings." This is when criminals use technology, such as phones, to make victims believe that their loved ones have been kidnapped. The victim is then coerced into transferring money or providing other valuable information. The name "virtual kidnapping" may be misleading, but it effectively captures the attention of the media and public. To support the Hack podcast, listeners can become patrons on Patreon.com/hackpodcast. This month, the show is set to reach a significant milestone - one million downloads. The hosts express their gratitude to their listeners for their support throughout the years, even during periods of inactivity.

    • Virtual kidnapping is a scam, not a new form of kidnappingBe cautious of communications claiming loved ones have been kidnapped, as it's likely a scam. Verify authenticity before taking action.

      The term "virtual kidnapping" is misleading and does not accurately describe the crime involved. It is not a new form of kidnapping where a virtual object is taken, but rather a social engineering scam where criminals manipulate victims into believing their loved ones have been kidnapped. This was exemplified in the story of Richard Mendelstein, a software engineer at Google, who fell victim to such a scam in 2022. Despite being knowledgeable about cybersecurity, he was successfully tricked into believing his daughter had been kidnapped and followed the kidnapper's instructions to withdraw money from the bank. The term "virtual kidnapping" is a misnomer, as there is no kidnapping involved, but rather a sophisticated form of extortion. It is important to be aware of this deception and to verify the authenticity of any suspicious communications, no matter how convincing they may seem.

    • Maintaining control is key for scammersStay calm and think critically during phone scams or social engineering attacks. Involve law enforcement or trusted individuals to regain control and assess the situation.

      In the context of phone scams or social engineering attacks, maintaining control over the situation is crucial for the scammer. The scammer keeps the victim on the line, creating an intense and anxious situation, preventing them from thinking rationally. However, when the call was disconnected, the victim's wife was able to act quickly and contact their daughter, who was safe. This disrupted the scammer's control and broke the "fourth wall," allowing the victim to regain composure and realize the situation was a scam. Therefore, it's essential to remain calm and think critically during such situations, and when possible, involve law enforcement or trusted individuals to help assess the situation.

    • Improving podcast ads through digital manipulationPodcasters and advertisers can enhance podcast ads by learning from tech industry's targeted digital heists to create more compelling and effective ads

      While the scenario presented in the podcast ad about a potential kidnapping and the use of podcast advertising to reach a large audience is effective in generating emotion and engagement, there is room for improvement from a digital perspective. The use of hacking and digital manipulation to create a more convincing and targeted experience could enhance the overall impact of the ad. Additionally, the repetitive nature of the ad, which is similar to common scam calls, may result in desensitization among listeners. Podcasters and advertisers can learn from more sophisticated digital heists and targeted approaches seen in the tech industry to create more compelling and effective podcast ads.

    • Exploiting Fear in Scam CallsScam calls continue to evolve, exploiting fear and posing a significant threat. Stay informed and vigilant to protect yourself.

      Unsolicited phone calls, whether they're spam or scams, can be a common and frustrating experience for many people. These calls often use technology in unintended ways, and their effectiveness can change over time. In Canada, for instance, the most common tactic used in scam calls is to exploit people's fear of breaking rules. In the United States, scams have evolved to include virtual kidnappings, which can be particularly distressing. These scams have become so prevalent that they're now one of the most common types of phone calls in the country. Despite advancements in technology and awareness, these scams continue to evolve and pose a significant threat. It's important for individuals to stay informed and vigilant, and for law enforcement to stay one step ahead of these scammers.

    • Social engineering scams can cause chaos and confusionUnsolicited phone calls can lead to fake kidnappings, causing distress and uncertainty for families, requiring awareness and education to prevent and law enforcement preparedness to handle the fallout.

      The impact of a single social engineering scam can create a domino effect of chaos and confusion, involving both loved ones and law enforcement. The scam, which often begins with a seemingly innocent phone call, can lead to reckless behavior and real responses, even if the kidnapping is fake. The scam artists may use outdated technology, such as SIM hubs, to carry out their schemes, often targeting areas with easily recognizable area codes. The sheer volume of calls made, combined with the difficulty of filtering potential victims, makes this a numbers game. This can leave victims' families in the dark, unsure of what is real and what is not. It's important to be aware of this phenomenon and to educate ourselves and our loved ones about the potential dangers of unsolicited phone calls. Additionally, law enforcement agencies need to be prepared to handle the potential fallout from these types of scams and to differentiate between real and fake kidnappings.

    • Exploiting Fear in Virtual KidnappingsCriminals use fear of real kidnappings to perpetrate virtual kidnappings, instilling panic through social engineering techniques. Stay informed and vigilant to prevent falling victim to these scams.

      Fear can be exploited in unexpected ways. In the case of virtual kidnappings, criminals prey on people's fears of real kidnappings by making them believe that a loved one has been abducted. The criminals use social engineering techniques, such as revealing the name of the supposed kidnap victim, to instill panic and convince the victim to cooperate. These schemes have become more common and profitable, especially in places where kidnappings are less frequent, allowing criminals to profit from the fear of crime. Ramirez, a Mexican kidnapper in prison, saw an opportunity to export this grift to new markets by leveraging his English language skills and the fact that virtual kidnappings were less known in those areas. This demonstrates how fear of one crime can be used to facilitate another, making it essential to stay informed and vigilant against such scams.

    • Prison phone scam using social engineeringBeing aware of phishing scams isn't enough, stay vigilant against all social engineering attacks, even those that seem unlikely.

      Even the most tech-savvy individuals can fall victim to sophisticated social engineering scams, especially when they are caught off guard or under pressure. The case of Ramirez's prison phone crime ring illustrates this point. Ramirez, a prisoner, was able to build a lucrative phone scam operation from inside the prison using burner phones and social engineering hacks. The victims, including a software engineer at Google named Richard, were tricked into wiring money to Mexico. Despite being aware of phishing scams, Richard fell prey to this one due to the urgency of the situation. The scam was able to fly under the radar due to the sheer number of people in prison and the ease with which they can access and use cell phones. Even when caught, the perpetrators face limited consequences as they are already in jail. This case highlights the importance of being vigilant against social engineering attacks, no matter how unlikely they may seem.

    • Tech executive falls for kidnapping scamEven intelligent individuals can be susceptible to manipulation and deception, highlighting the importance of staying aware of potential threats and scams in our digital world.

      That even intelligent and seemingly aware individuals can be susceptible to manipulation and deception, as demonstrated in the story of a tech executive who fell for a kidnapping scam. This incident serves as a reminder that everyone has vulnerabilities and triggers, making us all potential targets for scams. If you're new here, welcome! We're a podcast that explores the world of technology and its impact on our lives. In this episode, we delved into the story of a tech executive who was targeted in a kidnapping scam. The scam was so convincing that it caught the executive off guard, highlighting the importance of being aware of potential threats and scams in our increasingly digital world. Our sources for this episode include "We Have Your Daughter" by David Kushner, which provides an in-depth look into the story, and Vox's piece by Rory Smith on the democratization of kidnappings in Mexico, which offers a broader context for this type of crime. We encourage you to check out these sources for a more comprehensive understanding of the topic. Thank you for joining us on this episode. We're glad you could make it to the end and hope you found the discussion informative and thought-provoking. Stay tuned for our next episode, where we'll explore another fascinating aspect of technology and its impact on our lives.

    Recent Episodes from Hacked

    Google Search Leaks

    Google Search Leaks
    Few things impact the shape of the internet more than Google Search, yet its inner workings are mostly a mystery. In May, Rand Fishkin received alleged leaked documents that peal back the curtain as to how it works. We speak with Rand Fishkin about his involvement in the Google API leaks. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJuly 02, 2024

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Ep. 242 - Human Element Series - The Greatest Salesman in the World - Is It AI? with Tony UV

    Ep. 242 - Human Element Series - The Greatest Salesman in the World - Is It AI? with Tony UV

    Today we are joined by Tony UcedaVélez. Tony UV is the co-creator of the Process for Attack Simulation & Threat Analysis and the CEO of VerSprite. Tony has over 25 years of IT/InfoSec work across a vast range of industries. He is also the OWASP leader for Atlanta, GA. [Jan 8, 2024]

     

    00:00 - Intro

    00:19 - Intro Links

    -          Social-Engineer.com - http://www.social-engineer.com/

    -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/

    -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/

    -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/

    -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb

    -          CLUTCH - http://www.pro-rock.com/

    -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/

    03:00     Tony UV Intro

    03:34     Good in Chaos

    05:28     VerSprite

    06:18     Future Focus

    09:38     It's Like a Flea Market

    13:19     Groomed by Marketing

    14:46     The Age of Misinformation

    17:14     How to Defend

    21:34     Human Validation

    23:49     Implicit Trust

    26:01     Zero Trust in Humans

    29:33     Mentors

    -          Parents

    32:25     Book Recommendations

    -          The Alchemist - Paulo Coelho

    -          The Greatest Salesman in the World - Og Mandino

    34:08     Find Tony UV online

    -          X/Twitter: @t0nyuv

    -          LinkedIn: linkedin.com/in/tonyuv/

    34:53 - Guest Wrap Up & Outro

    -          www.social-engineer.com

    -          www.innocentlivesfoundation.org

    Ep. 222 - Human Element Series - Art and Bias with Andi Schmied

    Ep. 222 - Human Element Series - Art and Bias with Andi Schmied

    Today we are joined by Andi Schmied. Andi is an urban designer and visual artist. With her installations and printed work, she explores the architectural framing of social space, and uncovers urban anomalies. These vary from areas that have deviated far from their originally planned function, utopian architectures or spaces of extreme privilege.

     

    Schmied graduated as an urban designer from the Bartlett School of Architecture (UCL, London) and is currently a PhD candidate at Moholy Nagy University of Arts and Design. Her latest book, Private Views: A High-Rise Panorama of Manhattan won the first prize in visual arts category of the Most Beautiful Czech Books competition. Her work, among other places, has been shown from London to Vienna and everywhere in between. [August 14, 2023]

     

    00:00 - Intro

    00:13 - Intro Links

    -          Social-Engineer.com - http://www.social-engineer.com/

    -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/

    -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/

    -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/

    -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb

    -          CLUTCH - http://www.pro-rock.com/

    -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/

    03:10 - Andi Schmeid Intro

    04:12 - From Design to Disruption

    06:15 - Open House

    09:13 - Room for the Nanny

    11:28 - Casting a Long Shadow

    15:38 - That’s Just Your View

    16:59 - It's a Man's World

    19:25 - Beyond the Pictures

    21:43 - Something's Gotta Change

    24:35 - Earth Abides

    26:48 - The Artistic Urge

    27:41 - Find Andi Schmied online

    -          Instagram: @andischmied

    -          Website: andischmied.com

    27:57 Mentors

    -          Nicholas Boyarsky

    28:58 - Book Recommendations

    -          Class - Paul Fussell

    -          Private Views - Andi Schmied

    29:49 - Guest Wrap Up & Outro

    -          www.social-engineer.com

    -          www.innocentlivesfoundation.org

    Ep. 224 - The SE ETC Series - Tips for Having Difficult Conversations with Chris and Patrick

    Ep. 224 - The SE ETC Series - Tips for Having Difficult Conversations with Chris and Patrick

    Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social Engineering. [August 28, 2023]

     

    00:00 - Intro

    00:21 - Patrick Laverty Intro

    00:55 - Intro Links

    -          Social-Engineer.com - http://www.social-engineer.com/

    -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/

    -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/

    -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/

    -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb

    -          CLUTCH - http://www.pro-rock.com/

    -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/

    07:20 - Intro Chat

    09:11 - Todays Topic: Tips for Having Difficult Conversations

    10:00 - Outline for Parents

    12:10 - Map Your Terrain

    16:22 - Define Your Goal

    17:40 - Decide on Your Pretext

    20:05 - Imagine Your Rapport Building

    21:50 - Identify Potential Influence Building Techniques

    28:47 - Run a Quick Manipulation Check

    31:31 - Pump Up the Nonverbals

    36:30 - Conduct an Authenticity Check

    39:21 - Prepare for Likely Contingencies

    40:48 - Solidify Gains

    43:40 - Next Month: ???

    44:00 - Wrap Up & Outro

    -          www.social-engineer.com

    -          www.innocentlivesfoundation.org

     

    Find us online

    -          Chris Hadnagy

    -          Twitter: @humanhacker

    -          LinkedIn: linkedin.com/in/christopherhadnagy

    -          Patrick Laverty

    -          Twitter: @plaverty9

    -          LinkedIn: linkedin.com/in/plaverty9

    122: Lisa

    122: Lisa
    In this episode we hear some insider threat stories from Lisa Forte. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. Create your free account at snyk.co/darknet. Attribution Darknet Diaries is created by Jack Rhysider. Editing by Damienne. Assembled by Tristan Ledger. Sound designed by Andrew Meriwether. Episode artwork by odibagas. Mixing by Proximity Sound. Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Ep. 213 - The Doctor Is In Series - Everything You Remember is False

    Ep. 213 - The Doctor Is In Series - Everything You Remember is False

    Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology.

     

    In today’s episode, Chris and Abbie are discussing: False Memories. Although memory processes and systems usually operate reliably, they are sometimes prone to distortions and illusions. Today’s discussion will examine how and why this happens. [June 5, 2023]

     

    00:00 - Intro

    00:20 - Dr. Abbie Maroño Intro

    01:02 - Intro Links

    -          Social-Engineer.com - http://www.social-engineer.com/

    -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/

    -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/

    -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/

    -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb

    -          CLUTCH - http://www.pro-rock.com/

    -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/

    07:43 - The Topic of the Day: False Memories

    08:11 - Defining Our Memories

    10:17 - Challenging Your Reality

    11:48 - Remember the Good Times

    13:01 - The Exception

    15:07 - Unintentional Ego Inflation

    17:27 - Putting it in Context

    18:46 - The Dangers of Distorting Memories

    23:19 - Not-So-Total Recall

    25:40 - Repression vs Suppression

    28:35 - Eyewitness Error

    32:10 - Shameless Plug: Ep. 134

    -          Altered Memories and Alternate Realities with Dr. Elizabeth Loftus

    34:14 - Emotional Influence

    37:22 - How Accurate Are You???

    39:56 - Emotional Defense

    44:35 - Belief System

    47:48 - Don't Be Certain (Because You're Not)

    49:31 - Confirmation Bias

    52:39 - Simple Does Not Equal Easy

    54:08 - Shades of Grey

    56:38 - Wrap Up

    56:58 - Next Month: Deception Detection

    57:45 - Outro

    -          www.social-engineer.com

    -          www.innocentlivesfoundation.org

     

    Find us online:

    -          Twitter: https://twitter.com/abbiejmarono

    -          LinkedIn: linkedin.com/in/dr-abbie-maroño-phd-35ab2611a

    -          Twitter: https://twitter.com/humanhacker

    -          LinkedIn: linkedin.com/in/christopherhadnagy

     

    References:

    Damiano, C., & Walther, D. B. (2019). Distinct roles of eye movements during memory encoding and retrieval. Cognition, 184, 119-129.

    Robins, S. K. (2019). Confabulation and constructive memory. Synthese, 196, 2135-2151.

    Schacter, D. L. (2022). Constructive memory: past and future. Dialogues in clinical neuroscience.

    Murphy, G., Loftus, E. F., Grady, R. H., Levine, L. J., & Greene, C. M. (2019). False memories for fake news during Ireland’s abortion referendum. Psychological science, 30(10), 1449-1459.

    Sedikides, C., & Skowronski, J. J. (2020). In human memory, good can be stronger than bad. Current Directions in Psychological Science, 29(1), 86-91.

    Otgaar, H., Howe, M. L., & Patihis, L. (2022). What science tells us about false and repressed memories. Memory, 30(1), 16-21.

    Loftus, E. F. (1993). The reality of repressed memories. American psychologist, 48(5), 518.

    Anderson, M. C., & Hulbert, J. C. (2021). Active forgetting: Adaptation of memory by prefrontal control. Annual review of psychology, 72, 1-36.

    Loftus, E. F., & Pickrell, J. E. (1995). The formation of false memories. Psychiatric annals, 25(12), 720-725.

    Otgaar, H., Candel, I., Merckelbach, H., & Wade, K. A. (2009). Abducted by a UFO: Prevalence information affects young children's false memories for an implausible event. Applied Cognitive Psychology: The Official Journal of the Society for Applied Research in Memory and Cognition, 23(1), 115-125.

    Otgaar, H., Candel, I., Scoboria, A., & Merckelbach, H. (2010). Script knowledge enhances the development of children’s false memories. Acta Psychologica, 133(1), 57-63.