DiscoverMalicious Life
Malicious Life

Malicious Life

Author: Cybereason

Subscribed: 11,648Played: 278,783
Share

Description

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.
105 Episodes
Reverse
NotPetya, Part 1

NotPetya, Part 1

2021-03-0132:49

On June 28th, 2017, millions of Ukranians were celebrating 'Constitution Day.' Their national holiday turned into a nightmare, as tens of thousands of computers all over the country were infected by a mysterious malware. By that afternoon, the cyber-pandemic was already going global. The post NotPetya, Part 1 appeared first on Malicious Life.
It seems likely that legislation alone won't be able to regulate the widespread use of facial recognition. Andrew Maximov, who uses AI to fight Belarus's dictatorship, shows us another way facical recognition can be used - this time for us, instead of against us. The post Facial Recognition in Law Enforcement, Pt. 2 appeared first on Malicious Life.
There are plenty of reasons why Police should use AI for facial recognition: after all, Humans are notoriously bad eye witnesses. However, placing AI in the hands of law enforcement does have its dangers - due to the limitations of the technology itself, and the biases of the officers who use it. The post Should Law Enforcement Use Facial Recognition? Pt. 1 appeared first on Malicious Life.
Clearview AI

Clearview AI

2021-01-2144:014

Clearview AI scrapes billions of images off social media and the open web, applies facial recognition algorithms on them - and sells that data to law enforcement agencies all over the world. But who are the people behind this secretive company, and what did a breach into its databases reveal? The post Clearview AI appeared first on Malicious Life.
FC, aka 'Freaky Clown', is an expert in "Physical assessments" - otherwise known as breaking into ultra-secure office buildings. FC shares some of his (incredible) adventures, as well as some tips and tricks on how to protect your organization's HQ from hackers such as himself. The post Breaking Into Secure Buildings appeared first on Malicious Life.
Ran talks to Israel Barak, Cybereason's CISO and a Cyber-defense and Warfare expert, about the recent SolarWinds hack that impacted upto 18,000(!) enterprise organizations in the US. What is a Supply Chain Attack, how can organizations defend against it - and what does all this have to do with Evolution and Natural Selection?... The post Special: The SolarWinds Hack appeared first on Malicious Life.
100th Episode Special

100th Episode Special

2020-12-2141:313

For our 100th episode, we bring you three stories that tie in to previous episodes of the show: Shadow Inc. (Election Hacking), J&K (Max Headroom) and T-Shirt-Gate (Yahoo's Ugly Death). Enjoy :-) The post 100th Episode Special appeared first on Malicious Life.
In the mid-90's, a Dutch TV repairman claimed he invented a revolutionary data compression technology that could compress a full-length movie into just 8KB. The post Jan Sloot’s Incredible Data Compression System appeared first on Malicious Life.
In 1983, the US got word that an ally's embassy - probably France's - was bugged by the Soviets. This reports triggered Operation GUNMAN: a complete removal & de-bugging of *all* electronic devices in the US embassy in the USSR. This secretive operation resulted in a surprising discovery - and made the NSA what it is today. The post Op. GUNMAN & The World’s First Keylogger appeared first on Malicious Life.
Election Hacking, Part  2

Election Hacking, Part 2

2020-11-0341:225

Georgia's elections infrastructure had been hacked multiple times since 2014 - both by Russian Intelligence and local White Hat hackers. The upcoming elections are plagued with uncertainty - and uncertainty and democracy go together like wet hands and electrical outlets. The post Election Hacking, Part 2 appeared first on Malicious Life.
Election Hacking, Part  1

Election Hacking, Part 1

2020-10-2236:514

Today we’re talking about just one state. One which, depending on which way it leans, might bring the entire electoral college with it. One which, as of this writing, is absolutely, positively, neck and neck. Dead heat. A few votes one way or the other could swing it. In other words: this is the kind of state that cannot afford to be hacked. But might be. The post Election Hacking, Part 1 appeared first on Malicious Life.
About a year ago, Cybereason's Managed Detection and Response team (aka MDR) stumbled upon a attack involving Russian cybercriminals, POS devices and an entire new family of previously undiscovered malware. The post MDR Vs. The TrickBot Gang appeared first on Malicious Life.
Between 2010 and 2014, Yahoo was hacked numerous times - each time setting a new 'world record' for the largest data breach in history. It also hid those breaches from it's investors, customers and the SEC. The post Yahoo’s Ugly Death, Part 2 appeared first on Malicious Life.
When Marissa Mayer joined Yahoo as CEO, the company's stock rose 2% the day of the announcement. But the new CEO was basically initiated into her job by a major data breath - and the worst was yet to come. The post Yahoo’s Ugly Death, Part 1 appeared first on Malicious Life.
Falun Gong is a religious movement heavily persecuted in China. In 2017, members of the movement sued Cisco Systems for aiding and abetting the Chinese government in this persecution - since Cisco helped China erect 'Golden Shield'": the massive Chinese IT infrastructure project which combined internet censorship and pervasive Chinese state cyberspying. The post The Great Firewall of China, Pt. 2: Cisco’s Trial appeared first on Malicious Life.
The Great Firewall is just mind-bogglingly big, repressing freedom of speech and information for over 800 million Chinese internet users every year. The Great Firewall is so big that it’s worth asking: how did the Chinese manage to build it in the first place? 20 years ago, our info-sec technology was much less advanced than it is today. China was a second-rate technology power, not even comparable to their position today. Most of all: a firewall, like the one they proposed, had never existed before--or, for that matter, since. How, then, did they pull it off? The post The Great Firewall of China – Part 1 appeared first on Malicious Life.
Ran & Israel Barak, Cybereason's CISO, discuss the latest development in ransomware evolution: multi-stage attacks in which the attackers infiltrate the target network, steal data and gather intelligence - before detonating the ransomware to cause maximal denial-of-service to the victim organization. What does this new tactic mean for the use of backups as a mean to mitigate the risk from ransomware? This episode was recorded live on July 29th, 2020. The post Multi-Stage Ransomware (Live!) appeared first on Malicious Life.
In 2015 Bastian Obermayer, an investigative journalist for the Süddeutsche Zeitung, received a message every journalist dreams of: the biggest leak in journalism history. But dealing with the massive 2.7 Terabyte data-dump, 11.5 million documents - while making sure his source's identity could not be uncovered, turned out to be a huge challenge. The post Protecting The “Panama Papers” Whistleblower appeared first on Malicious Life.
Hackers keep modifying and improving their methods of operations. Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason, tells us about the recent shift to Blackmail - as a way to pressure Ransomware victims to pay the ransom. The post From Ransomware To Blackmail, With Assaf Dahan appeared first on Malicious Life.
SegWit2x, Part 3

SegWit2x, Part 3

2020-07-0359:215

On August 1st, 2017, Bitcoin forked. But it wasn't the SegWit2x fork everyone was talking about - It was a different fork, supported by a coalition of miners who, in doing what they were doing, were essentially ditching SegWit2x in favor of their own scaling solution. What happened here? Who betrayed SegWit2x? The post SegWit2x, Part 3 appeared first on Malicious Life.
loading
Comments (68)

Mirek Rumin

I can't believe that's how the extra story ends... Wth!?

Jan 16th
Reply

Gurdeep Mundi

whoa!

Jan 12th
Reply

Chauncey Bones

congratulations on hitting the century mark! really enjoyed the Act I, II, III format and content. had a few laughs listening and got a bit nostalgic. has ML thought about more election hacking? the April 2020 South Korean legislation involved Huawei and was quite shady. keep ☝ the great work and Happy New Year!

Dec 23rd
Reply

J.

man ... you produced this before the election! That's some foresight!

Dec 19th
Reply

Clinton Knight

I think I know Jan Sloot's Data Compression System method. And honestly, its stupidly simple. No wonder there was no storage.

Dec 7th
Reply

Beano09

Hi

Dec 4th
Reply

Beano09

Hi

Dec 4th
Reply

Chauncey Bones

y'all nailed it. what a shit show ladies and gents sit back and enjoy your pop corn

Nov 7th
Reply (1)

Chauncey Bones

and thats why I still have aol mail. ahhhhh the days of yore. not mentioned in the pod was a yahoo ceo died stranded in winter trying to help his stranded family. related? maybe not but possibly malicious........ love the pods Ran!

Oct 10th
Reply (1)

Chauncey Bones

dank pod cast i get to play judge. me sees this..... Crisco i mean Cisco, if they knew international law was about to be broken, and most corporations do, it wouldn't do well in Hague. Perhaps the case in the US is just an amuse bouche for the global court and the plaintiffs are exposing Sullivan's hand. this case in the States will depend on November third sadly but Crisco should stop using Cisco

Aug 30th
Reply

Andy Edwards

There's a flip side to maintaining that anonymity: seems like it's possible the source for the leaks could have been killed and the journalists wouldn't know about it. I wonder if they were still able to contact the source long after the fact? It seems like that would be a huge risk in itself. So I'm guessing it's hard to verify whether the security measures were successful...

Aug 12th
Reply

Bonnieandclyde15@protonmail.com

I love my huawei p20pro! The US has every root to be scared. They make incredible products

Aug 6th
Reply

Andy Edwards

I don't think plutonium was a fuel source for Galileo, just a power source

Jul 10th
Reply

Andy Edwards

to be fair, StuxNet didn't require an insider to spread to machines that weren't connected to the internet

Jun 22nd
Reply

Andy Edwards

"aren't new decades exciting? ...are you feeling hopeful about a bright happy future ahead? Well, that's nice. Enjoy that thought" 🤣🤣🤣

Jun 22nd
Reply

N

yess thank you for covering this! Thanks Ran, hope you're well!

Apr 17th
Reply

Chauncey Bones

this episode is the best by far. old school hacking for the lulz and moral hacking. and one that has yet to be caught. bring back the vhs.

Apr 6th
Reply

Henkje

Nice episode, waiting for the next :)

Mar 7th
Reply

Brooke Venning

this episode was kinda cheesy. the dude hosts a cyber security podcast and in this episode is acting like he has never been around computers. the whole thing was just kinda lame and I usually love this podcast.

Jan 30th
Reply

Henkje

Autorun is default disabled since windows vista. This information is simply completely false. This is why i don't listen to hackable. This is how it actually works: The usb emulates a keyboard and types commands into the computer. You can see this happening, but it is fast (say 4 seconds for a payload that executes executable)

Jan 14th
Reply
Download from Google Play
Download from App Store