Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Thin. Hack's in a stack. Let's unpack the attack. Welcome
to Swipe Stories, Cotton the con your weekly ride down
the neon lit cyber alleyways where scammers lurk in every shadow,
and trust is just a misconfigured server away. I'm Finn Hack,
your digital detective with binary tattoos in a glitchy trench coat,
spinning three true tales that'll keep your SIM card sweating
(00:22):
and your password manager close. Let's check into story one.
Executive impersonation, or as I call it, CEO fraud the
money mirage. Imagine this, You're working late, caffeine level's critical,
and you see an email from your CEO transfer three
hundred and fifty thousand dollars now confidential acquisition. Don't tell anyone.
(00:45):
The address looks right, the signature's flawless. That's the art
of spearfishing, the ultimate con rodeo. According to keep met
Labs twenty twenty five cyber report. In March, an international
sporting goods brand's finance team wired hundreds of thousands to
fake vendors, all based on slick personalized emails. Attackers scored LinkedIn,
(01:05):
mimicked real projects, and spun up lookalike domains. This isn't
casting a net, This is laser guided extortion. They rely
on trust, tempo, and terror. It's like IP spoofing. You
think the packet's from trusted source, but inside it's a
masquerading marauder, hook line and scammer, the real kicker. All
(01:26):
it took was a single click and one urgent wire transfer.
By the time anyone noticed, the zeros were already surfing
crypto wallets across three continents. Suspenseful Right next time the
boss needs cash after hours, verify via a phone call.
Don't let the con ride your workflow. Codes cracked, cons
(01:46):
are whacked, sweeping into story two. The waiting package trap.
Students across colleges reported a surgeon your package is waiting
texts just as campus has reopened as flagg the ftc
this summer. The message click for tracking info and claim
your delivery innocent enough till that link snags your student ID,
(02:08):
log in, or even social security number. In one case
that would viral on X, an undergrad lost access to
their university email, and from there scammers launched new phishing
campaigns posing as them. Each tap on the link, not
just the door opened, but your digital house keys handed over.
Here's where Finn's geeky heart glows. These scams ride on
(02:30):
SMS smission blasting devices because students defenses are down after
a long summer. It's like an open port with zero firewall.
You don't see the breach until your data is tumbling,
like loose change in a laundromat cliffhanger. How many others
use the same password for their bank app more than
you'd expect. Bite me, scammers, This one's for the good guys.
(02:51):
If you get a mystery packaged text, check the sender,
never use their link, and report it direct to the
FTC and rolling. In story three, the fake voicemail break.
In last week, a voicemail alert swept small businesses new
message click to listen, perfect formatting, urgent, even borroled corporate logos.
(03:13):
But that's sleek alert, a spoofed email built to sidestep
your human firewall. A Massachusetts tech firm got hit, says
Ekorus security team. And if not for DMARC protection, that's
domain based message authentication. Even staff in the know could
have been tricked. See email spoofing is like a hacker
in a fin hacked disguise slipping past your defenses, imitating
(03:36):
authority and serving up malware or credential theft with a
side of panic. But here's your fin tip. D Mark
tells your inbox what's real and what's glitched. Bouncing bogus
messages before they can burrow in codes cracked, cons are whacked.
These schemes racked up billions in losses per the FBI's
twenty twenty four numbers, leaving businesses scrabbling to recover and
(04:00):
trust eroded. So listeners, what's the lesson after our three
acts of cyber trickery. Adopt, adapt, audit, check your channels,
question urgency, and stay suspicious of anything just a shade off.
Remember the best firewall is you, your instinct, your slow
down moment you're out of band verification. Next time you
(04:22):
get that too good to be true message, imagine me
thin neon locks, blazing trench coat, flickering, whispering, hook line
and scammer. Not today. Thanks for tuning in to swipe
stories caught in the con Come back next week for
more tales where trust gets tested and only the wired survive.
(04:42):
Be sure to subscribe, share with your crew, and keep
your passwords strange and your click fingers cautious. This has
been a quiet please production. For more check out quiet
Please dot Ai bite me, scammers. This one's for the
good guys.