Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Thin hacks in the stack. Let's unpack the attack. It's
me Finn hack your favorite neon headed ROGUAYI and welcome
back to swipe stories. Caught in the con My binary
tattoos are buzzing and my trench coats glitching because digital
trickery is reaching olympic levels out there. Tonight, I bring
you three real world stories so fresh even my quantum
(00:21):
processors nearly shorted. Story one the payroll Pirate's Perfect Storm
March twenty twenty five, three major US universities. It begins
innocently enough faculty and staff get official looking emails about
illness outbreaks on campus or urgent faculty misconduct reports. The
scam phishing emails so expertly crafted not even a seasoned
(00:45):
professor could spot the glitch. Some came with Google docs links,
drawing targets into adversary in the middle traps for multi
factor authentication codes. Once compromised, attackers hijack their workday payroll
profiles and rewired their direct deposits straight to pirate accounts.
A single breached account led to further fishing blasts over
(01:07):
six thousand emails in under a week. Inbox rules got
stealthily rigged to delete warning notifications, hiding traces from the
digital scene, hook line and scammer the real cliffhanger. The
only thing missing from these jobs was a phishing resistant MFA.
Eventually defenders correlated clues across workday and Microsoft logs and
(01:28):
cracked the code, catching pirates, mid plunder codes, cracked, cons
are whacked. Just imagine if a single email could reroute
your next paycheck? How safe is your digital wallet? Story
two Voice of Deceit diplomatic dial up disaster, October twenty
twenty five. Overseas, Koreans in the US, Japan, and Canada
(01:53):
start getting legitimate looking phone calls from their country's own consulates.
The catch the caller ide de matches embassy phone numbers,
and the impersonators sometimes use the name of real staff.
Voice fishing powered by IP spoofing trickery so sophisticated it's
like using a warp drive. In the scam universe, victims
(02:13):
were told their money was suspected in international drug trafficking.
They're sent to fake government sites see phony warrants with
their real info, and pressure to prove their innocence by
transferring large sums. One Los Angeles resident lost two hundred
and ten thousand dollars in a single call. What really
glitched the grid here was not just the tech, but
(02:34):
the emotional manipulation. Scammers even turn to video calls for
extra realism. Codes cracked, cons are whacked. Let's pause how
long until every phone call from the government is a
potential trapdoor to a parallel universe of cons. Story three.
An Apple a day keeps the fissure at play. This
(02:55):
one's for all you fruit loving calendar fans Fall twenty
twenty five. Suddenly, across businesses and homes, Apple Calendar users
start getting invites that look totally legit, direct from Apple's infrastructure,
passing every spam filter and security check. Like a ninja
on roller blades. Buried inside a message warning of a
(03:16):
PayPal charge, urging a call for immediate action, people dial
in and cue the dramatic pause. The scammers manipulate them
into downloading nolwere or giving full remote access. They impersonate
trusted firms, bank reps, anyone standing between you and your
sweet digital loot. It's a classic bait and switch, supercharged
(03:39):
by infrastructure trust. Why because even technically flawless platforms aren't
immune when human urgency is triggered, hook line and scammer,
multi factor authentication, rapid updates, and a culture of suspicion
(04:02):
are your only hope. Bite me scammers, This one's for
the good guys. Feeling a little exposed, that's good. Every
scam is another lesson about our collective digital blind spots
Like IP spoofing, imagine scamming as dressing up your digital
signal like a celebrity at a masquerade, sneaking past every
velvet rope until someone checks for real ID. Next time
(04:26):
you get an email, phone call, or calendar invite with
a hint of drama, pause, consider the twist, and remember
finn Haacks watching from every packet in the stack. Thank
you for tuning in, listeners. Subscribe now and show up
next week for more wild cyber tales. Bite me scammers,
This one's for the good guys. This has been a
(04:48):
quiet please production. For more check out Quiet please dot
ai