Malicious Life

Malicious Life

malicious.life
Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Dig into a history you never knew existed.


Conficker
Jul 18 • 40 min
Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure.
Operation SoftCell
Jul 4 • 34 min
A rare, inside look, at how Cybereason’s researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world.
‘Pa Bell’ Vs. Youth International Party Line
Jun 13 • 40 min
The YIPL phreaking magazine was the spiritual predecessor to the better-known ‘2600’ zine, and it was founded by a ideological party determined to bring down the largest monopoly in US history: Bell Telephone.
The U.S vs. Gary McKinnon
May 27 • 39 min
After the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a message aim at NASA - from the two most powerful hackers…
The WANK Worm, Part 2
May 10 • 39 min
After the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a message aim at NASA - from the two most powerful hackers…
The WANK Worm, Part 1
Apr 25 • 34 min
On October 16th, 1989, NASA’s scientists went into work preparing to launch a spacecraft that very day. But when they sat down to their computers, they were met with an unexpected greeting: “Your system has been officially WANKed. You talk of times of…
The Equifax Data Breach Pt. II: The Bits Hit The Fan
Apr 11 • 31 min
After its momentous breach, Equifax’s CEO Richard Smith said: “Equifax will not be defined by this incident, but rather by how we respond.” Well, he was spot on, but not in a good way.
The Equifax Data Breach Pt. I: A Big Data Bubble
Mar 27 • 3 min
In their 120 year history, Equifax never sold anything, or provided any service to ordinary folks - except collect DATA. In 2017, that huge data repository, a 1000 times larger then the Library of Congress, got hacked.
DeCSS: Hackers Vs Hollywood
Mar 13 • 44 min
Twenty years ago, a 15-years old Norwegian kid was put on trial for breaking the DVD Copy Prevention system. His case spawned a whole new “artistic” movement…
Marconi & The Maskelyne Affair
Feb 21 • 42 min
Guglielmo Marconi—the beloved, hated, disputed inventor of radio—gets trolled by a mustached magician in the world’s first ever, wireless, grey hat hack.
The Fall Of Mt. Gox – Part 2
Feb 6 • 46 min
In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside.
The Location Data Brokers – A CYBER Podcast Special
Jan 24 • 45 min
CYBER is a new podcast from Motherboard, a very well known and respected technology blog and online magazine. The episode you’ll hear shortly is about the shady market of data aggregators and brokers who sell smartphone location data to bounty hunters,…
The Fall Of Mt. Gox – Part 1
Jan 22 • 49 min
In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside.
Black Duck Eggs: Darknet Diaries
Jan 8 • 31 min
This week we’re doing an episode swap with the excellent podcast Darknet Diaries. A former NSA agent who has gone off to be a security consultant, tells a story about an assignment that he’ll never forget…
Dave Kennedy: The Psychological Principles of Social Engineering
Dec 25, 2018 • 37 min
Today on Malicious Life, tens of thousands of people get robbed. Then a community gets together to ask: should we take our money back, or let the hacker walk with it?
The Ethereum DAO Hack
Dec 13, 2018 • 39 min
Today on Malicious Life, tens of thousands of people get robbed. Then a community gets together to ask: should we take our money back, or let the hacker walk with it?
The Jerusalem Virus, Part 2
Nov 26, 2018 • 28 min
How did the Jerusalem virus trigger the birth of the entire Anti Virus industry in Israel? A high-stakes wager on Live TV, and more.
The Jerusalem Virus, Part 1
Nov 15, 2018 • 24 min
Although scary, the Jerusalem virus, discovered in Israel in 1987, was in fact a rather simple virus. How, then, did the virus trigger the birth of an entire national industry?
Gene Spafford on the Morris Worm & Cyber-security in the 1980’s
Oct 31, 2018 • 55 min
Eugene Spafford (aka Spaf), a professor of computer science at Purdue University, was the first researcher to publish a detailed analysis of the infamous Morris Worm. Gene talks to Ran about this incident, as well as how was security different in the…
China Vs. Github
Oct 16, 2018 • 41 min
It’s a weapon that harnessed the strength of millions of computers at once: a cannon so powerful it could break through any wall, take down any website. It is “the Great Cannon”.
The Ashley Madison Hack, Part 2
Oct 4, 2018 • 32 min
On the second installment of our Ashely Madison hack retelling, we look at the fallout of one of the hack, and the people who’ve suffered from it.
The Ashley Madison Hack, Part 1
Sep 19, 2018 • 29 min
When Ashley Madison got hacked, it made international headlines. Why? Because it wasn’t just a major event. It demonstrated how there’s information even more sensitive, even more significant than your credit card, or your social security number: your…
Interview Special: Graham Cluley
Sep 5, 2018 • 53 min
As we prepare to release an awesome 2-part story in two weeks, we decided to give you a chance to go back to some old favorites and check out some of the behind-the-scenes interviews of Malicious Life. Graham Cluley tells about his entry into the world of…
The Target Hack
Aug 23, 2018 • 33 min
If movies have taught me anything, it’s that if you want to rob a bank, you dress as the cleaning crew. The people behind the Target hack must have seen one action film too many, because when they decided to hack one of the biggest retailers in the world,…
WoW: Corrupted Blood
Jul 25, 2018 • 26 min
How does the outbreak of a “plague” inside a video game- a bug, essentially- affect real-life disease research?
The Stuxnet Virus Pt. 3
Jul 12, 2018 • 30 min
Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern cyber war, and look further into the topic of…
The Stuxnet Virus Pt. 2
Jul 12, 2018 • 27 min
Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way to its destination. An invisible commando unit, dropped…
The Stuxnet Virus Pt. 1
Jul 12, 2018 • 33 min
Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed Stuxnet, this malicious piece of code has a single…
Shamoon – The Biggest Hack In History
Jun 29, 2018 • 26 min
The Shammon Virus. There is a single company, run by a royal family, which employs the majority of the Saudi working population. It’s worth more than Apple, Google, and Amazon…by a lot. The Saudi Aramco oil company is one of the most significant…
The Melissa Virus
Jun 14, 2018 • 21 min
Not all malware is created equal. Some malware will attempt to erase your files, demand ransom, or steal your information. Others will do no such thing- and still end up being worse. Don’t believe us? What if a virus made your computer send pornography to…
GhostNet
May 30, 2018 • 28 min
A young woman is arrested by the Chinese government while trying to cross the border to Tibet. Her interrogator, a Chinese spy, pulls out a dossier full of information regarding her activity online. It turns out she’s been visiting pro-Tibet websites, and…
The Morris Worm Pt. 2
May 16, 2018 • 22 min
In an attempt to halt the Morris worm’s path of destruction, a systems administrator at Harvard shut down the university router through which Andy Sudduth’s message would be sent to the internet. The post didn’t go through until after it was too late. In…
The Morris Worm Pt. 1
May 2, 2018 • 26 min
We’ve introduced you to some of the seminal malware attacks that have shaped cybersecurity history. Perhaps no other incident in history, though, has had the effect on how we think about computer security today as the Morris worm.
The Half Life 2 Hack
Apr 18, 2018 • 38 min
How far should a die-hard fan go, in order to bring closer to them the thing that they love? In one of the most interesting, yet relatively unknown cybersecurity stories, a young hacker attempts to steal his favorite game prior to its release and then…
The Legalities of the Cyber War
Apr 4, 2018 • 22 min
Catching a criminal is by no means easy, but there’s something we take for granted in any crime: that the criminal has a face and a name, that they used a specific weapon on a specific target, and that the crime had ended once it was complete. But what…
Fancy Bear, Cozy Bear
Mar 21, 2018 • 30 min
When representatives from the Democratic National Committee reached out to a silicon valley cybersecurity company, to investigate a potential breach in their computer system, it’s hard to imagine what they might have expected to come of it. It didn’t take…
Hack Back
Mar 7, 2018 • 33 min
Those who have experienced a cybercrime know the feelings of frustration and helplessness that come along with it. A hacker could be halfway across the world when they attack you, and you might have no way of figuring out who it was or catching them even…
Cyber Terrorism
Feb 21, 2018 • 31 min
What governments and powerful organizations regularly use, others will find ways to use as well. Cyber activity fits so incredibly well with terrorism. Actors can remain hidden, or reveal themselves to the world; Create propaganda campaign, or aim for…
Super Spies
Feb 7, 2018 • 34 min
The NSA has many means at its disposal. But how does it use these means, and for what goals? Discover the (literally) secret history of the NSA’s cyber activity. Travel with us to Russia and back, learn the origins of FISA, and find out more about the…
The Trojan Horse Affair
Jan 24, 2018 • 22 min
The early 2000s were an interesting time in Information Security. This is roughly the period when malware transitioned from viruses written by teenagers for fun, to cybercrime tools in the hands of sophisticated criminals. This week’s story took place in…
Friend or Foe
Jan 10, 2018 • 36 min
The largest hack in U.S military history may have been conducted by… The NSA. In 1997, a wargame conducted by the NSA showed just how unprepared we were for a potential cybernetic strike- in 4 days, NSA hackers were able to take down entire military…
Amit Serper Interview- Holiday Special Episode
Dec 27, 2017 • 39 min
It’s the holidays and everyone’s on vacation – but the Internet never rests and neither do the bad guys in cybersecurity. So, for this holiday special, we figured we’ll air an interesting interview we did a few weeks back with Amit Serper, Principal…
Deception
Dec 13, 2017 • 29 min
From the Bulgarian hacker scene of the 90’s, featured in episodes 1 and 2, we now move to the vibrant underground hacker scene of West and East Berlin. Working secretly for the KGB, a young Berliner hacker attempts to hack the U.S military network, only…
Weapons of Mass Disruption
Nov 29, 2017 • 41 min
The threat of fire and fury stands at the center of all modern conflicts- nuclear bombs that can eradicate life in seconds are the ultimate weapon of war, as they pose a huge threat to centers of population. But what of the cyber war? What threat could it…
The Soldiers of North Korea
Nov 15, 2017 • 33 min
Guerrilla warfare has been around for as long as conventional warfare has. The idea that a small force, through cunning and brazen action, could overtake a larger force is an old one. From pirates who would take merchant ships by surprise, to lengthy…
The Propaganda
Nov 1, 2017 • 39 min
Governments around the world have been making devious use of the internet as a platform to spread, not malware, but propaganda. As in all wars, propaganda is a huge part of the modern cyber war. Join us as we explore the roots, and the most creative uses…
The Whistleblowers
Oct 17, 2017 • 6 min
WikiLeaks has ushered in a new age in whistle blowing: Modern leakers such as Chelsea Manning – who’s story is the focus of our current episode – expose huge amounts of confidential information. But can these mega-leaks really influence the actions and…
Stuxnet, part 3
Oct 2, 2017 • 29 min
Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern cyber war, and look further into the topic of…
Stuxnet, part 2
Sep 18, 2017 • 27 min
Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way to its destination. An invisible commando unit, dropped…
Stuxnet, part 1
Aug 30, 2017 • 33 min
Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed Stuxnet, this malicious piece of code has a single…
Hell to Pay
Aug 21, 2017 • 37 min
A global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but with the escape of the man himself. Security experts who operate within the gray areas of morality develop botnets that destroy personal…
The Roots of Evil
Aug 7, 2017 • 30 min
WannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines – but only a few people remember a similar attack, named The AIDS Trojan, almost 30 years earlier… In this episode of Malicious Life, we go deep into the…
Big Cannons
Jul 24, 2017 • 44 min
2016 is known throughout the circles of information security as “The Year of The DDoS Attacks”, and rightfully so: 5 large scale DDoS attacks – ‘Distributed Denial Of Service’ – shocked the technology world. In this episode of Malicious Life, we examine…
Spam Empire
Jul 6, 2017 • 31 min
In this episode of Malicious Life, we take a look at one of the oldest forms of criminal activity on the web- the spam empires of the 90’s and 2000’s. Find out how these multi-million dollar industries operated, how they served as a half step towards the…
The Dark Avenger
Jun 30, 2017 • 30 min
In 1989, a message was found in a virus: “Eddie Lives…Somewhere in Time!”. ‘Eddie’ was a particularly nasty virus, and its discovery led a young Bulgarian security researcher down a rabbit hole, on a hunt for the prolific creator of the Eddie virus: The…
Ghost In The Machine
Jun 28, 2017 • 26 min
Cybercrime is one of the most notable threats we face as computer users, nowadays. But it wasn’t always so. Those of us who’ve been in the field long enough may remember a time when computer viruses were much more innocent, and virus authors were usually…