meta_pixel
Tapesearch Logo
Log in
Darknet Diaries

148: Dubsnatch

Darknet Diaries

Jack Rhysider

True Crime, Technology

4.9 • 8.6K Ratings

🗓️ 6 August 2024

⏱️ 93 minutes

🧾️ Download transcript

Summary

Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.

Sponsors
Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.


Transcript

Click on a timestamp to play from that location

0:00.0

I was just reading up on these Beatles superfans called Apple Scruffs.

0:04.0

They weren't the crazy fans you see screaming their heads off trying to grab at the Beatles any chance they could.

0:09.0

No, the Apple scruffs thought that was lame.

0:12.0

They liked the Beatles so much that they dedicated years of

0:14.5

their life to trying to support the Beatles. They were like, look, the Beatles are

0:18.8

important. How do we make their lives better? So they spent tons of time figuring out the exact

0:24.1

location of where the Beatles would be every day and then go there to try to help.

0:27.6

Often holding back Beetlemania crowds or offering flowers or food or to run errands. And over time they would get to know the Beatles.

0:35.2

There are some stories of them even sneaking into places to act as staff in order to help them even more.

0:40.8

George Harrison would later write a song called Apple Scruffs where he said he loves them.

0:46.0

I'm astonished to see what incredible lengths that some music fans go to.

0:51.0

They'll cross continents just for a fleeting moment with their idols or endure relentless

0:55.6

weather or camp out for days showing a level of devotion that defies logic. The risks and sacrifices that some fans make is truly remarkable.

1:07.0

These are true stories from the dark side of the internet.

1:15.0

I'm Jack Recyder.

1:20.0

This is Darknet Diaries. This episode is brought to you by Veronis. So many security incidents are caused by

1:43.7

attackers finding and exploiting excessive permissions. All it takes is one exposed

1:48.2

folder, bucket or API to cause a data breach crisis. The average organization has tens of millions of unique permissions and sharing links.

1:58.0

Even if you could visualize your cloud data exposure,

2:01.0

it would take an army of admins years to right-sized privileges. With how quickly

2:05.4

data is created and shared, it's like painting the Golden Gate Bridge. That's why Veronis built

2:10.8

least privilege automation. Veronus continuously eliminates data exposure while you sleep by making

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Jack Rhysider, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Jack Rhysider and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.