Coconote
AI notes
AI voice & video notes
Export note
Try for free
What Would You Do If a Hacker Stole All of Your Money?
Jul 8, 2024
What Would You Do If a Hacker Stole All of Your Money?
Introduction
Victim of a scam that stole £43,254.11 from business account.
Recovered the money but questioned damage hackers could do with more time.
Hired two ex-criminals to test vulnerabilities and try to ruin his life.
The Hackers
Tony Sales
Known as Britain’s biggest fraudster.
Transitioned from petty crime to large-scale operations stealing over £30 million from corporations.
Now reformed, writes, has a movie coming out, and helps governments and businesses with security.
Solomon Gilbert
Ethical hacker, shut down terrorist websites and attacked the American Nazi party as a teen.
Arrested and investigated for targeting secret government agencies.
Currently partners with Tony to help in cybersecurity.
The Plan
Signed a consent form allowing Tony and Solomon to steal his identity and commit crimes in his name.
Changed all passwords and secured the YouTube channel.
Steps the Hackers Took
Social Media Reconnaissance
Investigated Instagram, Twitter, LinkedIn for personal info.
Aimed to gather sufficient data to create a digital identity.
Physical Investigation
Rummaged through rubbish bins for sensitive information.
Found discarded sensitive documents, gaining about 20 pieces of critical data.
Wi-Fi Hacking
Used Wi-Fi Pineapple to gain control of office network.
Accessed most social media accounts via phishing and DNS redirection.
Extracted details like National Insurance number.
Results of the Intrusion
Managed to create 60% of digital identity using found data.
Gained office entry and found additional sensitive documents.
Had potential to destroy data systems with devices like USB killers.
Gathered info like phone numbers and bank details within minutes.
Deep Fake and Financial Manipulation
Developed a deep fake of his face for further manipulations.
Opened a bank account and a crypto account in the victim's name.
Took out loans and made transactions using these fraudulent accounts.
Successfully purchased properties and transferred large sums of money in crypto.
Conclusion
Hackers demonstrated how easy it is to steal and ruin a digital identity.
Emphasized the importance of securing personal and sensitive information.
Ended with a strong reminder to be careful about any personal data shared publicly.
📄
Full transcript