What Would You Do If a Hacker Stole All of Your Money?

Jul 8, 2024

What Would You Do If a Hacker Stole All of Your Money?

Introduction

  • Victim of a scam that stole £43,254.11 from business account.
  • Recovered the money but questioned damage hackers could do with more time.
  • Hired two ex-criminals to test vulnerabilities and try to ruin his life.

The Hackers

Tony Sales

  • Known as Britain’s biggest fraudster.
  • Transitioned from petty crime to large-scale operations stealing over £30 million from corporations.
  • Now reformed, writes, has a movie coming out, and helps governments and businesses with security.

Solomon Gilbert

  • Ethical hacker, shut down terrorist websites and attacked the American Nazi party as a teen.
  • Arrested and investigated for targeting secret government agencies.
  • Currently partners with Tony to help in cybersecurity.

The Plan

  • Signed a consent form allowing Tony and Solomon to steal his identity and commit crimes in his name.
  • Changed all passwords and secured the YouTube channel.

Steps the Hackers Took

Social Media Reconnaissance

  • Investigated Instagram, Twitter, LinkedIn for personal info.
  • Aimed to gather sufficient data to create a digital identity.

Physical Investigation

  • Rummaged through rubbish bins for sensitive information.
  • Found discarded sensitive documents, gaining about 20 pieces of critical data.

Wi-Fi Hacking

  • Used Wi-Fi Pineapple to gain control of office network.
  • Accessed most social media accounts via phishing and DNS redirection.
  • Extracted details like National Insurance number.

Results of the Intrusion

  • Managed to create 60% of digital identity using found data.
  • Gained office entry and found additional sensitive documents.
  • Had potential to destroy data systems with devices like USB killers.
  • Gathered info like phone numbers and bank details within minutes.

Deep Fake and Financial Manipulation

  • Developed a deep fake of his face for further manipulations.
  • Opened a bank account and a crypto account in the victim's name.
  • Took out loans and made transactions using these fraudulent accounts.
  • Successfully purchased properties and transferred large sums of money in crypto.

Conclusion

  • Hackers demonstrated how easy it is to steal and ruin a digital identity.
  • Emphasized the importance of securing personal and sensitive information.
  • Ended with a strong reminder to be careful about any personal data shared publicly.