Cyber94

Mohammed Sarker

Cyber94 delivers daily cybersecurity news, major hack breakdowns, and real stories from past cyberattacks. Our mission is to raise cyber awareness and educate the public with easy-to-understand insights that help keep everyday people safe from scams, breaches, and online threats. Stay informed. Stay protected. Cyber94.

  1. 27 MAR

    Crypto Nightmare The 2.2 Billion Dollar Heist Chronicles

    The Digital Wild West Has Never Been More Dangerous Welcome to the dark side of cryptocurrency, where billion-dollar heists happen with the click of a button and entire financial ecosystems can vanish overnight. This podcast exposes the most devastating cyber attacks in crypto history, revealing how hackers have stolen over 2.2 billion dollars in 2024 alone. What You'll Discover Join Ben and Chloe as they unpack the most shocking cryptocurrency thefts of our time, from the record-breaking 1.5 billion dollar Bybit hack to the bizarre case of a hacker who stole 611 million dollars just for fun, then gave it all back. These aren't your typical cybercrime stories these are digital bank heists that make Ocean's Eleven look like pocket change. The Players Behind the Chaos Learn about the shadowy figures orchestrating these attacks, including North Korea's state-sponsored Lazarus Group, which has turned cryptocurrency theft into a weapon of economic warfare. Discover how lone wolf hackers exploit tiny flaws in smart contracts to create millions of coins out of thin air, and why some of the most secure cold storage wallets aren't as safe as everyone thought. Real Stories Real Consequences From the original Mt. Gox disaster that lost 6 percent of all Bitcoin in existence to the FTX collapse where hundreds of millions disappeared on bankruptcy day, these stories reveal the human cost behind the headlines. Every hack represents real people losing life savings, retirement funds, and financial security in an instant. Why This Matters Now As cryptocurrency becomes mainstream and governments consider digital currencies, understanding these vulnerabilities isn't just fascinating it's essential. Cross-chain bridges, hot wallets, flash loan attacks, and rug pulls these technical vulnerabilities affect anyone considering entering the crypto space. The Future of Digital Money This podcast raises critical questions about the future of decentralized finance. Can blockchain technology ever be truly secure when state-sponsored hackers and sophisticated criminals are constantly evolving their methods? Is the promise of financial freedom worth the risk of catastrophic loss? Perfect For Whether you're a crypto enthusiast, cybersecurity professional, or simply curious about the darker side of digital innovation, this podcast delivers compelling storytelling about the biggest financial crimes of the digital age. No technical background required just bring your curiosity about how quickly fortunes can disappear in the digital realm. A Wake-Up Call These aren't distant news stories they're warnings about the risks we all face as money becomes increasingly digital. Every vulnerability exposed, every billion stolen, and every security failure teaches us something crucial about the intersection of technology, crime, and human nature. Prepare to question everything you thought you knew about digital security in this gripping exploration of cryptocurrency's most devastating disasters.

    5 min
  2. 27 MAR

    ELECQ Ransomware Attack Exposes Critical Vulnerabilities in Smart EV Charging Infrastructure

    What Happened ELECQ, a leading manufacturer of smart electric vehicle chargers, recently fell victim to a sophisticated ransomware attack that compromised thousands of customer records. On March 7th, cybercriminals successfully infiltrated the company's AWS cloud platform, encrypting systems and stealing sensitive customer data including names, email addresses, phone numbers, and home addresses. The Real Impact While the physical EV charging devices themselves remained secure and operational, the breach exposed a more insidious threat. The stolen personal information creates a perfect foundation for advanced social engineering attacks, where scammers can impersonate ELECQ support staff with convincing authenticity, using real customer details to build trust before launching sophisticated fraud schemes. Modern Ransomware Tactics This incident showcases the evolution of ransomware from simple file encryption to double extortion schemes. Attackers not only encrypted ELECQ's systems but also copied customer data, creating dual leverage for ransom demands and threatening to publicly release private information if payment isn't made. Company Response ELECQ responded swiftly by taking affected servers offline, restoring systems from backups, and engaging third party cybersecurity experts for forensic investigation. The company has reported the breach to data protection authorities in both the UK and Germany, indicating significant European customer impact and potential GDPR compliance implications. Broader Implications This attack highlights the hidden vulnerabilities of our increasingly connected world. While smart EV chargers offer convenient remote monitoring and control, they require cloud connectivity that creates new attack surfaces for cybercriminals. The incident serves as a cautionary tale for the entire Internet of Things ecosystem. What This Means for Consumers As more household devices become smart and connected, from vehicles to coffee makers, consumers face an invisible trade off between convenience and privacy. Each connected device potentially stores personal data on remote servers, creating additional targets for cybercriminals seeking valuable information for identity theft and social engineering attacks. Key Takeaways Customers affected by this breach should remain vigilant for phishing attempts, reset passwords on related accounts, and be especially suspicious of unsolicited contact claiming to be from ELECQ or related services. The incident underscores the importance of understanding what personal data companies collect and how they protect it. Discussion Points This episode explores critical questions about data privacy in the smart device era, examining the security expectations consumers should have when choosing connected products and the responsibility companies bear for protecting customer information in an increasingly hostile cyber environment.

    4 min
  3. 26 MAR

    The Equifax Breach A Cybersecurity Nightmare That Exposed 143 Million Americans

    The Perfect Storm of Security FailuresIn 2017, one of the most devastating data breaches in history unfolded at Equifax, exposing the personal information of 143 million Americans. This cybersecurity nightmare wasn't the work of a mastermind hacker, but rather the result of a catastrophic series of preventable failures that created the perfect storm for disaster.What Went WrongBen and Chloe take you through the shocking timeline of events that led to this massive breach. From an unpatched Apache Struts vulnerability to expired security certificates that went unnoticed for 10 months, every layer of protection failed simultaneously. Discover how attackers found passwords stored in plain text and moved freely through unsegmented networks, stealing terabytes of data for 76 days without detection.The Chilling Truth Behind the AttackWhile the world braced for an identity theft apocalypse, something unexpected happened. The stolen data never appeared on dark web markets. Years later, the truth emerged when the US Department of Justice charged four members of the Chinese military with the attack. This wasn't about financial fraud but something far more sinister.State Sponsored EspionageLearn how this breach was part of a massive intelligence operation to build a comprehensive database on millions of Americans. The goal wasn't quick profit but long term espionage, targeting government officials and intelligence operatives for potential blackmail and coercion. Your financial data became a weapon in the hands of a foreign government.The Aftermath and Lessons LearnedExplore the bungled corporate response, including confusing websites and misdirected social media posts that made the crisis worse. Discover how Equifax spent over 1.4 billion dollars on cleanup while victims received little meaningful compensation despite promises of settlement payments.Critical Security LessonsThis episode breaks down the fundamental cybersecurity principles that could have prevented this nightmare. From proper patch management to network segmentation and certificate renewal, learn why getting the basics right is more important than expensive security tools that are poorly managed.A National Security Wake Up CallThis breach transformed from a corporate security failure into a national security crisis, highlighting how our most trusted institutions can become vulnerabilities in the digital age. The implications extend far beyond stolen credit card numbers to the very foundations of national security and personal privacy.Join Ben and Chloe as they dissect this cybersecurity horror story and explore the question that haunts us all when a breach serves espionage rather than profit, does that make it more or less dangerous for ordinary citizens whose data was stolen.

    9 min
  4. 26 MAR

    Iran Linked Ransomware Groups Target US Healthcare in New Cyber Warfare Strategy

    Episode OverviewJoin cybersecurity experts Ben and Chloe as they dive deep into a disturbing new development in cyber warfare. This episode examines a recent Iran-linked ransomware attack on a US healthcare provider that signals a dangerous shift from profit-driven cybercrime to pure destruction tactics.What We DiscussThe Pay2Key ransomware group's unusual attack pattern that encrypted systems without stealing data, marking a departure from traditional extortion models. We explore how this represents a fundamental change in cyber threat methodology, moving from financial motivation to strategic disruption of critical infrastructure.Key Topics CoveredThe geopolitical context surrounding increased cyber attacks during heightened tensions between the US, Israel, and Iran. We analyze how threat groups are strategically targeting healthcare systems to create maximum societal impact and erode public trust in critical services.Attribution ChallengesThe complex web of attribution in modern cyber warfare, including how ransomware-as-a-service models on Russian underground forums provide plausible deniability for state sponsors while achieving strategic objectives.Healthcare Under SiegeWhy healthcare systems have become prime targets for state-linked cyber groups and the implications of attacks designed for destruction rather than profit. We examine recent incidents involving groups like Handala and their impact on medical technology companies.Strategic ImplicationsThe evolution from cybercrime to cyber warfare and what this means for defenders who must now prepare for attackers whose goal is chaos rather than money. We discuss the paradigm shift facing both government and private sector cybersecurity strategies.Critical QuestionsHow should organizations adapt their defense strategies when facing adversaries motivated by geopolitical goals rather than financial gain. What new approaches are needed to protect critical infrastructure from attacks designed to cause maximum disruption.This episode provides essential insights for cybersecurity professionals, healthcare administrators, and anyone concerned about the intersection of geopolitics and cyber threats in our increasingly connected world.

    5 min
  5. 25 MAR

    Colonial Pipeline Ransomware Attack How Hackers Accidentally Shut Down Americas Fuel Supply

    The Nightmare That Made Cybersecurity Real When a single stolen password brought America's energy infrastructure to its knees, millions of people discovered that cyber threats aren't just IT problems anymore. Join Ben and Chloe as they unpack one of the most devastating ransomware attacks in US history, where criminal incompetence created a national crisis. The Attack That Changed Everything In May 2021, the Colonial Pipeline, carrying 2.5 million barrels of fuel daily and supplying 45% of the East Coast's energy needs, went completely offline. Not due to mechanical failure or natural disaster, but because cybercriminals had infiltrated their networks and were holding the entire system hostage. When Criminals Say Sorry What makes this story truly surreal is what happened next. The DarkSide ransomware gang, responsible for shutting down critical American infrastructure, issued a public apology claiming they never meant to cause such widespread problems. They were just trying to make money, they said, not create a national emergency. The Business of Digital Destruction Discover how modern cybercrime operates like a twisted franchise system, with DarkSide running a "Ransomware as a Service" business model. They create the malicious software and lease it to affiliate criminals, taking a cut of every successful attack while maintaining the disturbing pretense of corporate ethics. A Simple Password, A National Crisis The most terrifying aspect might be how easily it all started. Security experts believe the attack likely began with nothing more sophisticated than a stolen password for remote desktop software, purchased from underground data brokers. One compromised home office login potentially unlocked chaos affecting millions of Americans. The Perfect Storm This podcast explores how the pandemic's shift to remote work, the rise of franchised cybercrime, and America's dependence on interconnected infrastructure created the perfect conditions for this nightmare scenario. When digital threats became physical reality, empty gas stations and grounded flights drove home a chilling truth about our vulnerable modern world. Questions That Keep Security Experts Awake As our critical infrastructure becomes increasingly connected, from power grids to water supplies, Ben and Chloe examine whether it's even possible to make these systems completely secure. Or is this the new reality we must learn to navigate in our hyperconnected age? This episode reveals how a criminal gang's "accident" became a brutal wake-up call about the fragility of the systems we depend on every day.

    6 min
  6. 25 MAR

    Poland Under Siege How Russian Hackers Launched an Unprecedented Attack on Critical Infrastructure

    The Digital Battlefield In December 2025, Poland experienced what cybersecurity experts are calling an unprecedented cyberattack on its energy infrastructure. This episode explores how Russian-linked threat actors launched a coordinated assault on critical systems, marking a dangerous escalation in digital warfare against NATO members. Attack Details On December 29th, cybercriminals simultaneously targeted a major power plant supplying heat to nearly half a million customers, along with multiple wind and solar farms across the country. While electricity supply remained stable, the attack employed destructive data-wiping malware designed purely for sabotage rather than financial gain. The Numbers Behind the Threat Poland faced 270,000 cyberattacks in 2025 alone, representing a staggering 250% increase from the previous year. Government officials describe this as waging a literal war in cyberspace, with incidents rising dramatically year after year. Digital Detective Work Cybersecurity investigators traced the attack to sophisticated Russian threat actors, with evidence pointing to either the FSB-linked Dragonfly group or the GRU-affiliated Sandworm organization. Both groups have extensive histories of state-sponsored cyber operations, particularly targeting Ukrainian infrastructure. Unprecedented Escalation Polish Computer Emergency Response Team officials confirmed this was the first destructive cyberattack on energy sector infrastructure among NATO or EU countries. Unlike typical ransomware attacks motivated by financial gain, this assault aimed purely at destruction and chaos. Geopolitical Implications The timing and target selection reveal clear strategic intent. Poland serves as a crucial logistical hub for Western aid to Ukraine and represents a key NATO ally. This attack demonstrates how cyber warfare has become an integral component of hybrid conflict strategies. What This Means for National Security The attack raises critical questions about infrastructure vulnerability in an increasingly connected world. Had the assault targeted larger energy units, it could have destabilized Poland's entire electrical grid, potentially causing widespread blackouts. Global Response The severity of the incident prompted Polish authorities to issue a public technical report, appealing to the international cybersecurity community for assistance in understanding the full scope of the attack. This episode examines how modern warfare extends far beyond traditional battlefields into the digital systems that power our daily lives, and what this means for national security in the 21st century.

    5 min
  7. 24 MAR

    Cisco Firewall Zero Day Exploited by Russian Ransomware Gang for 36 Days Before Discovery

    The Story A critical vulnerability in Cisco's Secure Firewall Management Center became the gateway for one of the most sophisticated ransomware campaigns of 2026. For over a month, the Interlock cybercriminal group silently exploited this zero-day flaw, gaining complete control over enterprise networks before anyone knew the vulnerability existed. What Happened CVE-2026-20131 allowed unauthenticated attackers to execute arbitrary code with root privileges on Cisco firewall management systems. The vulnerability was discovered in March 2026, but Amazon's threat intelligence team revealed that Interlock had been exploiting it since January 26th. This gave the attackers 36 days of invisible access to critical infrastructure networks. The Discovery The attack was uncovered through an operational security failure by the attackers themselves. Amazon researchers stumbled upon a misconfigured infrastructure server that contained the complete blueprint of Interlock's operation, including custom hacking tools, reconnaissance scripts, and attack methodologies. The Threat Actors Analysis of timestamps and metadata revealed that Interlock operates like a professional organization with regular business hours. Their activity patterns suggested a UTC+3 timezone operation, likely based in Russia, with peak operational hours between noon and 6 PM. Targets and Impact Interlock specifically targeted sectors where operational disruption creates maximum pressure for ransom payments. Educational institutions represented their largest target group, followed by engineering firms, healthcare providers, manufacturing organizations, and government agencies. Technical Details The vulnerability affected the web-based management interface of Cisco's Secure Firewall Management Center software. It stemmed from insecure deserialization of user-supplied Java byte streams, allowing remote code execution without authentication. Lessons Learned This incident highlights the fundamental challenge in cybersecurity where trusted security devices themselves become attack vectors. It demonstrates how sophisticated threat actors can operate undetected for extended periods and the critical importance of defense-in-depth strategies. Why This Matters When the very systems designed to protect our networks become compromised, it forces a reevaluation of our entire security approach. This case study serves as a stark reminder that even the most trusted security vendors can harbor critical vulnerabilities that sophisticated adversaries will find and exploit.

    5 min
  8. 24 MAR

    The Billion Dollar Digital Heist That Shook the Crypto World

    The Crime of the Century February 21, 2025 marked the darkest day in cryptocurrency history when hackers executed the largest digital theft ever recorded. In a single devastating attack, North Korean cybercriminals stole $1.5 billion from Bybit, the world's second-largest cryptocurrency exchange, using methods so sophisticated they redefined the meaning of digital warfare. How It Happened This wasn't your typical smash-and-grab cyber attack. The hackers didn't target Bybit directly. Instead, they orchestrated an elaborate supply chain compromise that would make even the most seasoned cybersecurity experts shudder. Through social engineering, they infiltrated Safe Wallet, a trusted third-party platform Bybit used for transaction approvals. What followed was a masterclass in digital deception. The attackers patiently waited inside the compromised system, then deployed malicious code that created a perfect digital illusion. When Bybit employees attempted a routine transfer from their cold wallet to warm wallet storage, they saw exactly what they expected to see on their screens. But beneath the surface, invisible malicious code redirected $1.5 billion worth of Ethereum to wallets controlled by North Korean operatives. The Perpetrators The FBI later attributed this attack to TraderTraitor, a sophisticated unit within North Korea's infamous Lazarus Group. This wasn't just cybercrime for personal gain. According to UN and US government reports, these massive cryptocurrency heists serve as a primary source of foreign currency for the North Korean regime, directly funding their weapons programs and making this attack a matter of global security. The Aftermath As news broke, panic swept through the crypto community. Bybit faced over 350,000 withdrawal requests as customers rushed to protect their funds. CEO Ben Zhou's emergency promise to make all customers whole, even if it meant covering the entire $1.5 billion loss, likely saved the company from total collapse. Meanwhile, the hackers launched an incredibly sophisticated money laundering operation. They converted the stolen Ethereum to Bitcoin for greater anonymity, used cryptocurrency mixers to scramble transaction trails, and employed a tactic called flooding the zone, executing tens of thousands of tiny transactions to overwhelm blockchain analysts trying to trace the money. The Global Chase What followed was a high-stakes international pursuit involving cryptocurrency exchanges, cybersecurity firms, and law enforcement agencies racing against time to freeze the stolen funds before they disappeared forever into the digital underground. The hackers used organized crime syndicates for money laundering as a service, creating a complex web spanning multiple countries and jurisdictions. Lessons Learned This heist exposed a terrifying truth about our increasingly digital financial world. Even with perfect internal security, organizations remain vulnerable through their trusted third-party partnerships. The attack forced a fundamental rethinking of transaction verification methods and highlighted the urgent need for new security protocols in the cryptocurrency industry. Join cybersecurity experts Ben and Chloe as they unpack this digital nightmare, revealing how a single click unleashed chaos across the global financial system and forever changed how we think about digital security.

    5 min

About

Cyber94 delivers daily cybersecurity news, major hack breakdowns, and real stories from past cyberattacks. Our mission is to raise cyber awareness and educate the public with easy-to-understand insights that help keep everyday people safe from scams, breaches, and online threats. Stay informed. Stay protected. Cyber94.