PODCAST · business
dontgetgot
by dontgetgot
dontgetgot tellls the true stories of hackers, hustlers, and billion-dollar con artists — who they are, how they think, and why they did it. The schemes they built, the lives they lived, and the moments that changed everything.True crime stories about social engineering, and deception. Inspired by real people, real digital attacks, and real situations.Sign up for our Email Newsletter @ dontgetgot.co/subscribe
-
31
Linwei Ding - Google's Insider Threat
Linwei Ding was a software engineer at Google, assigned to the team building the AI infrastructure that the entire industry was racing to replicate. He had access to confidential material most engineers only read about. And for a year and a half, he used it to quietly copy over 2,000 pages of Google's most closely guarded technical secrets, file by file, right under their noses. He had a startup in Shanghai waiting for him, investors lined up in Beijing, and a one-way ticket out of the country.Become a member : dontgetgot.co
-
30
Linwei Ding - Google's Insider Threat
Linwei Ding was a software engineer at Google, assigned to the team building the AI infrastructure that the entire industry was racing to replicate. He had access to confidential material most engineers only read about. And for a year and a half, he used it to quietly copy over 2,000 pages of Google's most closely guarded technical secrets, file by file, right under their noses. He had a startup in Shanghai waiting for him, investors lined up in Beijing, and a one-way ticket out of the country.
-
29
The Bangladesh Bank Heist: How a Typo Saved $900 Million
A fraud auditor at a small bank in Sri Lanka is reviewing transfers on a Thursday morning when a twenty million dollar wire comes through for an organization he's never heard of, with a name that's misspelled and a number that has no business showing up on a screen in Colombo. What he doesn't know yet is that he's looking at the edge of a billion dollar heist targeting the central bank of Bangladesh.Email Newsletter : www.dontgetgot.co/subscribeEpisode research sourced from Reuters, SWIFT security advisories, US Department of Justice indictments, Bangladesh Bank investigation records, Philippine Senate hearings, and Pan Asia Banking Corporation statements.
-
28
The Call That Crashed Las Vegas - MGM Hack
This story reveals the inner thoughts of an IT help desk employee whose routine Friday phone call opened the door to one of the largest cyberattacks in casino history. A ten minute conversation, a single password reset, and a hundred million dollars in damage. Inspired by the 2023 MGM Resorts hack by the teenage hacking group Scattered Spider.Email Newsletter : www.dontgetgot.co/subscribeNOTES - Episode research sourced from ALPHV public statements, Okta security advisories, Reuters, The Wall Street Journal, VX Underground, West Midlands Police, and US Department of Justice filings.
-
27
Jho Low - The Prince of Malaysia
Before the stolen billions, before Hollywood appearances and rubbing shoulders with celebrities, before the yachts and the Picassos and the Golden Globes, Jho Low was a sixteen year old kid at a boarding school in London trying to keep up with Saudi royalty. This is the story of how he learned the game.Subscribe to our email newsletter for updates : www.dontgetgot.co
-
26
The Contractor's Son - How a 21 Year Old Stole $46 Million From The US Marshals
His dad spent years earning the government's trust. Built a small IT firm from nothing. Landed a contract to manage billions in seized crypto for the U.S. Marshals Service. Then his 21-year-old son found the keys to the vault.$46 million. Gone.This is the story of how a government contractor's son robbed the federal crypto vault and couldn't stop bragging about it.____________________________John Daghita, 21, was arrested on March 5, 2026, on the island of Saint Martin in a joint FBI and French Gendarmerie operation. He faces charges related to the alleged theft of more than $46 million in cryptocurrency from U.S. Marshals Service seizure wallets. He has not yet been formally charged in U.S. federal court and is presumed innocent until proven guilty. His father, Dean Daghita, president of CMDSS, has not been charged with any crime.ZachXBT is an independent blockchain investigator whose analysis initiated the investigation. His findings were reported across major outlets including CoinDesk, Bitcoin Magazine, Decrypt, TRM Labs, and BleepingComputer.If you or someone you know has been targeted by a cryptocurrency scam or investment fraud, report it to ic3.gov or your local law enforcement.
-
25
Ronald Spektor: The Coinbase Scammer Who Stole $16 Million and Bragged About It
Ronald Spektor was 23, living with his dad in Brooklyn, stealing millions from Coinbase users with nothing but a phone call. He gambled away $6 million, bragged about it on Telegram, and thought no one could touch him. Then someone started following the money. This is the story of the victim who picked up the phone, the kid who couldn't stop talking, and the trail that doesn't disappear.
-
24
Betterment Got Got: The ShinyHunters Voice Phishing Attack
On January 9th, 2026, a Betterment employee got a phone call from IT. The voice was friendly. The request was routine. The login page looked exactly like the one he used every day. Three minutes later, hackers had full access to the systems Betterment uses to communicate with millions of customers, and they used those systems to send a crypto scam from Betterment's own channels. Within two weeks, 1.4 million customer records were dumped on the dark web. This is the story of how ShinyHunters, one of the most active cybercrime groups in the world, used a voice phishing call to breach one of America's biggest investment platforms. No malware. No code exploits. Just a phone call and a push notification. We tell the full story from the employee's perspective and break down what you can do to make sure it doesn't happen to you.
-
23
Daren Li - Pig Butchering & The $73 Million Money Laundering Operation
She thought she made a friend over text. What started as a wrong number turned into months of trust, a crypto investment that looked like it was working, and a loss she never saw coming. It's called pig butchering, and it's one of the fastest growing scams in the world. The man behind this $73 million operation pleaded guilty to all of it. Then he disappeared.
-
22
The Business of State-Sponsored Hackers
In December 2025, hackers nearly knocked out power to half a million people in Poland during a brutal cold snap. The attack was traced back to Russian intelligence. State-sponsored hacking is an industry. There are org charts. Salaries. Military ranks. And a recruitment pipeline that can turn a criminal hacker into a government asset.In this episode, we break down how these groups actually operate. Why North Korea's hackers are focused on stealing money while China's are after your company's trade secrets. How Russia uses a network of freelancers, criminals, and intelligence officers to do its dirty work. This is the shadow world where cybercrime meets espionage.Newsletter : dontgetgot.coSecurity Awareness Program : dontgetgot.co/trainingInstagram : https://www.instagram.com/dontgetgot.co/
-
21
Malone Lam: The 20-Year-Old Who Stole $263 Million in Bitcoin
Malone Lam was 20 years old when he stole $263 million in Bitcoin from a single victim using nothing but a phone call. He bought a $3.8 million Pagani, a $2 million watch, and spent $500,000 a night at clubs handing out Birkin bags. A month later, the FBI raided his Miami mansion. This is how he did it, how he got caught, and why a couple in Connecticut got kidnapped because of it.
-
20
Charlotte Austin - Famous Model Falls for AI Deepfake Scam
A model and actress with millions of followers fell for an AI deepfake scam and lost $118,000 in a single day. In this episode, we break down exactly how a criminal syndicate trapped her on a video call for 24 hours, what made this scam nearly impossible to detect, and how you can make sure it doesn't happen to you.
-
19
Why Keonne Rodriguez Is in Prison for Caring about Privacy
Keonne Rodriguez and his Co-founder William Lonergan Hill is in federal prison for creating Bitcoin privacy software. We explain how Bitcoin tracking works, what Samourai Wallet actually did, and why the government's own regulator said Rodriguez didn't break the law before prosecutors charged him anyway.Sign the petition demanding a pardon for the founders.
-
18
Spyware App Creator Bryan Fleming facing 15 years in Prison
pcTattletale founder catches chargers for "catch a cheater app"Monitoring software is everywhere. Parents use it, employers use it, and it's completely legal to buy. So why is Bryan Fleming facing 15 years in federal prison for selling it? Today we break down the pcTattletale case, the legal line between legitimate monitoring and criminal surveillance, and what happens when a company that sold "100% undetectable" spyware gets hacked itself. 138,000 customers. 300 million screenshots. And one guilty plea that just changed the stalkerware industry.
-
17
Why Americans Have Grown Numb to Data Breaches
Breach after Breach after BreachAnother data breach headline you scrolled past. We get it. But that numbness is exactly what cybercriminals are counting on. In this episode, we unpack the breach landscape and give you a practical framework for deciding when to panic and when to shrug. Plus: what actually happens when your data hits the dark web, and the one action that stops most identity theft cold.
-
16
Cybersecurity Pros Plead Guilty to Ransomware Attacks
Two cybersecurity professionals, Ryan Clifford Goldberg and Kevin Martin, just pleaded guilty to launching the exact ransomware attacks they were hired to stop. One was an incident response manager at Sygnia. The other was a ransomware negotiator at DigitalMint. Together with a third accomplice, they attacked five U.S. companies using off the shelf malware.
-
15
The Bonnie & Clyde of Bitcoin - Ilya Lichtenstein & Heather (Razzlekahn) Morgan
The Rapper and the HackerA few weeks ago, the guy behind the 2016 Bitfinex hack walked out of prison after serving just 14 months. His wife, who helped launder the money while building a rap career as "Razzlekhan," served eight months. In this episode, we break down how he actually pulled off the hack, why the security architecture failed, and how law enforcement finally caught them five and a half years later.
-
14
Chen Zhi - Billionaire Scam King Arrested
The billionaire scam kingpin is finally in custody. On January 6th, Cambodian authorities arrested Chen Zhi. By January 7th, he was on a plane to Beijing in handcuffs.Meanwhile, the scam compounds in Cambodia keep running.This is the update on Chen Zhi.
-
13
Apple vs. The United Kingdom - The battle over backdoors
The UK government issued a secret order demanding backdoor access to any iPhone user's encrypted data. Apple's response was to disable the security feature for the entire country. Here's why that matters for everyone.
-
12
Violence-as-a-Service - The gig economy for criminals
Europol calls it Violence as a Service. You pay, someone else throws the grenade. And the person throwing it is probably 16.Operation GRIMM just swept up 193 people across eleven countries. But the arrests aren't the story. The story is the online black market that's recruiting teenagers through Discord servers and gaming chats to carry out bombings, shootings, and contract killings. Recruiters building trust for months. Small jobs that turn into big ones. By the time these kids realize what they signed up for, they're in too deep to walk away.The Netherlands saw over 1,500 explosive attacks last year. Police are finding bombs stored under teenagers' beds. And Europol says minors are now involved in 70 percent of organized criminal markets.This episode breaks down how the machine works.
-
11
North Korean hackers record breaking $2 Billion year
In 2025, North Korea's state-sponsored hackers shattered their own previous record by stealing over $2 billion in cryptocurrency in a single year. In one hack they stole $1.5 billion from Bybit. It was the largest crypto hack in history. We break down how a country thats been cut off and ostracized by many countries, has built a cyber program on par with G7 nations.
-
10
How hackers stole $400K worth of Lobster
Someone stole $400,000 worth of lobster meat bound for Costco. No weapons. No violence. No high-speed chase. Just a spoofed email, a fake website, a fake driver's license, and a truck. The seafood bandits drove off in broad daylight.
-
9
Fake CIA Agent Cons 12 Companies Out of $4 Million
He was the DEA's chief spokesman, a boring government PR job. But after leaving, Garrison Courtney reinvented himself as something far more exciting: a covert CIA operative running classified missions in Africa. For four years, he convinced defense contractors to put him on their payroll as "commercial cover," promised them lucrative government contracts that would never come, and duped real intelligence officials into vouching for him. He held meetings inside actual classified facilities, made people surrender their phones, and threatened anyone who questioned him with arrest for "leaking classified information." When the FBI finally closed in, the people he scammed actually stonewalled investigators—convinced they'd be betraying national security by talking. His $4.4 million fraud earned him seven years in federal prison. This is the story of how one man weaponized Washington's obsession with secrecy to pull off one of the most audacious cons in recent memory.
-
8
Seeing Through Walls: How Your WiFi Has Been Weaponized
What if every WiFi router could track you without a phone in your pocket? German researchers just proved it's possible, and the system is already everywhere. This is the surveillance tech from The Dark Knight, except instead of Batman destroying it after one use, it's permanently embedded in every building you walk into. No cameras. No warning. Just radio waves that see through walls.
-
7
Michael Clapsis - How Fake Airport WiFi Stole Private Photos
A flight attendant noticed something weird. There were two WiFi networks with the same name. That one observation unravels a six-year operation where an IT guy named Michael Clapsis, used a $100 device to steal credentials from passengers at airports and on flights across Australia. We break down how evil twin attacks actually work, and what actually keeps you safe on public WiFi (spoiler: it's not "just don't use it").
-
6
One man tricked Facebook & Google into paying him $100 Million
How a Lithuanian Man Stole Over $100 Million from Google and Facebook with fake invoices.Evaldas Rimasauskas pulled off one of the largest corporate frauds in history. No hacking. No malware. No compromised networks. Just fake emails and invoices sent to the right people at the right time.Business Email Compromise, or BEC, costs companies $2.9 billion a year.In this episode, we break down exactly how the scam worked, why it succeeded, and what's required to defend against it. It's simpler than you think.
-
5
Chen Zhi - The Billionaire Kingpin of online scams
He orchestrated a criminal empire worth billions, stealing from businesses and individuals around the world. And he's still out there. Join us as we trace the rise of one of the most sophisticated criminal leaders the world has ever seen. And uncover why, despite international efforts, he remains one of the most wanted, and most elusive, cybercriminals alive.
-
4
Hushpuppi - The BEC scam celebrity
Ramon Abbas called himself the Billionaire Gucci Master. He had two million Instagram followers, private jets, luxury cars, designer everything. All paid for with stolen money. This is the story of how a Nigerian fraudster built a multimillion-dollar BEC scam operation.
-
3
How a 19 year old helped steal $115 Million through social engineering
A 19-year-old from East London was identified as one of the two most core operators behind Scattered Spider, directing attacks that extracted over $115 million in ransom. A teenager, who orchestrated some of the most audacious security breaches in recent memory. This is the breakdown of how Scattered Spider operated, who Jubair was within that network, and what it reveals about the new generation of cybercriminals who treat extortion like a business.
-
2
Over $800,000 stolen by fake Brad Pitt
Anne was a successful interior designer living comfortably in France when she got a message that would change everything. Someone claiming to be Brad Pitt's mother reached out, saying her son needed a woman just like Anne. What started as an unbelievable DM turned into a relationship that lasted over a year and cost Anne her marriage, her savings, and nearly her life. A story about AI, loneliness, and how far someone will go when they believe in a digital dream.
-
1
Over 7,000 people rescued from Myanmar scam centers
Wang Xing's rescue was supposed to be the end of the story. Instead, it triggered something much bigger. What happened next exposed just how sophisticated these criminal networks really are, and why a crackdown barely made a dent in the operation.
-
0
Chinese actor scammed & forced into modern day slavery
Wang Xing was a working actor looking for his next break when an opportunity came through WeChat. A legitimate production company needed English speaking actors for a film shooting in Thailand. The role seemed perfect. The company checked out. So he took the job. What happened next exposed one of Southeast Asia's fastest-growing criminal operations, triggered an international crisis between two governments, and revealed just how many people have vanished chasing the same dream Wang was.
No matches for "" in this podcast's transcripts.
No topics indexed yet for this podcast.
Loading reviews...
ABOUT THIS SHOW
dontgetgot tellls the true stories of hackers, hustlers, and billion-dollar con artists — who they are, how they think, and why they did it. The schemes they built, the lives they lived, and the moments that changed everything.True crime stories about social engineering, and deception. Inspired by real people, real digital attacks, and real situations.Sign up for our Email Newsletter @ dontgetgot.co/subscribe
HOSTED BY
dontgetgot
CATEGORIES
Loading similar podcasts...