What do you think, would you fall for a phishing email like that? What other kinds of social engineering scams and malware attempts have you seen that have been successful?
I receive about 2 spam email/day, and it seems that they gave up mostly, they just send a hyperlink and google flags it as spam. No interesting story, no fancy pictures or threat, just a hyperlink.
I don't know if it's a coincidence or not but, anytime I order something online, I will receive all these emails titled with tracking number blah blah has been put on hold awaiting potential import tax. Usually titled as DHL. I never even open them because I'm scared it will infect me lol
This barebones, off-the-cuff, low level approach is exactly what makes your videos so interesting and relatable, John. Thank you for doing these. I almost fell for the classic 'Your work mailbox will be locked' phishing once. what tripped me off was the password box not showing asterisks or stars, but clear text. so yes, they came within 5 keystrokes from success...
Working as an ethical hacker, I'm too paranoid to click on links in e-mail that _are_ legit 😀But having something so pressing, trying to be a youtuber myself... scary stuff
I just completed a 2yr degree at community college for cyberdefense and digital forensics, and it was still fascinating and instructive to see such a brief, streamlined, walk-thru of how it's done. 2yrs of school summarized in 30 min. Lol. It's really great to see it in practical application.
Funny, it's a good time to bring up how DMCA requests actually work: you don't typically receive them, UA-cam will give you a notice they have received it but they won't provide you, the creator, with a copy. That may be slightly different now, but generally you won't receive some lawyer-speak notice about violating copyright unless you are a company, own your own business where you are the CEO. In that case, you should have your own lawyer(s) anyway. So, don't open anything in any emails ever, don't trust DMCA notices because you wouldn't personally receive them anyway, and definitely question all links and attachments. If you get an attachment from a coworker, notify them and ask if they sent it, even if it's a legitimate email address and came from them. Remember, emails can be spoofed very well, just as phone numbers.
The funniest thing about receiving a "spoofed" email address sender, is when you OWN the TLD/URL and have zero outbound email clients in there. Thus - YOU know no one sent anything thus anything with an alias email address from that "sleeping" Domain name absolutely HAS to have been illegally spoofed. But then to see it being sent to the same domain name as if to the alias that doesn't exist - how fucken daft are those scammers?
Such content should reach out to every UA-cam creators. It will surely help them to stay away their hands on clicking such links !! Thank you for posting it,
The guy across the street hacked my wifi, my phone. His buddy upstairs shares everything with him. They know everything I do online, passwords included. The woman upstairs stomps on the floor and they both walk up on me from upstairs when they hear a noise and follow me around my apartment. VPN and Tor are no help, they're already in them. Got rid of WiFi because they're in my TV's, too. Any suggestions?
Educational, fun, not boring at all! Thanks a lot for your work. Studies computer networks myself and I only regret not having a teacher like your. Certainty would have a much better professional path by now! You, Bombal, Chuck: great lads! I wish I could study and learn more from you. Such a knowledge base!
NetworkChuck sent me here, but wow, what a video! Absolutely superb and appreciate the breakdown. Very interesting to watch and an eye opener for sure. Thanks John, you have another subscriber!
Wow, it's the first time seeing how a virus works and what calls make to a computer. It's both amazing and terrifying in the same time! Thank you for the informative video! P.S. I'm coming from NetworkChuck who made a video with you :) I'm now a subscriber of your channel as well.
Insane how well crafted these security threats are becoming. They’re literally almost easily able to get any IT professional to fall for it… that’s scary.
This is not boring at all John. I watched the complete video and it was hanging tight in my chair and being fascinated for the last half hour in my university library! I learned some things i had no idea things like a Linux Distro existed for Malware analyses until now. Thanks for being such a great help in the IT comminity!
Heya just came from the Network Chuck channel just wanted to say that I appreciate that you explain smaller details of stuff that more advanced users probably don't need to hear. But some of us are dumb :)
John Hammond, I feel confident enough to say - "we", as in the community can most definitely feel as if this was absolutely amazing! This (as well as most of your videos if not all), are always practical and showcase actual steps. Steps that a "poor man's" way of doing things is most likely a more advance way of doing some actual poking for those of us who value cyber security and ethical hacking but haven't made it a career. For all of the tinkerers out there, and even for just study purposes this is an excellent! We don't need to see the Mr. Robot type hacking all the time...though we love it...- Don't get me wrong I absolutely love the movie, i've done my review / some of thee tactic used are legit. But anyway, this video was an absolute treat for us and all the more very educational indeed. Definitely appreciate as always brother, stay blessed and safe out there. I'm very thankful you did not fall victim to this attack! ~ Cheers!
Dude! This walk-through was real, relevant, and sweet to my tech buds. Got me seeing BLUE again, dang-it! Thanks John for taking us on this journey.👨💻
I saw that this had happened to both David Bombal and the Corridor Crew and thought to myself "I almost hope they try this garbage with John Hammond so he can make a video about how they were doing this to other creators..." ha ha ha! Great content as usual and they can't mess with the best!
Great video and clearly useful information for many people! You can always add a writeup in the description with that uber-elite hacking skills you used. My degree is network security and I enjoy all of your content, especially those that include more technical information about what you're doing. Many of us don't have time to do what you do so get our "hacking" enjoyment from social media content.
Yeah, Window's default is to hide all known extensions. Call me old school, but I agree with you, this is a massive security hole in Windows. Same thing in Mac OS. The default should be to show extensions. Remember anna_kournikova.jpg.exe? Everyone should turn on their extensions. However in this case it was a virtual machine, so not much customization.
It's literally the first thing I do when I install a new OS: turn on file extensions. In fact I think it's irresponsible of OS designers to have them be invisible by default.
Great video! The Twitter thread was excellent too. This dissection was a fantastic learning experience, thank you for sharing it and going so in depth.
dont hesitate! this video was just perfect, i really learn a lot from this video, the idea that i can restore VM to a state, that redline stealer was a thing, .scr, the ways they scam, and much much more, thank you very much, appreciated.
Awareness of these TTPs is just as vital for those who are responsible for protecting access to critical infrastructure. Content creators may sometimes be more visible targets, but everyone should remain vigilant.
I honestly really liked this video because it showed a real-world example, and gave me an idea of how someone might begin scratching the surface of malware to figure out what it's trying to do and where it comes from. I'm a web developer with a passing interest in cyber security and reverse engineering, so seeing your process (even if you consider it a fairly basic, poor man's way of doing things) was really fun and educational for me.
As a person with and analytical mind I do find this segment extremely interesting and I’m making a big shout out to you and everybody who views this film to have good luck and everything you do thank you for listening to me
was listening and semi watching as I was playing a game but i realized I kind of just stopped playing my game to watch you do this...I didn't understand like most of the video but it was really awesome to watch :O
John keeps dropping gems for us! Thank you so much for your endless efforts to spread knowledge and awareness among the community, very much appreciated!
Fantastic video!! I'm a cybersecurity noob so this is helpful, loads of great resources to flag and lots of info to be on the lookout for. Thanks again!!
Just now really discovering your videos. I’ve seen a couple here and there but you’re pretty much the only reason I open UA-cam at this point so thank you for the content. I’m about to start watching all of your videos back to back like a series. Over and over in hopes to learn some things. Keep on 🤘🏼
Do you think its okay to share a possible victims email address? Might be just an unlucky user who got their account compromised and might now be spammed by UA-cam users.
@No Name People who use redline or other cred stealing tools have 10,000s+ of victims emails, Its harder to make new gmails accounts then to just steal them.
Hey John, thanks for sharing this... definitely not boring and also not too lengthy! I suspect that the file was inflated to pass through web filters. Most firewalls with webfilter have a resource limit up to which size they scan downloads which is typically some 100 MB. So thats the easy or poor man way to bypass these. By the way, Hetzner is a large German hoster, which also has a datacenter in Finland. They rent everything from simple webspace to dedicated root servers or even colocation space. You can write them an mail, they have a good team!
i am very thankful that i found this video. I've been just starting in content creation, and being aware of this is super helpful for the future (especially this early in the game when one may not know the emails of youtube, google, or the common formatting used for these emails). Thank you for spreading awareness
This was awesome in its detail and I appreciate John's efforts to educate but also to tell a great story. Also I might add that if I were a content creator, I wouldn’t use a Microsoft product such as windows. Windows is clearly ground zero for these folks.
Fantastic work, John. I heard about this horror-show form NetworkChuck and I just _could not believe_ this one so I've arrived here and watched the whole thing with my jaw hanging open! Now a subscriber. Cheers 👍🤗
This right here! Is why I enjoy learning from you my friend. This was super enlightening. Thank you for doing a deep dive and sharing your findings with us. Stay safe John! 💪🏼
Hi John, responding to your worry "is it boring?". No absolutely not! Watched the video till the end and found it very informative! Thanks! Much appreciated. Cheers!
Hey John, I just wanted to say thank you for helping the community. I recently discovered your channel by asking AI questions, and it's pretty helpful.
In addition to the content what I really appreciate about your videos is that you don't start with the usual "smash that like and subscribe". Bless you!
Super educational! I get tons of phishing emails from Iceland and I've always wanted to know how to safely dive deeper to track down homebase. Of course I assume any risks involved.
super awesome content ! ty for sharing this. my cousin is learning about cyber security. and i think this will help him as h progresses through his classes. you know give him something too write a report on. again ty so much for getting the word out.
This is a fantastic video for breaking down how a very realistic spam message. I am going have my CyberPatriot teams watch this video and then we will discuss what happened and how it relates to what they are learning as part of being on my CyberPatriot team(s).
Very educational, and thank you! As a very small scale UA-camr (on behalf of a small, local club) it's useful to hear about such scams. Thanks to you (and NetworkChuck!) for the heads up!
that was beautiful, I don't know 10 percent of what you're saying, but to watch you go through that and how you know every move to make and the next steps. its art. I would give anything for that knowledge
This is my first video but right off the bat question..... BRUNCH?!?!? Brunch bro? You fancy
You guys have friends? wuh??
@@calholli imho opinion, brunch is just breakfast for those who sleep in
@@HansBelphegor No, it's second breakfast :)
@@dheijnemansbreakfast and lunch had a baby, people got so excited for the baby they fell asleep for an extra 2 hours, and so brunch was made
@@dheijnemans no its a meal that occurs between breakfast and lunch
john is so good at what he does to the point where if you wanted to attack him he would think you are submitting a malware for analysis
bruh.... XD
lmao
that sounds pretty good actually, could get some interesting stuff out of it
What do you think, would you fall for a phishing email like that? What other kinds of social engineering scams and malware attempts have you seen that have been successful?
I receive about 2 spam email/day, and it seems that they gave up mostly, they just send a hyperlink and google flags it as spam. No interesting story, no fancy pictures or threat, just a hyperlink.
I don't know if it's a coincidence or not but, anytime I order something online, I will receive all these emails titled with tracking number blah blah has been put on hold awaiting potential import tax. Usually titled as DHL. I never even open them because I'm scared it will infect me lol
This barebones, off-the-cuff, low level approach is exactly what makes your videos so interesting and relatable, John. Thank you for doing these. I almost fell for the classic 'Your work mailbox will be locked' phishing once. what tripped me off was the password box not showing asterisks or stars, but clear text. so yes, they came within 5 keystrokes from success...
Working as an ethical hacker, I'm too paranoid to click on links in e-mail that _are_ legit 😀But having something so pressing, trying to be a youtuber myself... scary stuff
Sir can u give that malware for my study on digital forensics
I’ve received similar emails but never a Google drive notification. Interesting how they keep changing small things within the same scams.
Wsg bro
I just completed a 2yr degree at community college for cyberdefense and digital forensics, and it was still fascinating and instructive to see such a brief, streamlined, walk-thru of how it's done. 2yrs of school summarized in 30 min. Lol. It's really great to see it in practical application.
DEFINITELY not boring. If you're serious about cyber security then ANY knowledge is good knowledge. Thanks for the video.
Funny, it's a good time to bring up how DMCA requests actually work: you don't typically receive them, UA-cam will give you a notice they have received it but they won't provide you, the creator, with a copy. That may be slightly different now, but generally you won't receive some lawyer-speak notice about violating copyright unless you are a company, own your own business where you are the CEO. In that case, you should have your own lawyer(s) anyway. So, don't open anything in any emails ever, don't trust DMCA notices because you wouldn't personally receive them anyway, and definitely question all links and attachments. If you get an attachment from a coworker, notify them and ask if they sent it, even if it's a legitimate email address and came from them. Remember, emails can be spoofed very well, just as phone numbers.
Thanks for sharing the knowledge👨💻
The funniest thing about receiving a "spoofed" email address sender, is when you OWN the TLD/URL and have zero outbound email clients in there.
Thus - YOU know no one sent anything thus anything with an alias email address from that "sleeping" Domain name absolutely HAS to have been illegally spoofed.
But then to see it being sent to the same domain name as if to the alias that doesn't exist - how fucken daft are those scammers?
I'm taking my first steps in cyber security. To see such a pro how you deal with this was extraordinarily educational and very interesting. Thnks!
Correct your thnks
Such content should reach out to every UA-cam creators.
It will surely help them to stay away their hands on clicking such links !!
Thank you for posting it,
Your face in the thumbnail had me like 😂😂😂😂
This is wonderful, specific and detailed. You should consider createing a malware analysis class. FYI, you have your first student. 😆
He already did that
@@alimustafa2682 LOL
@@alimustafa2682 link
*creating
The guy across the street hacked my wifi, my phone. His buddy upstairs shares everything with him. They know everything I do online, passwords included. The woman upstairs stomps on the floor and they both walk up on me from upstairs when they hear a noise and follow me around my apartment.
VPN and Tor are no help, they're already in them. Got rid of WiFi because they're in my TV's, too. Any suggestions?
Your the best John. I work in IT myself but not in the security segment, you always make content so interesting to watch. Love your work. Keep it up!
Educational, fun, not boring at all!
Thanks a lot for your work. Studies computer networks myself and I only regret not having a teacher like your. Certainty would have a much better professional path by now! You, Bombal, Chuck: great lads!
I wish I could study and learn more from you. Such a knowledge base!
I honestly love these kind of videos if im honest. Good stuff John thank you
NetworkChuck sent me here, but wow, what a video! Absolutely superb and appreciate the breakdown. Very interesting to watch and an eye opener for sure.
Thanks John, you have another subscriber!
One of the best TI and Malware analysis I've watched. This is a great video for new SOC analysts. Thank you so much JH 💓
Wow, it's the first time seeing how a virus works and what calls make to a computer. It's both amazing and terrifying in the same time! Thank you for the informative video!
P.S. I'm coming from NetworkChuck who made a video with you :) I'm now a subscriber of your channel as well.
Every content creator need to see this video!!! This analysis is so simple yet so effective i bet everyone would understand.
Insane how well crafted these security threats are becoming. They’re literally almost easily able to get any IT professional to fall for it… that’s scary.
yeah it's not 2010 anymore
don't click any links or run any executables on your desktop
yes its nice in bad way... show how evrything change and if you dont know how to adapt, you be in trouble
@@drygordspellweaver8761 😂😂
@@drygordspellweaver8761 Put your PC in a Faraday cage and board up the windows and move to another state. Never use technology again.
You're my hero! That knowledge level on cyber-security... dude, you're the absolute best!
This was so awesome. Kudos to you John. Really appreciate you taking us along with you.
It was very interesting and informative! Great job John!
Exactly 👨💻
Very useful, and intriguing. You aren't rambling or anything like that, thank you mate!
Welcome... to Jurassic Hack
👏 great video
This is not boring at all John.
I watched the complete video and it was hanging tight in my chair and being fascinated for the last half hour in my university library!
I learned some things i had no idea things like a Linux Distro existed for Malware analyses until now.
Thanks for being such a great help in the IT comminity!
Incredibly useful and helpful video, thank you John! It's interesting seeing under the hood for threats related to content creators.
Heya just came from the Network Chuck channel just wanted to say that I appreciate that you explain smaller details of stuff that more advanced users probably don't need to hear. But some of us are dumb :)
Hey John, thanks for sharing your thought process with us. I love the detailed explanation of how you analyze suspicious files.
I loved the “rumbling”. This was fun, I subscribed, keep going!
It’s nice to see what an analyst would do. Very well explained, and use free tools to do your PoC. Bravo!
The details, the way you dive in to the malware is superb. Nice video. You earned a Sub and I'm your student now even I'm new to these threat analysis
John Hammond, I feel confident enough to say - "we", as in the community can most definitely feel as if this was absolutely amazing!
This (as well as most of your videos if not all), are always practical and showcase actual steps.
Steps that a "poor man's" way of doing things is most likely a more advance way of doing some actual poking for those of us who value cyber security and ethical hacking but haven't made it a career.
For all of the tinkerers out there, and even for just study purposes this is an excellent!
We don't need to see the Mr. Robot type hacking all the time...though we love it...- Don't get me wrong I absolutely love the movie, i've done my review / some of thee tactic used are legit.
But anyway, this video was an absolute treat for us and all the more very educational indeed.
Definitely appreciate as always brother, stay blessed and safe out there.
I'm very thankful you did not fall victim to this attack!
~ Cheers!
Dude! This walk-through was real, relevant, and sweet to my tech buds. Got me seeing BLUE again, dang-it! Thanks John for taking us on this journey.👨💻
Honestly feel pretty fortunate to be able to watch videos like this while I’m going to school studying cyber security 😅
Boy I'd love to see a pcap of what that thing looks like on the wire! If you run it again grab on and lemme see! AWESOME video John!!
I saw that this had happened to both David Bombal and the Corridor Crew and thought to myself "I almost hope they try this garbage with John Hammond so he can make a video about how they were doing this to other creators..." ha ha ha! Great content as usual and they can't mess with the best!
Great video and clearly useful information for many people! You can always add a writeup in the description with that uber-elite hacking skills you used. My degree is network security and I enjoy all of your content, especially those that include more technical information about what you're doing. Many of us don't have time to do what you do so get our "hacking" enjoyment from social media content.
honestly the best soft tutorial ive ever seen. short and straight to the point ! i love it
Imagine thinking that John Hammond would have hidden file extensions turned off
Yeah, Window's default is to hide all known extensions. Call me old school, but I agree with you, this is a massive security hole in Windows. Same thing in Mac OS. The default should be to show extensions. Remember anna_kournikova.jpg.exe? Everyone should turn on their extensions. However in this case it was a virtual machine, so not much customization.
It's literally the first thing I do when I install a new OS: turn on file extensions. In fact I think it's irresponsible of OS designers to have them be invisible by default.
Great video! The Twitter thread was excellent too. This dissection was a fantastic learning experience, thank you for sharing it and going so in depth.
I'm always amazed by just how far down the rabbit hole its possible to go looking into these malware attacks. Keep up the good work
dont hesitate! this video was just perfect, i really learn a lot from this video, the idea that i can restore VM to a state, that redline stealer was a thing, .scr, the ways they scam, and much much more, thank you very much, appreciated.
Awareness of these TTPs is just as vital for those who are responsible for protecting access to critical infrastructure. Content creators may sometimes be more visible targets, but everyone should remain vigilant.
Imagine the hackers themselves watching this videos. Well if they are, just learn from him 🤣🤣🤣
The duality between channel profile picture and thumbnail makes this video already great before I even start watching.
Really interesting to see how something like this actually works.
Ive been learning basics of linux and hacking on OverTheWire and watching you has shown how much more i have to learn. Keep making content!
I honestly really liked this video because it showed a real-world example, and gave me an idea of how someone might begin scratching the surface of malware to figure out what it's trying to do and where it comes from. I'm a web developer with a passing interest in cyber security and reverse engineering, so seeing your process (even if you consider it a fairly basic, poor man's way of doing things) was really fun and educational for me.
I absolutely loved this video, some very very interesting information. You have no idea how many emails I get from *fake* youtube
As a person with and analytical mind I do find this segment extremely interesting and I’m making a big shout out to you and everybody who views this film to have good luck and everything you do thank you for listening to me
was listening and semi watching as I was playing a game but i realized I kind of just stopped playing my game to watch you do this...I didn't understand like most of the video but it was really awesome to watch :O
John keeps dropping gems for us! Thank you so much for your endless efforts to spread knowledge and awareness among the community, very much appreciated!
I just started my security+ classes and I feel like I’m learning a totally different language. Look forward to your content to help in my journey!
We really need MORE people to enter the cybersecurity field. Like, even if they don't get a job in cyber, these are becoming life skills for survival.
Fantastic video!! I'm a cybersecurity noob so this is helpful, loads of great resources to flag and lots of info to be on the lookout for. Thanks again!!
I'm not suggesting to attack to any unauthorised machines, but he did what you deserved for (as you have jokingly said, please try hack me).
Love it!
Just now really discovering your videos. I’ve seen a couple here and there but you’re pretty much the only reason I open UA-cam at this point so thank you for the content. I’m about to start watching all of your videos back to back like a series. Over and over in hopes to learn some things. Keep on 🤘🏼
FYI guys- at work we are seeing alot of "student loan forgiveness" phishing emails, I collect phishing emails and they are well designed. Be careful.
It's always a pleasure to have your insight on malware attacks, there's habits we need to have in "alarming" emails/messages even calls
Do you think its okay to share a possible victims email address? Might be just an unlucky user who got their account compromised and might now be spammed by UA-cam users.
@No Name People who use redline or other cred stealing tools have 10,000s+ of victims emails, Its harder to make new gmails accounts then to just steal them.
It is indeed beyond helpful and you are so modest.
Dude, so fascinating! Found your channel through network chuck! Subscribed!
Hey John, thanks for sharing this... definitely not boring and also not too lengthy!
I suspect that the file was inflated to pass through web filters. Most firewalls with webfilter have a resource limit up to which size they scan downloads which is typically some 100 MB. So thats the easy or poor man way to bypass these.
By the way, Hetzner is a large German hoster, which also has a datacenter in Finland. They rent everything from simple webspace to dedicated root servers or even colocation space. You can write them an mail, they have a good team!
i am very thankful that i found this video. I've been just starting in content creation, and being aware of this is super helpful for the future (especially this early in the game when one may not know the emails of youtube, google, or the common formatting used for these emails). Thank you for spreading awareness
This has popped up a couple times recently so they're still at it. Glad you broke this one down👍😃
Wow, so well done! Thanks for posting, man! Very helpful.
This was awesome in its detail and I appreciate John's efforts to educate but also to tell a great story. Also I might add that if I were a content creator, I wouldn’t use a Microsoft product such as windows. Windows is clearly ground zero for these folks.
Fantastic work, John. I heard about this horror-show form NetworkChuck and I just _could not believe_ this one so I've arrived here and watched the whole thing with my jaw hanging open! Now a subscriber. Cheers 👍🤗
This right here! Is why I enjoy learning from you my friend. This was super enlightening. Thank you for doing a deep dive and sharing your findings with us. Stay safe John! 💪🏼
Really cool vid John, I am getting into Cybersec and this was exquisite to watch. Thank you for the videos.
So far the only tutorial I've seen that takes it slow and doesn't require prior experience to soft design.
Hi John, responding to your worry "is it boring?". No absolutely not! Watched the video till the end and found it very informative! Thanks! Much appreciated. Cheers!
Not boring at all. You did a great job going through it!!!
it's actually anti-boring. I rarely watch videos that long to the end at normal speed. Thanks for the info, I learned a ton.
Dude your overview was great! I would've liked to see the whole process.
Hey John, I just wanted to say thank you for helping the community. I recently discovered your channel by asking AI questions, and it's pretty helpful.
So cool, John! Neat to see you do your thing here.
Am glad you shared this. Your analysis just saved me from a phishing attack just now.
In addition to the content what I really appreciate about your videos is that you don't start with the usual "smash that like and subscribe". Bless you!
Super educational! I get tons of phishing emails from Iceland and I've always wanted to know how to safely dive deeper to track down homebase. Of course I assume any risks involved.
super awesome content ! ty for sharing this. my cousin is learning about cyber security. and i think this will help him as h progresses through his classes. you know give him something too write a report on. again ty so much for getting the word out.
This is a fantastic video for breaking down how a very realistic spam message. I am going have my CyberPatriot teams watch this video and then we will discuss what happened and how it relates to what they are learning as part of being on my CyberPatriot team(s).
That was Awesome Mate. Thanks for educating us all. Cheers!
A channel I wish I had found many years ago. Great stuff - thanks ... Cheers
Thank you for sharing this! It will help us to be aware and pay attention to details before opening any emails.
Found you from Network Chuck. Love your content. Subbed!
this was so informational & exciting to see & definitely not boring, hope to see videos like this in future!
Just got a similar email myself. Glad I saw your video first!
I miss these malware reversing videos. Love it
Love these! So many creators are getting these lately - Corridor Crew, I think Mr Beast, and many others
Awesome to see and would love to see more stuff like this!
Subscribed! I have been in IT for 22 years
Oh my gsoh. This was such a fun video to watch. I loved watching you analyze the malware. What a great video, thanks for sharing John!
Wonderful ! well explained! best work John
Very educational, and thank you! As a very small scale UA-camr (on behalf of a small, local club) it's useful to hear about such scams. Thanks to you (and NetworkChuck!) for the heads up!
Super useful. I learned about some smart tools to do analise on the scam email.
that was beautiful, I don't know 10 percent of what you're saying, but to watch you go through that and how you know every move to make and the next steps. its art. I would give anything for that knowledge
I saw your post on LinkedIn and I really was shocked. John you’re gem. Thanks and its really interesting
Really cool video - lots of useful tools showcased here, I should add these to my list!
Not boring at all. We need more of this.