Chasing The Most Hated Hacker In History - Joe Tidy

Chasing The Most Hated Hacker In History - Joe Tidy

Modern WisdomJun 14, 20251h 26m

Chris Williamson (host), Joe Tidy (guest), Narrator

Scattered Spider and current attacks on UK/US retailersSocial media, clout, and the moral drift of youth hacking cultureRansomware mechanics, social engineering, and real‑world impactsThe Vastaamo psychotherapy hack and the career of Julius KivimäkiGlobal cybercrime hubs, Russian and North Korean operations, and geopoliticsHigh‑profile cyber operations like Stuxnet and NotPetyaLaw enforcement, attribution challenges, and how hackers actually get caught

In this episode of Modern Wisdom, featuring Chris Williamson and Joe Tidy, Chasing The Most Hated Hacker In History - Joe Tidy explores teenage hackers, ransomware chaos, and the rise of digital cartels The conversation explores how loosely organized teenage hacking crews, exemplified by Scattered Spider, evolved into highly disruptive cybercrime actors targeting major retailers and infrastructure. Joe Tidy traces the cultural and technological shifts—from Twitter-era clout chasing to Bitcoin-fueled monetization—that turned “chaotic good” hacker culture into “chaotic evil” digital cartels. He profiles notorious figures like Julius Kivimäki, dubbed the most hated hacker in history, and Russian gang EvilCor to show how ego, lax security, and geopolitical shelter make cybercrime both powerful and messy. Alongside worst‑case scenarios like attacks on hospitals, cars, and nuclear programs, Tidy emphasizes that most hacks still exploit basic human error and weak security hygiene.

Teenage hackers, ransomware chaos, and the rise of digital cartels

The conversation explores how loosely organized teenage hacking crews, exemplified by Scattered Spider, evolved into highly disruptive cybercrime actors targeting major retailers and infrastructure. Joe Tidy traces the cultural and technological shifts—from Twitter-era clout chasing to Bitcoin-fueled monetization—that turned “chaotic good” hacker culture into “chaotic evil” digital cartels. He profiles notorious figures like Julius Kivimäki, dubbed the most hated hacker in history, and Russian gang EvilCor to show how ego, lax security, and geopolitical shelter make cybercrime both powerful and messy. Alongside worst‑case scenarios like attacks on hospitals, cars, and nuclear programs, Tidy emphasizes that most hacks still exploit basic human error and weak security hygiene.

Key Takeaways

Most high‑impact hacks still begin with low‑tech social engineering.

Attacks on firms like M&S likely start with simple tactics—phishing emails or phone calls to IT help desks posing as staff—rather than Hollywood‑style code exploits, underscoring that human error remains the primary entry point.

Get the full analysis with uListen AI

Clout culture and cryptocurrency transformed teen hackers into profit‑driven criminals.

The shift from early, often idealistic hacker groups to today’s teenage cyber gangs coincides with Twitter’s follower/retweet economy and Bitcoin’s rise, giving young hackers both an audience and an anonymous payment rail.

Get the full analysis with uListen AI

Ransomware is the dominant cyber threat because it directly monetizes disruption.

By encrypting data and paralyzing operations—from supermarkets to hospitals—ransomware creates immediate leverage, allowing attackers to demand cryptocurrency payments that are difficult to trace and seize.

Get the full analysis with uListen AI

“Noob persistent threats” show you don’t need elite skills to cause elite damage.

Groups like Scattered Spider are often technically mediocre but extremely persistent and reckless; underestimated teenage crews using recycled tools and social engineering can still cripple large organizations.

Get the full analysis with uListen AI

The most harmful breaches exploit highly sensitive, personal data rather than just money.

The Vastaamo hack, where psychotherapy session notes for tens of thousands were stolen and used for individual blackmail, demonstrates that psychological and social damage can far exceed the financial loss from a cyberattack.

Get the full analysis with uListen AI

Operational security is where many ‘mastermind’ hackers fail.

High‑profile offenders like Kivimäki have been unmasked through blunders—accidentally dumping entire home directories, reusing handles, or flaunting wealth online—showing that ego and carelessness often undo sophisticated crimes.

Get the full analysis with uListen AI

Basic cyber hygiene dramatically reduces your risk compared to the ‘easy bucket’ of targets.

Using a password manager, unique strong passwords, multi‑factor authentication, and timely software updates won’t make you unhackable, but it moves you out of the lowest‑effort target pool most attackers prefer.

Get the full analysis with uListen AI

Notable Quotes

They’re not advanced but they are persistent and they are a threat and we should take them seriously.

Joe Tidy (on teenage hacking crews as 'noob persistent threats')

Everyone thinks that cybercriminals are masterminds when they’re carrying out the hacks, but they’re not masterminds at covering their tracks.

Joe Tidy

The stuff you say to your therapist is the most sensitive information probably that you could ever hope stays safe.

Joe Tidy

It took about four minutes. The security at Vastaamo was terrible.

Joe Tidy

Hackers will always go for the easiest bucket. If you take yourself out of that easy bucket into the slightly harder bucket, you massively reduce your chance of getting hacked.

Joe Tidy

Questions Answered in This Episode

How should governments and companies rethink incentives so that top cybersecurity talent chooses public‑interest work over higher‑paid private or criminal paths?

The conversation explores how loosely organized teenage hacking crews, exemplified by Scattered Spider, evolved into highly disruptive cybercrime actors targeting major retailers and infrastructure. ...

Get the full analysis with uListen AI

Where should regulators draw the line between responsible threat research and glamorizing or inadvertently rewarding criminal hacker culture?

Get the full analysis with uListen AI

What realistic safeguards can be built into critical systems like hospitals, power grids, and autonomous vehicles to ensure they degrade safely under cyberattack rather than catastrophically?

Get the full analysis with uListen AI

Given the rise of ‘harvest now, decrypt later’ strategies, how urgent is a global shift to post‑quantum encryption, and who should pay for it?

Get the full analysis with uListen AI

How can parents and educators intervene in the common ‘gaming → cheats → hacking’ pipeline before it turns into serious cybercrime?

Get the full analysis with uListen AI

Transcript Preview

Chris Williamson

What's happening with Scattered Spider?

Joe Tidy

(inhales deeply) Well, Scattered Spider is the name of this very loosely coordinated collective of hackers that are, we think, currently causing havoc around the UK and the US as well. So, I don't know if you've heard about the news of the M&S cyberattack and the Co-op cyberattack. So, um, there's a really big ... If you're not in the UK, there's a really big, uh, chain of, of supermarkets called M&S, very much loved, over a hundred years old, one of the pillars of the High Street. And around Easter time, there was a cyberattack which started causing problems for M&S, and it just got worse and worse and worse for them. Because a-ori-... Initially they said, "Actually, we, we can't take orders on the internet," which, for a massive company like M&S is really bad. Then we started seeing logistics problems, empty shelves in some stores, and then around the same time, there was a very similar attack on the Co-op, again, another big supermarket chain in the UK. They also do funeral services and insurance as well. Um, that attack wasn't as bad, but again, we're seeing disruption at stores, empty shelvess, real chaos behind the scenes. And around the same time, we saw an attack on Harrods, obviously the, uh, the luxury retailer in London. Um, so everyone's wondering what on earth is going on. And things have got progressively worse, and then we hear the last couple of days, there are attacks on US retailers as well. And everyone is pointing towards this really infamous group called Scattered Spider. And they're not a normal cybercrime gang. They haven't named themselves that. They are, uh, you know, not very organized. They come together on Discord and Telegram. A little bit like... Have you heard of Anonymous?

Chris Williamson

Yes.

Joe Tidy

Yeah. So, they're a little bit like that, but more out for cybercrime and money and infamy than sort of hactivism. So, uh, one company called CrowdStrike started looking at this activity coming from this sort of corner of the, the cybercrime ecosystem, and they said, "Who are these people? Th- they're doing the same kind of tricks to get into, into places." So they nicknamed them Scattered Spider. Spider's the name that CrowdStrike gives cybercrime groups, and Scattered is, is what they, um, the term they give for, you know, because they're loose and they're all over the place.

Chris Williamson

Mm-hmm. Mm-hmm.

Joe Tidy

And actually, I'm looking right now at the CrowdStrike Scattered Spider figurine. Um, it's very controversial actually that they've done this, but here you go. So this is the... So they sell these on their merch website, and like I say, quite controversial actually because it kind of glamorizes these, these guys, and there are some people who would, who would say, "We shouldn't really glamorize cyber criminals." Because, um, the, the type of individuals that we think Scattered Spider are, very young, probably teenagers, in the US and UK, they will love the attention of having their own figurine.

Install uListen to search the full transcript and get AI-powered insights

Get Full Transcript

Get more from every podcast

AI summaries, searchable transcripts, and fact-checking. Free forever.

Add to Chrome