Tap to unmute

The Most Mysterious File On The Internet

Share
Embed
  • Published on Apr 14, 2026

Comments •

  • @cybernews
    @cybernews  Month ago +218

    Thanks for watching, we hope you enjoyed it. Do you think there's a file like this hiding in modern networks today, or have we finally caught up?
    Join our weekly newsletter for the latest in tech and infosec: cnews.link/cybernews-newsletter/uVPoq1Svz7g/

    • @DonutSMPThomas24Laine
      @DonutSMPThomas24Laine Month ago +3

      How did you comment 3h ago if the video was made 30 mins ago

    • @a_a_a_a_a_a_a_aaaaaaaa
      @a_a_a_a_a_a_a_aaaaaaaa Month ago +3

      @DonutSMPThomas24Laine time travel?

    • @DonkeyKongGD
      @DonkeyKongGD Month ago +1

      ​@a_a_a_a_a_a_a_aaaaaaaaunlisted video that he listed public, that's how.

    • @ryelor123
      @ryelor123 Month ago +2

      Kabul is in Iraq?

    • @Bambification987
      @Bambification987 Month ago +4

      ​​@DonutSMPThomas24Laine when videos are edited in post then re-uploaded it displays the new upload date but keeps the comments and likes

  • @sideshowmo653
    @sideshowmo653 21 day ago +65

    Don't push your stick into public holes without protection, dudes!

  • @blindluck48
    @blindluck48 Month ago +236

    I absolutley love the sprites representing the viruses.

  • @jamdoodles
    @jamdoodles Month ago +2670

    Worth pointing out that using unclassified USBs or privately-sourced USBs on SIPRNET was always against the rules, and connecting a SIPRNET system to the regular Internet is basically ultra-illegal, so the only way this little guy could get on or off SIPRNET was if people were ignoring the rules. Make all the new rules and regs you want: the weak point is always the meat.

    • @EarthlingNews
      @EarthlingNews Month ago +5

      Always

    • @GuyNamedSean
      @GuyNamedSean Month ago +30

      Computers can't make mistakes. They do exactly what was asked of them. Any time a computer system gets compromised, the source of the error was a human somewhere along the line.

    • @John8087
      @John8087 Month ago

      If the system relies on thousands of people all knowing every single rule and obey them no matter what, then that's not a very secure system to begin with. Take driving for instance, 40,000 Americans die every year on the roads and over a million is injured, all because of people not obeying the rules. Humans make mistakes, humans are unpredictable and stupid, computers ain't, they do exactly what they're programmed to do. The right solution is therefore to design a system that is idiot proof. Or the "least privilege principle" as a fundamental design philosophy when a system is created.

    • @jfbeam
      @jfbeam Month ago +157

      Bingo. I was saying the same thing... "and now he's broken a few hundred laws..." Just bringing a USB stick into a secured network is a violation. Depending on the age of the rule book, the systems shouldn't even have USB ports.

    • @williamwhitehair8365
      @williamwhitehair8365 Month ago +11

      SIPR is it’s own network along with NIPR and JWICS. Three totally independent networks. While NIPR is unclassified and commonly used by govt officials and contractors alike SIPR and JWICS are highly regulated and strictly controlled as to who has access to those networks. Maybe back in the day you could have easily gotten away with plugging in a thumb drive with no one really batting an eye but now it is strictly controlled to who has access to those networks. Most of them are only in SCIF’s which has its limits on who can enter. With everything said nothing is 100% secure. Security is always layers ,but anyone with enough means, dedication, and time can get access.

  • @MattyEngland
    @MattyEngland 19 days ago +133

    Undoubtedly the worm had a tiny hat on it's head.

    • @beybylycyous
      @beybylycyous 8 days ago +2

      u mean he had a WORMHAT?

    • @Ex1st4nt
      @Ex1st4nt 7 days ago

      🙄

    • @MattyEngland
      @MattyEngland 7 days ago

      ​​@Ex1st4nt 90% of the most serious malware originates in Israel.
      I guess if that hurt your feelings, it's lucky i didn't mention Metzitzah B'Peh and Mishnah Niddah 5:4 👀

    • @PaintHerWhite
      @PaintHerWhite 6 days ago +3

      *its. No apostrophe.

    • @nnglnd
      @nnglnd 5 days ago

      Probably

  • @npsit1
    @npsit1 Month ago +886

    As an IT professional, I already know that people cannot be trusted. You have to assume at least 10% of them are going to do something stupid and not obey the rules or regulations.

    • @JonValtandtheEvilRobots
      @JonValtandtheEvilRobots Month ago +11

      Meatware

    • @jamescollier3
      @jamescollier3 Month ago +8

      At a computer software place I worked at a moron opened a zip file that was spam, and infected us. I figure this should be done in the interview. Maybe they send you a zip and see if you open it while you are settling up your interview process

    • @Speedster189
      @Speedster189 Month ago +5

      Do you know how many IT professionals there are in this day and age? A hundred million, Youre not special. Stop declaring your not so special title on every video or forum thread

    • @Moon_x_sun
      @Moon_x_sun Month ago +58

      Only 10%? I thought it would be to assume atleast 50%!

    • @98f5
      @98f5 Month ago +2

      More like 60% bc at least 50 are fake people made by adversaries. Tech support isnt it professional and more than 10% are socially engineering you

  • @yes3858
    @yes3858 20 days ago +38

    00:30 they forgot to add the part where he quickly opened osrs and started AFKing as soon as he sat down 😂

  • @averagestudent1158
    @averagestudent1158 Month ago +1738

    The soldier should have selected eject drive safely before removing the usb 😂

    • @rabokarabekian409
      @rabokarabekian409 Month ago +5

      Recall the "soldier" story is only an proposed idea.

    • @lumikarhu
      @lumikarhu Month ago +15

      @rabokarabekian409 it was a joke

    • @GloomVFX
      @GloomVFX Month ago +40

      Coulda stopped a big mess😂

    • @skeNGk
      @skeNGk Month ago +42

      Haha my first thought too. He just... _unplugged_ it!?! 😮

    • @penntopaper9305
      @penntopaper9305 Month ago +3

      @rabokarabekian409 have you ever heard of a joke

  • @ZzzomQ
    @ZzzomQ 24 days ago +153

    The drama with this whole saga isn't that Agent.BTZ is "The Most Mysterious File On The Internet", but that the Pentagon managed to turn a pretty run-of-the-mill USB worm for the era into a full-blown national security crisis.
    And honestly, that's even funnier and scarier than any spooky mystery stuff.

    • @Cryhavoc19
      @Cryhavoc19 21 day ago +5

      This ... And hardly any one knows

    • @deadmanstoolbox
      @deadmanstoolbox 9 days ago

      Yeah I was about to say this is a pretty typical trojan, but also the DoD retelling is a bit over dramatized considering the stager wasn't even able to reach the public internet, a function needed to actually execute malicious code

    • @brandoncantu195
      @brandoncantu195 6 days ago

      People will always be more scary than ghosts or beasts.

  • @neonyeko
    @neonyeko Month ago +338

    Information of these critical cybersecurity incidents and wars is becoming more important to us each passing day.
    Thank you and your team for making this information more accessible for all.

    • @sad10promo
      @sad10promo Month ago

      Literally just need a 4090 or a 5090, a decent LLM. Then have the LLM watch the video, and it could make something awfully similar.

    • @neonyeko
      @neonyeko Month ago +1

      I said nothing about AI, ​@sad10promo. Respect should be paid to those who put in the time, learned the craft, and offer their work to others - especially when it's offered freely.

    • @RessellWiz
      @RessellWiz Month ago

      @sad10promowhat’s a 4090

    • @marcnhunter
      @marcnhunter Month ago

      @sad10promo ok?

    • @alex-vc8lq
      @alex-vc8lq Month ago

      👍

  • @thewolf5191
    @thewolf5191 Month ago +673

    I actually installed these internet cafes out there for a couple years. We eventually ended up using an image server that would reboot the PCs to original image state after each use. Troops were completely clueless on cyber security. Troops plugging their personal USBs into military and secure devices was out of control.

    • @maramclaine830
      @maramclaine830 Month ago +93

      One of the wildest things I have heard was how top secret training bases were found by kids on the Internet because the troops were using Apple fit bit and watches. Military moves slowly sometimes. Big ship to turn.

    • @drewlop
      @drewlop Month ago

      @maramclaine830
      It was Strava and Fitbit that had some kind of sharing-by-default on, if I recall correctly (not that Apple hasn't had their own issues, too, just Strava was a problem in sizable numbers)

    • @johnsmithy2317
      @johnsmithy2317 Month ago +1

      Awesome 😎

    • @TrashKitty1254
      @TrashKitty1254 Month ago +22

      @maramclaine830 No no no, those are totally african locals running laps in the middle of nowhere, don't worry about it!

    • @UD503J
      @UD503J Month ago

      @maramclaine830 It was the Strava running heatmaps. Strava is an app that tracks walking and jogging, and they compiled all the information into a single heatmap that showed popular routes. Someone found unexpected lines in the middle of Syria, Afghanistan, heck there was even one at Groom Lake.

  • @wuldntuliktonoptb6861
    @wuldntuliktonoptb6861 Month ago +917

    Ah system32 you wanna make sure to delete that file it slows performance down way to much

    • @lumikarhu
      @lumikarhu Month ago

      he never said system32. it was InProcServer32, a com hijacking technique for gaining persistence, works to this day

    • @LarsBjerregaard
      @LarsBjerregaard Month ago +7

      😄

    • @OgamiClan
      @OgamiClan Month ago +9

      Can confirm. Can cause the system to crash randomly too.

    • @lumikarhu
      @lumikarhu Month ago +12

      @OgamiClan cannot confirm. after deletion it also downloaded more ram for me. more space in the computer = more space to install things. that's logical man.

    • @rmt3589
      @rmt3589 Month ago +110

      Y'all gonna confuse the AI reading this. 😂

  • @Kas_Styles
    @Kas_Styles Month ago +315

    Bluring the reflection of the glasses on the guy. Smart.

    • @BPL-Whipster
      @BPL-Whipster Month ago +22

      Also his achievements on the wall, and even a subtle blur of the portrait on his desk I think.

    • @sylphus
      @sylphus Month ago +39

      The glasses are not blurred at the end of the video haha

    • @n-i-n-o
      @n-i-n-o Month ago +8

      @sylphus i never understand something like this.

    • @codycast
      @codycast Month ago +9

      Timestamp? What are you talking about

    • @johnsmith1953x
      @johnsmith1953x 25 days ago +7

      "If you can read this reflected post it note, I'd like to talk to you"

  • @njmcfreak
    @njmcfreak Month ago +129

    Once you realize a lot of people even in cyber security even at high levels, don’t really understand how a computer works and are there to collect a paycheck and follow a trouble shooting checklist. It becomes clear just how easy it is for a well seasoned hacker to just go wild.

    • @Cryhavoc19
      @Cryhavoc19 21 day ago +2

      This 💯

    • @swapnilmankame
      @swapnilmankame 16 days ago +1

      or how 10 year old kids easily stumble into hacking Nasa or the Pentagon.

    • @ZuckEnabler
      @ZuckEnabler 15 days ago +1

      So much cybersecurity is pointless shit someone made up years ago to sound relevant. Like why do we call it a type 1 and type 2 biometric failure? Why not say false positive and false negative?
      I dunno but I'll bet it was some some academic or NSA guy fluffing up a paper, finding ways to become 'experts'.

    • @SaslJr
      @SaslJr 2 days ago

      @ZuckEnabler While it doesn't negate the overall point, the terminology for type 1 and type 2 errors comes from the field of statistics and was established in the early 30s. Basically, a paper said "here are the two types of errors that can happen when testing a null hypothesis," and the terms came from the order they were listed in.

    • @ZuckEnabler
      @ZuckEnabler 2 days ago

      @SaslJr I didn't know that, makes sense... and doesn't make sense.

  • @chris.heffernan
    @chris.heffernan 28 days ago +108

    So what you’re saying is, the NSA created BTZ, just to secure more funding. Interesting

    • @williambates3277
      @williambates3277 24 days ago +5

      🤫

    • @buff_0292
      @buff_0292 16 days ago +8

      thats exactly what i was thinking haha ! Cause the nsa has access to every cpu out there but can't find the og server ? bffr it's not like russia is the only country that could benefit from a worm infecting 90% of all computers on earth and feeding info milliseconds after finding an internet connection

    • @TotallyRadical3
      @TotallyRadical3 15 days ago +1

      I mean, it's nothing new. The British used to fund pirates in China so they could send more naval ships in as defense. All in the name of defending their economy and totally not to subvert the Chinese government and slowly rip away their coastal access.

    • @Kamexe
      @Kamexe 8 days ago +3

      This isnt an uncommon thing. Gotta love our taxes not going where we think its going.

  • @MrSchism
    @MrSchism Month ago +37

    Mikko's an absolute legend.

  • @katejay9786
    @katejay9786 25 days ago +30

    22:31 TIL: the US military discovered the concept of "antivirus software" in 2008.

    • @toolshed47
      @toolshed47 16 days ago +5

      2026 US military discovers the concept of FPV drones. This is what we pay 1 trillion dollars for.

  • @zaqway
    @zaqway 28 days ago +118

    Government, having a rare good idea: "we are allocating funds towards defense against malware"
    NSA: "okay, we will use this for offense and developing methods of mass surveillance"
    That pretty much sums up all three letter agencies.

    • @Swellington_
      @Swellington_ 27 days ago +4

      What,you think they’re bad/evil and need defunded? They give no fu@ks about what you or I are doing bro. Trust me. They aren’t watching us do absolutely nothing. Literally nothing. Let it go man. The US is on the right side. Not perfect but it’s a complex world out there and takes complex decisions to navigate

    • @jove8366
      @jove8366 27 days ago

      ​@Swellington_you're either braindead or a bot. not sure which

    • @rubikmonat6589
      @rubikmonat6589 27 days ago +13

      ​@Swellington_Not this year. Read the global news, not US sources.

    • @SF-Acepilot
      @SF-Acepilot 25 days ago +2

      most. But you would still have malicious folks in every agency.

    • @rayjynx
      @rayjynx 24 days ago +8

      ​@Swellington_ saying this based on the current world situation...are you a bot? or just delusional?

  • @starbrandX
    @starbrandX Month ago +162

    Good old autorun

    • @ZuckEnabler
      @ZuckEnabler 15 days ago +6

      Right? I'd turned that shit off pretty much SOP on any of my personal devices.
      I remember burning those little mini cd's and having my girlfriend write "Spring Break Pics

  • @SeenSinner
    @SeenSinner Month ago +332

    14:54 Kabul is in Afghanistan, not Iraq

    • @stop7556
      @stop7556 Month ago +62

      Funny enough, within the first minute they identify kabul being in Afghanistan

    • @rockstarOkichiwa
      @rockstarOkichiwa Month ago +3

      Its not on the one great nation map

    • @bufordhighwater9872
      @bufordhighwater9872 Month ago +78

      ​@stop7556That's what happens when they use AI to generate their content. They never think to proofread the script before they upload. I had wondered if this was AI generated, and that about seals the deal. If they can botch Kabul, who knows what else is.

    • @stop7556
      @stop7556 Month ago +4

      ​@bufordhighwater9872quality doesnt imply AI. Could have easily had split the video into 3 parts and used fiver to fill out those parts etc.

    • @cybernews
      @cybernews  Month ago +195

      Hey, you're absolutely right. Believe it or not, that's exactly what happens when you have a team of meat-based humans (and no AI) staring at a script for too long. Absolute brain-fart on our end. We're aware that Kabul is in Afghanistan as the entire video premise is built on that, and it's not going to happen again. Thanks for calling us out!

  • @nc50express
    @nc50express Month ago +30

    Imagine the vulnerabilities today with every service member having all their personal devices all over the place that are internet connected.

    • @Speedster189
      @Speedster189 Month ago +23

      1 word. TikTok. The Chinese spyware got millions and millions of soldiers GPS location every 15 seconds for a decade. They got their photos (and metadata). Lifelong metadata tracking their locations throughout a lot of their lives. Their biometric face data.
      The Chinese said that all the data was destroyed or given to the new american owners of tiktok. If you believe they did not backup that data I got a castle to sell you

    • @abandonedmuse
      @abandonedmuse Month ago +5

      And open Claw on the Internet I’m having a panic attack right now. Do these people not realize what’s going on? I feel like if they’re like 200 years behind and they’re thinking like caveman.

    • @TrashKitty1254
      @TrashKitty1254 Month ago +5

      @Speedster189 Safer to assume TT was tracking GPS at all times.

    • @TrashKitty1254
      @TrashKitty1254 Month ago +5

      @abandonedmuse "A person is smart. People are dumb, panicky, dangerous animals, and you know it!"

    • @basicivmatt917
      @basicivmatt917 21 day ago +2

      GNC a Chinese owned company on US military bases everywhere collecting data on soldiers.

  • @from94till
    @from94till Month ago +51

    But did they try turning off the computers and turning them back on?

  • @micah8355
    @micah8355 3 days ago +1

    I love that the WIndows Wallpaper color changes from XP Home to XP Pro when he goes to work. Top notch

  • @lukelb-1
    @lukelb-1 Month ago +69

    1:14 I appreciate that you showed a command prompt window to indicate code being executed

    • @jamescollier3
      @jamescollier3 Month ago +4

      I like the little skull with white lighting to show the thieving

    • @lukelb-1
      @lukelb-1 Month ago

      @jamescollier3 that's elite as well

    • @infn8loopmusic
      @infn8loopmusic Month ago +4

      In reality on screen you would probably not see anything at all. the firmware probably just exploits a memory execution vulnerability in the kernel, embedding it's processing bits into the kernels running memory as a low level process with system level access. After that it just continues mounting normally like any normal flash drive would, user unbeknownst.

    • @ShenDoodles
      @ShenDoodles 27 days ago

      Makes me think of Sos Sosowski using Hacker Typer to fake coding on the news to fuck with people.

  • @powerpaul1995
    @powerpaul1995 Month ago +9

    This might have been intentional. Just recruit someone and tell him to stick this in your office computer.

  • @Tchaymz
    @Tchaymz 21 day ago +5

    Love the tone of this video. It’s slow-paced enough that the viewer can absorb the information and not feel overwhelmed and the concepts are explained in a clear and didactic manner without making one feel like an idiot. A very delicate balance to strike, especially when it comes to such technical topics that tend to make people want to run in the other direction. Well done!

  • @l.m.892
    @l.m.892 Month ago +32

    The first thing I would have done is to set up a sandbox system with the worm and determine what server it was trying to connect to. If you can't identify where the payload is going, you haven't done much. I would think the NSA would have better resources than I do. What they did doesn't make sense.

    • @screenteasing
      @screenteasing 26 days ago +4

      These are the specific things that made me drop many conspiracy theories over time. I'm sure there are some "hidden" groups steering society in some ways, but most of the time even governments relying on single skilled individuals on certain topics... They are as riddled with problems as any other workplace.

    • @refundreplay
      @refundreplay 23 days ago +6

      You're engaging Normal Human Thinking.
      Try using Government Goon Thinking.
      You'll be able to process the information more completely.

    • @SomeDude0881
      @SomeDude0881 15 days ago +2

      This is 2026 brother. This is just not what they did back then. You’re underestimating how long ago this was.

    • @ZuckEnabler
      @ZuckEnabler 15 days ago +3

      Dude people would break into government systems for fun and bump into other hackers already on the same systems. It was an absolute clusterfuck.

  • @eey8909
    @eey8909 Month ago +15

    Would it not be easier to completely remove the usb ports on computers that are connected to vulnerable networks? Like wtfk???

    • @unnamedchannel1237
      @unnamedchannel1237 10 days ago +2

      No because there are things that need to use USB’s .
      Example keyboards and mice .
      A decent antivirus will know the difference between a storage device and other but that is not 100% accurate

    • @unnamedchannel1237
      @unnamedchannel1237 9 days ago

      @nicholasbridge829it’s not just keyboards and mice . Think about how many peripherals run on USB.
      Just because you log out USB storage devices via group policy or AV , it’s not 100%

    • @SineN0mine3
      @SineN0mine3 9 days ago +3

      ​@nicholasbridge829 they're slowly coming around to this line of thinking. Militaries are big places, parts of them are more secure than others. I imagine there are already military facilities that have removed access to USB ports and started to move towards more restricted hardware.

  • @2-meter
    @2-meter Month ago +9

    So wait, you’re telling me it turn Internet Explorer into Chrome?

  • @couldntfindafreename
    @couldntfindafreename Month ago +40

    The mistake was to use Windows in the first place.

    • @Quickened1
      @Quickened1 Month ago +5

      Awww c'mon, Windows was fun! I've played with them all, but the abundance of software and ease of use with Win 95/98 was astounding!

    • @seijirou302
      @seijirou302 25 days ago

      Avoiding windows won't save you. If you aren't being targeted it's because you don't matter, not because of your platform.

    • @unnamedchannel1237
      @unnamedchannel1237 10 days ago +5

      Linux and Unix are not immune to this type of thing.
      The only reason windows is targeted so heavily is that it has the biggest market share so the chance of compromise is much higher .

  • @joebob6763
    @joebob6763 Month ago +12

    How embarrassing for the government to get hacked by an activex control, just hilariously incompetent.

  • @bennygerow
    @bennygerow Month ago +11

    19:45 well that's not Orwellian at all

  • @JohnnyFaber
    @JohnnyFaber 8 days ago +2

    The reflection of the monitors on the guys glasses is comically distracting 😂

  • @UnorthodoxTantrums
    @UnorthodoxTantrums Month ago +21

    Intelligence failures like this and 9/11 teach us that as smart or as well resourced as the US government is, it still manages to repeatedly fumble the ball due to small minded bureaucrats.

    • @ccsaunas
      @ccsaunas Month ago +10

      You should look into 9/11 a bit more. Architects and Engineers for 9/11 Truth would be a good start. “Explosive Evidence”.

    • @BroosDager
      @BroosDager Month ago +5

      ​@ccsaunas As a mechanical engineer in the building trades, I knew something was fishy that night when bldg 7 fell.

    • @jlev505
      @jlev505 Month ago +4

      @ccsaunastiny hats posing as “art students” rigged the explosives to take down the towers and get their wars! Damn 🧃🧃.

    • @mannyftw
      @mannyftw 26 days ago +4

      The Israeli E-Team posed as art students to gain access to sensitive facilities (including unlabeled FBI offices lol). What kind of art project needs BB18 detonation cord? The one at the Twin Towers, apparently 🤭🤭

  • @pollianapavloski7911
    @pollianapavloski7911 Month ago +17

    The visuals of this video are incredible! As always I appreciate your level of detail and the quality of this documentaries.

    • @arciphera2757
      @arciphera2757 19 days ago +1

      yeah, the level of detail and quality is so incredible that (at 0:40) they show an RTF on the computer screen while describing a PDF. 😆

    • @cybernews
      @cybernews  12 days ago +1

      @arciphera2757 Apologies for the mis-match, will pass it on to our editing team! 🙇

  • @PJW.418
    @PJW.418 Month ago +9

    Even 17 years ago (2010) USB-use in a restricted area was prohibited, except for select personnel. Proper security protocol disallowed use of external drives for office use, both physically, OS and network.

  • @JuiceDMV
    @JuiceDMV 19 days ago +1

    Imagine being the mastermind and coming across a whole documentary about some shit you did ages ago and forgot about 😂😂😂

  • @stefanmilicevic5322
    @stefanmilicevic5322 Month ago +11

    Once again, amazing work, mates! High quality, excellent animations, informative content, impressive and clear storytelling. Keep it up!

  • @CalebFultz
    @CalebFultz Month ago +10

    Mikko looking like Christian Bale and he are about to Prestige

  • @williamhelms1781
    @williamhelms1781 22 days ago +3

    There is no such thing as a secure network

  • @BoxheadHakx
    @BoxheadHakx Month ago +20

    1:35 *Publicly* little is known.

    • @creak_creak
      @creak_creak Month ago +2

      these are relative adjectives, to desctibe, not to state solid facts

    • @dvsur
      @dvsur Month ago

      Yes, and internally?

    • @MonographicSingleheadedM-sp2wk
      @MonographicSingleheadedM-sp2wk 17 days ago

      @dvsur either it is known in the hacker circles, very likely. every job has their ins and outs. or the author of the comment suggests to know more than most ppl, is he the author of that worm? maybe, very unlikely. :) still, a fun thing to consider.

  • @cosmoBUZ
    @cosmoBUZ 25 days ago +2

    16:17 once the screen reflected on his glasses becomes cartoon eyes you cannot unsee

  • @petrichorbabe
    @petrichorbabe Month ago +39

    The way that I was genuinely sitting here watching this with “beer, pizza, an internet connection, and nothing better to do” and was like
    👁️👄👁️

  • @Skullzy22
    @Skullzy22 Month ago +7

    love how he does not mention the name of the air force cyber core

  • @Krynos18
    @Krynos18 Month ago +44

    "Kabul, Iraq" never heard of that place

    • @TillmanVatter
      @TillmanVatter 26 days ago +15

      Americans. Enthusiastic, but clueless.

    • @staticlimpet
      @staticlimpet 25 days ago

      @TillmanVatter Is that where the Iahtolla lived?

    • @bomaniigloo
      @bomaniigloo 22 days ago

      ​@TillmanVattereuropoors...poor and seething

    • @Lupinskey
      @Lupinskey 22 days ago +1

      ​@TillmanVatterSorry we don't know every location on earth by heart. 🙄

    • @Whyusemyname
      @Whyusemyname 21 day ago +5

      Does it really matter. Iran, Iraq, Afghanistan. Just another place US troops should never have been in the first place.

  • @NateTheMeh
    @NateTheMeh 19 days ago +1

    Incredible production quality. Please keep making these!

  • @letsRegulateSociopaths

    Only one country is allowed to be anywhere near physical computers in the United States. The blue and white

  • @extrabagante0417
    @extrabagante0417 21 day ago +1

    Now imagine this administration… defunding our cybersecurity team smh

  • @bslate07
    @bslate07 29 days ago +2

    The fact we'd ever have sensitive information on thumb drives is mind boggling.

  • @tonyk438
    @tonyk438 Month ago +3

    Wait, they couldn't debug a thread? I would suspect they know what it did.

  • @DinJaevel
    @DinJaevel 21 day ago +7

    There is one country, who in their paranoia and megalomania, continuesly infiltrate their own allies. They are in the absolute forefront of cyber warfare, surveillance and hacking. They are never mentioned by these allied leaders, as they are often put in a position of gratitude or threat of exposure. This singular country has one of the worlds most sophisticated apparatuses. They know everything, but mysteriously they miss giant preparations of attacks, they are suddenly surprised by new terrorist cells appearing. They have been caught with their fingers in false flag operations so many times it is extremely hard to keep track of it. And yet far more more of their operations have been successful. They are still allowed to keep doing their nefarious deeds, killing literal millions of people.

  • @azuree.nekowo
    @azuree.nekowo Month ago +2

    Nice, a new documentary to watch! Love y'all contents

  • @Haywire-Alguire
    @Haywire-Alguire 10 days ago +1

    Build it so it's bulletproof.

  • @motocamp84
    @motocamp84 Month ago +16

    I can totally see how the theory that perhaps a soldier purchased a USB thumbstick from a vendor in Iraq could be an entry vector. Back in 2005, I was deployed to Camp Fallujah, Iraq as a logistics analyst. I purchased a USB thumbdrive, but I purchased it from the actual Camp Fallujah PX.. how secure is that logistics chain? I'd be that it isn't so secure that a bad actor couldn't insert infected usb thumbdrives into the chain. Another thing I just though of was that bootleg DVD vendors were VERY common around and even on military bases in Iraq (and probably Afghanistan?) back then. You could buy a bootleg set of The Wire or whatever for a few bucks from the vendor outside the DFAC (dining facility). DVDs can also have autorun features, so all it might take is someone putting the wrong DVD into a SIPRNET connected computer and bam, infected.

    • @samward9641
      @samward9641 Month ago +5

      Or John McAfee donated a bunch of computers to the government😂

    • @samward9641
      @samward9641 Month ago

      Because they quit using his antivirus shitt they found out it was him and they got pissed that's why he took off and ended up dead in Spain

  • @DamenHansen
    @DamenHansen 13 days ago

    Great content! Thanks for your work.

  • @irmofs
    @irmofs Month ago +7

    SO, the NSA just edited the DNS server to point to its own servers? I am still struggling on how the heck it got into the NSA network.

    • @Jay-j5z1q
      @Jay-j5z1q Month ago +5

      😂 it's a USB worm my mans... So it came from a USB! 😅

    • @lumikarhu
      @lumikarhu Month ago +2

      how did you come to that conclusion?

    • @irmofs
      @irmofs Month ago +1

      @lumikarhu Narrator mentioned they needed to stop the virus from calling HOME. Unless it used an IP to call home, it likely used a domain. And they needed to route it to their IPs... So, edit the internal DNS server to point to a "fake" c2c server

    • @Goretantath
      @Goretantath Month ago +1

      @irmofs i wouldnt doubt it using an ip, which is why i love the idea of creating a specific way to fake ip addresses in a lan to emulate the home server.

    • @Goretantath
      @Goretantath Month ago +1

      as long as you have physical access to a machine or its drives, you can do whatever your creative mind is capable of and fake being anything you want to fake.

  • @schubiduba1
    @schubiduba1 8 days ago +1

    Classic red team move like the drones over us bases

  • @loadingA1601
    @loadingA1601 Month ago +15

    Kabul is in Afganistan not Iraq. 14:50

    • @lexacutable
      @lexacutable Month ago +2

      absolutely insane error

    • @anon15091
      @anon15091 Month ago +1

      this video seems poorly researched, I guess anyone can make high budget looking animations nowadays

    • @loneranger3041
      @loneranger3041 29 days ago +2

      Amuricans and geography

  • @tonysmith7632
    @tonysmith7632 Month ago

    Enjoyed this. Thank you team.

  • @gregoryallen0001
    @gregoryallen0001 Month ago +5

    guess what you guys this is a self hack the call is coming from inside the house p a l a n t i r

  • @CaseyGlynn-g9r
    @CaseyGlynn-g9r 11 days ago

    Excellent Video. Great work!!

  • @MiguelOrtizKetoRacing
    @MiguelOrtizKetoRacing Month ago +12

    Considering I was in Afghanistan in the early 2000s in digital forensics for the military I’ll check some of my old equipment to see if anything is still infected 😵‍💫

  • @Haywire-Alguire
    @Haywire-Alguire 10 days ago +1

    The Cyber Security companies make billions.

  • @stevec00ps
    @stevec00ps Month ago +3

    The reflections on his glasses was blurred for the whole video up until the last 30 seconds :D

  • @larsandrehansen6141

    Refreshing to see such a quality video, kudos to you guys! Keep up the great work!

  • @JimThompsonL-d3r
    @JimThompsonL-d3r Month ago +4

    I have a strong feeling we know who patient zero was.

  • @briansproule20
    @briansproule20 20 days ago

    another great video. really enjoy the documentaries

  • @George-fu9vu
    @George-fu9vu Month ago +25

    18:43 oh no! A house infected with computers! 😅😅

  • @AnInspirat10ned
    @AnInspirat10ned 16 days ago

    Man, I absolutely adore watching your masterpiece vids!! Such a pleasure... Keep up THE BEST work! Looking forward for upcoming videos of the series!

  • @AchtungAffen
    @AchtungAffen Month ago +3

    14:56 Kabul, Iraq.... ? Isn't that Afghanistan's capital?

  • @niksman
    @niksman 8 days ago +1

    A soldier in Kabul rings a doorbell at a place where there's a line to use a computer. He sits down at the computer and enters his password and login on an unknown computer in Kabul, in an unknown apartment, among unknown people. After working with his email, the soldier takes the flash drive and turns off the computer. Either the soldier was last in line at this computer. Or the soldier decided that after him, no one else needed the computer. This introduction alone suggests that the story is complete nonsense, the narrator of which didn't bother to make it plausible.

  • @mick8888V
    @mick8888V Month ago +68

    I cannot imagine what is cooking now that AI has entered the arena.

    • @RussShotThis
      @RussShotThis Month ago +1

      It’s been here and has been here for at least a decade.

    • @AgapeEngineer
      @AgapeEngineer Month ago

      checkout cyber polygon 2021 and ull see whats cooking

    • @JimThompsonL-d3r
      @JimThompsonL-d3r Month ago +11

      Apparently it blew up 3 schools killing hundreds in lran

    • @JimThompsonL-d3r
      @JimThompsonL-d3r Month ago +5

      It worked perfectly according to Satanyahoo

    • @Speedster189
      @Speedster189 Month ago

      What are you even talking about? Were discussing viruses not AI. Dude.

  • @MrGivmedew
    @MrGivmedew 27 days ago +1

    It was right around the time that this happened that Verizon Wireless told all of its employees to stop using personal USB devices and if we needed a drive that they had an encrypted one they’d send.
    Now I’m wondering if the timing is because of what happened in this story.

  • @Centerpieceofmind
    @Centerpieceofmind Month ago +12

    If you pronounce "cafe" as "cuh-fay", there is, in fact , a special place in hell for you.

    • @johncharles2357
      @johncharles2357 Month ago

      hahaha. I caught that too. Maybe it’s just not a word he says often

    • @JeffBilkins
      @JeffBilkins Month ago +1

      Bad AI voicr

    • @lumikarhu
      @lumikarhu Month ago +1

      how is it pronounced in american english then? i'm not a native obviously, just genuinely curious

    • @lumikarhu
      @lumikarhu Month ago

      cuh-feh?

    • @jeffs1571
      @jeffs1571 Month ago

      ​@lumikarhu "Ca" pronounced the way it is in "Cat"
      "Fe" pronounced like the first half of the word "fade"

  • @YourTypicalGringo
    @YourTypicalGringo 14 days ago

    If I wanted this many commercials I'd watch cable tv.

  • @Rob63324
    @Rob63324 22 days ago +10

    Massive respect to the strong men that loaded the servers on to the truck. Glad they got a mention.

  • @DerbyBandit
    @DerbyBandit 9 days ago

    Is this what causes the death blue screen? 🤣🤦‍♂️

  • @BiggestCorvid
    @BiggestCorvid Month ago +4

    14:55 "Kabul, Iraq"
    Great video, silly mistake to get through the editing process. Baghdad is the capital of Iraq; Kabul is in Afghanistan

  • @LycanShift
    @LycanShift 20 days ago +2

    you'd think these morons in government, especially national security and military, wouldn't use standard public devices/ports.. rather custom proprietary things.. like "USB" drives but with a different sized connector and different pin layout, then moronic employees can't go sticking it in their civilian device, or worse, public computers. Sure it could still be hacked or whatever if someone got their hands on it the same as any usb device, but this is more just to prevent moronic employees/contractors or military personel from casually breaking isolation/security protocols, forcing them to only use government/military devices as their propreity usb device only fits in those secured devices, rather than risk them being able to use on unsecured public devices. Also the protection goes both ways, as the government/military computer only has those custom ports, so a standard civilian usb key or whatever device can't plug in.

    • @PratosKS
      @PratosKS 13 days ago

      Pretty expensive solution for the basic SIPRNet computers. SIPR is one step above a basic computer with internet access. Everyone in the military has access to it. It's not a super secret network or anything. It's much easier to log anything that's not whitelisted that's plugged in. Trust me, they know who you are and when you plug something in. 2008 was just a different time also, still using win xp since 7 wasn't out yet.

  • @delta_fox789
    @delta_fox789 Month ago +4

    Kabul is in Afghanistan, not Iraq

  • @NANASHIIDC
    @NANASHIIDC 11 days ago

    THE WARFRAME TRADE NOISE IS TRIPPING ME OUT. I CANT BE THE ONLY ONE

  • @bogartwilley
    @bogartwilley Month ago +41

    33:05 - PUPPY!!!!!!!!!!!!!

    • @eadigi3057
      @eadigi3057 9 days ago +1

      Your Sight scares me....

    • @bogartwilley
      @bogartwilley 9 days ago

      @eadigi3057lmao I wear soda pop bottle tier glasses

  • @FortyTwoB
    @FortyTwoB 10 days ago

    Hearing Red October unlocked so many memories.

  • @Charlie-b2i
    @Charlie-b2i Month ago +7

    I don’t think we can Come To any conclusions based off similar code after 6 years. It could be that the Russians who made the snake malware learned from this 2008’incident

    • @abandonedmuse
      @abandonedmuse Month ago

      I believe that among thieves, that might be a sort of transgression because the whole thing of becoming a honored hacker is writing your own code. the piggy backers are the script kiddies, the real hackers, and what they pat themselves on the back for is the fact that they can write their own pieces of Malware. That’s how you earn badges in that world

    • @Charlie-b2i
      @Charlie-b2i Month ago +1

      @abandonedmusebut do you think a state agency like the FSB would care about that? Or about efficiency and results?

  • @Ivor67
    @Ivor67 16 days ago

    Terrorists watched that soldier go in and out, so they just waited.

  • @lucasdnasa3926
    @lucasdnasa3926 Month ago +11

    more cool damn well produced documentaries!

  • @PeterScream
    @PeterScream 13 days ago

    This is great - more of those please

  • @Psyopcyclops
    @Psyopcyclops Month ago +31

    19:25 All the money bouncing into coffer, and then some of it bouncing out and disappearing is a perfect visual of government spending.

    • @bird2049
      @bird2049 19 days ago

      Happens in the private sector as well

  • @brandons2079
    @brandons2079 25 days ago +2

    You did all of this research and then said Kabul, Iraq…

  • @GOMANGOOOO
    @GOMANGOOOO Month ago +3

    love this channel :D

    • @lumikarhu
      @lumikarhu Month ago

      try darknet diaries podcasts, they're golden

  • @MarcoSuriani
    @MarcoSuriani 13 days ago

    “We have a problem.We’ll need a ton of pizza and coffe”

  • @sandelsbanken7362
    @sandelsbanken7362 Month ago +6

    Hyppönen the goat.

  • @thesylveon4122
    @thesylveon4122 11 days ago

    this video could also be titled: how the military's incompetence let someone onto their own servers

  • @sakuraWasTaken123
    @sakuraWasTaken123 Month ago +183

    Honestly I don't get how the early 2000s wasn't just virus-filled to the brim, so many more security vulnerabilities existed then lol.
    Edit: turns out I was wrong my bad everyone

    • @borderroar
      @borderroar Month ago +25

      it was, you just didn't see them

    • @Galaxia_000
      @Galaxia_000 Month ago +11

      they exixt nowadays too maybe less but still exist
      problem is that no one knew about them and no one knows about them now

    • @BPL-Whipster
      @BPL-Whipster Month ago +85

      It absolutely was. That's how companies like McAfee and Symantec became successful in their day.

    • @youtubesucksass6969
      @youtubesucksass6969 Month ago

      They were definitely around. It wasnt reported on AS much before it became openly used by nation state actors. Additionally the older malware tended to be more in your face and destructive. Now a days a lot of malware has a huge focus on stealth.

    • @Justinanomaly
      @Justinanomaly Month ago +91

      It was, we just didn’t put all our personal information online so it didn’t really matter, and there was not really much to be gained other than doing it for the love of the game

  • @brandonlm0125
    @brandonlm0125 Month ago +2

    If you had a thumb drive that went onto the sipr or anything work related, it was covered with red stickers saying “secret”. If that idiot was plugging thumb drives in anywhere all Willy nilly, he was an absolute moron who shouldn’t have a clearance.

  • @ShannonWare
    @ShannonWare Month ago +10

    "A tale of two bureaucracies"

  • @blasting1148
    @blasting1148 12 days ago

    I was going to have this on in the background while playing some games, but the editing is so good I decided to watch it fully. Great work!

  • @sugarpolecat4781
    @sugarpolecat4781 16 days ago +9

    Cybercommand sounds hardcore as heck
    "Where do you work?"
    "CYBERCOMMAND"
    You're basically the coolest dude in the room

  • @project.jericho
    @project.jericho 6 days ago +1

    Mike McConnell's 'worst fear' tells you everything you need to know about the US government's perspective on the citizen.

  • @drag0nz692
    @drag0nz692 Month ago +112

    14:52 kabul?iraq? American educational system needs a bigger budget lol

    • @Silandrovich
      @Silandrovich Month ago +4

      Turkmenistan mentioned! Inshallah

    • @n30gn0sis
      @n30gn0sis Month ago +17

      Or AI slop needs some improvement

    • @Špý-VS-Špý
      @Špý-VS-Špý Month ago +2

      I just past that part. 😂

    • @Silandrovich
      @Silandrovich Month ago +12

      ​@n30gn0sis or just needs to have no recognition and get called out everytime.

    • @strawberrybeatlesforever1967
      @strawberrybeatlesforever1967 Month ago +3

      As an american, I can confirm our education system needs to be overhauled badly.