Podcast Summary: Danny Jones Podcast #327 – Scammer Payback: #1 Hacker Gets REVENGE on World's Biggest Fraudster | Pierogi (Scammer Payback)
Date: August 29, 2025
Host: Danny Jones
Guest: Pierogi (Scammer Payback, cybersecurity expert, YouTuber)
Theme: Danny’s quest to get smarter—Exploring the dark world of global scam operations, how organized cyber-fraud really works, and the behind-the-scenes of “scam baiting.”
Overview
This episode dives deep into the world of scamming, cyber-fraud, and digital crime with Pierogi, the persona behind the immensely popular Scammer Payback YouTube channel. Pierogi unpacks the origins of his mission, techniques for fighting back against scammers, the scope of organized cybercrime, and the personal and technical sides of both defending against—and offensively targeting—online fraud networks. The conversation balances stories of technological cat-and-mouse, commentary on tech culture and privacy, and real-world impacts on scammers and victims alike.
Key Discussion Points & Insights
1. Pierogi’s Origin Story & The Rise of Scammer Payback
- Pierogi discovered scam-baiting through late-night YouTube binging—combining his cybersecurity expertise with a hunger to take action.
- "My origin story... when I think about it, you would think it's like some crazy kind of a thing. My grandma got scammed... but I was actually at my brother-in-law's house... [he showed me] this guy that calls these scammers on the Internet and he messes with them. ...I was like, I could probably do this as well." [00:22–01:38]
- The content started just for fun, quickly snowballed:
- "I started recording it, putting it on YouTube and kind of the rest is history." [01:38]
2. From Enterprise Security to Scam-Baiting
- Career background in enterprise/network security, protecting institutions from phishing/nation-state threats, ultimately funneled into consumer protection.
- "My world was like nation-state actors going after, you know, hospitals and governments...There's this whole, like, consumer security side that nobody talks about ever." [01:47–02:59]
- Explains sophisticated breaches (e.g. Target’s breach via refrigerator vendor), importance of endpoint security, and strategies hackers use to hide themselves. [04:00–06:11]
3. How Scams Actually Operate
- Outlines evolution from simple “tech support” pop-up scams to elaborate refund/romance/money-laundering schemes.
- "It starts with a phone call... You get this error code on your screen... the support center overseas... was originally legitimate, now they're luring grannies via popups." [08:09–09:51]
- Modern scams: manipulate banking sites, convince victims to move money, launder via US-based “mules.”
- "Instead of 300, we gave you 30,000 or 300,000, you need to actually give us that money back as soon as possible." [11:04–11:49]
- Victims are coerced to lie to banks, use bitcoin ATMs, buy gold bars, or mail cash/gift cards. [12:09–14:19]
4. Anatomy of Transnational Money Laundering
- Explains “Havala” system, layering of overseas scammers with US-based money mules for laundering—networks operate in rental cars, Airbnbs, and shell companies.
- "We uncovered a nine-figure ring… They’re a well-oiled machine… they use our banks, our institutions, under the nose of the government." [18:07–18:46]
5. Law Enforcement Relationships & Legal Gray Areas
- Frequently contacts with law enforcement, FBI, and “three-letter agencies.”
- "They kind of played tough with me… 'we want you to be a mole for free… we're gonna set up a server and you're gonna send us all this information and we're not gonna tell you anything.'" [19:27–20:38]
- Ultimately works with partners who give victim feedback, but draws the line at direct involvement with violent domestic rings. [20:40–21:19]
6. Scams’ Human Toll:
- Describes heartbreaking effects: victims losing life savings, suffering shame, or even dying by suicide.
- "People have lost. They've taken their lives.” [24:23]
- “Imagine being 80 years old and you gave away everything. You have no job, you have no future, right?” [24:32–24:40]
7. Detailed Cases: Romance Scams, Sextortion, Organized Crime
- Extortion and impersonation tactics targeting teens and the elderly—sometimes resulting in tragedy.
- "Two Nigerian hackers were extradited to the US to face charges related to a sextortion ring that led to the suicide of a 17-year-old." [28:21–28:51]
- Romance scams sometimes push elderly victims into shipping phones or laundering money unknowingly. [55:44–57:19]
8. How Scammer Payback Fights Back
- Hack-back techniques: getting into scammers’ computers/networks, exposing their identities, trolling, disrupting operations.
- "Imagine... your laptop, the little light goes on... That's me. I'm turning the camera on because I'm taking your picture. ...We can talk through his computer to him. We can do all sorts of things." [31:00–32:04]
- Works with teams to surveil, collect evidence on, and even orchestrate raids on Indian call centers.
- "At our people's call center, we have 15 call centers around India that we're watching right now... It’s probably 6 or 700 computers of scammers." [34:58–36:08]
- Relies on collaboration with international partners, local assets, and (sometimes) defecting insiders. [79:32–82:17]
9. Indian Scam Ecosystem & Social Dynamics
- Discusses why India became a hotbed for scams: strong math/CS education, English proficiency, and economic desperation.
- "There are so many bright people in India and they're great with technology... Kolkata became this hub for scams... Legit businesses by day, scam call centers by night." [50:00–54:00, 33:35–34:32]
- Many young people coerced into scam work by necessity—sometimes verging on human trafficking. [38:46–40:10]
10. Global Cyber Threats & Systemic Weaknesses
- Talks about chip manufacturing, “backdoors,” and supply chain vulnerabilities in global tech. [107:10–110:10]
- The difficulty of fighting transnational crime—extradition, legal frameworks, and political resistance. [42:17–46:00]
11. AI, Bots, and Information Warfare
- Dangers of bot-driven discourse, “dead internet theory,” loss of genuine human connection.
- "People think they're engaging with people, but they're engaging with corporate interest and government interest of how... they want to shape you to think." [58:00–58:53]
- Commentary on fake engagement, manipulation of comments, rise of AI-generated content. [60:55–63:12, 127:32–130:57]
- Emergence of AI voice/video deepfakes for scams—AI-based social engineering accelerating. [151:12–162:10]
12. Practical Security Advice (Cyber Hygiene) & Defenses
- Password managers, unique passwords per account, using encrypted email services like ProtonMail.
- "Cyber hygiene, if that makes sense. Equate it to brushing your teeth and flossing. ...Use different passwords for all your sites." [136:15–139:17]
- Managing aliases, understanding data brokers, protecting against device-level attacks (OMG cables, USB drives, WiFi fraud). [140:12–150:29]
- General principle: Don't trust unknown devices, networks, or people offering to “help.” [150:29–153:57]
13. Cultural Reflection: The Internet, Greed, and Humanity
- Questions about privacy, technology’s role, digital overload, surveillance culture, and the interplay of power and greed.
- "A lot of life goes down to money and greed, unfortunately. And from money, there comes power." [118:11–119:20]
- Importance of real experiences, independent thought, spiritual balance, and kindness—even to “the enemy.”
- "People are people. I try to see people like how God sees them… I do get frustrated... But I try to also, they're people too." [115:56–116:34]
14. Retaliation and Danger
- Has faced doxxing, threats, and has to take professional and personal security seriously, but says scammers are generally “all talk.”
- "The Indian scammers, they’re talk… they wouldn't dare try to do stuff here in the US to a citizen, like the repercussions." [70:10–70:32]
Notable Quotes & Memorable Moments
On scammer psychology:
- "We use their game against them. We use the greed against them." [82:17]
- "Once the money is gone, there's no way to get it back… that's the $10 billion question." [90:53–90:56]
On the scale of the problem:
- "FBI put a report out for $10 billion… that's just the US. I don't even touch romance scammers, or crypto scammers out of Eastern Europe..." [46:00–46:29]
- "These data brokers... make more than the NFL, the MLB, and the NBA combined. Data brokers off our data. And it's not illegal." [76:03]
On the emotional toll:
- "People have lost. They've taken their lives over what? ...Being 80 years old and you gave away everything. You have no job, you have no future, right?" [24:23–24:40]
On hacking back:
- "Imagine... it's three in the morning. You're trying to get $20,000 from somebody and all of a sudden your laptop camera light goes on… all of a sudden we start talking through his computer to him... We can find your exact location in a matter of minutes…" [31:14–32:35]
On AI, bots, and reality:
- "Dead internet theory… people are like doom-scrolling to the bottom and it's not a real person...you're engaging in a complete [simulation]... It's the Truman Show. We're living in it, man." [58:00–61:41]
On the path forward:
- "If anything, I want people to know that this is not about a couple hundred dollars in gift cards anymore… it is life and death. People are taking their lives because of the shame...” [28:51]
- "I try to take a lens, like it's heavy, like on these calls because we're, you know, joking... but, like, there are people... I try to see people like how God sees them…” [115:56–116:19]
Key Timestamps
- 00:22 – Pierogi’s entry into scam-baiting
- 06:55–07:59 – Collaborating with Jim Browning & Mark Rober (glitter bombs, money-mule investigation)
- 08:17–12:39 – How modern scams work, evolution of tactics
- 15:00–16:19 – Overseas call centers, “Havala” laundering, the scale of crime rings
- 18:46 – Local and federal law enforcement relationships, legal gray areas
- 24:23 – Emotional toll, victims’ suicides, shaming in comment sections
- 28:21–28:51 – Sextortion, tragedy of teen suicide (Jordan Dea case)
- 31:00–32:35 – Exposing scammers, hacking into call centers, the “reverse scam”
- 34:35–36:52 – Tracking scammers, working with authorities in India to orchestrate raids
- 55:44–57:19 – Romance scams, grandmothers sending money to 'celebrities'
- 58:00–61:41 – Dead internet theory & impact on reality, rise of bots & AI
- 136:15–139:17 – Cyber hygiene—practical safety tips for individuals & families
- 150:10–153:57 – Physical device attacks, USB/OMG cables, practical warnings
Final Thoughts & Takeaways
- Scammer Payback is not just entertaining digital vigilantism—it’s a window into the scale and sophistication of global scamming operations and the vulnerabilities in modern digital life.
- Human element: At the core, both victims and many low-level scammers are often vulnerable people—empathy and awareness are crucial.
- Defend yourself: Cyber hygiene, strong password management, protected email, and healthy skepticism about devices, links, and social networks are key.
- Biggest threat: The true danger comes from the combination of organized crime, new tech (deepfake AI, bots), and a legal/political framework slow to adapt.
- Human connection and critical thinking: In an era of bots, false discourse, and AI, genuine connection and independent thought will remain the most powerful defense.
Find Pierogi on YouTube: Scammer Payback
Other platforms: Search “Scammer Payback” for the channel, podcast, and Spotify album.
For those who haven’t listened:
This episode is a must-hear if you want to peek behind the curtain of modern scams, understand both the soul and science of digital crime-fighting, and reflect on how we protect ourselves—and the most vulnerable—in an increasingly connected world.
