PirateSoftware says he used to hack for the U.S. Government Department of Energy

The resurfaced clip has viewers wondering if Thor really was a government hacker, or if he was just LARPing as one.
Streamers reacting during a gaming livestream
(Image via Code Jesus on YouTube)
TL;DR
  • A podcast clip shows PirateSoftware describing his past work conducting social engineering and security tests for Blizzard and the Department of Energy.
  • His described duties included running phishing campaigns, attempting physical infiltration, and testing human security vulnerabilities.
  • Security professionals note these activities are standard corporate security practices rather than advanced hacking, leading to debate about how he frames his experience.

A recently resurfaced video has thrust indie game developer and streamer PirateSoftware back into the spotlight, showing him describing his previous career in cybersecurity before his current game development focus. In the clip, originally from a podcast interview, PirateSoftware (real name Thor) details his experience performing social engineering and penetration testing for major organizations.

The video shows PirateSoftware explaining how he conducted security assessments while working for Blizzard Entertainment and later on government contracts, including work with the Department of Energy. His described responsibilities primarily involved testing human vulnerabilities in security systems rather than technical exploits.

His work reportedly extended to physical security testing as well. PirateSoftware describes attempting to infiltrate buildings by tailgating authorized personnel, observing door codes, and testing other physical access controls—standard practices in comprehensive security audits.

Most notably, PirateSoftware mentions conducting security testing on power plants through Department of Energy contracts while working at Eagle Research Group as a Cyber Security Specialist. He frames this experience using the term “hacking,” though clarifies his focus was primarily on human-centered security vulnerabilities.

The clip has brought new attention to PirateSoftware’s professional background. Although he claims to be a high-level hacker, according to LinkedIn, he was simply a social engineer. While social engineering is a legitimate and important aspect of cybersecurity, security professionals note that these tasks are often entry-level positions that utilize commercial platforms like Knowbe4 for phishing simulations and employee training.

PirateSoftware has previously mentioned working at Blizzard, though his roles reportedly included Quality Assurance before moving into security-related work. His LinkedIn profile lists experience in penetration testing and working with sensitive networks, aligning with the duties he describes in the video.

Community Reactions
How do you feel about this story?
👍
0
👎
0
😂
0
😡
0
😢
0
Explore More
Meet the Editor
mm
Head of Spilled