Chapter

Identifying Unknown Attackers: A Closer Look
listen on Spotify
18:26 - 25:06 (06:39)

The speaker discusses his experience with attempting to identify unknown attackers and trying to determine their motive behind their actions.

Clips
The speaker expresses doubt on the genuineness of a supposed technology support scam due to the grammatical mistakes and friendly attitude of the supposed scammers, but warns of the rapid spread of the worm they used to infiltrate vulnerable systems.
18:26 - 21:47 (03:21)
listen on Spotify
Technology Support Scam
Summary

The speaker expresses doubt on the genuineness of a supposed technology support scam due to the grammatical mistakes and friendly attitude of the supposed scammers, but warns of the rapid spread of the worm they used to infiltrate vulnerable systems.

Chapter
Identifying Unknown Attackers: A Closer Look
Episode
73: WannaCry
Podcast
Darknet Diaries
When victims of ransomware cyberattacks are paying to unlock their files, they often do not receive a proper decryption key, leading security researchers to question the true intentions of some malware.
21:47 - 22:39 (00:51)
listen on Spotify
Ransomware
Summary

When victims of ransomware cyberattacks are paying to unlock their files, they often do not receive a proper decryption key, leading security researchers to question the true intentions of some malware. As such, experts advise against paying the demanded ransom and instead recommend implementing proper security measures and creating backups of important files.

Chapter
Identifying Unknown Attackers: A Closer Look
Episode
73: WannaCry
Podcast
Darknet Diaries
The team discusses their experience with a ransomware attack, including the challenges of determining the motive and identifying the perpetrator, as well as the difficulties in recovering encrypted computers.
22:39 - 25:06 (02:27)
listen on Spotify
Ransomware
Summary

The team discusses their experience with a ransomware attack, including the challenges of determining the motive and identifying the perpetrator, as well as the difficulties in recovering encrypted computers.

Chapter
Identifying Unknown Attackers: A Closer Look
Episode
73: WannaCry
Podcast
Darknet Diaries