Chapter
Clips
The speaker expresses doubt on the genuineness of a supposed technology support scam due to the grammatical mistakes and friendly attitude of the supposed scammers, but warns of the rapid spread of the worm they used to infiltrate vulnerable systems.
18:26 - 21:47 (03:21)
Summary
The speaker expresses doubt on the genuineness of a supposed technology support scam due to the grammatical mistakes and friendly attitude of the supposed scammers, but warns of the rapid spread of the worm they used to infiltrate vulnerable systems.
ChapterIdentifying Unknown Attackers: A Closer Look
Episode73: WannaCry
PodcastDarknet Diaries
When victims of ransomware cyberattacks are paying to unlock their files, they often do not receive a proper decryption key, leading security researchers to question the true intentions of some malware.
21:47 - 22:39 (00:51)
Summary
When victims of ransomware cyberattacks are paying to unlock their files, they often do not receive a proper decryption key, leading security researchers to question the true intentions of some malware. As such, experts advise against paying the demanded ransom and instead recommend implementing proper security measures and creating backups of important files.
ChapterIdentifying Unknown Attackers: A Closer Look
Episode73: WannaCry
PodcastDarknet Diaries
The team discusses their experience with a ransomware attack, including the challenges of determining the motive and identifying the perpetrator, as well as the difficulties in recovering encrypted computers.
22:39 - 25:06 (02:27)
Summary
The team discusses their experience with a ransomware attack, including the challenges of determining the motive and identifying the perpetrator, as well as the difficulties in recovering encrypted computers.