Episode

Ep 15: Ill Tills
Description
A major retailer was hacked. Their point of sales machines were riddled with malware. Listen to hear how digital forensics and incident responders handled the situation. What malware was found? Where was it found? How was it stopped? And most importantly, how much data was leaked? Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
DRADA offers continuous monitoring and risk visibility for compliance standards such as SOC 2, ISO 27001, GDPR, HIPAA, and more, streamlining compliance for over 14 frameworks and automating custom frameworks and controls.
00:00 - 04:06 (04:06)
Summary
DRADA offers continuous monitoring and risk visibility for compliance standards such as SOC 2, ISO 27001, GDPR, HIPAA, and more, streamlining compliance for over 14 frameworks and automating custom frameworks and controls. Many security professionals from companies such as Notion, Lemonade, and Bamboo HR have relied on DRADA as their compliance partner.
EpisodeEp 15: Ill Tills
PodcastDarknet Diaries
A credit card's data theft was discovered through a malware that was used to write to a specific file extension.
04:06 - 10:21 (06:15)
Summary
A credit card's data theft was discovered through a malware that was used to write to a specific file extension. The credit card company has contacted the retail store responsible for this purchase point.
EpisodeEp 15: Ill Tills
PodcastDarknet Diaries
Criminals are using various tactics such as cloning credit card information and malware to exploit vulnerabilities in payment systems in order to withdraw cash or launder money through gift cards.
10:21 - 18:29 (08:07)
Summary
Criminals are using various tactics such as cloning credit card information and malware to exploit vulnerabilities in payment systems in order to withdraw cash or launder money through gift cards. The vulnerability of the systems makes it hard for companies to distinguish between genuine and false alerts when suspicious activity is detected.
EpisodeEp 15: Ill Tills
PodcastDarknet Diaries
A team was able to find and stop every pivot point and backdoor created by an attacker, preventing any more credit cards from leaving the network.
18:29 - 26:07 (07:37)
Summary
A team was able to find and stop every pivot point and backdoor created by an attacker, preventing any more credit cards from leaving the network. They also noted that expired credit card numbers were a sign that the attacker hadn't been present for very long.
EpisodeEp 15: Ill Tills
PodcastDarknet Diaries
This transcript discusses the after-effects of cybersecurity breaches, as well as the impact they can have on the individuals whose information has been stolen.
26:07 - 33:08 (07:01)
Summary
This transcript discusses the after-effects of cybersecurity breaches, as well as the impact they can have on the individuals whose information has been stolen.
EpisodeEp 15: Ill Tills
PodcastDarknet Diaries
The discovery of a new strain of malware disrupted operations at multiple major companies.
33:08 - 35:35 (02:26)
Summary
The discovery of a new strain of malware disrupted operations at multiple major companies. The malware utilized a multi-stage attack to evade detection, posing a significant threat to businesses and individuals alike.