Тёмный

How Companies Catch Ransomware Hackers 

Hak5
Подписаться 928 тыс.
Просмотров 70 тыс.
50% 1

Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
In this episode, we take a look at the history of ransomware attacks, what they are, and how companies can protect themselves.
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → www.hak5.org
Shop → hakshop.myshopify.com/
Subscribe → ru-vid.com...
Support → / threatwire
Contact Us → / hak5
Threat Wire RSS → shannonmorse.podbean.com/feed/
Threat Wire iTunes → itunes.apple.com/us/podcast/t...
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.

Наука

Опубликовано:

 

7 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 117   
@menez031
@menez031 2 года назад
Think I missed the part explaining how companies catch ransomware hackers?
@DasUberAdmin
@DasUberAdmin 2 года назад
Glad I'm not the only one
@rogue93ying
@rogue93ying 2 года назад
Baited me into watching 80% of the video, waiting for this info to show up. Also worth noting is, RU-vidrs often regularly change their titles within release time, to gamble on one that most people will click on.
@retiallc
@retiallc 2 года назад
We provided two real stories of how this happened, maybe you blinked?
@FascistTrex
@FascistTrex 2 года назад
They pay the ransom
@IamNotHerbert
@IamNotHerbert 2 года назад
@@retiallc how did they catch the ransomware drop on the machine they were watching?
@poseidon5033
@poseidon5033 2 года назад
Good to see Kody back in his natural retrowave enviroment
@OneManCanStopTheMotorOfWorld
@OneManCanStopTheMotorOfWorld 2 года назад
Damn nobody wants to talk about the step up in editing, content structure, narration, and 80’s retro synth. Awesome content boys. Way to step it up. I hope this becomes a whole vibe 🦩
@northwindx79
@northwindx79 2 года назад
noone is talking about him not blinking even 1 time in the video. that is way more important
@zvpunry1971
@zvpunry1971 2 года назад
@@northwindx79 cyanoacrylate eye drops ;)
@nukeem1832
@nukeem1832 2 года назад
the quality is just banger. Really really good
@blakryptonite1
@blakryptonite1 2 года назад
The production quality of this video is amazing
@FLUFFYCAT_PNW
@FLUFFYCAT_PNW 2 года назад
Whoaaa! Cyber-weapons lab guy!! Nice to see you back, man. Congrats on the job.
@markarca6360
@markarca6360 2 года назад
In cybersec, we refer to the CIA triad on how to protect computer networks and user data (confidentiality, integrity, and availability). Ransomware attacks defeat ALL three.
@ihatesignupsgrrrrrrr
@ihatesignupsgrrrrrrr 2 года назад
I'd say some stolen nuclear secrets are way more valuable than doing a ransomware attack... Backups defeat the ransomware for any smart company. In general, I'd agree although, since most companies are not that tech-savy.
@Kattakam
@Kattakam 2 года назад
Nice video, touched on all key talking points of corporate ransomware. One thing to add is insider threats. Unlike spear phishing in large corps it is common to have a n inside person to help stage payloads or misdirected senior leaders when mitigation strategies are abound. Cheers!
@arnabbhattacharya7471
@arnabbhattacharya7471 2 года назад
BACKUP ! BACKUP ! BACKUP ! - is the only way to survive a Ransomware attacks🔥🔥 😁
@remigiuszbloch
@remigiuszbloch 2 года назад
Good BlackHats wait for your syncs, and encrypt your data servers too
@arnabbhattacharya7471
@arnabbhattacharya7471 2 года назад
@@remigiuszbloch 😂😂 physical Backup OP 😂😂😂
@blacksparrow2868
@blacksparrow2868 2 года назад
"Grandfather-Father-Son" backup approach, Offsite and not online.
@ihatesignupsgrrrrrrr
@ihatesignupsgrrrrrrr 2 года назад
@@remigiuszbloch Write to DVD or non-rewritable media, problem solved?
@Disguised_Hawk
@Disguised_Hawk 2 года назад
The style of the video is awesome, also very informative
@Darki0n
@Darki0n 2 года назад
Excellent content 👍 I love the audio environment, makes me want to watch the old hackers movie, I miss zero cool and cereal killer
@nathanwilson8860
@nathanwilson8860 2 года назад
Such top tier production, love this guy and the channel
@etmasikewo
@etmasikewo 2 года назад
The "hacker" themes in this are so overdone, I love it A hacker wearing glasses with displays, 2 ties and is driving from the cops is in a 1 person meeting with "elleng mosk" as a talking point LOL what a pitch.
@wtfdoiputhere
@wtfdoiputhere 2 года назад
MY GUY STILL NEVER BLINKS
@knightthompson2938
@knightthompson2938 2 года назад
Good to see you here.
@TheUser120
@TheUser120 2 года назад
Kody!!! Great to see him anywhere, I feel safe
@Jim73
@Jim73 2 года назад
The voice audio that includes 3:30 is very "droppy" and somewhat hard to hear. like the volume drops out during certain parts of speech. aha - 5:35 has similar issues. Seems related to the teleconferencing software and audio config.
@wolfmeowmeow
@wolfmeowmeow 2 года назад
Ah good to see you guys
@scottym50
@scottym50 2 года назад
Great video, thank you.
@Magnetic999
@Magnetic999 2 года назад
Nice stock videos compilation :D
@BeatBoxBrian
@BeatBoxBrian 2 года назад
The guy at 3:00 has some interesting ducking going on in his audio that makes it hard to understand. Anyway, great video!
@AnjewTate
@AnjewTate 2 года назад
How can apps like Kapersky, Malwarebytes, Norton, Bitdefender and Sophos for example… be of use?
@tomasgorda
@tomasgorda 2 года назад
Great video 👍
@YouRSmalltime
@YouRSmalltime 2 года назад
if your laptop covers with all the stickers are fingerprints with so much surveillance around couldnt the man just build an application that finds you while you're out and about doing your hax in a coffee shop or public wifi?
@hackingismylife2167
@hackingismylife2167 2 года назад
How many people ransomware attack execute and how many require Ram and Rom
@MelaninMagdalene
@MelaninMagdalene 2 года назад
Dropping usbs is old. Manufacturing usb plugs with malware is the future
@forgottenone1973
@forgottenone1973 2 года назад
whole Usb plug scenary is getting old bruh
@MelaninMagdalene
@MelaninMagdalene 2 года назад
@@forgottenone1973 Manufacturing isn’t lol
@scottwood1143
@scottwood1143 2 года назад
ARE U KIDDING ME!? Sketchy emails are the BEST emails!
@PeetzaFox
@PeetzaFox 2 года назад
NGL. I was lowkey judging y'all at 0:43 when I saw Windows. :p
@ecwnikos
@ecwnikos 2 года назад
ty 4 info.
@schwarzpete
@schwarzpete 2 года назад
nice job
@Joe-tk8cx
@Joe-tk8cx 2 года назад
Awesome sauce
@teja9676
@teja9676 2 года назад
Good job
@ThomasARichardson
@ThomasARichardson 2 года назад
The real hero of this video is that de-esser! workin it hard boys
@charanreddy8856
@charanreddy8856 2 года назад
Cody from Null Byte!
@happyman9666
@happyman9666 2 года назад
how did kesaya get the decryption keys
@gorpsnookem5041
@gorpsnookem5041 2 года назад
So a store receipt via email could be ransomware
@learnelectronika177
@learnelectronika177 2 года назад
Does anyone know about decryption on ransomware
@noxxum
@noxxum 2 года назад
Well you first have to find out what level of encryption was used, the chances are slim nowadays to crack anything modern.
@methila
@methila 2 года назад
Ohh... Null Byte here... 😇 Nice
@professordd8731
@professordd8731 2 года назад
Bring back the old school Daren stuff I'm begging 😭
@retiallc
@retiallc 2 года назад
lol no
@scottwood1143
@scottwood1143 2 года назад
Lol, what’s with the roll of shiny toilet paper!? Awesome _haxor_ scenes tho!!!
@jasonwarbird
@jasonwarbird 2 года назад
@peedurdupaadur
@peedurdupaadur 2 года назад
Loved the video! Great explaination about ransomware! If i may give some feedback. Taking countermeasures is what helps people. Keep your computers up to date. Great! How? dont plug in any random usb devices. Sure! what can help me manage my usb devices? Maybe plot the highest risks to ransomware on the cyber killchain, en what measures you can take to reduce that risk! I'd love to see a video with a more tactical overview to measure implementations against ransomeware, or for that matter, any prominent security risk!
@ihatesignupsgrrrrrrr
@ihatesignupsgrrrrrrr 2 года назад
"Keep your computers up to date. Great! How? dont plug in any random usb devices." Yes, make sure to be careful when someone gives you a USB and says you need it to keep your computer up to date! Imagine that ransom!?
@peedurdupaadur
@peedurdupaadur 2 года назад
@@ihatesignupsgrrrrrrr I mean those to be separate issues you could tackle in a video. They were named near the end, but not really looked into. Issue #1: Keeping things up to date, how? Issue #2: Watch out for USB devices, how? I think those would really help people.
@NebosvodGonzalez
@NebosvodGonzalez 2 года назад
I downlaoded a video for free and then Saw a message appear on all of my devices a week later a Ransomware Virus that demanded huge amounts of money for the data and the hardware to even function.
@gsalvadorflores9715
@gsalvadorflores9715 2 года назад
Good morning friend, can you do tutorial of some method or tool now to hack wifi networks with the wps blocked
@frozenfar7231
@frozenfar7231 2 года назад
is this an ad for companies?
@ToX1nE
@ToX1nE 2 года назад
sound of bold guy is just awfully bad.
@ankh-ef-en-khonsu3274
@ankh-ef-en-khonsu3274 2 года назад
I bet they put a bunch of stickers on their laptops and a dark hoodie.
@teja9676
@teja9676 2 года назад
I want learn please but how
@edington6302
@edington6302 2 года назад
I saw him blink!!!!!! 0:48 😁😁😁😁
@bkbroiler5946
@bkbroiler5946 2 года назад
Most of the video was background info. Only a tiny bit about how they catch the hackers
@teja9676
@teja9676 2 года назад
Super videos
@mdmuntaharul6795
@mdmuntaharul6795 2 года назад
Make a video how to decrypt ransomeware encrypt file
@biggerandbetterthings7222
@biggerandbetterthings7222 2 года назад
So is Shannon Morse a Schill?
@saddudehours
@saddudehours 2 года назад
These video setups are better than all the other original Hak5 videos. Kody gets straight to the point.
@teja9676
@teja9676 2 года назад
Where are you country
@Xyrok404
@Xyrok404 2 года назад
Which Notebook is the best choice for Kali Linux?
@reloadscript2156
@reloadscript2156 2 года назад
SuPer-vid..
@ggLP42
@ggLP42 2 года назад
good job gamers
@Jojoxxr
@Jojoxxr 2 года назад
Kody‼️
@moysevalentine6117
@moysevalentine6117 2 года назад
What about downloading files from the Internet? Can it lead malware to your system?
@AnjewTate
@AnjewTate 2 года назад
Who ever said: “There are no dumb questions” lied… I present your question as proof.
@neuzen
@neuzen 2 года назад
Those irrelevant stock footage placeholders.
@farhadniaz732
@farhadniaz732 2 года назад
nice
@anthonymonge7815
@anthonymonge7815 2 года назад
It is illegal in the US to pay a ransom.
@blacksparrow2868
@blacksparrow2868 2 года назад
It depends, Paying is often not illegal. HOWEVER In October 2020, the United States Department of the Treasury’s Office of Foreign Assets Control (OFAC) declared it is illegal to pay a ransomware demand in some instances. To clarify, it’s illegal to facilitate the payment to individuals, organizations, regimes & some instances entire countries that are on the sanctions list. The important part here is that some cybercrime groups are on the sanctions list. The EU follows a similar system with a sanctions regime that prohibits making funds available to parties on the official sanctions list.
@anthonymonge7815
@anthonymonge7815 2 года назад
@@blacksparrow2868 I think there was an EO or something that came out that said it is illegal. Let me try and find it. If I cannot, then I am mistaken.
@courtlandb1162
@courtlandb1162 2 года назад
Silent killer frl
@viewer8323
@viewer8323 2 года назад
Please don't put music in background when someone is explaining or keep it low .
@markarca6360
@markarca6360 2 года назад
Endpoint refers to ANY device connected to the corporate network, not just PCs or mobile devices.
@hydro172
@hydro172 2 года назад
Blink
@reastle1307
@reastle1307 2 года назад
next video on phishing victim
@pitisradu
@pitisradu 2 года назад
I do have a suggestion...maybe at least explain in the video what says in the title. No information about how companies catch those hackers was shown.
@rayamoooooo685
@rayamoooooo685 2 года назад
like if I he had some bass in his voice I could interpret better
@khaledal-falihi7311
@khaledal-falihi7311 2 года назад
forgiveness of God
@retiallc
@retiallc 2 года назад
ok
@user-sg1vs7rl3g
@user-sg1vs7rl3g 2 года назад
👆👆👆 Easiest way for all recoveries ❤❤❤ thanks sweetheart 😘
@羴
@羴 2 года назад
Just ask for monero instead. Lol.
@BBQJOE22
@BBQJOE22 2 года назад
This guy's mic is horrible or does too much post processing, glitching and stuttering like hell
@totalcooljeff
@totalcooljeff 2 года назад
Wiw
@userNULL
@userNULL 2 года назад
"black hat" hackers that go after big corporations should be considered white hats ;)
@forgottenone1973
@forgottenone1973 2 года назад
they shouldnt imho, if motivation its just their own profit...
@userNULL
@userNULL 2 года назад
@@forgottenone1973 true
@userNULL
@userNULL 2 года назад
@@forgottenone1973 how about robinhood hackers that steal from the rich and give to the poor :)
@blacksparrow2868
@blacksparrow2868 2 года назад
@@userNULL We have seen when "Big Corporations" are hit by ransomware, its the customer who are the ones whos data has been compromised, leaving all the customers now exposed to financial fraud by criminals.
@userNULL
@userNULL 2 года назад
@@blacksparrow2868 thats fine, as long as the corporations pay the customers are safe :)
@giovanniventre7727
@giovanniventre7727 2 года назад
The guy talking from the screen has a poorly setup or edited audio, like a stupidly high de-esser or compressor. Some words are unintelligible.
@themightybeast4716
@themightybeast4716 2 года назад
God can I win a pc or an iPhone please 😢I wanna learn
@alshaklawi
@alshaklawi 2 года назад
Hi
@anthonyscott5612
@anthonyscott5612 2 года назад
It's desperate trying to follow this guy with the lisp.
@alshaklawi
@alshaklawi 2 года назад
First I guess
@veritasdesigns5067
@veritasdesigns5067 2 года назад
If some one makes you a mark there’s no way to prevent it. The only way to stop it is closed circuit the data. But you didn’t mention that at all. So ya playing games. Find an American company for your chips. You take cloudflare and solar winds, and Qualcomm, and dominion. None of them prevented it. Lastly IC3 IC has jurisdictions limited. Each business who has multiple proxies should hard copy the closed circuits. And updates daily with several ports and limiting the control to limited folks only but hey idk what I am talking about. -veritas ps there’s no laws preventing you from hacking a foreign company. Very rarely I dislike your movies but today it’s a dislike. Poor content. Poor fixes.
@mikedc
@mikedc 2 года назад
Trump2024
Далее
Where People Go When They Want to Hack You
34:40
Просмотров 1,2 млн
Впервые дал другу машину…
00:57
How do hackers get caught? - the hunt for the hacker.
13:07
The King Of Malware is Back
19:27
Просмотров 190 тыс.
How to Actually Escape the Botnet
32:17
Просмотров 505 тыс.
The Latest YouTube Malware Scam
27:09
Просмотров 115 тыс.
OWASP Oopsies and Calling XZ What It Is - ThreatWire
11:03
Choose a phone for your mom
0:20
Просмотров 6 млн
ПОКУПКА ТЕЛЕФОНА С АВИТО?🤭
1:00