Тёмный

REAL Ransomware Chat Logs 

John Hammond
Подписаться 1,9 млн
Просмотров 22 тыс.
50% 1

jh.live/flare || Track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Start a free trial and see what info is out there: jh.live/flare
Learn Cybersecurity with Just Hacking Training: justhacking.com
Learn Coding: jh.live/codecr...
Don't listen to other "influencer" VPN crap -- host YOUR OWN: jh.live/openvpn
WATCH MORE:
Dark Web & Cybercrime Investigations: • Tracking Cybercrime on...
Malware & Hacker Tradecraft: • Malware Analysis & Thr...
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥RU-vid ALGORITHM ➡ Like, Comment, & Subscribe!

Опубликовано:

 

11 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 86   
@AgentAsteriski
@AgentAsteriski 2 дня назад
honestly, i'd totally believe that a ransomware team has better ui than many legit businesses, the bar is on the floor
@BillAnt
@BillAnt 2 дня назад
If companies would just invest in a good real-time incremental backup, none of this sh*t would be happening. Got infected? No problem, just roll it back by a couple of hours to the encrypted data. If have software monitoring any encryption taking place in real time.
@BillAnt
@BillAnt 2 дня назад
If companies would just invest in a real-time incremental backup, none of this sh*t would be happening. Got infected? No problem, just roll it back by a couple of hours to the encrypted data. If have software monitoring any encryption taking place in real time.
@billant2
@billant2 2 дня назад
If companies would just invest in a real-time incremental backup, none of this sh*t would be happening. Got infected? No problem, just roll it back by a couple of hours to the encrypted data. If have software monitoring any encryption taking place in real time.
@bobbyrandomguy1489
@bobbyrandomguy1489 2 дня назад
Man, that last convo was bizarre!! Interesting video.
@jmd489
@jmd489 2 дня назад
Was clearly trying to talk him up to get more info out of them.
@bobbyrandomguy1489
@bobbyrandomguy1489 2 дня назад
@jmd489 yeah that's a good possibility. They just seemed like old friends or something lmfao
@billant2
@billant2 2 дня назад
If companies would just invest in a real-time incremental backup, none of this sh*t would be happening. Got infected? No problem, just roll it back by a couple of hours to the encrypted data. Or have monitoring software of any encryption taking place in real time.
@BillAnt
@BillAnt 2 дня назад
If companies would just invest in a real-time incremental backup, none of this sh*t would be happening. Got infected? No problem, just roll it back by a couple of hours to the encrypted data. Or have monitoring software of any encryption taking place in real time.
@CoolProveIt
@CoolProveIt 2 дня назад
"we have mcafee and symantec" and nothing prevented this :(" Peak.
@balsalmalberto8086
@balsalmalberto8086 2 дня назад
I would watch of 24 hour stream of this with a Costco deluxe sized bag of popcorn
@TTVBretZ
@TTVBretZ 2 дня назад
I wonder how many of those are IT guys just fucking with them 😂
@logiciananimal
@logiciananimal 2 дня назад
Or law enforcement doing a sting.
@robertgowdey
@robertgowdey 2 дня назад
@@logiciananimal A sting how? It's all bitcoin and TOR.
@Oldladywithastick
@Oldladywithastick 2 дня назад
​@@robertgowdeyAs if bitcoin would be 100% anonymous
@logiciananimal
@logiciananimal 2 дня назад
@@robertgowdey Delaying tactics by LE to track down where the bad guys are.
@BillAnt
@BillAnt 2 дня назад
@@logiciananimal - Probably drying on a highway with a burner phone. Tracking nowadays is really difficult with good opsec.
@darkshoxx
@darkshoxx 2 дня назад
26:45 yeah it sounds like they exchanged phone numbers and started dating 😆. Man that was bizarre
@Alfred-Neuman
@Alfred-Neuman 2 дня назад
He finally found a service that offer a good customer support so that understandable... lol
@Bempus
@Bempus 2 дня назад
Compliments goes a long way, if you're positive and kind you're more likely to buy more time (as shown in the conversation). There were never any hesitation from the hacker's side and the victims bought almost a month of time to try to solve the problem themselves. It might just have been a strategy from the victims.
@jmd489
@jmd489 2 дня назад
this 100%
@AndrewWells527
@AndrewWells527 День назад
LOL, 19:20, "and guarantees to not attack us in the future." "Sure."
@DVLANetwork
@DVLANetwork 2 дня назад
The company I work for got hit a few months ago and we never even contacted them. Don't negotiate with the criminals
@Walter_
@Walter_ 2 дня назад
Yeah also: doing full backups from a nearly air sealed pc that uses SSH to login to the actual servers is nearly unbeatable. From compromising the entire network perspective you can only stop the backup from working, which you can set up to trigger an alarm, but they can't encrypt/delete the backup. Only problem left would be data leakage, idk how to solve that.
@stronglift1873
@stronglift1873 2 дня назад
Yes but some companies actually have costumers and work with data that would hurt them if it gets online. Then if you just ignore them, youre in an even bigger mess. Even if you have backups because they just gonna leak the data. And i dont know for sure who the real criminals are, the ones that do these attacks, or the ones that are supposed to keep our data safe but fail so for years and years and were getting slapped with data leak after data leak. If you run a company you should be liable if the data you are supposed to keep safe gets leaked
@TylerRamsbey
@TylerRamsbey 2 дня назад
Excellent stuff. Thanks sir!
@Carl49-k7c
@Carl49-k7c 18 часов назад
You explain things really well John Hammond
@mathewrogers5430
@mathewrogers5430 2 дня назад
Hey John we need live RU-vid session about this...awesome content
@ZacKoch
@ZacKoch День назад
Sad when the RAS OP has better communication skills and grammar than IT staff. Additionally, the number of IT staff that can't open the test files are nutty. 🤯
@MyWatermelonz
@MyWatermelonz День назад
Last one was definitely trying some social engineering to get some information. But obviously it wasn't gonna go anywhere
@MyWatermelonz
@MyWatermelonz День назад
I mean these are the same companies that won't spend any money on security because some mba thinks it's an unnecessary expense and they have to hit quarterly kpi's and profits!
@sergeyvas123
@sergeyvas123 2 дня назад
I think important point was missed here. Where these resources gets the chats data from?
@p2l
@p2l 2 дня назад
could be leaked, there could be an insider or they were probably the person to start the chat
@justingolden87
@justingolden87 2 дня назад
Maybe last guy was complimenting to just buy time and had no interest in paying from get go?
@jimmygravitt1048
@jimmygravitt1048 20 часов назад
Honestly, the ransomware gangs appear more reasonable than most normal companies.
@Miqueljuanserra
@Miqueljuanserra 2 дня назад
Alternative title for this video: "Just for laugh". Love it.
@layneburkhead3220
@layneburkhead3220 2 дня назад
Overwriting memory is too complicated for a SOC analyst?
День назад
Might have to start doing this
@alejandroalzatesanchez
@alejandroalzatesanchez 2 дня назад
The fact that also tells you how they hacked into your system is quite dystopian. :|
@ThrowawayAccountToComment
@ThrowawayAccountToComment 2 дня назад
This would be reallly interesting to stream!
@fearmaiden.21
@fearmaiden.21 2 дня назад
I refuse to believe those guys are from IT, really!?
@OsmanFarid-e9m
@OsmanFarid-e9m 2 дня назад
it's very important video good job. John
@jacquesduplessis6175
@jacquesduplessis6175 2 дня назад
Cool video, some of those chats were really funny 😆
@Macj707
@Macj707 2 дня назад
good stuff, crazy crazy crazy stuff.
@HerEvilTwin
@HerEvilTwin 2 дня назад
Super interesting and entertaining video. Would love a part 2
@AnonymousPhucker
@AnonymousPhucker 2 дня назад
flare is also tip of horse junk which expands during the session
@SmallGuyonTop
@SmallGuyonTop 2 дня назад
I received such a threat. I told them to prove they had my information by telling me the address where I am located. Crickets... You can't just Google me and find me. I am off the grid.
@Mario583a
@Mario583a 2 дня назад
Grizzly Adams, that you?
@testcss5329
@testcss5329 2 дня назад
Is it safe to access ransomware sites like John Hammond did?
@min3craftpolska514
@min3craftpolska514 2 дня назад
Most likely yes unless you download shady programs.
@darkshoxx
@darkshoxx 2 дня назад
1:00 now to stop you right there for a second, (assuming this isn't answered later in the video). What ARE you supposed to do? What is the best call? Do I DO contact the police, other law-enforcement, cybersecurity companies, Huntress?
@logiciananimal
@logiciananimal 2 дня назад
I would encourage your business, if you have one, to have a preexisting policy. IMO rewarding criminals is not a good idea and ignore the "No police warning". But talk to legal; they probably should have a lot to say here. For yourself, that's a bit more complicated.
@DarkForce2024
@DarkForce2024 2 дня назад
@@logiciananimal Right. That's what I've always wondered. Oh, your a criminal, I TOTALLY trust that you won't attack me again and you won't publish my data after I paid you. Do people actually believe that?
@darkshoxx
@darkshoxx 2 дня назад
@@DarkForce2024 @logiciananiman I believe to remember from a conference talk that renowned hacker groups are actually guaranteed to hold their end of the deal. It sounds counterintuitive but they build a reputation as a group that will hold their end of the deal, therefore it makes sense to pay, because they have established that reputation. Similar to what John says at 3:25 about them having a business with a "good reputation". Not good as in "a lawful force of good in the world" but good reputation as in "is known to follow through"
@Shelleloch
@Shelleloch 2 дня назад
​@@DarkForce2024The last thing an enterprising ransomware writer wants to be known as is "the one that doesn't release follow through". If you don't follow through, you get one, maybe two payments before word gets out that you're not worth paying. The "release what is being held hostage" part is really the most important part of your job, and when you're scamming significantly sized businesses, you can't just hope that your victim will not tell every one of their corporate contacts about "the one not worth paying".
@culturedivined
@culturedivined День назад
really interesting stuff 👍
@CrittingOut
@CrittingOut 2 дня назад
This is very interesting to see
@darkshoxx
@darkshoxx 2 дня назад
21:30 Yes please.
@pmcforever9686
@pmcforever9686 2 дня назад
Agreed
@cTomcTom
@cTomcTom 2 дня назад
Thanks so much I appreciate you 🎉
@LDowning0190
@LDowning0190 2 дня назад
21:31 please live stream this one time!
@betterjesusofficial
@betterjesusofficial 2 дня назад
Fascinating stuff more videos like this please
@mattdownernz
@mattdownernz День назад
John! Can you sandbox a cryptolocker with some fake juicy stuff and get your own convo? Maybe use an Exchange and domain lab on old esxi??
@Miglen
@Miglen 2 дня назад
Pretty cool video JOhn :)
@psknhegem0n593
@psknhegem0n593 13 часов назад
Hey John, if you'd like a good and funny story about ransomware, answer me out. Got in chat with ransomware actors and .. eh.. the gap between pro & amateur is huge. Got some funny stuffs to talk about. Feel free to reach out!!
@danielthompson3082
@danielthompson3082 2 дня назад
If I encrypt my information (with windows Bitlocker for example ), does that deny hackers access to the plaintext on its face? I know they can just get the encryption key, but how much more difficult would it be?
@mrup3650
@mrup3650 2 дня назад
wow, what a great video
@Frankiejav
@Frankiejav 2 дня назад
Although funny I believe they praise these threat actors to buy some time
@jra7y11_6
@jra7y11_6 2 дня назад
Greatt Video !
@topabove
@topabove 2 дня назад
this is better ai gpt chat roleplay
@KrawnKam
@KrawnKam 2 дня назад
Are you for hire?
@Rocky-g2i
@Rocky-g2i 2 дня назад
this might be interesting
@плохойбрат
@плохойбрат 2 дня назад
The guy @26:13 is getting fired😂
@DjPsYcOtIc
@DjPsYcOtIc 2 дня назад
Cheers
@booktoot9053
@booktoot9053 День назад
Part two 😂😂😂😂
@Mrman1990s
@Mrman1990s 2 дня назад
😢
@י̈ד
@י̈ד 2 дня назад
hello
@Hamst3r-hacker
@Hamst3r-hacker 2 дня назад
Oh really ? Honestly the soc team in the video , are noob 😂
@mrwancool8648
@mrwancool8648 2 дня назад
He was obviously trolling them he wasn’t serious
@carsonjamesiv2512
@carsonjamesiv2512 День назад
😃
@MacGuffin1
@MacGuffin1 2 дня назад
moar
@زهراء-ف6ق4خ
@زهراء-ف6ق4خ 2 дня назад
😅ش
@balarab1
@balarab1 2 дня назад
خ🤔
@hiteshrx2024
@hiteshrx2024 2 дня назад
@_JohnHammond , sir this is one funniest videos on this channel 😅
Далее
They Say This Malware is INSANE
51:48
Просмотров 45 тыс.
We've Just Found a New Type of Star and It's Terrifying
14:38
КУШАТЬ ХОЧЕШЬ? #дистори
00:15
Просмотров 113 тыс.
The Worlds Largest DDos Attack 3.8 Tbps
36:18
Просмотров 137 тыс.
Bruteforcing Windows Defender Exclusions
25:30
Просмотров 15 тыс.
Somebody emailed me a trojan virus
14:06
Просмотров 865 тыс.
41% Increased Bugs With Copilot
29:54
Просмотров 154 тыс.
so...I put a Time Server in my HomeLab
28:25
Просмотров 153 тыс.
When you Accidentally Compromise every CPU on Earth
15:59
Three Ways to Hack Mobile Apps
43:41
Просмотров 42 тыс.
APT Malware (advanced persistent threat)
28:49
Просмотров 51 тыс.