Feb. 9, 2026

A Brief History of Ransomware

A Brief History of Ransomware

A history of ransomware is more than just dates and names—it's the story of how criminals evolved from mailing infected floppy disks in 1989 to running billion-dollar enterprises that cripple entire organizations. On this episode of The Backup Wrap-up, I sit down with Dr. Mike Saylor, my co-author on "Learning Ransomware Response and Recovery," to trace this evolution from the AIDS Trojan to today's sophisticated double extortion attacks.

We talk about how ransomware went from requiring physical distribution to scaling globally through the internet, how cryptocurrency made anonymous payment possible, and why the shift from tape to disk backups created vulnerabilities that attackers now exploit first. You'll learn about the wild west days when IT focused on building systems without understanding how bad guys attack, the emergence of ransomware-as-a-service that democratized cybercrime, and why modern attacks target your backups before encrypting your production systems.

If you've ever wondered why backup immutability matters or how we got to a point where ransomware is inevitable rather than hypothetical, this episode connects those dots. Dr. Mike and I also discuss why having backups is still critical even with double extortion threats, and what you need to know about defending your backup systems in today's threat environment.

Chapter Markers:

00:00:00 - Introduction

00:01:19 - Welcome and Guest Introduction

00:02:19 - Curtis's First Ransomware Memory

00:03:40 - The AIDS Trojan: First Ransomware (1989)

00:04:42 - The Wild West Era: Late 1990s Security

00:08:05 - Y2K and Budget Shifts

00:11:26 - The Transition from Tape to Disk Backups

00:15:45 - How Disk Backups Created Vulnerabilities

00:19:30 - The Rise of Cryptolocker and Bitcoin

00:23:15 - Ransomware as a Service Emerges

00:27:40 - WannaCry and NotPetya

00:31:20 - Double Extortion: The Game Changer

00:35:10 - Why Backups Still Matter

00:37:55 - Should You Just Pay the Ransom?

00:40:01 - Defending Your Backup System

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we take a trip down memory lane with Dr. Mike

Speaker:

Saylor, my co-author on learning ransomware response and recovery.

Speaker:

We're talking about a brief history.

Speaker:

Of ransomware from the AIDS Trojan in 1989 to today's sophisticated

Speaker:

double extortion attacks.

Speaker:

You'll hear how ransomware has developed into a multi-billion

Speaker:

dollar criminal enterprise and what changes made that possible.

Speaker:

To know where we are, we need to know how we got here.

Speaker:

Let's listen to a brief history of ransomware.

Speaker:

By the way, if you don't know my history, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup, and I've been passionate about backup and recovery for over 30 years.

Speaker:

Ever since.

Speaker:

I had to tell my boss that there were no backups of the production

Speaker:

database that we just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated admins into cyber recovery heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the backup wrap up.

Speaker:

I'm your host, w Curtis Preston.

Speaker:

And with me, as always is my co-host Goldilocks Prasanna

Speaker:

Malaiyandi, how's it going?

Speaker:

It's been a while since I've heard that name.

Speaker:

I'm good, Curtis.

Speaker:

I'm good.

Speaker:

You clearly haven't been going out with our f common friend enough.

Speaker:

Yes, I

Speaker:

have

Speaker:

likes, that, likes to call you that name.

Speaker:

Um, and uh, then we have the opposite of Goldilocks.

Speaker:

We have over here,

Speaker:

No locks.

Speaker:

the, the no no locks.

Speaker:

I like it.

Speaker:

My co-author on the book, learning Ransomware Response and Recovery.

Speaker:

How's it going?

Speaker:

it's going well guys.

Speaker:

Thanks for having me.

Speaker:

So this is this gonna be one of those episodes where, you know,

Speaker:

the two guys with gray hair and the one guy with, with some gray hair.

Speaker:

We're gonna, we're gonna do a little, we're gonna be, do a little bit like

Speaker:

back in the day, you know, when we talk about, uh, ransomware, uh, I, I, I'll

Speaker:

start, you know, we're talking about the evolution of ransomware and I, and I'll

Speaker:

actually go back to my first memory of.

Speaker:

Of a ransomware incident, and it's actually my dad called me that, uh,

Speaker:

a, a business partner of his had had his computer encrypted and they were

Speaker:

asking for, it was, as I recall, back in the day, like one Bitcoin was like.

Speaker:

Like it was under $500 or something, and, and it was under a number

Speaker:

that if it went over that, that it triggered some laws or whatever.

Speaker:

That that's what I remember.

Speaker:

And so he, he had this situation and I remember asking if, if his

Speaker:

friend, you know, had any backups of this computer that had been

Speaker:

taken, and, uh, the answer was no.

Speaker:

Right.

Speaker:

He had, and, and of course, you know, I'm like, I'm like, you're killing me.

Speaker:

Right?

Speaker:

Um, I I, I hate it.

Speaker:

I'm sure you, you have the same thing, Mike, when you're, when you know, we,

Speaker:

we've talked about it in the past, that you get most of your phone calls.

Speaker:

Uh, post facto, right?

Speaker:

Like you, you know, it's like, I've, I've been attacked.

Speaker:

Please help.

Speaker:

And you're like, well, crap.

Speaker:

Did you have any defenses whatsoever?

Speaker:

And the answer is no.

Speaker:

Uh, you know, it, it's a lot better to, to do things in

Speaker:

advance, but, uh, let's go back.

Speaker:

A lot of people seem to think that.

Speaker:

The very first, uh, ransomware was this, uh, this thing called

Speaker:

the AIDS Trojan back in 1989.

Speaker:

Do you, do you agree with that?

Speaker:

Um, that's, that's kind of the first formal attack.

Speaker:

There's, there's probably others that, you know, somebody trying to do something

Speaker:

and it turned out to be, you know, X, Y, Z. But yeah, that's the, that's

Speaker:

probably the, the, the first, uh, large.

Speaker:

Ransomware attack

Speaker:

Yeah.

Speaker:

And that sounds like a really long time ago.

Speaker:

1989. I mean, I was, I was still in college.

Speaker:

Persona

Speaker:

How, how I, I wanna know how much data they

Speaker:

school.

Speaker:

how much data was that back in the days?

Speaker:

Because back then it wasn't like a hundred megabytes.

Speaker:

A lot of

Speaker:

Well, yeah.

Speaker:

This was like one, 1.5 megabytes per per dish.

Speaker:

Um, oh, right, right.

Speaker:

Yeah.

Speaker:

'cause it was on a floppy, it was actually Dr.

Speaker:

Joseph Pop.

Speaker:

Um, yeah.

Speaker:

Um, and it didn't scale.

Speaker:

There wasn't, there was, there was no crypto, there was no internet.

Speaker:

Right.

Speaker:

Uh, so it was very different than what we have today.

Speaker:

Um, and then there's the big growth era that, um, you know, from the eighties

Speaker:

to the, to the mid two thousands.

Speaker:

Uh, how do you think it sort of evolved past, past that initial.

Speaker:

Well, there, there are several, uh, kind of branches off of, uh, malware

Speaker:

that happened, uh, during this period, probably closer to the, the two thousands.

Speaker:

Uh, but I won't, I won't, uh, I won't miss an opportunity to

Speaker:

reference the late 19 hundreds, uh,

Speaker:

uh, the late 19 hundreds was, you know, it was kind of the wild west, uh, from a,

Speaker:

a security perspective because, uh, from.

Speaker:

On, on the professional side, a lot of technology people, a lot of it people,

Speaker:

we were so focused on building and maintaining, uh, with, with really

Speaker:

very little understanding of how bad guys are actually attacking us.

Speaker:

Like how did that actually happen?

Speaker:

How, and then there was no end user training or awareness.

Speaker:

It was just acceptable use.

Speaker:

And you signed something when you, when you started working here,

Speaker:

that you wouldn't use computers for evil, but people still did.

Speaker:

Um.

Speaker:

I mean, I, I remember walking into a data center and there's a guy in

Speaker:

there with a computer making, uh, um.

Speaker:

Satellite cards, clone satellite cards.

Speaker:

He was selling 'em out the back door, like in the middle of the data center.

Speaker:

And he is like, what?

Speaker:

Uh, and I'm like, well, you're not supposed one, it's illegal.

Speaker:

Uh, and two, you're using company property to do that.

Speaker:

But at the same time, bad guys were starting to realize that, um, when,

Speaker:

when you've got these low end criminals, they're looking for the tools.

Speaker:

Well, what if I infected the tool?

Speaker:

And then that got downloaded to the criminal and then it got dispersed

Speaker:

through the criminal enterprise, and now I've got, you know, it was just a, it

Speaker:

was like a. Uh, multi-level marketing, uh, without the inquiry recruitment.

Speaker:

Um, and then you get into the two thousands and technology starts to evolve.

Speaker:

Computers are getting, you know, beefier and faster, and, uh, Internet's getting

Speaker:

faster, which is really what hindered a lot of bad guy, you know, bad guy

Speaker:

activity back in the day is the dial up.

Speaker:

They're like, well, you can't do much.

Speaker:

Uh, but now with, with the, the, the, the broadband and, uh, even fiber, um.

Speaker:

Uh, overseas, uh, bad guys are doing a lot more because the capabilities there that

Speaker:

the, the hardware, the, the horsepower, the, the bandwidth, it's all there.

Speaker:

Um, and then the tools are getting better and really they're just stealing from it.

Speaker:

Operations tools, you know, the.

Speaker:

The, the companies are putting out tools to help us do our, our real job better.

Speaker:

You know, uh, manage a network, troubleshoot a network, and the

Speaker:

bad guys are like, oh, those are great reconnaissance tools.

Speaker:

Those are great deployment tools.

Speaker:

You know, if I can find the, the Microsoft server that disperses patches and I

Speaker:

just put my malware on that, then it'll, you know, I can disperse my malware.

Speaker:

Uh, so.

Speaker:

That's a consistent thing that I, that I learned about with you, with

Speaker:

the book, is that, that consistently tools that have a good use, right.

Speaker:

Uh, were then misused

Speaker:

sure.

Speaker:

bad, right?

Speaker:

Yeah.

Speaker:

Uh, does, does Crypto Locker fit into that?

Speaker:

Because I know that was a big change.

Speaker:

Um, or was CryptoLocker always a, a bad, a bad

Speaker:

Yeah, I, I think just the name, uh, crypto Locker.

Speaker:

Even if it was intended to be good, they should have picked a different name.

Speaker:

Uh, it sounds bad, but No, it was, it was always bad.

Speaker:

yeah.

Speaker:

I think maybe one of the tools you're thinking about Curtis,

Speaker:

that I've seen is like, I think, Mike, you probably know Cobalt

Speaker:

Strike, I think is.

Speaker:

The one that's commonly used for deploying and detecting.

Speaker:

But Mike, one other question.

Speaker:

I know you talked about sort of

Speaker:

computers getting beefier and faster, the internet and broadband.

Speaker:

Is there also anything like that you saw around that time as companies

Speaker:

start to produce more data?

Speaker:

Everything started to sort of become online rather than having

Speaker:

paper records and other things.

Speaker:

Things started to become more collaborative in nature with the

Speaker:

technologies and other pieces there that maybe might have started to lead

Speaker:

to more ransomware attacks and other

Speaker:

Sure.

Speaker:

And, and what's scary about really good, bad guys is they do their analysis on how.

Speaker:

Companies and their employees are using technology.

Speaker:

So if you really look and, and do an analysis like today of, of the average

Speaker:

employee or computer user, and then you, you design your attack, uh, strategy

Speaker:

around that higher percentage of success.

Speaker:

So taking, taking your question back to the late 19 hundreds, uh, it was,

Speaker:

it was centralized computing, right?

Speaker:

So it was client server, you know, we, maybe we had a dumb terminal,

Speaker:

but all the data was centralized and we could protect that.

Speaker:

We could do better at protecting that.

Speaker:

And then as hardware, uh, became more, uh, affordable, so now I can put a,

Speaker:

a, like a, a, a thick, what we call a thick client or a a, a desktop, right?

Speaker:

It's got a hard drive and.

Speaker:

Everything I need, I can put it on your desk.

Speaker:

Well that became decentralized computing because now you know, Bob and accounting

Speaker:

is saving stuff on Bob and Accounting's computer, not necessarily the server.

Speaker:

And that that was because network bandwidth.

Speaker:

So we're using a token ring or old coax and it's, man, it takes forever to

Speaker:

load that file when it's on the server.

Speaker:

I'm just gonna keep it here on my desktop.

Speaker:

Right.

Speaker:

So it's not getting backed up probably.

Speaker:

Uh, and it's not where it needs to be.

Speaker:

Well then bad guys doing that analysis are like, well, I'm gonna stop

Speaker:

attacking the network and the server.

Speaker:

I'm gonna start attacking these end user computers.

Speaker:

And that's where a lot of these like floppy drive and email, uh, um, uh,

Speaker:

driven attacks came from is because bad guys understood that that's

Speaker:

where the valuable stuff in the, in the higher likelihood of success.

Speaker:

Alright, well now we've got laptops and mobile phones.

Speaker:

Well, bad guys were like, well, I don't even have to attack the company anymore.

Speaker:

I just need to figure out where this dude lives and hack his wireless,

Speaker:

or steal his phone out of his car, or, you know, borrow his laptop or,

Speaker:

you know, or, or, or infect the kid.

Speaker:

You know, the kids use their, the parents' computers too, so I just

Speaker:

need to get the kid to go to a website to download some stuff.

Speaker:

And so, I mean, there's any number of tactics and strategy.

Speaker:

Once bad guys really, uh, uh, understand how their targets use technology.

Speaker:

So I think what I think what happened there, there were two things that happened

Speaker:

in the, the early two thousands, right?

Speaker:

Uh, so we have the, the invention of Bitcoin right?

Speaker:

In 2008.

Speaker:

And we have the invention of, uh, CryptoLocker in 2013.

Speaker:

And do you want to explain how those two really together,

Speaker:

uh, I think poured ga poured.

Speaker:

Gas on this

Speaker:

fire?

Speaker:

Is That the analogy I was looking

Speaker:

That's a good one.

Speaker:

And it, and boy, it became a fire.

Speaker:

So, uh, Bitcoin and, and, and really any, any, any of any of that, that,

Speaker:

uh, anonymizing technology that, that happened in the, in the, probably 2010

Speaker:

is when it probably got really popular.

Speaker:

Um.

Speaker:

Well, you know, I mentioned, I've mentioned in previous, uh, conversations

Speaker:

that bad guys are kind of risk averse.

Speaker:

You know, these types of criminals are not the ones that are gonna

Speaker:

walk into a gas station and rob them at point blank, right?

Speaker:

With a gun.

Speaker:

They're, that's not the kind of criminal they are.

Speaker:

They're, they sit behind a keyboard thinking I'm protected

Speaker:

or, or at least disconnected from this crime to some degree.

Speaker:

So there's a mentality around that and wow, now, now you're telling

Speaker:

me I can, I can get paid kind of anonymously and nobody can track it.

Speaker:

And initially you couldn't, uh, there wasn't real good understanding of

Speaker:

even how this whole, you know, Bitcoin and, uh, cryptocurrency worked, uh,

Speaker:

especially from a law like getting law enforcement to understand that at the

Speaker:

time, good luck and so bad guys were like, I'm, I'm gonna start charging.

Speaker:

You know, uh, holding ransom with Bitcoin or, um, you know, leveraging extortion,

Speaker:

uh, you know, uh, attacks with Bitcoin and I can get paid and spend Bitcoin,

Speaker:

uh, with some level of anonymity.

Speaker:

And so, yeah, that, that was, uh, that was probably a, a one of the

Speaker:

bigger, uh, advents of, of hacker or bad guy, uh, um, evolution.

Speaker:

That, that, that probably sparked a good spike in the.

Speaker:

And, and what role, what role did, uh, crypto Locker pay in

Speaker:

So Crypto Locker was, uh, kind of the, the,

Speaker:

I.

Speaker:

the foundation for a lot of the attacks that bad guys are lazy.

Speaker:

So, I'm gonna take, I'm gonna take this, this framework,

Speaker:

and I'm just gonna tweak it.

Speaker:

In a lot of cases, what we saw was, you know, a attack, a used, you know, crypto

Speaker:

locker plus maybe some other stuff.

Speaker:

And, and it was hard coded with, you know, my, my, uh.

Speaker:

Uh, my, my crypto wallet, uh, you know, all the, all the financial,

Speaker:

like, you just need to click here and it pays and it's all hard coded.

Speaker:

Alright?

Speaker:

And, and then that, that developed a signature.

Speaker:

So antivirus, anti antivirus at the time, they didn't really have

Speaker:

anti malware back then, but, so now there's a signature for that.

Speaker:

But if I take that exact same payload and I just tweak it, and that

Speaker:

tweak could just be changing the.

Speaker:

The Bitcoin wallet, uh, and, and the email address, and I'm just gonna use

Speaker:

what you used and deploy it as my own.

Speaker:

But now it's got its own signature, so I'm gonna get past the

Speaker:

antivirus for at least a week.

Speaker:

Um, but yeah, that became the, the foundation, uh, upon which, uh, an

Speaker:

entire ransomware, um, empire was built.

Speaker:

It.

Speaker:

It's almost a little like script kitties.

Speaker:

Right, where you just take something, you copy it, you tweak it, you use it, but

Speaker:

you don't really fully understand what's going on, or it's not anything unique

Speaker:

from

Speaker:

You know, that that was some of it, but then, you know, that there were, there

Speaker:

were threat actors that built entire, like criminal enterprises around this.

Speaker:

Uh, so I mean, and, and what I, I truly mean, they've got HR and marketing and

Speaker:

sales and tech support and engineers.

Speaker:

And I mean, some of these, some of these groups are, you know,

Speaker:

50 plus employees, uh, and they think they're doing a normal job.

Speaker:

They just come to work and do accounting.

Speaker:

They don't know where the money's necessarily coming from.

Speaker:

Uh, and, or maybe in some cases they're working for a, a criminal organization.

Speaker:

And then I think the next phase, uh, is when we start seeing

Speaker:

nation states get involved, right?

Speaker:

Um, and we start seeing tools like WannaCry and not Petia.

Speaker:

Do you want to talk a little bit about that sort of era and then,

Speaker:

and then I think right after that is sort of our current era,

Speaker:

but what, what happened in that

Speaker:

Well, um, probably starting about the same time that, that Bitcoin became popular.

Speaker:

Um.

Speaker:

Uh, pretty much every cri uh, criminal enterprise, even, you know, drug cartels,

Speaker:

uh, white collar crime, espionage, all those, uh, started to see the value in

Speaker:

understanding and, and conducting cyber, uh, crime as a, either as, uh, uh, an

Speaker:

alternate source of income, another threat of income, or a way of facilitating

Speaker:

Side gig.

Speaker:

Right.

Speaker:

Um, and so what we see in, in the evolution of that, and because a lot of

Speaker:

organized crime is tied into, uh, state crime, uh, so, um, uh, nation state

Speaker:

governments, um, and, and there really aren't very many that are excluded from,

Speaker:

from this, but as, as organized crime gets more involved with cyber crime, the nation

Speaker:

states also become more interested and.

Speaker:

A lot of those, um, suspect nation states, they conduct their own

Speaker:

cyber crime illegitimate campaigns as well.

Speaker:

And well, what, what?

Speaker:

For, for reasons.

Speaker:

Uh, is it for reasons other than state interests or is it just

Speaker:

like, is it you, you understand what I'm saying?

Speaker:

Right.

Speaker:

Are they doing this to further the.

Speaker:

The aims of the country, or is this just

Speaker:

Well sometimes it, and, and this goes into geopolitics.

Speaker:

So company A, country A may affect, uh, a cyber incident in country B for

Speaker:

the benefit of country D. So that.

Speaker:

Hmm.

Speaker:

It somehow manipulates a relationship with Country D over maybe a deal

Speaker:

or some other political thing.

Speaker:

So, I mean, it's just another, it's another strategy in their chess game.

Speaker:

Uh,

Speaker:

But was, is

Speaker:

this any different though, Mike, than previously?

Speaker:

Like, I'm sure even before this time period that we're talking about,

Speaker:

there were probably nation states that were attacking other nation

Speaker:

states at a technology level, and so is what really changed here is

Speaker:

it became more prevalent and more destructive, I would say, and more

Speaker:

So destructive is, is just a, uh, that's an outcome.

Speaker:

So, and that depends on, on the campaign, a lot of cyber from

Speaker:

a nation state perspective is, is all intelligence gathered?

Speaker:

Uh, and so, uh, with intelligence, the moment you take action

Speaker:

on it, you, you lose that.

Speaker:

It is no longer intelligence.

Speaker:

Right?

Speaker:

Um, and if, if you affect damage, uh, while you're collecting intelligence, then

Speaker:

you're cut off from future collection.

Speaker:

Now, there, there are always, uh, uh, opportunities to determine,

Speaker:

well, there, there's no, uh, there's no future value in this.

Speaker:

So now I, I can, um, you know, be destructive.

Speaker:

Uh, and, and we saw that with, uh.

Speaker:

With the Iranian, uh, centrifuges back in the day.

Speaker:

Um, but for sure, uh, nation states have always, uh, looked for ways of collecting

Speaker:

intelligence and cyber in cyber crime and cyber crime through, uh, organized crime.

Speaker:

Uh, it's been a, a, a significant evolution of that.

Speaker:

Um, an example, so in the US we got pretty, um.

Speaker:

I pretty good at identifying nation state attacks from China.

Speaker:

And so as an IT practitioner, I can go, well, that, that

Speaker:

looks like traffic from China.

Speaker:

We're not gonna, we're not gonna allow that.

Speaker:

Uh, so we, we develop firewall rules.

Speaker:

We block traffic.

Speaker:

We don't buy hardware from China.

Speaker:

We don't subscribe to software from China, right?

Speaker:

So we we're getting better at that.

Speaker:

Well, then what China did was hire a bunch of domestic.

Speaker:

Organized crime, uh, you know, gangs and, and, and bad guys.

Speaker:

And they taught those guys how to be hackers and they funded

Speaker:

them and gave them tools and now they're attacking us domestically.

Speaker:

And well, we can't block everything domestically, so our

Speaker:

effectiveness has gone down.

Speaker:

Um, and then if you look at.

Speaker:

You know, North Korea actually getting people hired within an organization.

Speaker:

Well you now you've given them access.

Speaker:

They don't have to, they don't have to hack or do, I mean,

Speaker:

they're, they're sitting at a desk with access you gave them.

Speaker:

Uh, and so now they're a true insider threat.

Speaker:

Um, so all of that is

Speaker:

Yeah.

Speaker:

and, now they can deploy ransomware from their desk and then just walk

Speaker:

out and hop on a plane and go home.

Speaker:

Right?

Speaker:

You, you touched on something there, Mike, that that comes up.

Speaker:

It's come up a lot on the pod, and that is this, this idea

Speaker:

of the, the insider threat.

Speaker:

Right?

Speaker:

Um, and I, I talk a lot about insider threats, both from a. From a rogue

Speaker:

admin who is, is just, he's just pissed off or he's, he's financially

Speaker:

incentivized to do something.

Speaker:

Or like in this case, you're talking about literally they are a plant.

Speaker:

And I've had at least a handful of people who suggest that I am

Speaker:

crying wolf, that I am exaggerating that this is just the boogeyman.

Speaker:

Uh, and it's just, uh, I, I use it as a way to scare

Speaker:

people into doing good backups.

Speaker:

What do you think about that?

Speaker:

Uh, it's, it's not the boogeyman and I think it happens more often

Speaker:

than, than we, we hear about.

Speaker:

Uh, I think one of the most recent significant ones I've heard about

Speaker:

is, uh, I can't remember if it was SpaceX or or Tesla, but it was one

Speaker:

of Elon, Elon Musk's, uh, companies, bad guys, actually propositioned an

Speaker:

employee to help them deploy malware in that environment in exchange for

Speaker:

a percentage of the ransom wells.

Speaker:

Well, that's huge and.

Speaker:

There are any number of ways to identify that target.

Speaker:

It's no different than than intelligence targeting.

Speaker:

If I'm gonna go to, you know, some foreign country and try to get an

Speaker:

important person to become an asset for me to, you know, be a double agent or

Speaker:

an agent of mine, I'm gonna do homework.

Speaker:

Uh, and, and we've done this to some degree in, in our services,

Speaker:

out to clients, uh, when, when we try to determine, uh.

Speaker:

The, the effectiveness of security training for employees.

Speaker:

Uh, if I'm gonna target a facility, you know, maybe I do, you know, some

Speaker:

open source intelligence, all the, of all the employees that work there.

Speaker:

And I find the one that's, you know, getting divorced, he's got bad credit,

Speaker:

um, maybe he had an accident recently and he's got some medical bills.

Speaker:

Well, I'm gonna offer that guy some money in exchange for helping me out.

Speaker:

And I can tell you 100% of the time that we've done that, uh,

Speaker:

they've accepted the money.

Speaker:

Interesting.

Speaker:

Yeah, it, uh, again, that reminds me, uh, when I worked at the bank

Speaker:

back, back in, back in the eighties.

Speaker:

Um, and, uh, no, I guess technically that was the early nineties.

Speaker:

Not in the eighties.

Speaker:

In the eighties I was still in high school.

Speaker:

Um, but.

Speaker:

I, we, we, we would do, you know.

Speaker:

Employee orientation and, and regular cyber train, you know,

Speaker:

ear early cyber training.

Speaker:

It wasn't really cyber training, just information security training.

Speaker:

Right.

Speaker:

And one of the things that we consistently told people repeatedly,

Speaker:

no one from us will ever, ever, ever call you and ask you for your password.

Speaker:

Right.

Speaker:

And if it is, it's, it's a bad guy.

Speaker:

Right.

Speaker:

And then we would then next week call them and ask them for their password and, um.

Speaker:

The percentage of people that would give us their password was was was

Speaker:

way higher than we would've liked.

Speaker:

My, my favorite one was I walked around an environment and I, I went to, to FedEx

Speaker:

Kinko's, and I printed out some little postcards that said, uh, uh, update,

Speaker:

you know, it had some graphics on it.

Speaker:

Update our new help desk phone number.

Speaker:

Is, you know, whatever this phone number is, uh, call us with any, any tech

Speaker:

support needs, or if you need, you know, the printer needs paper or whatever.

Speaker:

Here's the new phone number.

Speaker:

And we, we walked, we piggybacked into an environment and we put those pa,

Speaker:

those postcards on everybody's desks.

Speaker:

The very next day we called them and said, Hey, this is, you know,

Speaker:

this is Mike from Tech Support.

Speaker:

We're having issues with your account.

Speaker:

I need you to reset your password, uh, and I can help you with that over the phone.

Speaker:

They're like, I'm not.

Speaker:

Giving you that.

Speaker:

I'm like, so that was one.

Speaker:

Well, then we did have some people calling us and when they called us,

Speaker:

we would ask for their credentials.

Speaker:

And they're like, I'm not giving, I was told not to give you that.

Speaker:

And we're like, Hey, you called us.

Speaker:

You called me.

Speaker:

Right.

Speaker:

So yeah, there's, there's a lot of different ways to game that.

Speaker:

Yeah.

Speaker:

So let's talk about sort of where we are now.

Speaker:

Um, and the, I I think there's sort of two big things, right?

Speaker:

Which we talk about ransomware as a service, which, you

Speaker:

know, Raz, RAAS, right?

Speaker:

Uh, you want to talk about that, and then also.

Speaker:

What double extortion is and how that's become kind of, uh, the SOP at this

Speaker:

Yeah, so ransomware as a service is, is just a business.

Speaker:

Um, so, you know, it's like a, a franchise.

Speaker:

Uh, and so you can buy into ransomware as a service.

Speaker:

Uh, as, as an entrepreneur, you don't really have to be technical at all.

Speaker:

Uh, you just have to be careful.

Speaker:

Uh, that, you know, you're not, you know, the first time you get

Speaker:

a, a good check, you're not buying flashy cars in, in a brand new house,

Speaker:

uh, while you're on unemployment.

Speaker:

Um, so there's ransomware as a service.

Speaker:

Uh, you know, bad guys set that up so that they just get a piece of it.

Speaker:

Uh, but really it's you, uh, taking all the risk, uh, and, and getting the money.

Speaker:

So, um, anybody can do that.

Speaker:

You let me, let me, let me ask you make sure, go ahead.

Speaker:

We'll go ahead.

Speaker:

Persona.

Speaker:

Why Mike, just that last sentence, you part, you said, right where it's

Speaker:

the bad guys take a cut, but you take

Speaker:

on all the risk.

Speaker:

How?

Speaker:

How is like, I'm assuming that the ransomware as a service

Speaker:

guys offer the service.

Speaker:

They have all the infrastructure.

Speaker:

They have all the connections, they are doing everything.

Speaker:

Why is it you as the entrepreneur who ends up taking that

Speaker:

So the way that works is, so let, let's give a real world example.

Speaker:

So let's, let's say you wanna start a lemonade stand, but you don't know

Speaker:

how to make lemonade or build a stand.

Speaker:

Uh, so,

Speaker:

Are you

Speaker:

so, so,

Speaker:

Or you

Speaker:

don't know what water is, but

Speaker:

a lemonade stand as a service.

Speaker:

So I paid Curtis $10,000.

Speaker:

And Curtis builds me a lemonade stand and makes me a lemonade and sets up

Speaker:

a bank account for me and puts it all out of the curb and says, good luck.

Speaker:

And then he's, he's done.

Speaker:

He washes his hands of it.

Speaker:

He's made his money, he made his 10 grand.

Speaker:

Whatever you make off of your l your, your lemonade stand is all

Speaker:

yours, but it's all connected to you.

Speaker:

You're standing there, it's your bank account, right?

Speaker:

Uh, and so everything after Curtis is setting all that

Speaker:

up for you, it's all on you.

Speaker:

But isn't ransomware as a certain, sorry, just walking through what

Speaker:

you had said, but they still have all the infrastructure, everything

Speaker:

else that

Speaker:

They set it all up for you.

Speaker:

They, they?

Speaker:

Okay.

Speaker:

And then they hand off and

Speaker:

I actually, I'm really glad you you, because I just assumed that when you

Speaker:

did ransomware as a service, you, so you're saying they're literally

Speaker:

setting up a ransomware system for

Speaker:

and control.

Speaker:

to use.

Speaker:

Configuring the, the ransomware talking to you about how you want this to work.

Speaker:

Do you want it just to infect and encrypt and, you know,

Speaker:

pray that they pay the ransom?

Speaker:

Do you want double extortion with a, a website set up?

Speaker:

You know, there's, there's all these different packages,

Speaker:

uh, that you could buy.

Speaker:

Uh, some of 'em come with postcards.

Speaker:

Uh.

Speaker:

that, that's actually now I'm actually really, I I had always

Speaker:

assumed it was like it was different.

Speaker:

I thought

Speaker:

that that's, I thought the same

Speaker:

yeah.

Speaker:

So, so this really is very similar to, I'm gonna say Microsoft 365, so

Speaker:

that they, they set this thing up for you than what you do with it is

Speaker:

up to you.

Speaker:

Right.

Speaker:

They, they know how to set it up.

Speaker:

They know how to configure it and, and put it together, but then you

Speaker:

are going to use it to do bad things.

Speaker:

a degree.

Speaker:

I mean, you don't, you don't typically interact with it after,

Speaker:

so they're gonna set it up.

Speaker:

You know, they're, they're gonna populate the tool with a million

Speaker:

email addresses or a target list.

Speaker:

Uh, they're gonna design the payload, they're gonna help

Speaker:

you set up your Bitcoin wallet.

Speaker:

Uh, they're gonna rent the server and they're gonna tell you when,

Speaker:

when, and how to push the button.

Speaker:

And that's it.

Speaker:

You don't, you don't get in there and change anything.

Speaker:

You're not logging into anything.

Speaker:

You're just sitting back waiting, you know, looking at your Bitcoin

Speaker:

wallet to see when money hits.

Speaker:

That's it.

Speaker:

And what, what are you, what are you providing?

Speaker:

Are you literally just giving them money or are you saying,

Speaker:

Hey, here's a list of people

Speaker:

that I,

Speaker:

fundamentally, it's just money.

Speaker:

But you can, you can work with them to customize your attack.

Speaker:

Yep.

Speaker:

Could be a former employer, but that hasn't disabled your access yet.

Speaker:

'cause that happens a lot.

Speaker:

Um, it could be some political group that you don't like.

Speaker:

It could be a whole country, it could be a whole industry.

Speaker:

Uh, or you could just say, I'm leaving it up to you guys as

Speaker:

the expert to target whoever you think is gonna make me some money.

Speaker:

But then like all the infrastructure that spun up.

Speaker:

All the setup, that's sort of You

Speaker:

own it

Speaker:

You own it, but you really don't touch it.

Speaker:

Yeah, yeah, exactly.

Speaker:

Okay.

Speaker:

It's all tied to your Bitcoin wallet and,

Speaker:

And that's why you say, because it's tied to your Bitcoin wallet, that's why you say

Speaker:

you're taking the risk.

Speaker:

So if, if somebody figures out, uh,

Speaker:

you

Speaker:

how to cover their tracks.

Speaker:

You know, they're gonna, they're gonna rent a server that accesses another

Speaker:

rental server, that accesses another rent server to help set up your command and

Speaker:

control server, which is also rented.

Speaker:

And, and all those things only have a life of, you know, 72 hours to, to a week.

Speaker:

Um, and that's how long you're, you're paying for, you know, you,

Speaker:

however much money you pay in is, you know, gives you a period of time

Speaker:

to collect as much money as you can.

Speaker:

So

Speaker:

they're more like infra,

Speaker:

Go ahead.

Speaker:

they're more like infrastructure expertise.

Speaker:

Yep.

Speaker:

So they know how to, and it's all, you know, it's all virtual infrastructure.

Speaker:

Yep.

Speaker:

Yeah.

Speaker:

And what percentage of do you think modern attacks are using

Speaker:

that type of idea versus set?

Speaker:

Just running your

Speaker:

own

Speaker:

gonna, I'm gonna create some buckets again.

Speaker:

So one bucket is the entrepreneur that's doing ransomware as a service as business.

Speaker:

And the other bucket is other criminal actors that are using ransomware

Speaker:

as a service, as a component of their criminal enterprise.

Speaker:

So you've got real criminals that are doing other stuff, and nation state actors

Speaker:

are good at this because they'll use ransomware infections as a distraction.

Speaker:

Right?

Speaker:

So I'm gonna infect.

Speaker:

A Department of Defense contractor with ransomware if I can.

Speaker:

And while they're focusing on recovering from this ransomware,

Speaker:

we're gonna do this other attack.

Speaker:

So they don't really care about the ransomware or if you pay a ransomware

Speaker:

or not, they're just using it so that you're not focused on something else.

Speaker:

That, uh, denial of service attacks were, we're used that way in the past.

Speaker:

Now you were there, there were two

Speaker:

The buck, the bucket one was the entrepreneur.

Speaker:

And bucket

Speaker:

Oh, right, okay.

Speaker:

Yep, yep.

Speaker:

Got it.

Speaker:

you know, uh, sophisticated threat, threat actor that's using it as a,

Speaker:

In term in terms of number of attacks or percentages of attacks, how do you

Speaker:

see that splitting between those two

Speaker:

uh, the, the entrepreneur is much smaller.

Speaker:

Uh, very few and far between of people that just wanna push

Speaker:

a button to make some money.

Speaker:

'cause if you understood the risk.

Speaker:

For the record, I wanna push a button and make some money, but I

Speaker:

just don't want to, I don't want to break crimes or I don't want to do

Speaker:

Break the law.

Speaker:

Yeah.

Speaker:

doing that.

Speaker:

Um, anyway, um, so let's talk about what double extortion is and what, you know,

Speaker:

why, why did it happen in the first place?

Speaker:

Uh, and then, you know, and, and.

Speaker:

You know, what does it mean to, to a, a, a victim,

Speaker:

So the, the double extortion, um, tactics started to evolve as more and

Speaker:

more victims stopped paying the ransom.

Speaker:

Or stopped communicating with the threat actor to begin with.

Speaker:

So, uh, there are some threat actors that your ransomware note says You

Speaker:

have, you know, two days to reach out to us before we post your information

Speaker:

on our wall of shame or whatever.

Speaker:

So you've got a couple of days to go, Hey, I, I realize you got me, uh, what's next?

Speaker:

And then you can draw that out and, and, uh, a negotiator will help you draw that

Speaker:

out till you figure out what to do and, and have some, some time to respond.

Speaker:

Um, but.

Speaker:

Uh, in the evolution of ransomware in this, in this, uh, in this

Speaker:

particular crime, uh, a lot of people were like, so what?

Speaker:

You, you encrypted my, my computer?

Speaker:

I've got a backup, or, it wasn't anything important, so I don't care.

Speaker:

Um, well, now you're, you, you, you might get a subsequent email that says,

Speaker:

but I got all your photos, uh, photos of you and your girlfriend, or photos of.

Speaker:

You know, you and on that vacation with somebody else, or you know

Speaker:

what, whatever else I can do to try and, you know, turn the screws to

Speaker:

try and get you to pay something.

Speaker:

So maybe it was, maybe it was a thousand dollars ransom and you

Speaker:

weren't gonna pay that, but will you pay, you know, $300, $300?

Speaker:

So I don't release this data.

Speaker:

Um, and that's actually gotten worse too because now I can use AI to

Speaker:

manipulate photos I took from your computer to make it look like anything.

Speaker:

And so that's, you know, unfortunately that's kind of what's been going on

Speaker:

with, with kids thinking their, their, their life is over 'cause someone's

Speaker:

got some manipulated picture of them.

Speaker:

But, uh, that's where, that's where it started.

Speaker:

I'm not gonna pay the ransom.

Speaker:

Oh, well, will you pay me something so that I don't release

Speaker:

this information to the public?

Speaker:

Do you know if bad actors have some sort of automation or tools?

Speaker:

Because I'm sure there are these huge troves of data that they've

Speaker:

exfiltrated from all these

Speaker:

various victims, and to go through it piece by piece may

Speaker:

be complicated and time cons.

Speaker:

And so are you aware of any tools or other things to sort of sort filter

Speaker:

Well, ai, AI for sure will do that today, but in the past, uh, they

Speaker:

were just scripts like, you know, using, using Python or PowerShell

Speaker:

or even before PowerShell, um, you know, like some c plus.

Speaker:

Uh, scripts.

Speaker:

Uh, so, and, and you make a good point, and sometimes that

Speaker:

double extortion is, is flipped.

Speaker:

So they will, they will, in some cases, uh, exfil data to determine whether

Speaker:

or not you're even a valuable target.

Speaker:

Uh, right.

Speaker:

And then, and then

Speaker:

Hmm.

Speaker:

encrypt you and then determine if, if, if data they've got of any value, but.

Speaker:

through that phase at a time.

Speaker:

And this, you know, we, we talked about the five phases in, in another episode,

Speaker:

but when, when they exfil data, when they, when it calls home and says, here

Speaker:

was what I found, to your point, uh, if they found a lot, it could take some time.

Speaker:

And we did, we did an incident response once where.

Speaker:

Uh, it was a company that does, uh, surveys, right?

Speaker:

So you sign up and say, I wanna do surveys and free surveys.

Speaker:

You do, you earn points, and then with the points you earn, you can

Speaker:

buy gift cards and things like that.

Speaker:

So that's your participation in the survey thing.

Speaker:

Well, so bad guys, uh, were able to compromise the laptop of a marketing

Speaker:

person that worked for the survey company.

Speaker:

That marketing person's job is to go out to big companies like Pepsi and

Speaker:

Coke and Frito-Lay and go, Hey, uh.

Speaker:

We can do surveys to, to help you develop your new product or change your

Speaker:

marketing or your, your advertising, uh, or, or the way that product looks.

Speaker:

And so when I do that, uh, and the company says, great, I wanna, I wanna participate.

Speaker:

Well, here's a, here's a an FTP site where you upload your, your marketing material.

Speaker:

And then we take that and embed it in surveys.

Speaker:

And then those surveys go out to a million people, bad guy,

Speaker:

compromised marketing guy's laptop.

Speaker:

And he maintained access to that for almost seven months, like six,

Speaker:

a little over six months until he understood what he had access to.

Speaker:

Well then, given what he understood, he crafted his attack by using laptops

Speaker:

access to the FTP site, waiting for, let's just say, Pepsi, to upload

Speaker:

graphics and files, and then infecting those files so that they went and

Speaker:

got embedded in a million surveys.

Speaker:

And then, so, yeah.

Speaker:

Uh, so it, it, it's all, it, it all depends on, uh, the threat actor,

Speaker:

um, the, the target, the victim, and the data that, and, and even, um, we

Speaker:

call it business process compromise.

Speaker:

So the bad guys are in your environment enough or in your

Speaker:

system enough to understand.

Speaker:

How things work and the value of access that you've given them.

Speaker:

So they've, they've compromised your process in order to inject

Speaker:

themselves, uh, into that process for the success of their, their attack.

Speaker:

Like if they, if these people weren't evil, I'd be like, they sound amazing.

Speaker:

Because half the time people in companies don't understand

Speaker:

their own business processes

Speaker:

and the fact that you have these criminals tearing it apart

Speaker:

Now.

Speaker:

Now granted, I mean, if you were able to, to work from home in your underwear and

Speaker:

eat pizza, kick back on your, in your lazy chair, and you know your laptop's in your

Speaker:

lap and you're just like, you know what?

Speaker:

I'm gonna take a nap.

Speaker:

I may work a little later.

Speaker:

I'll work tonight.

Speaker:

I'll work tomorrow.

Speaker:

And the incentive is, I made a million dollars.

Speaker:

Right?

Speaker:

So that's, that's why there's their, their incentives, their, uh, their,

Speaker:

their mentality is a lot different than your traditional, uh, employee.

Speaker:

So let me, and about this final phase here where there is a

Speaker:

significant amount of exfiltration happening and then double extortion.

Speaker:

What do you think about comments that.

Speaker:

I think we got some of them when we were, uh, tech editing the book.

Speaker:

And I, I get them occasionally online, and that is, well since, you know, since

Speaker:

uh, most of the ransomware attacks now have exfiltration as part of it, you know,

Speaker:

what's even the point of, of having a good backup and DR system if they're, if you're

Speaker:

ultimately gonna end up paying the ransom anyway, uh, because of double extortion.

Speaker:

What do you think about that idea?

Speaker:

Uh, I think it's, that's probably the wrong, uh, the

Speaker:

wrong mindset, uh, to start with.

Speaker:

Uh.

Speaker:

If you don't have good backups and you get ransomware regardless of

Speaker:

the bad guy, steal your data or not, you're not able to continue your

Speaker:

business and without good backups.

Speaker:

There are, there are solid statistics over the last several years of how

Speaker:

many businesses fail because they can't recover from a ransomware because they

Speaker:

don't have good backups and it, it's not just recovering to operations, it's

Speaker:

recovering from all the legal stuff too.

Speaker:

So depending on your organization and the data that they got, you

Speaker:

could get sued out of existence.

Speaker:

Uh, you, you could get regulated out of existence.

Speaker:

You could lose that contract, you could lose your ability to do business in

Speaker:

a state or with a particular vendor.

Speaker:

Um, so I mean, that, that's huge.

Speaker:

You've gotta do your own risk analysis and know yourself, uh, in

Speaker:

order to, to make that determination.

Speaker:

But, uh, I will say that.

Speaker:

There's a lot of different approaches to protecting your

Speaker:

data, so segmentation, encryption.

Speaker:

'cause if bad guys steal your data, it's an encrypt and it's encrypted.

Speaker:

They're not gonna spend a whole lot of time trying.

Speaker:

They're, they're lazy, remember?

Speaker:

So they, they're, they're like, I'll, I'll run some tools that I've got to

Speaker:

see if I can get through it, but they're not gonna spend a whole, they're not

Speaker:

gonna buy new tools or invest in a whole lot to, to try and break it.

Speaker:

Unless

Speaker:

they know it's valuable, like your last.

Speaker:

Uh, let's move on to the next victim.

Speaker:

Yeah.

Speaker:

for sure, um, an organization truly needs to, to understand the value of their

Speaker:

data, where their data is, uh, the impact it's gonna have if it is compromised.

Speaker:

And you've gotta take that approach these days because it's gonna happen.

Speaker:

So you need to plan for how are we gonna respond when it does happen?

Speaker:

And that's a lot of what our book talks about.

Speaker:

Uh, it's not about some hypothetical situation.

Speaker:

It's going to happen.

Speaker:

Right.

Speaker:

And, and, and you know, ransomware, you know, ransomware attacks are

Speaker:

literally one of the reasons why you need a backup and DR system.

Speaker:

Uh, all the other reasons are still there, right.

Speaker:

We just need to, we just need to add, you know, there was an entire

Speaker:

chapter in the book about how to defend the backup system from.

Speaker:

Cyber attacks.

Speaker:

Right.

Speaker:

Um, and it, and it's actually relatively easy.

Speaker:

It's easier than, than defending the primary thing.

Speaker:

'cause really all we have to do is just make sure they can't delete it.

Speaker:

Right.

Speaker:

Um, I mean, there are other things we, we wanna do, but the thing we have

Speaker:

to do is we have to make sure that the, that the backups are immutable.

Speaker:

That, that, that they can't attack them.

Speaker:

Right.

Speaker:

So, um, there's really not too much that you need to do to do a backup system that

Speaker:

you shouldn't have been doing already.

Speaker:

I just think that.

Speaker:

Cyber attacks in general are, they're making a lot of us just do the

Speaker:

things that we were supposed to do.

Speaker:

Uh, you know, it's sort of like when, you know, when there was COVID and

Speaker:

people were washing their hands, right?

Speaker:

Well, you're supposed to do that anyway.

Speaker:

well, I'll tell you, I didn't wear a helmet riding my

Speaker:

bike until I bumped my head.

Speaker:

Pretty good.

Speaker:

Yeah, I, I, you know, I used to, you know, when I was a kid, I rode my bike a lot

Speaker:

and, uh, I, I remember one time, right, and I, nobody, nobody wore helmets, but we

Speaker:

didn't know what a helmet was back then.

Speaker:

And I remember being on the sidewalk, there was this big box, like a, like

Speaker:

I'm talking like a three by three.

Speaker:

Foot box that was blocking the sidewalk.

Speaker:

And I, in my infinite wisdom, said, I'm gonna blast through this thing

Speaker:

'cause it's a cardboard box.

Speaker:

That did not work out as I had planned.

Speaker:

Did you not think there's a reason that someone has a cardboard box

Speaker:

in the middle of the sidewalk?

Speaker:

The, the 13-year-old Curtis clearly did not.

Speaker:

And, uh, the, you know, that, that thing of, uh, when, when a. What is it?

Speaker:

It would, a unstoppable force meets an immovable object.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

What was in the

Speaker:

I I went a whole bunch of stuff.

Speaker:

All I know is the box did not move.

Speaker:

I went flying over the, flying over the box and I did not have a helmet.

Speaker:

So anyway, don't be cur, you know, the little stick figures,

Speaker:

you know, Curtis is the thing.

Speaker:

Don't

Speaker:

beat, don't be a Curtis

Speaker:

Yeah.

Speaker:

That's the lesson from today's.

Speaker:

All right, well, thanks Mike for another great episode.

Speaker:

Look forward to the next one.

Speaker:

All right, and thanks persona again, always with the good questions.

Speaker:

For what I did, nothing.

Speaker:

You good, aura?

Speaker:

All right.

Speaker:

Uh, that is a wrap