The CryptoLocker Virus and the Birth of Modern Ransomware
The cryptolocker virus was the attack that turned ransomware from a nuisance into a full-blown criminal industry — and in this episode of The Backup Wrap-up, we break down exactly how that happened. W. Curtis Preston (Mr. Backup) sits down with co-host Prasanna Malaiyandi and cybersecurity expert Dr. Mike Saylor to trace the full evolution of ransomware and explain why CryptoLocker was the turning point.
If you've ever wondered how ransomware went from fake pop-up messages to billion-dollar criminal enterprises, this is the episode for you. We start with the earliest days — scareware attacks that did nothing more than frighten you into paying — and walk through the progression of encryption methods that made ransomware increasingly dangerous. Dr. Mike Saylor breaks down the difference between symmetric and asymmetric encryption in plain language, and explains why the move to public-private key pairs made it so much harder for victims to recover without paying up.
Then we get into the cryptolocker virus itself: how it spread through fake FedEx emails, why it kick-started phishing awareness training, what Operation Tovar did to shut it down, and — just as interesting — what the bad guys learned from its failures. We cover the role of the Zeus botnet, how Bitcoin became the payment method of choice, and why ransoms started out at just a few hundred bucks. We also talk about what happened next: the rise of data exfiltration, double extortion, and even triple extortion where attackers go after the victims of the victims.
Plus, we take a side trip into the LastPass breach and pour one out for the guy who lost his crypto fortune in a landfill.
Whether you're in IT, security, or just want to understand how ransomware works, this episode gives you the full picture.
Chapters:
00:00:00 — Intro
00:01:22 — Welcome and Introductions
00:04:11 — The Three Generations of Ransomware
00:05:01 — Scareware: Fake Attacks That Did Nothing
00:05:42 — Ciphers and Decoder Ring Encryption
00:06:38 — Symmetric Encryption Explained
00:09:25 — Asymmetric (Public-Private Key) Encryption
00:12:46 — Why Asymmetric Encryption Made Ransomware Stronger
00:15:44 — What Was the CryptoLocker Virus?
00:16:25 — Lessons CryptoLocker Taught Victims and Criminals
00:18:03 — Operation Tovar Takes Down CryptoLocker
00:19:54 — Bitcoin, Ransom Amounts, and Getting Paid
00:23:20 — Botnets Explained: Networks of Zombie Computers
00:26:22 — Recap: Three Phases of Ransomware
00:27:09 — Double Extortion and Data Exfiltration
00:28:01 — The LastPass Connection
00:28:47 — The Lost Crypto Hard Drive
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we go back to ransomware school persona.
Speaker:My co-author Dr. Mike Saylor, and I break down what the CryptoLocker virus
Speaker:was, why it mattered, and how it changed the ransomware game for everybody.
Speaker:Good guys and bad guys.
Speaker:Mike breaks down how encryption actually works, why the bad guys switch to
Speaker:public private key encryption, and how the crypto likeer CryptoLocker
Speaker:virus taught criminals what not to do when building a ransomware business.
Speaker:Well, we also cover botnets, operation Tovar, Bitcoin, and
Speaker:today's double extortion attacks.
Speaker:There's a lot of info in this episode, so buckle up.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr. Backup.
Speaker:I've been passionate about backup and recovery for over 30 years, ever since.
Speaker:I had to tell my boss that there were no backups.
Speaker:Of the production database that we just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the backup wrap up.
Speaker:I'm your host, w Curtis Preston, AKA, Mr. Backup, and I have with me the guy
Speaker:that was completely not helpful for this morning's events Prasanna Malaiyandi.
Speaker:How's it going?
Speaker:You were, you weren't there for me.
Speaker:Uh, uh.
Speaker:In fairness, I did not know what happened this morning until about 35
Speaker:seconds ago, actually 36 seconds ago.
Speaker:So
Speaker:think that is.
Speaker:Yeah, whatever.
Speaker:I was going through some hard stuff, man.
Speaker:And you weren't there for me.
Speaker:I'm just saying.
Speaker:But anyway, so persona, welcome of course to the podcast and we of course have once
Speaker:again with us, Dr. Mike Saylor, all the way from the Great Republic of Texas.
Speaker:How's going?
Speaker:Mike,
Speaker:well guys.
Speaker:Thanks for having me again
Speaker:is that, have I never noticed this?
Speaker:You've got some kind of game thing be behind you.
Speaker:Yeah.
Speaker:have a couple of those mini arcades with the, you know, five to 500
Speaker:different types of games on them.
Speaker:Really?
Speaker:I, uh, a hundred years ago, I, I remember, I, I was never, I, I didn't
Speaker:last, the last like, arcade game.
Speaker:I remember playing.
Speaker:Like, like that was actually, um, what was the one with the, with the knight?
Speaker:You remember the, the first one that had like Yeah.
Speaker:Joust.
Speaker:Yeah.
Speaker:I remember doing, and I remember being horribly awful at joust.
Speaker:That the bet the only game.
Speaker:time ago, I had this game.
Speaker:That's the first thing that came to mind.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um, I had joust and then, but the only, the last game I remember being
Speaker:any good at was, um, like Miss Pacman.
Speaker:Right.
Speaker:Like Asteroids and Miss Pacman and that, that era, which is
Speaker:Mm-hmm.
Speaker:Gallaga.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um, yeah.
Speaker:So we're old is all I'm really saying.
Speaker:This one has gallica on it.
Speaker:Yeah.
Speaker:All right.
Speaker:Well, at some point I gotta come over there.
Speaker:Oh, centipede.
Speaker:Yeah, I remember Centipede.
Speaker:Um, but, uh, all the people listening, they're like, whatever, man.
Speaker:Like these old farts.
Speaker:Uh, just tell me about ransomware.
Speaker:So we're talking about history though, in this episode.
Speaker:We're going back, you know, back in the day, you know, as I like to do.
Speaker:Uh, you know, when, when Mike, when I wrote, when, you know, when
Speaker:you, when you and I wrote the book.
Speaker:Like they, they, they sort of like poo-pooed on the history part.
Speaker:They were like, we don't wanna spend a lot of time on the history.
Speaker:Right.
Speaker:You remember that?
Speaker:stuff.
Speaker:But I, I think there definitely is value in like, going back a little bit in time
Speaker:to understand how we got here, right?
Speaker:That there was a time when, uh, ransomware wasn't what it is.
Speaker:What there's like three sort of generations of ransomware there.
Speaker:There's the first one, which, which a lot of it was like either.
Speaker:Like the, the claim that, you know, when you got the message, it was almost
Speaker:like, it was like a fake message that you, you wanted them to believe that
Speaker:the, or the, the, the hacker wanted you to believe that you were actually
Speaker:attacked by ransomware when in reality nothing had actually happened to you.
Speaker:Um, and, and this is, we still see this today, at least I still see it
Speaker:today with messages on like my phone.
Speaker:Right.
Speaker:You go to the wrong website and you'll get this thing of
Speaker:like, your phone has been taken.
Speaker:Yeah, your phone has been taken over.
Speaker:We, we know all your things and give us all your money, or we're
Speaker:gonna, you know, do the thing.
Speaker:And all you have to do is like close the browser.
Speaker:Right.
Speaker:For,
Speaker:Um, I,
Speaker:time.
Speaker:Those were, those were categorized as scareware.
Speaker:yeah.
Speaker:Scareware, right?
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um, but I mean, that, that was, so there was that and there was also.
Speaker:You, you mentioned, you know, in our pre-call you mentioned that there
Speaker:were, there was some stuff that was kind of easy to like decrypt.
Speaker:Would that be right?
Speaker:Yeah, it wasn't, it wasn't, um, you know, asymmetric encryption
Speaker:that we think of today.
Speaker:It was more of a, uh, more of a decoder ring type of encryption
Speaker:Hmm, hmm.
Speaker:You want, you want to,
Speaker:was quickest and easiest to implement, I'm guessing.
Speaker:yeah.
Speaker:So you th.
Speaker:overhead, high speed, low drag.
Speaker:So you, you threw out a couple of terms there.
Speaker:Let's start with the, the cipher concept.
Speaker:What are we talking about there?
Speaker:Well, cipher would be similar to like your de deco, your decoder ring.
Speaker:Uh, you know, the number one equals the letter A.
Speaker:Right,
Speaker:a cipher, you know, it's a
Speaker:right.
Speaker:match.
Speaker:Uh, and that's how a decoder ring works.
Speaker:You, you, you know, you, you turn your decoder ring until this lines
Speaker:up with that, and there's your, there's your letter or your number.
Speaker:I.
Speaker:Uh, and that's how, uh, initial type, uh, initial ransom type, uh,
Speaker:encryption happened or, and it wasn't even ransom and just encryption in
Speaker:general from malware perspective was
Speaker:Right.
Speaker:driven.
Speaker:Right.
Speaker:And then you, there was the, the second thing that you talked about, well,
Speaker:actually it was the first thing, but I'm gonna put it as the second thing, which is
Speaker:you said it wasn't asymmetric encryption, which this gives us an opportunity,
Speaker:I think, to discuss the difference between symmetric and asymmetric.
Speaker:Uh, encryption,
Speaker:So symmetric means that the keys are the same.
Speaker:Um, so if, if I encrypt something and send it to you.
Speaker:You already have the, you know, it's, it's your encryption key.
Speaker:Well, we all share the same key.
Speaker:It's public
Speaker:right.
Speaker:Um, so everybody has the same key.
Speaker:The only, the only way to maintain integrity and confidentiality is to
Speaker:make sure nobody else that has that, uh, nobody has the key that shouldn't.
Speaker:and
Speaker:Right.
Speaker:us left the group, uh, and uh, we wanna make confidentiality and integrity, we've
Speaker:gotta regenerate a key for us to share.
Speaker:Right.
Speaker:It's kinda like
Speaker:And, and.
Speaker:your, it's kinda like changing the key to your house.
Speaker:You know, when, when you
Speaker:Right.
Speaker:you don't, you, you, you wanna change all the locks.
Speaker:Right.
Speaker:you don't know who kept the key, uh, from the, the prior group.
Speaker:, So if you, when you change the key with symmetric encryption, do you
Speaker:then have to like re-encrypt the data?
Speaker:yep.
Speaker:Okay.
Speaker:Yeah.
Speaker:So, um, and the, the real problem, I think with symmetric encryption.
Speaker:Uh, would be basically communicate like if you want to commu, if I wanna
Speaker:send you something over email Right.
Speaker:And, uh, I want to encrypt it, well, how do I get you the key?
Speaker:Right.
Speaker:That's, that's a real problem there.
Speaker:don't send it
Speaker:email it.
Speaker:it with the email.
Speaker:No.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Well, I'll, I'll send it via SMS 'cause that's more secure.
Speaker:Well, and, and well, it would be better.
Speaker:Uh, so
Speaker:Yeah.
Speaker:that an out-of-band communication.
Speaker:So you would use a different account or a,
Speaker:Right,
Speaker:method, like SMS or
Speaker:right.
Speaker:meet in person, or, you know, I would stick it to the bottom of a park
Speaker:bench or, you know, things like that.
Speaker:Yeah.
Speaker:Like I've seen in the spy movies.
Speaker:Right.
Speaker:yeah.
Speaker:Uh, persona, you got anything to jump in there?
Speaker:I was going to ask about.
Speaker:Uh, Curtis, I think you kind of touched on it, so symmetric encryption, when
Speaker:you rotate the key or change the key.
Speaker:Everything moving forward would be encrypted using the new key, which
Speaker:means that that previous person, in your example, Mike, who left the group, would
Speaker:no longer be able to decode the new data because they don't have access to the key.
Speaker:if they wanted to ensure that the person who left the group also doesn't
Speaker:have access to the old data, then they would also have to re-encrypt
Speaker:or decrypt the data first, and then re-encrypt using the new key.
Speaker:Correct.
Speaker:Correct.
Speaker:Yeah.
Speaker:is, that is a, even though it's, it's a difficult math problem,
Speaker:it's, it's a lot less difficult than asymmetric encryption math problems.
Speaker:Gotcha.
Speaker:Gotcha.
Speaker:It's because it's a matter of like, you just need to know the key.
Speaker:Right.
Speaker:It's easier
Speaker:and obvi.
Speaker:one key than it is the combination of two keys.
Speaker:Oh, right.
Speaker:Yeah.
Speaker:Good.
Speaker:So, all right, so let's talk about what's next.
Speaker:Uh, the, the asymmetric encryption.
Speaker:So asymmetric means the, the two different halves are different, right?
Speaker:So, uh, you know, you've, you've got a, you've got a square on one side and a
Speaker:circle on the other that's asymmetric.
Speaker:And, essentially it, so the other, the other term for that
Speaker:is public private key encryption.
Speaker:I encrypt something with your public key and, and or your.
Speaker:Public key and my private key,
Speaker:Mm-hmm.
Speaker:you get it, you decrypt it with your, with my public key and your private key.
Speaker:Right.
Speaker:long as our private keys are, kept safe, that communication, uh,
Speaker:uh, can be relied upon as far as integrity and, and confidentiality.
Speaker:But if I can, if I can steal your private key, I can decrypt
Speaker:everything that Mike sends to Curtis.
Speaker:If your private key is compromised, uh, I can decrypt that.
Speaker:Well, with regards to ransomware, the victim is the public key.
Speaker:So I've deployed ransomware in your environment.
Speaker:I put the public key in that environment, or I use, I created a public key and then
Speaker:the private key is held on the command and control server by the bad guys.
Speaker:And this goes back to, um, you know, early days of ransomware and why.
Speaker:Why you had to pay the ransom within a certain period of time that that private
Speaker:key lived on a server that was being rented a botnet for that period of time.
Speaker:So after 72 hours is up, the botnet goes away, and so does that private key that
Speaker:would be needed to decrypt your stuff.
Speaker:And if you never, or if you lost access to the private key, you
Speaker:could never decrypt that data.
Speaker:Right?
Speaker:That's sort of the strength of.
Speaker:Asymmetric encryption, correct.
Speaker:I wouldn't say never, but yeah, it's, it's very difficult to, to crack.
Speaker:'cause for the most part, being human, uh, we're gonna create, and
Speaker:it, and it does depend on the, the, the tool you use to create your keys.
Speaker:A lot of times these days it's, you know, all random stuff.
Speaker:Like, move your mouse around and do this, that and the
Speaker:other until light turns green.
Speaker:And then we've created your key.
Speaker:But some people create their keys based on.
Speaker:Uh, kind of their approach to passwords, so birthdays and peoples
Speaker:and dogs and, uh, college football teams and that kind of thing.
Speaker:Uh, and so, when, when we go about trying to crack encryption, uh, there
Speaker:are kind of brute force methods, uh, along with like true math.
Speaker:Um.
Speaker:Uh, math hacking approaches to cracking passwords or, or keys.
Speaker:But
Speaker:Right.
Speaker:there's, there's a couple of different things to think about
Speaker:and, and a lot of those are unknown.
Speaker:So if you created your key and I don't know what you used to create it,
Speaker:then yeah, it's a lot more difficult for me as, as far as determining my
Speaker:approach to cracking your encryption.
Speaker:But if I did know what you used, uh, then I could focus on
Speaker:those, those type of tactics.
Speaker:Right.
Speaker:Uh, interesting.
Speaker:'cause I, I, I'll just say for the record, even though I understand
Speaker:everything you just said, and I, and I probably could have given the exact same
Speaker:Okay.
Speaker:or definition that you just gave, I have no idea how that works.
Speaker:Like, just like that's, uh, in terms of like underneath right.
Speaker:The, the actual coding part.
Speaker:Right.
Speaker:Um, so the, so the, with the why.
Speaker:Did switching to private public key help make ransomware more, uh, prevalent
Speaker:Resilient.
Speaker:or, or resilient?
Speaker:Yeah.
Speaker:Oh, is it be, is it be, I, maybe you already answered this, that basically
Speaker:the, the difficulty of guessing two keys is harder than guessing One.
Speaker:Well, it's the, it's the value of, of the ransom, right?
Speaker:So if I'm gonna hold you ransom, there's a high likelihood that you're
Speaker:not gonna be able to recover from it, then I'm more likely to get paid.
Speaker:So if
Speaker:Hmm.
Speaker:that encryption, uh, foolproof or at
Speaker:Mm-hmm.
Speaker:for you to figure out within the period of time that I think it, you
Speaker:know, before it starts to hurt you as a business or a person, you're
Speaker:more likely to pay the ransom.
Speaker:So, by increasing my encryption strength by moving to asymmetric, encryption,
Speaker:the likelihood of you being able to recover without paying me goes down.
Speaker:Gotcha.
Speaker:And even with the asymmetric encryption, I think I had read articles where
Speaker:some of the ransomware actors might have used the same private key
Speaker:over multiple different victims.
Speaker:And so like the FBI or any of these other organizations were able to help
Speaker:other victims, uh, even though by just, uh, gaining access to that private key.
Speaker:Is that right?
Speaker:and, and there's a yes, and, and there's a, there's an enhancement to that in
Speaker:that there are some bad guys or even some, some good guys that put the effort
Speaker:into decrypting things on their own.
Speaker:Uh, and so whether the FBI was able to get the key from a, a prior
Speaker:victim to help future victims, or it was these bad actors or, um.
Speaker:You know, uh, good actors, white hats or gray hats, uh, that cracked the
Speaker:password on their own and then shared it.
Speaker:Because one of the things that we saw early on in the ransomware game was that,
Speaker:there was competition, uh, for ransomware.
Speaker:And so you might have, uh, one ransomware actor.
Speaker:Uh, you know, attacking the, the victims that another ransomware actor wanted
Speaker:to attack or feeling like they're intruding on their, their business.
Speaker:And so one ransomware threat actor may crack the, the keys or, or provide a
Speaker:decryptor for the other ransomware.
Speaker:And then, and then, and this actually happened, there was, there was a website
Speaker:put up that said if you're, if you're encrypted by, you know, X gang, um.
Speaker:Put your files here and we'll
Speaker:That's, that's interesting.
Speaker:That's right.
Speaker:I, I, I had no idea that basically the, the, the com, the competitors,
Speaker:uh, trying to hurt their competitors, uh, that's crazy actually,
Speaker:um, that they would do that.
Speaker:Um, now,
Speaker:This is my corner.
Speaker:yeah, it's my corner.
Speaker:I get it.
Speaker:So what, um, what about, um.
Speaker:So as we move forward in time, what was CryptoLocker, when I
Speaker:say was it's still around, right?
Speaker:Uh, but how, in terms of the story, what role did Crypto Locker pay?
Speaker:Uh, well, I think it was one of those, um.
Speaker:Uh, somebody had to be first,
Speaker:mm-hmm.
Speaker:at trying to formalize the ransomware business.
Speaker:Uh, so there was a lot that, uh, both victims and bad guys
Speaker:learned from Crypto Locker.
Speaker:Mm-hmm.
Speaker:so Crypto Locker reinforced the need to be more diligent with, uh,
Speaker:So the Crypto Locker taught us a lot from a victim perspective because it made us
Speaker:more diligent with the emails that we get.
Speaker:Uh, a lot of Crypto Locker came in fake FedEx emails
Speaker:about a package, or a delivery.
Speaker:so that really started, that really kicked off the start of, uh, fishing training.
Speaker:Mm-hmm.
Speaker:and making sure that we're clicking on stuff that we expected and, and
Speaker:reporting things that looked suspicious.
Speaker:And then on the threat actor side, it, it really taught the bad guys how
Speaker:not to build a criminal business, uh,
Speaker:Hmm.
Speaker:these guys were not very well organized.
Speaker:They didn't, they didn't cover their tracks.
Speaker:Uh, they weren't doing the, you know, three and four layers of
Speaker:anonymity that, that we see today.
Speaker:simply just rented a botnet.
Speaker:Uh, they developed some ransomware that did, even though it had
Speaker:asymmetric encryption, uh, they did not protect their keys very well,
Speaker:which is, uh, and, and what I mean by that is, uh, eventually when.
Speaker:Law enforcement, uh, started going after these guys.
Speaker:The, the capture of their keys was, was fairly quick.
Speaker:They didn't, they didn't hide them, you know, they weren't, they
Speaker:weren't, uh, on a USB, you know, underneath a floorboard or anything.
Speaker:Hmm.
Speaker:and so, uh, that their organization fell apart within like a year or so.
Speaker:Do you know if there were arrests made?
Speaker:there were a lot of arrests made.
Speaker:Um, I'm trying to remember the name of the.
Speaker:The, uh, law enforcement campaign.
Speaker:I think, you know, Curtis, I think you put it in the notes earlier, but it's
Speaker:like Tovar or something like that.
Speaker:Operation Tovar.
Speaker:Uh, so yeah, they, they, there was an international, uh, task
Speaker:force that went after these guys.
Speaker:Uh, and it was, uh, about a year later that, um.
Speaker:Crypto Locker as an organization went down that the ransomware, uh, became
Speaker:a kind of a starting point for a lot of, uh, other ransomware campaigns.
Speaker:You know, bad guys are lazy if I can take what you've built and just modify it as a
Speaker:Right?
Speaker:Um, and so that's pretty common.
Speaker:There's a, there's a couple of good graphics out there that show you the,
Speaker:how ransomware over time branched off into these different variants.
Speaker:Mm-hmm.
Speaker:Crypto Locker was one of those first that branched off into, into several.
Speaker:So
Speaker:this,
Speaker:given
Speaker:ahead.
Speaker:given that it was sort of one of the first right, that changed
Speaker:ransomware and the business,
Speaker:Much money.
Speaker:Like what was sort of the amount of ransom that they were able
Speaker:to steal from their victims,
Speaker:There's
Speaker:I'm sure back then it was like a very different magnitude than it is today,
Speaker:just given how prevalent ransomware is so.
Speaker:Well, and, and they could have done more, but similar to.
Speaker:Normal approaches to business, you've gotta look at, you know, the
Speaker:feasibility, who's your customer?
Speaker:What's the likelihood of, of payment or success, right?
Speaker:so funny when you talk about like a criminal organization.
Speaker:So they had to think about this.
Speaker:So if, if they, if they ransom your stuff and they ask for a million
Speaker:dollars, what's the likelihood that they're gonna get paid?
Speaker:Uh, especially, uh, you know, back in the day a lot of the, uh,
Speaker:infections were on individual devices.
Speaker:It wasn't like a whole And so the, the value of an individual device versus
Speaker:crippling a whole company, right?
Speaker:So, um, crypto lockers ransom was relatively small.
Speaker:Uh, a couple hundred bucks maybe, maybe I think up to 500.
Speaker:Uh, and that correlated well with the value of Bitcoin at the time.
Speaker:And so one of the
Speaker:Right.
Speaker:did think about as far as anonymity goes is how do we get paid without
Speaker:people knowing who they're paying?
Speaker:And so that's when, you know, the advent of, of cryptocurrencies
Speaker:kind of kicked some of this off.
Speaker:But, um, Bitcoin back in the day, you know, was a couple hundred bucks, uh,
Speaker:a Bitcoin, uh, maybe close to 300.
Speaker:And, uh, and, and so a ransom for three or 500 bucks, anybody
Speaker:could go get one Bitcoin.
Speaker:or it would be relatively easy to get.
Speaker:And that's interesting too because over time, as the ransom started to go up,
Speaker:people had to ask for help because I don't know if you know this, but as
Speaker:individuals you can only get two Bitcoin like maybe every couple of weeks.
Speaker:So if you get ran, well now Bitcoin's a lot more valuable today.
Speaker:But let's say back in the day if, if someone asked you for four Bitcoin.
Speaker:Regardless of the cost just for Bitcoin, you and I could
Speaker:not do that within 72 hours.
Speaker:Hmm.
Speaker:Hmm.
Speaker:Like I could go get two and then I'd have to call a friend and say, Hey,
Speaker:I need, I need you to go get two.
Speaker:then, all right, where, where do we go?
Speaker:Well, it's usually not a good part of town.
Speaker:know, it's a bar somewhere that has a Bitcoin machine on the
Speaker:counter next to the bathroom.
Speaker:how they do drug transactions these days.
Speaker:Uh, but yeah, it, there's, there's a whole logistics behind and, and marketing
Speaker:and sales strategy behind ransomware.
Speaker:Fascinating.
Speaker:Um, so if, if Crypto Locker was, like you said, it was the first, but then
Speaker:they shut down the, the organization, it sounds like, uh, the main role that it's
Speaker:played here in, in the history is that.
Speaker:We, we can look, you know, or the bad guys were able to look at that and
Speaker:said, okay, there's what not to do.
Speaker:Let's do, let's do something slightly different than that.
Speaker:Let's take what we can do.
Speaker:Let, let's take the, the crypto, you know, part of it, right?
Speaker:So that we can get paid anonymously, semi, semi anonymously.
Speaker:And let's do that.
Speaker:The, the, the asymmetrical asymmetric encryption.
Speaker:Um, and.
Speaker:But don't but be better at hiding our secrets as we're part of it.
Speaker:Does that sound about right?
Speaker:It is.
Speaker:And, and then just add to that the, um.
Speaker:Um, the integration of the botnet.
Speaker:So the, again, bad guys learn some things here too.
Speaker:Mm-hmm.
Speaker:utilizing the botnet, you know, it's, that is a layer in your anonymity and,
Speaker:and, and definitely a component for your,
Speaker:the, the management or the command and control of your ransomware.
Speaker:Uh, but there was some lessons learned there about how best to do
Speaker:that and who to work with, like Zeus.
Speaker:Uh, the Zeus botnet is who?
Speaker:Locker used.
Speaker:Uh, and they became pretty widely used after this, that they were,
Speaker:Hmm.
Speaker:were, they were common, uh, but they kind of made them a name for themselves as
Speaker:a, as a platform from which you can, you can start to these ransomware attacks.
Speaker:Uh, and they started to improve their service and their support, uh, for
Speaker:those types of attacks after this one.
Speaker:Feature requests.
Speaker:So, uh, again, for, for those that are, you know, this is
Speaker:definitely a foundational episode.
Speaker:Do you want to discuss what a botnet is and you know how that, you know?
Speaker:Well, there you go.
Speaker:Sure.
Speaker:Uh, so, so a botnet is a, is a network of bots and a bot is short for robot.
Speaker:Uh, and a robot is a computer that you and I use, or, or maybe it's a company
Speaker:or, uh, an entire school district.
Speaker:It's somebody else's computer.
Speaker:That bad guys have compromised added it to their network of
Speaker:other compromised computers.
Speaker:It's, it's essentially a peer-to-peer network of if you will, uh, that come
Speaker:to life whenever, um, uh, bad guys, uh, rent them out, uh, to other threat
Speaker:Mm-hmm.
Speaker:And so, you know, I may have
Speaker:puppet.
Speaker:uhhuh, I may, I may have, I may have a million compromised
Speaker:computers around the world.
Speaker:And Curtis calls and says, Hey, I need, I need 10,000 computers for this thing.
Speaker:It could be, uh, uh, distributed computing to crack passwords.
Speaker:Uh, and, and by the way, when I, when I, um.
Speaker:When I have this bot, uh, botnet developed, I, I inventory all of my
Speaker:bots so I know the, the type of computer memory processor, all those things.
Speaker:And so I can actually, um, segment or, or virtualize parts of that botnet
Speaker:based on my client's requirements.
Speaker:So if I need, if I need 10,000 machines with, you know, eight cores or more.
Speaker:As far as processing goes and, and how much memory total across all this, uh,
Speaker:distributed network, then I can, I can build that and rent it by the hour,
Speaker:uh, by the day, week, month, um, uh, to whoever needs it for whatever reason.
Speaker:And so, uh, for a while, especially early on, the term for that
Speaker:would be a a, a botnet herder.
Speaker:So I'm a bot herder.
Speaker:Uh, so kind of a shepherd of, of bots, uh, that's kind of a, and, and people in the
Speaker:industry do the same thing you just did.
Speaker:It's kind of, they laugh at it and like nobody says that.
Speaker:Uh, but the textbooks did, uh, they called them bot herders.
Speaker:Um, and there's a, there's a fascinating, um, paper and I'm, I'm
Speaker:trying, it's called The Dark Visitor.
Speaker:it's out on the internet.
Speaker:It, it was a, it's a declassified military report on the
Speaker:Chinese hunk, red Hunker Army.
Speaker:Um, and that was the kind of the first nation state, uh, white paper written,
Speaker:uh, written by the military on the, on the Chinese, uh, uh, capabilities for
Speaker:cyber espionage and that kind of stuff.
Speaker:And in that paper they, they, they call bots, um, meat
Speaker:chickens or meatier chickens.
Speaker:So a compromise.
Speaker:So that's how it,
Speaker:Me.
Speaker:it translates in, in, in
Speaker:because it was written in Chinese.
Speaker:Right.
Speaker:Okay.
Speaker:how it translate.
Speaker:It translates into a meteor chicken.
Speaker:So a compromised computer that's part of a bot is a meteor chicken.
Speaker:That's pretty funny.
Speaker:So at the beginning of this episode, I mentioned that there
Speaker:were sort of three phases.
Speaker:We've discussed the evolution from that very beginning of sort of like scareware.
Speaker:Up to asymmetric encryption with, uh, CryptoLocker and other lots of copycats.
Speaker:Um, you know that, that, uh, since then and we had this giant
Speaker:proliferation of what I'm gonna now call traditional ransomware.
Speaker:But what has happened is in the last several years is that as people like
Speaker:me have helped random people, you know, have better backups and be able
Speaker:to recover from a, from a ransomware attack via a restore, they're like,
Speaker:well, we gotta do something else.
Speaker:And they added this concept of, um.
Speaker:Exfiltration, right?
Speaker:And then, uh, double extortion.
Speaker:So they're stealing your data.
Speaker:And then they're like, well, if you don't, you know, well, you may be able
Speaker:to restore your data, but if you don't give us this money, then uh, we're
Speaker:gonna reveal your secrets, which may be intellectual property, or it may be
Speaker:information that you don't want out there.
Speaker:Does that sound about right?
Speaker:It does.
Speaker:And, and there's even, alternative extortion.
Speaker:Uh, so, um.
Speaker:Even more recently, uh, bad guys are going after the people
Speaker:whose data they took from you.
Speaker:that could be a client.
Speaker:It could be a student, and they're saying, Hey, the, the, the company you,
Speaker:you did business with or your kid goes to school with isn't paying us, but if
Speaker:you pay me or maybe you need to tell them to pay us, then we won't release
Speaker:your, your information to the public.
Speaker:Oof.
Speaker:So persona, this is a little reminiscent of what happened with LastPass.
Speaker:Do you remember what happened there?
Speaker:Yeah.
Speaker:So the bad actors broke into LastPass, stole the encrypted vaults, and
Speaker:then they were starting to crack the vaults because they realized people
Speaker:Okay.
Speaker:their cryptocurrency key.
Speaker:Their passphrase in their vaults.
Speaker:And so they were then going after them in order to drain people's wallets.
Speaker:Yeah, it's kind of like that different, different, but kind of, you know,
Speaker:the, the idea of going after.
Speaker:after the victim.
Speaker:Yeah.
Speaker:Going after the victim.
Speaker:Yeah.
Speaker:Um, uh, I, I do want to have a moment of silence for the guy that lost his
Speaker:hard drive with the crypto key in the dump that he's now officially given up.
Speaker:I dunno if you saw that in the last week or so.
Speaker:Uh, that guy has officially given up his search for the hard drive
Speaker:with his crypto key, you know.
Speaker:For the lack of, for the want of a backup.
Speaker:Yeah.
Speaker:It was a lot of money.
Speaker:Uh, worst throwaway ever.
Speaker:He threw it away, right?
Speaker:Yep.
Speaker:He
Speaker:Yeah.
Speaker:So here's a question.
Speaker:Since those are now gone and not recoverable, does that mean those
Speaker:bitcoins just sort of linger forever?
Speaker:I was
Speaker:Yeah.
Speaker:Yeah,
Speaker:He would have to, he would have to, uh, he would've to relinquish them.
Speaker:And if I was him, I, I would not.
Speaker:'cause you
Speaker:yeah,
Speaker:Yeah.
Speaker:yeah.
Speaker:It's a bit like having gold stored in Mount Doom Right
Speaker:From, from Lord of the Rinks.
Speaker:Um.
Speaker:Yeah, like, like you, you know it's there, but nobody's gonna ever be able to get it.
Speaker:have you guys ever watched, uh, honest Trailers?
Speaker:Oh, yes.
Speaker:I love the honest trailers.
Speaker:Yeah.
Speaker:Yeah.
Speaker:did one, uh, this last week on Lord of the Rings.
Speaker:Oh, did he?
Speaker:That's good.
Speaker:Hmm.
Speaker:I, I, another series I like is how it should have ended.
Speaker:I dunno if you've saw, if you've seen that series.
Speaker:So it's, it's a, it's a whole series where they take the ending of movies
Speaker:and then they're like, well this is how this should have ended.
Speaker:Um, and the only one I remember and it was, it was a Star Trek.
Speaker:It was one of the newer Star Trek movies, and they get sucked into like
Speaker:a black hole in the, in the movie.
Speaker:And, and I don't remember how they get out of the black hole, but in
Speaker:the, how it should have ended this, the first of the New Star Treks,
Speaker:so the, so they were, they picked on this movie a lot, that there were all
Speaker:these lens flares everywhere on the ship.
Speaker:And so the, the way that how it should have ended is instead of getting sucked
Speaker:into the black hole, somebody said, I know, shut off the lens flare generator.
Speaker:And they did that and then they were able to escape the black hole.
Speaker:But, uh, yeah, I've seen the honest trailers.
Speaker:I like that.
Speaker:I like that.
Speaker:Uh.
Speaker:A bit.
Speaker:A lot.
Speaker:All right.
Speaker:I think we've covered, um, you know, some basics of ransomware
Speaker:don't do ransomware, kids.
Speaker:Uh, I dunno what, I dunno what to tell you there.
Speaker:All right.
Speaker:Uh, thanks everybody for joining.
Speaker:Persona.
Speaker:Thanks for joining.
Speaker:It was, it was good to understand the history, so,
Speaker:Yeah, thanks.
Speaker:the history from old people, so.
Speaker:Yeah, thanks Mike for being another old people.
Speaker:Sure.
Speaker:All right.
Speaker:That is a wrap.