Feb. 16, 2026

The CryptoLocker Virus and the Birth of Modern Ransomware

The CryptoLocker Virus and the Birth of Modern Ransomware

The cryptolocker virus was the attack that turned ransomware from a nuisance into a full-blown criminal industry — and in this episode of The Backup Wrap-up, we break down exactly how that happened. W. Curtis Preston (Mr. Backup) sits down with co-host Prasanna Malaiyandi and cybersecurity expert Dr. Mike Saylor to trace the full evolution of ransomware and explain why CryptoLocker was the turning point.

If you've ever wondered how ransomware went from fake pop-up messages to billion-dollar criminal enterprises, this is the episode for you. We start with the earliest days — scareware attacks that did nothing more than frighten you into paying — and walk through the progression of encryption methods that made ransomware increasingly dangerous. Dr. Mike Saylor breaks down the difference between symmetric and asymmetric encryption in plain language, and explains why the move to public-private key pairs made it so much harder for victims to recover without paying up.

Then we get into the cryptolocker virus itself: how it spread through fake FedEx emails, why it kick-started phishing awareness training, what Operation Tovar did to shut it down, and — just as interesting — what the bad guys learned from its failures. We cover the role of the Zeus botnet, how Bitcoin became the payment method of choice, and why ransoms started out at just a few hundred bucks. We also talk about what happened next: the rise of data exfiltration, double extortion, and even triple extortion where attackers go after the victims of the victims.

Plus, we take a side trip into the LastPass breach and pour one out for the guy who lost his crypto fortune in a landfill.

Whether you're in IT, security, or just want to understand how ransomware works, this episode gives you the full picture.

Chapters:

00:00:00 — Intro

00:01:22 — Welcome and Introductions

00:04:11 — The Three Generations of Ransomware

00:05:01 — Scareware: Fake Attacks That Did Nothing

00:05:42 — Ciphers and Decoder Ring Encryption

00:06:38 — Symmetric Encryption Explained

00:09:25 — Asymmetric (Public-Private Key) Encryption

00:12:46 — Why Asymmetric Encryption Made Ransomware Stronger

00:15:44 — What Was the CryptoLocker Virus?

00:16:25 — Lessons CryptoLocker Taught Victims and Criminals

00:18:03 — Operation Tovar Takes Down CryptoLocker

00:19:54 — Bitcoin, Ransom Amounts, and Getting Paid

00:23:20 — Botnets Explained: Networks of Zombie Computers

00:26:22 — Recap: Three Phases of Ransomware

00:27:09 — Double Extortion and Data Exfiltration

00:28:01 — The LastPass Connection

00:28:47 — The Lost Crypto Hard Drive

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we go back to ransomware school persona.

Speaker:

My co-author Dr. Mike Saylor, and I break down what the CryptoLocker virus

Speaker:

was, why it mattered, and how it changed the ransomware game for everybody.

Speaker:

Good guys and bad guys.

Speaker:

Mike breaks down how encryption actually works, why the bad guys switch to

Speaker:

public private key encryption, and how the crypto likeer CryptoLocker

Speaker:

virus taught criminals what not to do when building a ransomware business.

Speaker:

Well, we also cover botnets, operation Tovar, Bitcoin, and

Speaker:

today's double extortion attacks.

Speaker:

There's a lot of info in this episode, so buckle up.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr. Backup.

Speaker:

I've been passionate about backup and recovery for over 30 years, ever since.

Speaker:

I had to tell my boss that there were no backups.

Speaker:

Of the production database that we just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the backup wrap up.

Speaker:

I'm your host, w Curtis Preston, AKA, Mr. Backup, and I have with me the guy

Speaker:

that was completely not helpful for this morning's events Prasanna Malaiyandi.

Speaker:

How's it going?

Speaker:

You were, you weren't there for me.

Speaker:

Uh, uh.

Speaker:

In fairness, I did not know what happened this morning until about 35

Speaker:

seconds ago, actually 36 seconds ago.

Speaker:

So

Speaker:

think that is.

Speaker:

Yeah, whatever.

Speaker:

I was going through some hard stuff, man.

Speaker:

And you weren't there for me.

Speaker:

I'm just saying.

Speaker:

But anyway, so persona, welcome of course to the podcast and we of course have once

Speaker:

again with us, Dr. Mike Saylor, all the way from the Great Republic of Texas.

Speaker:

How's going?

Speaker:

Mike,

Speaker:

well guys.

Speaker:

Thanks for having me again

Speaker:

is that, have I never noticed this?

Speaker:

You've got some kind of game thing be behind you.

Speaker:

Yeah.

Speaker:

have a couple of those mini arcades with the, you know, five to 500

Speaker:

different types of games on them.

Speaker:

Really?

Speaker:

I, uh, a hundred years ago, I, I remember, I, I was never, I, I didn't

Speaker:

last, the last like, arcade game.

Speaker:

I remember playing.

Speaker:

Like, like that was actually, um, what was the one with the, with the knight?

Speaker:

You remember the, the first one that had like Yeah.

Speaker:

Joust.

Speaker:

Yeah.

Speaker:

I remember doing, and I remember being horribly awful at joust.

Speaker:

That the bet the only game.

Speaker:

time ago, I had this game.

Speaker:

That's the first thing that came to mind.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Um, I had joust and then, but the only, the last game I remember being

Speaker:

any good at was, um, like Miss Pacman.

Speaker:

Right.

Speaker:

Like Asteroids and Miss Pacman and that, that era, which is

Speaker:

Mm-hmm.

Speaker:

Gallaga.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Um, yeah.

Speaker:

So we're old is all I'm really saying.

Speaker:

This one has gallica on it.

Speaker:

Yeah.

Speaker:

All right.

Speaker:

Well, at some point I gotta come over there.

Speaker:

Oh, centipede.

Speaker:

Yeah, I remember Centipede.

Speaker:

Um, but, uh, all the people listening, they're like, whatever, man.

Speaker:

Like these old farts.

Speaker:

Uh, just tell me about ransomware.

Speaker:

So we're talking about history though, in this episode.

Speaker:

We're going back, you know, back in the day, you know, as I like to do.

Speaker:

Uh, you know, when, when Mike, when I wrote, when, you know, when

Speaker:

you, when you and I wrote the book.

Speaker:

Like they, they, they sort of like poo-pooed on the history part.

Speaker:

They were like, we don't wanna spend a lot of time on the history.

Speaker:

Right.

Speaker:

You remember that?

Speaker:

stuff.

Speaker:

But I, I think there definitely is value in like, going back a little bit in time

Speaker:

to understand how we got here, right?

Speaker:

That there was a time when, uh, ransomware wasn't what it is.

Speaker:

What there's like three sort of generations of ransomware there.

Speaker:

There's the first one, which, which a lot of it was like either.

Speaker:

Like the, the claim that, you know, when you got the message, it was almost

Speaker:

like, it was like a fake message that you, you wanted them to believe that

Speaker:

the, or the, the, the hacker wanted you to believe that you were actually

Speaker:

attacked by ransomware when in reality nothing had actually happened to you.

Speaker:

Um, and, and this is, we still see this today, at least I still see it

Speaker:

today with messages on like my phone.

Speaker:

Right.

Speaker:

You go to the wrong website and you'll get this thing of

Speaker:

like, your phone has been taken.

Speaker:

Yeah, your phone has been taken over.

Speaker:

We, we know all your things and give us all your money, or we're

Speaker:

gonna, you know, do the thing.

Speaker:

And all you have to do is like close the browser.

Speaker:

Right.

Speaker:

For,

Speaker:

Um, I,

Speaker:

time.

Speaker:

Those were, those were categorized as scareware.

Speaker:

yeah.

Speaker:

Scareware, right?

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Um, but I mean, that, that was, so there was that and there was also.

Speaker:

You, you mentioned, you know, in our pre-call you mentioned that there

Speaker:

were, there was some stuff that was kind of easy to like decrypt.

Speaker:

Would that be right?

Speaker:

Yeah, it wasn't, it wasn't, um, you know, asymmetric encryption

Speaker:

that we think of today.

Speaker:

It was more of a, uh, more of a decoder ring type of encryption

Speaker:

Hmm, hmm.

Speaker:

You want, you want to,

Speaker:

was quickest and easiest to implement, I'm guessing.

Speaker:

yeah.

Speaker:

So you th.

Speaker:

overhead, high speed, low drag.

Speaker:

So you, you threw out a couple of terms there.

Speaker:

Let's start with the, the cipher concept.

Speaker:

What are we talking about there?

Speaker:

Well, cipher would be similar to like your de deco, your decoder ring.

Speaker:

Uh, you know, the number one equals the letter A.

Speaker:

Right,

Speaker:

a cipher, you know, it's a

Speaker:

right.

Speaker:

match.

Speaker:

Uh, and that's how a decoder ring works.

Speaker:

You, you, you know, you, you turn your decoder ring until this lines

Speaker:

up with that, and there's your, there's your letter or your number.

Speaker:

I.

Speaker:

Uh, and that's how, uh, initial type, uh, initial ransom type, uh,

Speaker:

encryption happened or, and it wasn't even ransom and just encryption in

Speaker:

general from malware perspective was

Speaker:

Right.

Speaker:

driven.

Speaker:

Right.

Speaker:

And then you, there was the, the second thing that you talked about, well,

Speaker:

actually it was the first thing, but I'm gonna put it as the second thing, which is

Speaker:

you said it wasn't asymmetric encryption, which this gives us an opportunity,

Speaker:

I think, to discuss the difference between symmetric and asymmetric.

Speaker:

Uh, encryption,

Speaker:

So symmetric means that the keys are the same.

Speaker:

Um, so if, if I encrypt something and send it to you.

Speaker:

You already have the, you know, it's, it's your encryption key.

Speaker:

Well, we all share the same key.

Speaker:

It's public

Speaker:

right.

Speaker:

Um, so everybody has the same key.

Speaker:

The only, the only way to maintain integrity and confidentiality is to

Speaker:

make sure nobody else that has that, uh, nobody has the key that shouldn't.

Speaker:

and

Speaker:

Right.

Speaker:

us left the group, uh, and uh, we wanna make confidentiality and integrity, we've

Speaker:

gotta regenerate a key for us to share.

Speaker:

Right.

Speaker:

It's kinda like

Speaker:

And, and.

Speaker:

your, it's kinda like changing the key to your house.

Speaker:

You know, when, when you

Speaker:

Right.

Speaker:

you don't, you, you, you wanna change all the locks.

Speaker:

Right.

Speaker:

you don't know who kept the key, uh, from the, the prior group.

Speaker:

, So if you, when you change the key with symmetric encryption, do you

Speaker:

then have to like re-encrypt the data?

Speaker:

yep.

Speaker:

Okay.

Speaker:

Yeah.

Speaker:

So, um, and the, the real problem, I think with symmetric encryption.

Speaker:

Uh, would be basically communicate like if you want to commu, if I wanna

Speaker:

send you something over email Right.

Speaker:

And, uh, I want to encrypt it, well, how do I get you the key?

Speaker:

Right.

Speaker:

That's, that's a real problem there.

Speaker:

don't send it

Speaker:

email it.

Speaker:

it with the email.

Speaker:

No.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Well, I'll, I'll send it via SMS 'cause that's more secure.

Speaker:

Well, and, and well, it would be better.

Speaker:

Uh, so

Speaker:

Yeah.

Speaker:

that an out-of-band communication.

Speaker:

So you would use a different account or a,

Speaker:

Right,

Speaker:

method, like SMS or

Speaker:

right.

Speaker:

meet in person, or, you know, I would stick it to the bottom of a park

Speaker:

bench or, you know, things like that.

Speaker:

Yeah.

Speaker:

Like I've seen in the spy movies.

Speaker:

Right.

Speaker:

yeah.

Speaker:

Uh, persona, you got anything to jump in there?

Speaker:

I was going to ask about.

Speaker:

Uh, Curtis, I think you kind of touched on it, so symmetric encryption, when

Speaker:

you rotate the key or change the key.

Speaker:

Everything moving forward would be encrypted using the new key, which

Speaker:

means that that previous person, in your example, Mike, who left the group, would

Speaker:

no longer be able to decode the new data because they don't have access to the key.

Speaker:

if they wanted to ensure that the person who left the group also doesn't

Speaker:

have access to the old data, then they would also have to re-encrypt

Speaker:

or decrypt the data first, and then re-encrypt using the new key.

Speaker:

Correct.

Speaker:

Correct.

Speaker:

Yeah.

Speaker:

is, that is a, even though it's, it's a difficult math problem,

Speaker:

it's, it's a lot less difficult than asymmetric encryption math problems.

Speaker:

Gotcha.

Speaker:

Gotcha.

Speaker:

It's because it's a matter of like, you just need to know the key.

Speaker:

Right.

Speaker:

It's easier

Speaker:

and obvi.

Speaker:

one key than it is the combination of two keys.

Speaker:

Oh, right.

Speaker:

Yeah.

Speaker:

Good.

Speaker:

So, all right, so let's talk about what's next.

Speaker:

Uh, the, the asymmetric encryption.

Speaker:

So asymmetric means the, the two different halves are different, right?

Speaker:

So, uh, you know, you've, you've got a, you've got a square on one side and a

Speaker:

circle on the other that's asymmetric.

Speaker:

And, essentially it, so the other, the other term for that

Speaker:

is public private key encryption.

Speaker:

I encrypt something with your public key and, and or your.

Speaker:

Public key and my private key,

Speaker:

Mm-hmm.

Speaker:

you get it, you decrypt it with your, with my public key and your private key.

Speaker:

Right.

Speaker:

long as our private keys are, kept safe, that communication, uh,

Speaker:

uh, can be relied upon as far as integrity and, and confidentiality.

Speaker:

But if I can, if I can steal your private key, I can decrypt

Speaker:

everything that Mike sends to Curtis.

Speaker:

If your private key is compromised, uh, I can decrypt that.

Speaker:

Well, with regards to ransomware, the victim is the public key.

Speaker:

So I've deployed ransomware in your environment.

Speaker:

I put the public key in that environment, or I use, I created a public key and then

Speaker:

the private key is held on the command and control server by the bad guys.

Speaker:

And this goes back to, um, you know, early days of ransomware and why.

Speaker:

Why you had to pay the ransom within a certain period of time that that private

Speaker:

key lived on a server that was being rented a botnet for that period of time.

Speaker:

So after 72 hours is up, the botnet goes away, and so does that private key that

Speaker:

would be needed to decrypt your stuff.

Speaker:

And if you never, or if you lost access to the private key, you

Speaker:

could never decrypt that data.

Speaker:

Right?

Speaker:

That's sort of the strength of.

Speaker:

Asymmetric encryption, correct.

Speaker:

I wouldn't say never, but yeah, it's, it's very difficult to, to crack.

Speaker:

'cause for the most part, being human, uh, we're gonna create, and

Speaker:

it, and it does depend on the, the, the tool you use to create your keys.

Speaker:

A lot of times these days it's, you know, all random stuff.

Speaker:

Like, move your mouse around and do this, that and the

Speaker:

other until light turns green.

Speaker:

And then we've created your key.

Speaker:

But some people create their keys based on.

Speaker:

Uh, kind of their approach to passwords, so birthdays and peoples

Speaker:

and dogs and, uh, college football teams and that kind of thing.

Speaker:

Uh, and so, when, when we go about trying to crack encryption, uh, there

Speaker:

are kind of brute force methods, uh, along with like true math.

Speaker:

Um.

Speaker:

Uh, math hacking approaches to cracking passwords or, or keys.

Speaker:

But

Speaker:

Right.

Speaker:

there's, there's a couple of different things to think about

Speaker:

and, and a lot of those are unknown.

Speaker:

So if you created your key and I don't know what you used to create it,

Speaker:

then yeah, it's a lot more difficult for me as, as far as determining my

Speaker:

approach to cracking your encryption.

Speaker:

But if I did know what you used, uh, then I could focus on

Speaker:

those, those type of tactics.

Speaker:

Right.

Speaker:

Uh, interesting.

Speaker:

'cause I, I, I'll just say for the record, even though I understand

Speaker:

everything you just said, and I, and I probably could have given the exact same

Speaker:

Okay.

Speaker:

or definition that you just gave, I have no idea how that works.

Speaker:

Like, just like that's, uh, in terms of like underneath right.

Speaker:

The, the actual coding part.

Speaker:

Right.

Speaker:

Um, so the, so the, with the why.

Speaker:

Did switching to private public key help make ransomware more, uh, prevalent

Speaker:

Resilient.

Speaker:

or, or resilient?

Speaker:

Yeah.

Speaker:

Oh, is it be, is it be, I, maybe you already answered this, that basically

Speaker:

the, the difficulty of guessing two keys is harder than guessing One.

Speaker:

Well, it's the, it's the value of, of the ransom, right?

Speaker:

So if I'm gonna hold you ransom, there's a high likelihood that you're

Speaker:

not gonna be able to recover from it, then I'm more likely to get paid.

Speaker:

So if

Speaker:

Hmm.

Speaker:

that encryption, uh, foolproof or at

Speaker:

Mm-hmm.

Speaker:

for you to figure out within the period of time that I think it, you

Speaker:

know, before it starts to hurt you as a business or a person, you're

Speaker:

more likely to pay the ransom.

Speaker:

So, by increasing my encryption strength by moving to asymmetric, encryption,

Speaker:

the likelihood of you being able to recover without paying me goes down.

Speaker:

Gotcha.

Speaker:

And even with the asymmetric encryption, I think I had read articles where

Speaker:

some of the ransomware actors might have used the same private key

Speaker:

over multiple different victims.

Speaker:

And so like the FBI or any of these other organizations were able to help

Speaker:

other victims, uh, even though by just, uh, gaining access to that private key.

Speaker:

Is that right?

Speaker:

and, and there's a yes, and, and there's a, there's an enhancement to that in

Speaker:

that there are some bad guys or even some, some good guys that put the effort

Speaker:

into decrypting things on their own.

Speaker:

Uh, and so whether the FBI was able to get the key from a, a prior

Speaker:

victim to help future victims, or it was these bad actors or, um.

Speaker:

You know, uh, good actors, white hats or gray hats, uh, that cracked the

Speaker:

password on their own and then shared it.

Speaker:

Because one of the things that we saw early on in the ransomware game was that,

Speaker:

there was competition, uh, for ransomware.

Speaker:

And so you might have, uh, one ransomware actor.

Speaker:

Uh, you know, attacking the, the victims that another ransomware actor wanted

Speaker:

to attack or feeling like they're intruding on their, their business.

Speaker:

And so one ransomware threat actor may crack the, the keys or, or provide a

Speaker:

decryptor for the other ransomware.

Speaker:

And then, and then, and this actually happened, there was, there was a website

Speaker:

put up that said if you're, if you're encrypted by, you know, X gang, um.

Speaker:

Put your files here and we'll

Speaker:

That's, that's interesting.

Speaker:

That's right.

Speaker:

I, I, I had no idea that basically the, the, the com, the competitors,

Speaker:

uh, trying to hurt their competitors, uh, that's crazy actually,

Speaker:

um, that they would do that.

Speaker:

Um, now,

Speaker:

This is my corner.

Speaker:

yeah, it's my corner.

Speaker:

I get it.

Speaker:

So what, um, what about, um.

Speaker:

So as we move forward in time, what was CryptoLocker, when I

Speaker:

say was it's still around, right?

Speaker:

Uh, but how, in terms of the story, what role did Crypto Locker pay?

Speaker:

Uh, well, I think it was one of those, um.

Speaker:

Uh, somebody had to be first,

Speaker:

mm-hmm.

Speaker:

at trying to formalize the ransomware business.

Speaker:

Uh, so there was a lot that, uh, both victims and bad guys

Speaker:

learned from Crypto Locker.

Speaker:

Mm-hmm.

Speaker:

so Crypto Locker reinforced the need to be more diligent with, uh,

Speaker:

So the Crypto Locker taught us a lot from a victim perspective because it made us

Speaker:

more diligent with the emails that we get.

Speaker:

Uh, a lot of Crypto Locker came in fake FedEx emails

Speaker:

about a package, or a delivery.

Speaker:

so that really started, that really kicked off the start of, uh, fishing training.

Speaker:

Mm-hmm.

Speaker:

and making sure that we're clicking on stuff that we expected and, and

Speaker:

reporting things that looked suspicious.

Speaker:

And then on the threat actor side, it, it really taught the bad guys how

Speaker:

not to build a criminal business, uh,

Speaker:

Hmm.

Speaker:

these guys were not very well organized.

Speaker:

They didn't, they didn't cover their tracks.

Speaker:

Uh, they weren't doing the, you know, three and four layers of

Speaker:

anonymity that, that we see today.

Speaker:

simply just rented a botnet.

Speaker:

Uh, they developed some ransomware that did, even though it had

Speaker:

asymmetric encryption, uh, they did not protect their keys very well,

Speaker:

which is, uh, and, and what I mean by that is, uh, eventually when.

Speaker:

Law enforcement, uh, started going after these guys.

Speaker:

The, the capture of their keys was, was fairly quick.

Speaker:

They didn't, they didn't hide them, you know, they weren't, they

Speaker:

weren't, uh, on a USB, you know, underneath a floorboard or anything.

Speaker:

Hmm.

Speaker:

and so, uh, that their organization fell apart within like a year or so.

Speaker:

Do you know if there were arrests made?

Speaker:

there were a lot of arrests made.

Speaker:

Um, I'm trying to remember the name of the.

Speaker:

The, uh, law enforcement campaign.

Speaker:

I think, you know, Curtis, I think you put it in the notes earlier, but it's

Speaker:

like Tovar or something like that.

Speaker:

Operation Tovar.

Speaker:

Uh, so yeah, they, they, there was an international, uh, task

Speaker:

force that went after these guys.

Speaker:

Uh, and it was, uh, about a year later that, um.

Speaker:

Crypto Locker as an organization went down that the ransomware, uh, became

Speaker:

a kind of a starting point for a lot of, uh, other ransomware campaigns.

Speaker:

You know, bad guys are lazy if I can take what you've built and just modify it as a

Speaker:

Right?

Speaker:

Um, and so that's pretty common.

Speaker:

There's a, there's a couple of good graphics out there that show you the,

Speaker:

how ransomware over time branched off into these different variants.

Speaker:

Mm-hmm.

Speaker:

Crypto Locker was one of those first that branched off into, into several.

Speaker:

So

Speaker:

this,

Speaker:

given

Speaker:

ahead.

Speaker:

given that it was sort of one of the first right, that changed

Speaker:

ransomware and the business,

Speaker:

Much money.

Speaker:

Like what was sort of the amount of ransom that they were able

Speaker:

to steal from their victims,

Speaker:

There's

Speaker:

I'm sure back then it was like a very different magnitude than it is today,

Speaker:

just given how prevalent ransomware is so.

Speaker:

Well, and, and they could have done more, but similar to.

Speaker:

Normal approaches to business, you've gotta look at, you know, the

Speaker:

feasibility, who's your customer?

Speaker:

What's the likelihood of, of payment or success, right?

Speaker:

so funny when you talk about like a criminal organization.

Speaker:

So they had to think about this.

Speaker:

So if, if they, if they ransom your stuff and they ask for a million

Speaker:

dollars, what's the likelihood that they're gonna get paid?

Speaker:

Uh, especially, uh, you know, back in the day a lot of the, uh,

Speaker:

infections were on individual devices.

Speaker:

It wasn't like a whole And so the, the value of an individual device versus

Speaker:

crippling a whole company, right?

Speaker:

So, um, crypto lockers ransom was relatively small.

Speaker:

Uh, a couple hundred bucks maybe, maybe I think up to 500.

Speaker:

Uh, and that correlated well with the value of Bitcoin at the time.

Speaker:

And so one of the

Speaker:

Right.

Speaker:

did think about as far as anonymity goes is how do we get paid without

Speaker:

people knowing who they're paying?

Speaker:

And so that's when, you know, the advent of, of cryptocurrencies

Speaker:

kind of kicked some of this off.

Speaker:

But, um, Bitcoin back in the day, you know, was a couple hundred bucks, uh,

Speaker:

a Bitcoin, uh, maybe close to 300.

Speaker:

And, uh, and, and so a ransom for three or 500 bucks, anybody

Speaker:

could go get one Bitcoin.

Speaker:

or it would be relatively easy to get.

Speaker:

And that's interesting too because over time, as the ransom started to go up,

Speaker:

people had to ask for help because I don't know if you know this, but as

Speaker:

individuals you can only get two Bitcoin like maybe every couple of weeks.

Speaker:

So if you get ran, well now Bitcoin's a lot more valuable today.

Speaker:

But let's say back in the day if, if someone asked you for four Bitcoin.

Speaker:

Regardless of the cost just for Bitcoin, you and I could

Speaker:

not do that within 72 hours.

Speaker:

Hmm.

Speaker:

Hmm.

Speaker:

Like I could go get two and then I'd have to call a friend and say, Hey,

Speaker:

I need, I need you to go get two.

Speaker:

then, all right, where, where do we go?

Speaker:

Well, it's usually not a good part of town.

Speaker:

know, it's a bar somewhere that has a Bitcoin machine on the

Speaker:

counter next to the bathroom.

Speaker:

how they do drug transactions these days.

Speaker:

Uh, but yeah, it, there's, there's a whole logistics behind and, and marketing

Speaker:

and sales strategy behind ransomware.

Speaker:

Fascinating.

Speaker:

Um, so if, if Crypto Locker was, like you said, it was the first, but then

Speaker:

they shut down the, the organization, it sounds like, uh, the main role that it's

Speaker:

played here in, in the history is that.

Speaker:

We, we can look, you know, or the bad guys were able to look at that and

Speaker:

said, okay, there's what not to do.

Speaker:

Let's do, let's do something slightly different than that.

Speaker:

Let's take what we can do.

Speaker:

Let, let's take the, the crypto, you know, part of it, right?

Speaker:

So that we can get paid anonymously, semi, semi anonymously.

Speaker:

And let's do that.

Speaker:

The, the, the asymmetrical asymmetric encryption.

Speaker:

Um, and.

Speaker:

But don't but be better at hiding our secrets as we're part of it.

Speaker:

Does that sound about right?

Speaker:

It is.

Speaker:

And, and then just add to that the, um.

Speaker:

Um, the integration of the botnet.

Speaker:

So the, again, bad guys learn some things here too.

Speaker:

Mm-hmm.

Speaker:

utilizing the botnet, you know, it's, that is a layer in your anonymity and,

Speaker:

and, and definitely a component for your,

Speaker:

the, the management or the command and control of your ransomware.

Speaker:

Uh, but there was some lessons learned there about how best to do

Speaker:

that and who to work with, like Zeus.

Speaker:

Uh, the Zeus botnet is who?

Speaker:

Locker used.

Speaker:

Uh, and they became pretty widely used after this, that they were,

Speaker:

Hmm.

Speaker:

were, they were common, uh, but they kind of made them a name for themselves as

Speaker:

a, as a platform from which you can, you can start to these ransomware attacks.

Speaker:

Uh, and they started to improve their service and their support, uh, for

Speaker:

those types of attacks after this one.

Speaker:

Feature requests.

Speaker:

So, uh, again, for, for those that are, you know, this is

Speaker:

definitely a foundational episode.

Speaker:

Do you want to discuss what a botnet is and you know how that, you know?

Speaker:

Well, there you go.

Speaker:

Sure.

Speaker:

Uh, so, so a botnet is a, is a network of bots and a bot is short for robot.

Speaker:

Uh, and a robot is a computer that you and I use, or, or maybe it's a company

Speaker:

or, uh, an entire school district.

Speaker:

It's somebody else's computer.

Speaker:

That bad guys have compromised added it to their network of

Speaker:

other compromised computers.

Speaker:

It's, it's essentially a peer-to-peer network of if you will, uh, that come

Speaker:

to life whenever, um, uh, bad guys, uh, rent them out, uh, to other threat

Speaker:

Mm-hmm.

Speaker:

And so, you know, I may have

Speaker:

puppet.

Speaker:

uhhuh, I may, I may have, I may have a million compromised

Speaker:

computers around the world.

Speaker:

And Curtis calls and says, Hey, I need, I need 10,000 computers for this thing.

Speaker:

It could be, uh, uh, distributed computing to crack passwords.

Speaker:

Uh, and, and by the way, when I, when I, um.

Speaker:

When I have this bot, uh, botnet developed, I, I inventory all of my

Speaker:

bots so I know the, the type of computer memory processor, all those things.

Speaker:

And so I can actually, um, segment or, or virtualize parts of that botnet

Speaker:

based on my client's requirements.

Speaker:

So if I need, if I need 10,000 machines with, you know, eight cores or more.

Speaker:

As far as processing goes and, and how much memory total across all this, uh,

Speaker:

distributed network, then I can, I can build that and rent it by the hour,

Speaker:

uh, by the day, week, month, um, uh, to whoever needs it for whatever reason.

Speaker:

And so, uh, for a while, especially early on, the term for that

Speaker:

would be a a, a botnet herder.

Speaker:

So I'm a bot herder.

Speaker:

Uh, so kind of a shepherd of, of bots, uh, that's kind of a, and, and people in the

Speaker:

industry do the same thing you just did.

Speaker:

It's kind of, they laugh at it and like nobody says that.

Speaker:

Uh, but the textbooks did, uh, they called them bot herders.

Speaker:

Um, and there's a, there's a fascinating, um, paper and I'm, I'm

Speaker:

trying, it's called The Dark Visitor.

Speaker:

it's out on the internet.

Speaker:

It, it was a, it's a declassified military report on the

Speaker:

Chinese hunk, red Hunker Army.

Speaker:

Um, and that was the kind of the first nation state, uh, white paper written,

Speaker:

uh, written by the military on the, on the Chinese, uh, uh, capabilities for

Speaker:

cyber espionage and that kind of stuff.

Speaker:

And in that paper they, they, they call bots, um, meat

Speaker:

chickens or meatier chickens.

Speaker:

So a compromise.

Speaker:

So that's how it,

Speaker:

Me.

Speaker:

it translates in, in, in

Speaker:

because it was written in Chinese.

Speaker:

Right.

Speaker:

Okay.

Speaker:

how it translate.

Speaker:

It translates into a meteor chicken.

Speaker:

So a compromised computer that's part of a bot is a meteor chicken.

Speaker:

That's pretty funny.

Speaker:

So at the beginning of this episode, I mentioned that there

Speaker:

were sort of three phases.

Speaker:

We've discussed the evolution from that very beginning of sort of like scareware.

Speaker:

Up to asymmetric encryption with, uh, CryptoLocker and other lots of copycats.

Speaker:

Um, you know that, that, uh, since then and we had this giant

Speaker:

proliferation of what I'm gonna now call traditional ransomware.

Speaker:

But what has happened is in the last several years is that as people like

Speaker:

me have helped random people, you know, have better backups and be able

Speaker:

to recover from a, from a ransomware attack via a restore, they're like,

Speaker:

well, we gotta do something else.

Speaker:

And they added this concept of, um.

Speaker:

Exfiltration, right?

Speaker:

And then, uh, double extortion.

Speaker:

So they're stealing your data.

Speaker:

And then they're like, well, if you don't, you know, well, you may be able

Speaker:

to restore your data, but if you don't give us this money, then uh, we're

Speaker:

gonna reveal your secrets, which may be intellectual property, or it may be

Speaker:

information that you don't want out there.

Speaker:

Does that sound about right?

Speaker:

It does.

Speaker:

And, and there's even, alternative extortion.

Speaker:

Uh, so, um.

Speaker:

Even more recently, uh, bad guys are going after the people

Speaker:

whose data they took from you.

Speaker:

that could be a client.

Speaker:

It could be a student, and they're saying, Hey, the, the, the company you,

Speaker:

you did business with or your kid goes to school with isn't paying us, but if

Speaker:

you pay me or maybe you need to tell them to pay us, then we won't release

Speaker:

your, your information to the public.

Speaker:

Oof.

Speaker:

So persona, this is a little reminiscent of what happened with LastPass.

Speaker:

Do you remember what happened there?

Speaker:

Yeah.

Speaker:

So the bad actors broke into LastPass, stole the encrypted vaults, and

Speaker:

then they were starting to crack the vaults because they realized people

Speaker:

Okay.

Speaker:

their cryptocurrency key.

Speaker:

Their passphrase in their vaults.

Speaker:

And so they were then going after them in order to drain people's wallets.

Speaker:

Yeah, it's kind of like that different, different, but kind of, you know,

Speaker:

the, the idea of going after.

Speaker:

after the victim.

Speaker:

Yeah.

Speaker:

Going after the victim.

Speaker:

Yeah.

Speaker:

Um, uh, I, I do want to have a moment of silence for the guy that lost his

Speaker:

hard drive with the crypto key in the dump that he's now officially given up.

Speaker:

I dunno if you saw that in the last week or so.

Speaker:

Uh, that guy has officially given up his search for the hard drive

Speaker:

with his crypto key, you know.

Speaker:

For the lack of, for the want of a backup.

Speaker:

Yeah.

Speaker:

It was a lot of money.

Speaker:

Uh, worst throwaway ever.

Speaker:

He threw it away, right?

Speaker:

Yep.

Speaker:

He

Speaker:

Yeah.

Speaker:

So here's a question.

Speaker:

Since those are now gone and not recoverable, does that mean those

Speaker:

bitcoins just sort of linger forever?

Speaker:

I was

Speaker:

Yeah.

Speaker:

Yeah,

Speaker:

He would have to, he would have to, uh, he would've to relinquish them.

Speaker:

And if I was him, I, I would not.

Speaker:

'cause you

Speaker:

yeah,

Speaker:

Yeah.

Speaker:

yeah.

Speaker:

It's a bit like having gold stored in Mount Doom Right

Speaker:

From, from Lord of the Rinks.

Speaker:

Um.

Speaker:

Yeah, like, like you, you know it's there, but nobody's gonna ever be able to get it.

Speaker:

have you guys ever watched, uh, honest Trailers?

Speaker:

Oh, yes.

Speaker:

I love the honest trailers.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

did one, uh, this last week on Lord of the Rings.

Speaker:

Oh, did he?

Speaker:

That's good.

Speaker:

Hmm.

Speaker:

I, I, another series I like is how it should have ended.

Speaker:

I dunno if you've saw, if you've seen that series.

Speaker:

So it's, it's a, it's a whole series where they take the ending of movies

Speaker:

and then they're like, well this is how this should have ended.

Speaker:

Um, and the only one I remember and it was, it was a Star Trek.

Speaker:

It was one of the newer Star Trek movies, and they get sucked into like

Speaker:

a black hole in the, in the movie.

Speaker:

And, and I don't remember how they get out of the black hole, but in

Speaker:

the, how it should have ended this, the first of the New Star Treks,

Speaker:

so the, so they were, they picked on this movie a lot, that there were all

Speaker:

these lens flares everywhere on the ship.

Speaker:

And so the, the way that how it should have ended is instead of getting sucked

Speaker:

into the black hole, somebody said, I know, shut off the lens flare generator.

Speaker:

And they did that and then they were able to escape the black hole.

Speaker:

But, uh, yeah, I've seen the honest trailers.

Speaker:

I like that.

Speaker:

I like that.

Speaker:

Uh.

Speaker:

A bit.

Speaker:

A lot.

Speaker:

All right.

Speaker:

I think we've covered, um, you know, some basics of ransomware

Speaker:

don't do ransomware, kids.

Speaker:

Uh, I dunno what, I dunno what to tell you there.

Speaker:

All right.

Speaker:

Uh, thanks everybody for joining.

Speaker:

Persona.

Speaker:

Thanks for joining.

Speaker:

It was, it was good to understand the history, so,

Speaker:

Yeah, thanks.

Speaker:

the history from old people, so.

Speaker:

Yeah, thanks Mike for being another old people.

Speaker:

Sure.

Speaker:

All right.

Speaker:

That is a wrap.