How Ransomware Works: The Five Objectives of Every Attack
Understanding how ransomware works is critical for anyone responsible for protecting their organization's data. In this episode of The Backup Wrap-up, we examine the five core objectives that drive nearly every ransomware attack - from initial access through the final ransom note delivery.
I'm joined by my co-author Dr. Mike Saylor as we kick off what's going to be a comprehensive series on our new book, "Learning Ransomware Response and Recovery." We start at the beginning: how do these attackers even get in? Mike breaks down the role of initial access brokers (IABs) - the bad guys who specialize in harvesting and selling credentials. We talk about why email phishing remains the cheapest and most statistically reliable attack vector, even with all our defenses.
From there, we walk through lateral movement and reconnaissance. Once attackers are inside your network, they're not sitting idle. They're mapping your environment, identifying your crown jewels, and figuring out where your backups live. The "phone home" phase establishes command and control, letting attackers coordinate their activities and receive instructions.
We dig into data exfiltration and the rise of double extortion. It's not enough anymore to just encrypt your data - attackers are stealing it first, threatening to publish it even if you can restore from backups. Mike shares some fascinating details about how sophisticated ransomware can be, including variants that examine file headers rather than just extensions to find valuable targets.
The encryption phase itself is resource-intensive, and Mike explains why you might actually notice your computer acting weird if you're paying attention. Your mouse hesitates, typing lags, the network slows down - these are all potential warning signs.
Finally, we cover how ransom notes are delivered today. Spoiler: it's not the old-school desktop background takeover anymore. Modern ransomware drops text files in every folder it touches, making sure you can't miss the message.
This episode sets the foundation for understanding how ransomware works, which is the first step in defending against it and recovering when prevention fails.
you found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we break down how ransomware works.
Speaker:By examining the five key objectives that attackers follow in nearly every campaign.
Speaker:My co-author, Dr. Mike Sailor, joins persona in me to walk through the
Speaker:complete attack lifecycle from gaining that initial foothold to delivering the
Speaker:dreaded ransomware note we talk about initial access brokers lateral movement.
Speaker:Command and control or C two communications data exfiltration
Speaker:and the encryption process itself.
Speaker:Uh, this is the first in what's going to be a long series discussing
Speaker:our new book, so buckle up.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr. Backup,
Speaker:and I've been passionate about backup and recovery for over 30 years, ever since.
Speaker:I had to tell my boss that there were no backups.
Speaker:Of the production database we just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the backup wrap up.
Speaker:I'm your host w Curtis Preston, and I have two people with me today.
Speaker:We shall start with PSA manana.
Speaker:Malaiyandi, how's going?
Speaker:Prasanna I.
Speaker:Am good.
Speaker:Curtis, you have to.
Speaker:Okay.
Speaker:Really quickly, how was the show last night?
Speaker:Oh, with, uh, Esh Patel.
Speaker:Nme Nesh Nesh was good.
Speaker:He's taping a special in, uh, in April.
Speaker:Uh, so it was very cool.
Speaker:I wasn't quite in the front row.
Speaker:A lot of Indians in the crowd.
Speaker:And a lot of, a lot of comments about that.
Speaker:Um, uh, I stood out a bit in the crowd, but it was, it was very cool.
Speaker:Um, so, so welcome to the show Prasanna.
Speaker:Thank you, Curtis.
Speaker:I, it's good to be on the show.
Speaker:And of course, of course.
Speaker:We have my book co-author.
Speaker:And look, Mike, it's right up
Speaker:here on the
Speaker:I see it.
Speaker:You, I, yeah.
Speaker:I can't, that is, by the way, that is really big.
Speaker:It's.
Speaker:It is
Speaker:it's like, I think it's like 24
Speaker:by
Speaker:I was, I was,
Speaker:the
Speaker:signs
Speaker:I was concerned that was actual size, but I'm, I'm glad you, I'm glad you commented.
Speaker:Yeah.
Speaker:Yeah.
Speaker:So those, those are, I think, um.
Speaker:13 by 17, right?
Speaker:The ones over.
Speaker:Yeah.
Speaker:So by the way, for those of you, uh, you know, if you're listening, you can
Speaker:watch us on the on, on the tube, uh, by the same name, uh, the backup wrap up.
Speaker:So this is Doctor Mike Sailor, my co-author.
Speaker:Welcome to the
Speaker:show,
Speaker:Thank you guys.
Speaker:you're, you're in your new office,
Speaker:apparently?
Speaker:am in a new office.
Speaker:Yes.
Speaker:Yeah.
Speaker:Do you wanna, do you wanna talk about what you're
Speaker:doing over there?
Speaker:Yeah.
Speaker:So, uh, I think when, when you and I started the, the book, I was, uh, I was
Speaker:involved, uh, at a, to a lesser extent with, uh, some North Texas, uh, colleges
Speaker:and universities helping them with their cybersecurity computer science programs.
Speaker:Uh, and then over the last couple of months, um, um.
Speaker:My engagement with Weatherford College in particular, uh, grew into,
Speaker:uh, now I'm the department chair, uh, over business, computer science
Speaker:and organizational leadership.
Speaker:So, uh, I just can't, I can't get enough of, of more to do.
Speaker:So I'm, I'm, I'm at least succeeding in that
Speaker:Do you.
Speaker:gonna say, Mike, that you just like, you just finished your PhD last year,
Speaker:right?
Speaker:24.
Speaker:I was like, okay, 24.
Speaker:And I was like, okay, it looks like you got addicted to being
Speaker:in school or being around school.
Speaker:So you're like, okay, gonna go back.
Speaker:Except this time I will help set up or run departments and all the
Speaker:rest, so.
Speaker:Well, uh, uh, over the last couple years, I've, I've thought about, you know,
Speaker:what, what does retirement look like?
Speaker:And, uh, uh, I think I've, uh, I, I've got an idea of retiring as a,
Speaker:uh, in, in academia somewhere, you know, share, share my war stories and
Speaker:knowledge with the next generation.
Speaker:Uh, so that's that.
Speaker:You know what I'm working towards.
Speaker:feel free to, you know, I can think of a recommended textbook
Speaker:for your, for your, uh, for your
Speaker:class.
Speaker:a great idea.
Speaker:anyway, yeah.
Speaker:Um, I, I, I remember at least one of one of my books.
Speaker:Uh, I remember finding out that it was a textbook somewhere, which
Speaker:I thought that was pretty cool.
Speaker:Right.
Speaker:Being told that some, that some people are being forced to buy my book.
Speaker:So, uh, speaking of the book, we are beginning, this is at the very
Speaker:beginning of a very long series.
Speaker:We are gonna be talking about this book, literally four years.
Speaker:What's the title?
Speaker:we're gonna do like.
Speaker:A hundred episodes about, because there's so much to talk about in the book.
Speaker:But basically, uh, we're gonna just talk about the things that we, you know, that
Speaker:we, that we learned, uh, you know, some of which we, we already knew, but I think
Speaker:we learned, uh, some things along the way.
Speaker:And, um, this one, Mike, I thought we would start with that We already did.
Speaker:Uh, an episode or two, we talked about.
Speaker:We did the what is Ransomware episode and uh, I also did, um, 'cause we were
Speaker:waiting to, trying to book you, uh, you know, you're a busy man and uh, we did it.
Speaker:Y Yeah, we, uh, we, um, um, we did an episode on how DISC
Speaker:helped, but also hurt, right?
Speaker:Because the fact that backups are on disc makes them, uh, an easier
Speaker:target from a ransomware perspective.
Speaker:Right.
Speaker:Um, and now we're gonna talk about just, just sort of the, the, the attack.
Speaker:process the attack methodology, right?
Speaker:So the title here is, is five objectives of Every Ransomware Attack.
Speaker:What are they gonna try to do?
Speaker:Do they almost all follow the same pattern?
Speaker:To an extent there, there are some that, that may deviate based on
Speaker:how the ransomware was designed.
Speaker:Uh, and so there are specific campaigns to do specific things.
Speaker:Uh, but in general, yeah, they, they do tend to follow, uh, the same process.
Speaker:Can I chime in on something?
Speaker:Chime, chime.
Speaker:the name of this book that you are referring to?
Speaker:Well, it's of course learning ransomware response and recovery.
Speaker:Uh, although I appreciate the ability to plug Prasanna, there's already an ad that
Speaker:plays at the beginning of every episode.
Speaker:Trust me, I make sure they know the title of this book if they're
Speaker:listening to this episode.
Speaker:but yeah, so, and if you're watching it on, on, uh, on YouTube, you get to see
Speaker:the picture, uh, right up behind me there.
Speaker:Uh, and, uh, Mike is of course my co-author, so let's talk about
Speaker:that, that the first thing that they want to do, which, uh, and
Speaker:let's talk about, let's define.
Speaker:What an IAB is, right?
Speaker:And what this has to do with, uh, that first step, which is gaining that
Speaker:initial access to the environment.
Speaker:And so that can take a lot of different forms too.
Speaker:Uh, I think we, we, we often hear about ransomware coming through
Speaker:an email that you clicked on something or you open something.
Speaker:Um, but speaking of IABs or initial access brokers, sometimes bad guys simply buy
Speaker:credentials from some other bad guy.
Speaker:'cause that's all the, you know, that's the risk.
Speaker:That's their specialty.
Speaker:They just harvest credentials and they resell them.
Speaker:So now I don't, I don't need to rely on a user to interact with
Speaker:an email with malware in it.
Speaker:I have the credentials to log in and deploy my malware.
Speaker:Uh, so how it's initially, uh, deployed sometimes depends.
Speaker:Uh, so it depends on the, the threat actor.
Speaker:It depends on the campaign.
Speaker:And sometimes they may try both.
Speaker:You know, maybe I bought a bunch of credentials and none of them
Speaker:work, so now I'm gonna start sending emails or vice versa, right?
Speaker:I send a bunch of emails and nobody clicks on it.
Speaker:Well, now I need to go buy, I need to go buy some credentials.
Speaker:And is like if then I know you have a lot of expertise in this field,
Speaker:in your sort of experience, how.
Speaker:Successful.
Speaker:Is it sort of with the email versus, or how prevalent is the email attack side
Speaker:of things versus sort of uh, the, buy
Speaker:credentials.
Speaker:email is the cheapest and statistically most reliable.
Speaker:Uh, and then there's the other, there is the third option where bad
Speaker:guys do you know, they, they, they do an assessment of your environment
Speaker:looking for vulnerabilities.
Speaker:They find one they can exploit.
Speaker:Now they've got access that way without having to do either of the other two.
Speaker:But, um, statistics with email has, has run pretty consistent over the,
Speaker:the last man almost couple of decades.
Speaker:Uh, it's gotten a little bit better.
Speaker:Well, actually there's a bit of an e ebb and flow because,
Speaker:uh, traditional email phishing.
Speaker:We were getting better at as users at detecting, you know, bad, you
Speaker:know, bad grammar, bad punctuation, like that just doesn't seem right.
Speaker:I'm not clicking on that.
Speaker:But now with ai, those emails are written, written, pristine.
Speaker:And if, and if I can give AI enough history of how you communicate,
Speaker:I can truly make that email sound like something you would say.
Speaker:Right, because that's the other, that's the other giveaway with AI is
Speaker:that it's using language and things like Prasanna doesn't talk that way.
Speaker:He wouldn't sign his email like that.
Speaker:So now that's what I'm looking for.
Speaker:Instead of punctuation, I'm looking for like, you know, a sentence structure
Speaker:and, and the words you might use.
Speaker:Well, but ai, if I give it AI enough information, it can, it
Speaker:can, it can fool a lot of people.
Speaker:So there's been this like.
Speaker:Over, you know, prior to, uh, AI being used as a, as a tool, uh, the, the
Speaker:statistical, the statistical success of email phishing went down a couple
Speaker:of percentages, uh, percentage points.
Speaker:But now with ai, it's going back up.
Speaker:Uh, and so it's, it's usually around between 20 and 25%.
Speaker:So if I send out a million emails, that's 200,000 people are gonna click on it and,
Speaker:Really
Speaker:yeah.
Speaker:that, that's really
Speaker:It is.
Speaker:Well now, now granted, you know, you've gotta, you've gotta
Speaker:consider all the other things too.
Speaker:Like maybe I have a good email filter.
Speaker:And so
Speaker:Mm-hmm.
Speaker:don't typically get emails from Prasanna, so that's going into quarantine, right?
Speaker:So there's, there's other things that would impact that.
Speaker:Uh, so it does depend on how an environment might, uh, uh, might be
Speaker:set up to, to, uh, address phishing.
Speaker:But in general, between 20 and 25% delivery.
Speaker:Alright, so that's just, it made it to your inbox.
Speaker:Now of the 20, 25%, another 20, 25% interact with the email.
Speaker:So out of, out of 200,000 now you've got, what, 40, 40,000 people
Speaker:actually opening the email of those?
Speaker:Some, another subset would actually, you know, if it asked for credentials,
Speaker:they would give credentials.
Speaker:Uh, so it, out of a million emails, you're probably looking
Speaker:at, you know, maybe 20, 30,000.
Speaker:Uh, actually, actually interacting with it and potentially, you know,
Speaker:causing an infection or giving away their, their login credentials.
Speaker:Well,
Speaker:Of course.
Speaker:given how.
Speaker:Of course when you're saying the word phishing, for those that you
Speaker:know, 'cause we're saying it out loud, this is phishing pH, right?
Speaker:P-H-I-S-A-I-S-H-I-N-E.
Speaker:Right.
Speaker:Um, and, uh, you know, referring to this idea of sending something
Speaker:out, you're fishing, right?
Speaker:You're, you're sending a bunch of stuff out.
Speaker:Hoping that you get a bite.
Speaker:And, and the thing is, like everything else, and we're gonna say this a million
Speaker:times over the, you know, over these episodes is they, they have to, they
Speaker:only have to be right once, right?
Speaker:They only have to get one person right to click on the, on that, on that
Speaker:email and, uh, and, and enter the, the, uh, the credentials and then
Speaker:boom, they're in
Speaker:And, and on that note, it's funny that, you know, companies, companies
Speaker:do these phishing exercises and they're like, you know, out of a hundred
Speaker:people, only two people clicked.
Speaker:And that's great.
Speaker:I'm like, no, it's still two people.
Speaker:That's all they need.
Speaker:They just need one, right?
Speaker:It used to be a hundred percent, but.
Speaker:So we're, we're, we're trying to, we're trying to cover a lot in this half hour.
Speaker:So obviously the first thing they could do is, is to get in, right?
Speaker:To get some kind of, uh, either, you know, you talked a little
Speaker:bit about vulnerabilities.
Speaker:Uh, we've covered some of the vulnerabilities that happen, uh, and
Speaker:then also, but I think would, would you agree that the most common way
Speaker:is, is essentially stolen credentials?
Speaker:Is that the most common way that people get into
Speaker:environments?
Speaker:Uh, that is the most common successful path.
Speaker:Yes.
Speaker:Yeah.
Speaker:Yeah, that makes sense.
Speaker:Okay.
Speaker:And then obviously there, there are things like vulnerabilities
Speaker:that they can, they can exploit.
Speaker:Those are just, they're more work, I think.
Speaker:Right.
Speaker:Um, and, and many of those vulnerabilities require.
Speaker:I, I think this is hand in hand, right?
Speaker:So many of the vulnerabilities require that you're already
Speaker:in the environment, right?
Speaker:So the, if, if you have a vulnerability on your internal email server,
Speaker:but that internal email server is accessible via the internet,
Speaker:then you, you've gotta be inside.
Speaker:Um, does that
Speaker:sound
Speaker:Well, I am just gonna go back to my favorite word it, uh, or phrase.
Speaker:It depends.
Speaker:And so, so the, the initial part of this, whether it's identifying
Speaker:a vulnerability on your perimeter.
Speaker:Uh, buying, uh, uh, credentials or phishing, almost all of that is automated
Speaker:because bad guys are lazy and they've, they've figured out the, you know,
Speaker:the secret way of, of doing a job.
Speaker:So that first phase is almost all automated, and a lot of times the bad
Speaker:guy doesn't know that they compromise somebody until it phones home.
Speaker:And we'll get to that in a minute, but.
Speaker:Things like, um, you know, there were, there was a recent, uh,
Speaker:zero day with Fortinet firewalls.
Speaker:There's a, there's uh, there was a zero day with, um, load balancers.
Speaker:There was a zero day with some cloud services.
Speaker:All of those things, I mean, bad guys are, are keeping an eye on, on, on that stuff.
Speaker:Uh, and, and, and jumping on the opportunity to configure.
Speaker:You know, scripted attacks to take advantage of those things.
Speaker:And so it's, it's when those vulnerabilities get exploited and
Speaker:they get alerted like, Hey, this, that your sub your, your script or your
Speaker:attack was successful, that's when they start applying actual effort.
Speaker:Um, so.
Speaker:Right.
Speaker:Yep.
Speaker:sense.
Speaker:Yeah.
Speaker:Yeah.
Speaker:So let's talk about, so once they're in, right, so then what are we,
Speaker:what are they gonna do at that
Speaker:point?
Speaker:So the next part is understanding what they, what they caught, right?
Speaker:So, you know, you, you got something on the, on your line and you're
Speaker:like, this is gonna be a huge fish.
Speaker:And, you know, it turns out to, to be, you know, a little, little
Speaker:sunfish, uh uh, or a minnow.
Speaker:But, and I, and I say minnow because in some cases what you
Speaker:have is really just bait or a stepping stone for the next thing.
Speaker:But yeah, reconnaissance and understanding what, uh, what you've, what you've
Speaker:gained access to is the next step, because maybe it's something they
Speaker:don't wanna spend any more time on.
Speaker:Um, you know, it's, it's grandma's knitting shop.
Speaker:Uh, you know what, what, what's a value there?
Speaker:Uh, versus Oh yeah, I don't have time to mess with that.
Speaker:I'd rather spend, you know, the 10 hours that, that I've, that I've got to.
Speaker:Look at the next thing that that just told me got compromised.
Speaker:So I'm gonna go see what that is.
Speaker:Um, and so it's a little bit about, uh, you know, you just
Speaker:have to be less valuable or, um, more protected than your neighbor.
Speaker:Um,
Speaker:Yeah.
Speaker:so
Speaker:It is that thing about not
Speaker:outrunning the
Speaker:yep, you just have to faster than the other guy.
Speaker:Just have to run the other guy.
Speaker:And Mike are the people who do this sort of second level analysis, is that
Speaker:the same person who did the initial access broker and got in initially?
Speaker:Or is this sort of, they got in and now they just hand things over?
Speaker:Because I've heard that there are like multiple Prasannas sometimes involved in a
Speaker:ransomware
Speaker:sure.
Speaker:Yeah, there's, there's different threat actors, uh, initial access brokers.
Speaker:That's just their job.
Speaker:Uh, so they're either collecting or, or buying and reselling credentials.
Speaker:'cause sometimes, you know, maybe they'll go buy, you know, a million
Speaker:credentials and then they'll validate them and then sell them as validated
Speaker:credentials, which can bring more money.
Speaker:Versus just saying, I've got a lot of, you know, credentials and selling them.
Speaker:'cause I don't know if they're valid or not.
Speaker:So, initial access brokers, that's a job that's, that's, that's a bad guy's career.
Speaker:That's all they do.
Speaker:And so.
Speaker:Uh, sometimes there is continued interaction, so maybe I sold you
Speaker:some credentials for this target and one or two of them work, uh,
Speaker:but maybe some of them don't.
Speaker:So I may come back to you and say, Hey, you know, what else do
Speaker:you have related to this company?
Speaker:What else can you find?
Speaker:Go back out to your, your network and, and see if you can buy or
Speaker:get updated credentials, however you got them the first time.
Speaker:And, and then this, the, but the, the, the lateral movement and the recon
Speaker:that still can be automated, right?
Speaker:Like, uh, once they're, once something gets installed, it can sort of
Speaker:poke
Speaker:It often is,
Speaker:out
Speaker:it
Speaker:there.
Speaker:certainly often is, uh, the malware is designed to go
Speaker:and look for specific things.
Speaker:Like it'll say, you know, look for all the Microsoft Office related, you know,
Speaker:document, spreadsheet, PowerPoint, uh, and then give me a count and a
Speaker:file size for all of those things.
Speaker:'cause if they're all like.
Speaker:You know, 10 or 15 k, probably not interested in those, but if you've
Speaker:got a, a two or three meg spreadsheet, probably interested in that.
Speaker:Uh, and, and maybe even the file name, you know, financial forecast
Speaker:for 2026, I probably want that.
Speaker:Or, uh, uh, uh, cyber
Speaker:Password
Speaker:Absolutely.
Speaker:Or cybersecurity, uh, insurance program details.
Speaker:Right.
Speaker:Uh, so I want that.
Speaker:Well then maybe.
Speaker:Insurance,
Speaker:Maybe there's photos or backup files, you know, your, your Veeam backup file types,
Speaker:um, um, your accounting system file types.
Speaker:So it's gonna be pre-programmed to go look for this stuff, inventory it, uh, and then
Speaker:give that back to me so I can determine the value of what I've access to.
Speaker:But it's also gonna look for what other things does this device have access to?
Speaker:Do I have, am I mapped to a network drive?
Speaker:Uh, do I have credentials to a, a cloud environment?
Speaker:You know, is, is there.
Speaker:Um, um, I'm trying to, uh, I'm trying to remember the, the Microsoft service
Speaker:that runs that, that maintains your, your credentials across, uh, different apps
Speaker:you mean, uh, like inter ID
Speaker:active
Speaker:intra, but then there's a, there's actually a service, uh, that runs on a, a
Speaker:Windows machine that, that manages that.
Speaker:So it's gonna look for that too, like what services are running.
Speaker:Right.
Speaker:Um, so yeah, that, that, that kind of stuff is automated.
Speaker:That's what happened to Target.
Speaker:And there's other, there's other malware too.
Speaker:Like, uh, back in the day when, when the target was mostly credit card
Speaker:numbers, the malware would be scripted to identify, uh, point of sale systems.
Speaker:And so it, it could get in through the, the HVAC system and it will
Speaker:automatically crawl through the network until it finds and, and it interrogates
Speaker:each device it gets access to.
Speaker:Are you a POS?
Speaker:No.
Speaker:Then it'll move on and sometimes even clean up after itself.
Speaker:Um.
Speaker:Uh, until it finds the target scada uh, you know, what, what happened
Speaker:to, uh, the Iran, uh, centrifuge?
Speaker:It's very similar that malware looked for cent.
Speaker:What, what is a centrifuge?
Speaker:Uh, and it would only, uh, you know, uh, detonate, uh, when it, when it
Speaker:found what it was scripted to look for.
Speaker:And Mike, as it's doing the searches, is it hopping from device
Speaker:to device and doing searches kind of like spreading like a worm?
Speaker:Or is it just using that initial access point
Speaker:No, it wants to,
Speaker:to sort
Speaker:it wants to spread because the other objective of malware's persistence.
Speaker:So, uh, and, and I, and I, I've seen this in, in practice because
Speaker:we often get asked to, uh.
Speaker:To compromise or test the, the security of an environment.
Speaker:One of the ways we do that is custom malware.
Speaker:Uh, and so when, when we infect one machine, we want that machine to help
Speaker:us infect other machines and antivirus, especially with custom malware, it usually
Speaker:takes antivirus a week to determine that.
Speaker:That's malware.
Speaker:Well, then it updates the software, the, the signatures on this computer,
Speaker:and then our malware gets scraped.
Speaker:What's gonna do that sequentially?
Speaker:And that gives us time then to tweak our malware and redeploy it on
Speaker:those threads that are still open.
Speaker:Uh, so a no, absolutely it wants to spread, um, and maintain
Speaker:some level of persistence.
Speaker:All right, so we, so we got in, we're spreading around, and then what's
Speaker:So when it has that inventory or a good understanding of, of, uh, or it, it's
Speaker:achieved whatever it was designed to do, it's saying it's gonna phone home,
Speaker:it's gonna go, you know, Hey bad guys.
Speaker:Here's what you've got.
Speaker:Uh, lemme know what's next.
Speaker:Uh, and that, that then leaves it up to the bad guy to determine, all right,
Speaker:well, and I, I say that some, some malware is just scripted to, to detonate on
Speaker:everything whenever it gets access to it.
Speaker:So it'll just, it doesn't care.
Speaker:It doesn't care if you're, if your grandma's yarn shop or a, uh, an oil
Speaker:and gas company, the moment you get infected, it just starts encrypting stuff.
Speaker:Uh, so there's that.
Speaker:And so that goes back to the, it depends, but, uh.
Speaker:In, in most sophisticated attacks, it's gonna phone home and give them an idea of
Speaker:what they've got access to so that the bad guys could then determine, 'cause maybe
Speaker:I don't wanna detonate the ransomware, maybe I wanna maintain some access and
Speaker:start doing more recon and EA drop.
Speaker:Yeah, maybe.
Speaker:Yeah, maybe you, you don't, you don't quite have the golden
Speaker:goose that
Speaker:Okay.
Speaker:for, but maybe you've got, you can do a more manual lateral movement
Speaker:and
Speaker:Yep.
Speaker:right.
Speaker:Uh, something that's controlled by a human rather than, uh,
Speaker:than a
Speaker:And so we would consider that more of an advanced persistence.
Speaker:So it's not an automated persistence, it's a, it's a, it's a human driven
Speaker:persistence where they're gonna pivot and listen and, and maybe modify.
Speaker:But yeah,
Speaker:the deter advanced persistent threat,
Speaker:right, is
Speaker:I didn't wanna call it an A PT 'cause a lot of times those are
Speaker:nation state driven, but I like the advanced persistence part of that.
Speaker:Uh.
Speaker:But yeah, so it's gonna call, it's gonna phone home, and then it's gonna wait
Speaker:to determine if, uh, bad guys wanna do anything else or, or modify the attack.
Speaker:So when you say phone home, could you provide a little bit more details?
Speaker:'cause it's not like it's gonna like pick up the phone or just be like, Hey, I'm
Speaker:just gonna ping this IP or send a message.
Speaker:Right.
Speaker:Or an SMS.
Speaker:Right.
Speaker:What do you mean by
Speaker:phone
Speaker:So ahead of the com, uh, ahead of the campaign, bad guys will typically
Speaker:rent, uh, servers out on the dark net, so the compromised machines, uh, uh.
Speaker:Um, a virtual machine, they don't care if it gets blown away or compromised
Speaker:in the future, and they'll, they'll hold that lease for a period of time,
Speaker:usually a couple of days a week, sometimes only a few hours, and then
Speaker:they will pre-configure the malware with the IP address or the host and
Speaker:the host name of that, what we would consider a command and control server.
Speaker:It's what the bad guys are commanding and controlling their attack from.
Speaker:So they deploy the, the, the malware.
Speaker:When it calls home, it knows to call back to that command and control.
Speaker:Server, and that's where that information's gonna come from.
Speaker:That's also where the, if, if it, if ransomware is part of the
Speaker:attack, that's how they're gonna, uh, negotiate the, the keys, the
Speaker:encryption keys, the public private keys
Speaker:Hmm.
Speaker:back in the day.
Speaker:That's also why your Ransom note said you have 72 hours to reply to this.
Speaker:Well, it's because they we're only gonna lease that server for 72 hours and at
Speaker:the end of 72 hours when it gets blown away, we'll, so do your encryption keys.
Speaker:So, yeah.
Speaker:So, uh, that, that's evolved a bit today.
Speaker:Uh, some, um, some ransomware don't do the negotiation.
Speaker:It's just hard coded with how it's gonna encrypt.
Speaker:Uh, and, and that's one of the ways that, um, law enforcement's helping
Speaker:victims combat ransomware is because if, you know, if the FBI helped company
Speaker:A and it was ransomware strain, a. Uh, and then you get infected with the
Speaker:same ransomware strain, they may be able to use a decryption key from some
Speaker:other victim to help you with yours.
Speaker:Hmm.
Speaker:so again, it, it depends, uh, it depends on how the ransomware was, was built
Speaker:and that encryption was designed, but that's, that phone home goes
Speaker:back to that command control server.
Speaker:So in this episode we're, we're covering what I'm gonna call a traditional
Speaker:ransomware attack, but gonna add what has become more traditional.
Speaker:'cause it's not, it wasn't covered in the initial five
Speaker:steps that we're talking about.
Speaker:And I'm gonna talk a little bit about exfiltration, or I want you to talk a
Speaker:little bit about exfiltration, right?
Speaker:Because.
Speaker:I, think, uh, what, what do you think do, do you have any stats that talk
Speaker:about the percentage of ransomware attacks that have become double
Speaker:extortion
Speaker:It is in,
Speaker:Where, where
Speaker:they're stealing
Speaker:it's definitely increasing, especially with those that are not just automated
Speaker:attacks and what I mean, and, and so there's, there's, there's this
Speaker:development of kind of two, two generic.
Speaker:I am gonna, I'm gonna classify those two generic, uh, ransomware types of attacks.
Speaker:There's the, the low end attacks.
Speaker:And within those low end attacks, you, you have a variety of threat actors.
Speaker:Some of them are just entrepreneurs, and what I mean by that is bad guys
Speaker:are developing ransomware as a service.
Speaker:So there's ransomware, they're, they have the email list, maybe
Speaker:they have access or credentials.
Speaker:But you as the entrepreneur don't have to be technical at all.
Speaker:You just go to the dark net, you pay 'em $30,000, and they will
Speaker:launch a ransomware campaign on your behalf and deposit money for you.
Speaker:They'll take some off the top.
Speaker:There's good tech support and customer service, all those things.
Speaker:Well, so that's low.
Speaker:That's, that's on the generic low end attack because the ransomware
Speaker:as a service provider and you as an entrepreneur, you don't care.
Speaker:To go and access the environment and poke around and see what else they have.
Speaker:You just wanna, you just wanna return on your investment and you
Speaker:wanna play the statistics, right?
Speaker:So there's that.
Speaker:The other kind of generic low end attack is true bad guys, but they've just
Speaker:simply automated the ransomware and they don't, they have zero empathy for you.
Speaker:I mean, they could, they could, uh, ransomware in a completely encrypt
Speaker:a kids' hospital for all they care.
Speaker:They just want to automate.
Speaker:They have,
Speaker:have now in, in some, in most of those cases, they, they did feel
Speaker:bad and they, they unencrypted it.
Speaker:Uh, and I think mostly because other bad guys threatened them.
Speaker:It's kind of like, you know, the, the child predators going to prison
Speaker:and the other prisoners, uh, taking out anyway, so those threat actors
Speaker:don't really care what they have.
Speaker:They're just, again, playing the numbers that.
Speaker:Out of a hundred people, they encrypt.
Speaker:Some subset of that is gonna pay some amount of money in ransom, and
Speaker:that's how they make their money.
Speaker:Uh, and so they're kind of the bottom feeders as far as ransomware goes.
Speaker:Well, then you get into the other group, and that's the more
Speaker:sophisticated ransomware, uh, gangs.
Speaker:Uh, and those are the ones that really care about, uh,
Speaker:what they're getting access to.
Speaker:And they realize that most of, uh, victims today are using backups or.
Speaker:They don't have the money to pay any amount of ransom, and they're
Speaker:just gonna go with, you know, accept what they've lost and, you
Speaker:know, go buy another computer.
Speaker:So these guys realize that, uh, fewer people are paying ransom,
Speaker:and if a ransom is paid, that actually increases the risk to them.
Speaker:'cause now they're on the FBI list.
Speaker:Uh, you know, Interpols looking for them or, or whatever the case may be.
Speaker:And, and bad guys are lazy, but they're also risk averse.
Speaker:That's why they're doing all this stuff over the internet.
Speaker:So what they are doing is, is increasing, um, their tactics at exfiltrating
Speaker:your data so that if you don't pay the ransom, they can use those pictures or
Speaker:those files or that data as a second attempt at getting you to pay something.
Speaker:Um, in the event that you weren't gonna pay the ransom.
Speaker:Right, and so Prasanna.
Speaker:And sort of Mike, that last category that you talked about, um, there a
Speaker:certain type of victim that they target, like large organizations or select
Speaker:types of people, like celebrities, or is it kind of more the spray and pray
Speaker:and then figure it out by looking at
Speaker:each?
Speaker:So, um.
Speaker:The, the double extortion really only starts, well backing
Speaker:up to answer your question.
Speaker:It's still a variety of attack, uh, strategies.
Speaker:So, so there's the spray and pray, and then there's the
Speaker:recon and then the call home.
Speaker:And then they go, Hey, this company is worth double
Speaker:extorting, and they will do it.
Speaker:So any company that's of value to a threat actor in that second
Speaker:category, that more advanced category.
Speaker:Any victim that's worth continuing their attack, they will, they
Speaker:will exfiltrate data from.
Speaker:So that could be a, a credit union, it could be a school.
Speaker:Um, in general terms, back to your question about what type of targets,
Speaker:if they are gonna target somebody specific, they will likely target
Speaker:somebody that's regulated like a health, healthcare, or financial institution
Speaker:or a, uh, a school district or, um,
Speaker:Where they've got real
Speaker:penalties If data like
Speaker:personal data
Speaker:Yep.
Speaker:And so maybe the school or the hospital doesn't want to pay the ransom.
Speaker:Alright, so now they're getting double extorted and they still don't wanna pay.
Speaker:Well, now threat actors are getting pretty good at figuring out who they report to.
Speaker:So they'll, they'll reach out to their board or the regulator like the health
Speaker:and human ser, uh, services auditor or.
Speaker:The state, uh, or their insurance carrier and say, Hey, your, your
Speaker:client's not wanting to pay.
Speaker:Um, but this could be bad for them.
Speaker:Uh, and they do have insurance and so why don't we, why don't we negotiate?
Speaker:Uh, and so on, on the good guy side, there's actually a full-time
Speaker:job of ransomware and negotiating.
Speaker:Uh, and I got to sit with one of those guys once and that was pretty out.
Speaker:So, um, so, you know, the, the title of this episode was like five, you know,
Speaker:the, the five objectives, and I'm gonna say five objectives of every ransomware.
Speaker:I, I'm, I'm not sure every ransomware does exfiltration, but we'll, we'll
Speaker:add that as sort of a 5.5, right?
Speaker:Like you said, it's like an advanced, uh, way to.
Speaker:To, to do that, but let's say that, and they are gonna do, if they're gonna
Speaker:do exfiltration, they're gonna do that before they do the next step, which
Speaker:is the big payload, which is what?
Speaker:Oh, the encryption.
Speaker:Yep.
Speaker:Yeah.
Speaker:I mean, this is, this is, you know what I'm gonna call
Speaker:old school ransomware, right?
Speaker:Um, and this is obviously, that is the whole point of a ransomware
Speaker:attack, or at least the initial whole point of a ransomware
Speaker:attack is this is how they hold.
Speaker:'cause they're not literally stealing your data, They're gonna encrypt the data,
Speaker:uh, so that you, it's like it was stolen.
Speaker:It's like they took it away from you and they're holding a gun to its
Speaker:head.
Speaker:Yep.
Speaker:And along those lines too, uh, not to get too far ahead when, when your, your
Speaker:date is encrypted and you're talking to bad guys, which I don't recommend, you
Speaker:should have good backups, so you don't have ever have to talk to bad guys.
Speaker:Yeah,
Speaker:no
Speaker:Uh, but, but when you do and the bad guys are like, pay us money,
Speaker:and you'll, you know, we will, we'll help you decco your data.
Speaker:Uh, the first thing you need to do is, is similar to a, a real life,
Speaker:uh, ransom is you want proof of life.
Speaker:So you will send them examples of all these different types of files you have
Speaker:from all the different devices you have so that they can prove that they can
Speaker:decrypt those, um, before you pay them.
Speaker:Yeah.
Speaker:I was just gonna ask that question.
Speaker:I was like, why wouldn't they just encrypt your data and.
Speaker:Without ever knowing a key and have people pay the ransomware, like
Speaker:there's no
Speaker:Mm-hmm.
Speaker:that they're gonna be
Speaker:honest.
Speaker:Yep.
Speaker:And you know that they're bad guys, so they don't have to be, but they are also
Speaker:in a business, so they, they want to be, uh, so that, especially when you're
Speaker:working with an insurance company, if they, if they know that you're a,
Speaker:a threat actor, that doesn't care.
Speaker:Um, then they're not gonna negotiate with you, but if you do
Speaker:Yeah, because.
Speaker:People that do this on a regular basis, like yourself, like you
Speaker:get to know certain groups, right?
Speaker:You get to know certain threat actors in how they behave.
Speaker:And are, are there, are there groups where they've established this as
Speaker:a, as a, practice where they're, where they just don't care and, and
Speaker:so, you
Speaker:Yep,
Speaker:you might
Speaker:behave differently
Speaker:are.
Speaker:Uh, so a lot of the, um.
Speaker:Eastern European, uh, middle Eastern and Northern African, uh, uh, threat
Speaker:actors, they just, they don't care.
Speaker:They're just playing the numbers and they don't.
Speaker:That's region of
Speaker:the
Speaker:It is, it is.
Speaker:And, and, and going back to those two buckets, the, the low end
Speaker:bucket with the entrepreneurs, almost all of those are in the us.
Speaker:Hmm.
Speaker:Interesting.
Speaker:They caught one, uh, they caught
Speaker:America.
Speaker:years ago in Florida and.
Speaker:And this goes back to, you know, there's, there's a, you know, you need
Speaker:to watch enough bad guy video movies to know how to behave as a bad guy.
Speaker:And this guy didn't.
Speaker:So as soon as he started making money, he bought a big house and flashy cars.
Speaker:And that's,
Speaker:Um.
Speaker:that's, what tipped him off.
Speaker:So, yeah.
Speaker:Mike, so those three regions that you previously mentioned, you have
Speaker:any stats around what percentage of ransomware attacks come from
Speaker:those areas?
Speaker:I don't, but it's, uh, it wouldn't be hard to find.
Speaker:In fact, the UN does an annual report on cyber.
Speaker:Um, and that's probably a good place to loop.
Speaker:Okay,
Speaker:Interesting.
Speaker:link it in the podcast
Speaker:Yeah.
Speaker:and and of course the final step of the five steps, uh, not including
Speaker:the fifth and a half step, uh, is delivering the ransomware note.
Speaker:And how, how does this, is this still the, the old school of like,
Speaker:it just shows up on a screen?
Speaker:Uh, not, not usually.
Speaker:Um, back in the day, it would, it would come up as a banner or they would
Speaker:change the background of your desktop so that that's, you know, it's on every
Speaker:screen that you've got, uh, today.
Speaker:Um, 'cause that, that seemed, that, that, that is viewed as kind of, um, elementary,
Speaker:uh, by, by more sophisticated hackers.
Speaker:That's kind of a newbie thing.
Speaker:Like, look what I did.
Speaker:Uh, so most ransomware today will put a text file in every folder
Speaker:that it encrypted something in.
Speaker:So there'll be a text file on your desktop, there'll be a text file
Speaker:in my documents, there'll be a text file everywhere, uh, and that it's
Speaker:the same text file, but that is, and it'll say, you know, ransomware
Speaker:note dot, you know, whatever.
Speaker:Um, and in that,
Speaker:Read me.
Speaker:Read me on
Speaker:a
Speaker:Yep.
Speaker:Mike, I had a question.
Speaker:So you said that it'll go encrypt data, but of course it can't encrypt operating
Speaker:system files, otherwise the system
Speaker:would
Speaker:And they don't want the system to crash.
Speaker:They want you to be able to open it up and see the ransom note
Speaker:yeah,
Speaker:and see your encrypted data.
Speaker:so.
Speaker:then does it ignore certain extension types and certain directories?
Speaker:So potentially, could I put all my personal documents in the window sub
Speaker:folder be safe, or are they smarter
Speaker:than that?
Speaker:Some of them are pretty smart and they don't even care what the file's called
Speaker:because they will look at the, uh.
Speaker:The file header to determine what, so you could call your, you could
Speaker:call your spreadsheet, um, a DLL file, you know, you could rename it.
Speaker:I'm gonna trick them, right?
Speaker:Uh, so it could be, you know, passwords, dll, and put it in your Windows directory.
Speaker:The ransomware is gonna scan those files, not based on their file name
Speaker:and extension, but file header flags.
Speaker:So the file header flag is what the operating windows, particularly
Speaker:whenever you click on a file.
Speaker:It doesn't always care what the extension is, as long as the file header, uh, flag
Speaker:tells the operating system what, what application to use to open that file.
Speaker:And if it still says, I need to open this in a spreadsheet, then
Speaker:mal the malware will find it.
Speaker:But to your back to your point, yeah.
Speaker:It, it, it, it, uh, it excludes, uh, system operatings operating system files.
Speaker:because it, like you said, it wants it the system to be alive so you
Speaker:can find those files and realize
Speaker:your system's
Speaker:of the, one of the, one of the quick, uh, ways to respond to ransomware
Speaker:several years ago was that, uh, there was a particular ransomware.
Speaker:So one of the things that, that I asked if when someone calls and says, I think
Speaker:I've ransomware, I like, can you tell me anything about what it might be?
Speaker:So tell me what the ransomware note says.
Speaker:Tell me what the extension is.
Speaker:And there is a ransomware type that does not look in your trash can.
Speaker:So I'm like, delete everything you care about, highlight it, hit delete,
Speaker:and as long as it's in your trash can, it's safe for for ransomware.
Speaker:Interesting.
Speaker:Interesting.
Speaker:so, uh, one question I forgot to ask.
Speaker:During the encryption phase, when I think about encryption, uh, like I
Speaker:think that that seems like it would be a very resource intensive process.
Speaker:That
Speaker:Yep.
Speaker:a while, but what I'm hearing repeatedly is that they, they're actually able
Speaker:to encrypt data pretty quickly.
Speaker:Is that.
Speaker:Is that
Speaker:It, it is, um, but not without notice.
Speaker:So if, if you're paying any attention at all to your computer while you're
Speaker:using it, you know the mouse hesitates, you're typing, but nothing is, you
Speaker:know, you've typed the word but it hasn't shown up on the screen yet.
Speaker:Um, your email.
Speaker:It isn't coming in.
Speaker:Your network is slow.
Speaker:Um, things like that are good, are good indications that
Speaker:something else is going on.
Speaker:Um, so even though they've gotten better as far as the encryption
Speaker:a algorithms, it's still math.
Speaker:And math takes a lot of processing and, and memory.
Speaker:Uh, and so if you're paying attention at all, uh, you should be able to determine
Speaker:that something weird's happening.
Speaker:Um, and that's, uh, any, any relatively recent, uh.
Speaker:And a virus and a malware, uh, solution that you can put on your computer will,
Speaker:will help you figure that out too.
Speaker:So you
Speaker:Interesting.
Speaker:wanna have all your files on deathly slow, spinning media as far away from possible
Speaker:with a network throttle put on it.
Speaker:I, I don't think that's a, I don't think that's a valid recommendation there.
Speaker:Prasanna.
Speaker:Um, all right, well, we wanted this to be a, a quick, you know,
Speaker:overview of the five steps, right?
Speaker:Let's just review them.
Speaker:We want, the ransomware wants to get installed, undetected wants to move
Speaker:laterally around, do some recon, figure out what, what it's dealing with.
Speaker:It's gonna phone home, let the bad guys know what's going on.
Speaker:Encrypt everything.
Speaker:Somewhere between those last two steps, they will probably be looking, possibly
Speaker:be looking at some exfiltration.
Speaker:And then once it's done, the encryption, it's gonna deliver the
Speaker:ransomware note and then everything happens from that point on.
Speaker:Um, so, uh, we got a lot to cover and uh, I just want to thank you for, um,
Speaker:on the
Speaker:Hey, anytime.
Speaker:And I think some, just some add-on, uh, thoughts for, uh, future discussion is,
Speaker:you know, when, when a bad guy ex fills your data and you, you decide not to
Speaker:pay for them not to release your data.
Speaker:They, they've got things like wallet, they've got a wall of shame, uh, so that
Speaker:everybody knows you were compromised.
Speaker:They're then willing to sell.
Speaker:They become an access broker, right?
Speaker:So now they're selling access to your environment, to somebody else.
Speaker:And so there's some, there's some pretty solid statistics that if
Speaker:you get hit once you're gonna hit, you're gonna get hit again.
Speaker:Yeah.
Speaker:Yeah.
Speaker:These are the depressing things.
Speaker:Ah, thanks Mike.
Speaker:Thanks Mike.
Speaker:Prasanna.
Speaker:No, this is good.
Speaker:I'm excited for the a hundred episodes.
Speaker:Yeah.
Speaker:It's only gonna take us two years.
Speaker:All right.
Speaker:Uh, that is a wrap.
Speaker:I.