Feb. 2, 2026

How Ransomware Works: The Five Objectives of Every Attack

How Ransomware Works: The Five Objectives of Every Attack

Understanding how ransomware works is critical for anyone responsible for protecting their organization's data. In this episode of The Backup Wrap-up, we examine the five core objectives that drive nearly every ransomware attack - from initial access through the final ransom note delivery.

I'm joined by my co-author Dr. Mike Saylor as we kick off what's going to be a comprehensive series on our new book, "Learning Ransomware Response and Recovery." We start at the beginning: how do these attackers even get in? Mike breaks down the role of initial access brokers (IABs) - the bad guys who specialize in harvesting and selling credentials. We talk about why email phishing remains the cheapest and most statistically reliable attack vector, even with all our defenses.

From there, we walk through lateral movement and reconnaissance. Once attackers are inside your network, they're not sitting idle. They're mapping your environment, identifying your crown jewels, and figuring out where your backups live. The "phone home" phase establishes command and control, letting attackers coordinate their activities and receive instructions.

We dig into data exfiltration and the rise of double extortion. It's not enough anymore to just encrypt your data - attackers are stealing it first, threatening to publish it even if you can restore from backups. Mike shares some fascinating details about how sophisticated ransomware can be, including variants that examine file headers rather than just extensions to find valuable targets.

The encryption phase itself is resource-intensive, and Mike explains why you might actually notice your computer acting weird if you're paying attention. Your mouse hesitates, typing lags, the network slows down - these are all potential warning signs.

Finally, we cover how ransom notes are delivered today. Spoiler: it's not the old-school desktop background takeover anymore. Modern ransomware drops text files in every folder it touches, making sure you can't miss the message.

This episode sets the foundation for understanding how ransomware works, which is the first step in defending against it and recovering when prevention fails.

Speaker:

you found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we break down how ransomware works.

Speaker:

By examining the five key objectives that attackers follow in nearly every campaign.

Speaker:

My co-author, Dr. Mike Sailor, joins persona in me to walk through the

Speaker:

complete attack lifecycle from gaining that initial foothold to delivering the

Speaker:

dreaded ransomware note we talk about initial access brokers lateral movement.

Speaker:

Command and control or C two communications data exfiltration

Speaker:

and the encryption process itself.

Speaker:

Uh, this is the first in what's going to be a long series discussing

Speaker:

our new book, so buckle up.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr. Backup,

Speaker:

and I've been passionate about backup and recovery for over 30 years, ever since.

Speaker:

I had to tell my boss that there were no backups.

Speaker:

Of the production database we just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the backup wrap up.

Speaker:

I'm your host w Curtis Preston, and I have two people with me today.

Speaker:

We shall start with PSA manana.

Speaker:

Malaiyandi, how's going?

Speaker:

Prasanna I.

Speaker:

Am good.

Speaker:

Curtis, you have to.

Speaker:

Okay.

Speaker:

Really quickly, how was the show last night?

Speaker:

Oh, with, uh, Esh Patel.

Speaker:

Nme Nesh Nesh was good.

Speaker:

He's taping a special in, uh, in April.

Speaker:

Uh, so it was very cool.

Speaker:

I wasn't quite in the front row.

Speaker:

A lot of Indians in the crowd.

Speaker:

And a lot of, a lot of comments about that.

Speaker:

Um, uh, I stood out a bit in the crowd, but it was, it was very cool.

Speaker:

Um, so, so welcome to the show Prasanna.

Speaker:

Thank you, Curtis.

Speaker:

I, it's good to be on the show.

Speaker:

And of course, of course.

Speaker:

We have my book co-author.

Speaker:

And look, Mike, it's right up

Speaker:

here on the

Speaker:

I see it.

Speaker:

You, I, yeah.

Speaker:

I can't, that is, by the way, that is really big.

Speaker:

It's.

Speaker:

It is

Speaker:

it's like, I think it's like 24

Speaker:

by

Speaker:

I was, I was,

Speaker:

the

Speaker:

signs

Speaker:

I was concerned that was actual size, but I'm, I'm glad you, I'm glad you commented.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

So those, those are, I think, um.

Speaker:

13 by 17, right?

Speaker:

The ones over.

Speaker:

Yeah.

Speaker:

So by the way, for those of you, uh, you know, if you're listening, you can

Speaker:

watch us on the on, on the tube, uh, by the same name, uh, the backup wrap up.

Speaker:

So this is Doctor Mike Sailor, my co-author.

Speaker:

Welcome to the

Speaker:

show,

Speaker:

Thank you guys.

Speaker:

you're, you're in your new office,

Speaker:

apparently?

Speaker:

am in a new office.

Speaker:

Yes.

Speaker:

Yeah.

Speaker:

Do you wanna, do you wanna talk about what you're

Speaker:

doing over there?

Speaker:

Yeah.

Speaker:

So, uh, I think when, when you and I started the, the book, I was, uh, I was

Speaker:

involved, uh, at a, to a lesser extent with, uh, some North Texas, uh, colleges

Speaker:

and universities helping them with their cybersecurity computer science programs.

Speaker:

Uh, and then over the last couple of months, um, um.

Speaker:

My engagement with Weatherford College in particular, uh, grew into,

Speaker:

uh, now I'm the department chair, uh, over business, computer science

Speaker:

and organizational leadership.

Speaker:

So, uh, I just can't, I can't get enough of, of more to do.

Speaker:

So I'm, I'm, I'm at least succeeding in that

Speaker:

Do you.

Speaker:

gonna say, Mike, that you just like, you just finished your PhD last year,

Speaker:

right?

Speaker:

24.

Speaker:

I was like, okay, 24.

Speaker:

And I was like, okay, it looks like you got addicted to being

Speaker:

in school or being around school.

Speaker:

So you're like, okay, gonna go back.

Speaker:

Except this time I will help set up or run departments and all the

Speaker:

rest, so.

Speaker:

Well, uh, uh, over the last couple years, I've, I've thought about, you know,

Speaker:

what, what does retirement look like?

Speaker:

And, uh, uh, I think I've, uh, I, I've got an idea of retiring as a,

Speaker:

uh, in, in academia somewhere, you know, share, share my war stories and

Speaker:

knowledge with the next generation.

Speaker:

Uh, so that's that.

Speaker:

You know what I'm working towards.

Speaker:

feel free to, you know, I can think of a recommended textbook

Speaker:

for your, for your, uh, for your

Speaker:

class.

Speaker:

a great idea.

Speaker:

anyway, yeah.

Speaker:

Um, I, I, I remember at least one of one of my books.

Speaker:

Uh, I remember finding out that it was a textbook somewhere, which

Speaker:

I thought that was pretty cool.

Speaker:

Right.

Speaker:

Being told that some, that some people are being forced to buy my book.

Speaker:

So, uh, speaking of the book, we are beginning, this is at the very

Speaker:

beginning of a very long series.

Speaker:

We are gonna be talking about this book, literally four years.

Speaker:

What's the title?

Speaker:

we're gonna do like.

Speaker:

A hundred episodes about, because there's so much to talk about in the book.

Speaker:

But basically, uh, we're gonna just talk about the things that we, you know, that

Speaker:

we, that we learned, uh, you know, some of which we, we already knew, but I think

Speaker:

we learned, uh, some things along the way.

Speaker:

And, um, this one, Mike, I thought we would start with that We already did.

Speaker:

Uh, an episode or two, we talked about.

Speaker:

We did the what is Ransomware episode and uh, I also did, um, 'cause we were

Speaker:

waiting to, trying to book you, uh, you know, you're a busy man and uh, we did it.

Speaker:

Y Yeah, we, uh, we, um, um, we did an episode on how DISC

Speaker:

helped, but also hurt, right?

Speaker:

Because the fact that backups are on disc makes them, uh, an easier

Speaker:

target from a ransomware perspective.

Speaker:

Right.

Speaker:

Um, and now we're gonna talk about just, just sort of the, the, the attack.

Speaker:

process the attack methodology, right?

Speaker:

So the title here is, is five objectives of Every Ransomware Attack.

Speaker:

What are they gonna try to do?

Speaker:

Do they almost all follow the same pattern?

Speaker:

To an extent there, there are some that, that may deviate based on

Speaker:

how the ransomware was designed.

Speaker:

Uh, and so there are specific campaigns to do specific things.

Speaker:

Uh, but in general, yeah, they, they do tend to follow, uh, the same process.

Speaker:

Can I chime in on something?

Speaker:

Chime, chime.

Speaker:

the name of this book that you are referring to?

Speaker:

Well, it's of course learning ransomware response and recovery.

Speaker:

Uh, although I appreciate the ability to plug Prasanna, there's already an ad that

Speaker:

plays at the beginning of every episode.

Speaker:

Trust me, I make sure they know the title of this book if they're

Speaker:

listening to this episode.

Speaker:

but yeah, so, and if you're watching it on, on, uh, on YouTube, you get to see

Speaker:

the picture, uh, right up behind me there.

Speaker:

Uh, and, uh, Mike is of course my co-author, so let's talk about

Speaker:

that, that the first thing that they want to do, which, uh, and

Speaker:

let's talk about, let's define.

Speaker:

What an IAB is, right?

Speaker:

And what this has to do with, uh, that first step, which is gaining that

Speaker:

initial access to the environment.

Speaker:

And so that can take a lot of different forms too.

Speaker:

Uh, I think we, we, we often hear about ransomware coming through

Speaker:

an email that you clicked on something or you open something.

Speaker:

Um, but speaking of IABs or initial access brokers, sometimes bad guys simply buy

Speaker:

credentials from some other bad guy.

Speaker:

'cause that's all the, you know, that's the risk.

Speaker:

That's their specialty.

Speaker:

They just harvest credentials and they resell them.

Speaker:

So now I don't, I don't need to rely on a user to interact with

Speaker:

an email with malware in it.

Speaker:

I have the credentials to log in and deploy my malware.

Speaker:

Uh, so how it's initially, uh, deployed sometimes depends.

Speaker:

Uh, so it depends on the, the threat actor.

Speaker:

It depends on the campaign.

Speaker:

And sometimes they may try both.

Speaker:

You know, maybe I bought a bunch of credentials and none of them

Speaker:

work, so now I'm gonna start sending emails or vice versa, right?

Speaker:

I send a bunch of emails and nobody clicks on it.

Speaker:

Well, now I need to go buy, I need to go buy some credentials.

Speaker:

And is like if then I know you have a lot of expertise in this field,

Speaker:

in your sort of experience, how.

Speaker:

Successful.

Speaker:

Is it sort of with the email versus, or how prevalent is the email attack side

Speaker:

of things versus sort of uh, the, buy

Speaker:

credentials.

Speaker:

email is the cheapest and statistically most reliable.

Speaker:

Uh, and then there's the other, there is the third option where bad

Speaker:

guys do you know, they, they, they do an assessment of your environment

Speaker:

looking for vulnerabilities.

Speaker:

They find one they can exploit.

Speaker:

Now they've got access that way without having to do either of the other two.

Speaker:

But, um, statistics with email has, has run pretty consistent over the,

Speaker:

the last man almost couple of decades.

Speaker:

Uh, it's gotten a little bit better.

Speaker:

Well, actually there's a bit of an e ebb and flow because,

Speaker:

uh, traditional email phishing.

Speaker:

We were getting better at as users at detecting, you know, bad, you

Speaker:

know, bad grammar, bad punctuation, like that just doesn't seem right.

Speaker:

I'm not clicking on that.

Speaker:

But now with ai, those emails are written, written, pristine.

Speaker:

And if, and if I can give AI enough history of how you communicate,

Speaker:

I can truly make that email sound like something you would say.

Speaker:

Right, because that's the other, that's the other giveaway with AI is

Speaker:

that it's using language and things like Prasanna doesn't talk that way.

Speaker:

He wouldn't sign his email like that.

Speaker:

So now that's what I'm looking for.

Speaker:

Instead of punctuation, I'm looking for like, you know, a sentence structure

Speaker:

and, and the words you might use.

Speaker:

Well, but ai, if I give it AI enough information, it can, it

Speaker:

can, it can fool a lot of people.

Speaker:

So there's been this like.

Speaker:

Over, you know, prior to, uh, AI being used as a, as a tool, uh, the, the

Speaker:

statistical, the statistical success of email phishing went down a couple

Speaker:

of percentages, uh, percentage points.

Speaker:

But now with ai, it's going back up.

Speaker:

Uh, and so it's, it's usually around between 20 and 25%.

Speaker:

So if I send out a million emails, that's 200,000 people are gonna click on it and,

Speaker:

Really

Speaker:

yeah.

Speaker:

that, that's really

Speaker:

It is.

Speaker:

Well now, now granted, you know, you've gotta, you've gotta

Speaker:

consider all the other things too.

Speaker:

Like maybe I have a good email filter.

Speaker:

And so

Speaker:

Mm-hmm.

Speaker:

don't typically get emails from Prasanna, so that's going into quarantine, right?

Speaker:

So there's, there's other things that would impact that.

Speaker:

Uh, so it does depend on how an environment might, uh, uh, might be

Speaker:

set up to, to, uh, address phishing.

Speaker:

But in general, between 20 and 25% delivery.

Speaker:

Alright, so that's just, it made it to your inbox.

Speaker:

Now of the 20, 25%, another 20, 25% interact with the email.

Speaker:

So out of, out of 200,000 now you've got, what, 40, 40,000 people

Speaker:

actually opening the email of those?

Speaker:

Some, another subset would actually, you know, if it asked for credentials,

Speaker:

they would give credentials.

Speaker:

Uh, so it, out of a million emails, you're probably looking

Speaker:

at, you know, maybe 20, 30,000.

Speaker:

Uh, actually, actually interacting with it and potentially, you know,

Speaker:

causing an infection or giving away their, their login credentials.

Speaker:

Well,

Speaker:

Of course.

Speaker:

given how.

Speaker:

Of course when you're saying the word phishing, for those that you

Speaker:

know, 'cause we're saying it out loud, this is phishing pH, right?

Speaker:

P-H-I-S-A-I-S-H-I-N-E.

Speaker:

Right.

Speaker:

Um, and, uh, you know, referring to this idea of sending something

Speaker:

out, you're fishing, right?

Speaker:

You're, you're sending a bunch of stuff out.

Speaker:

Hoping that you get a bite.

Speaker:

And, and the thing is, like everything else, and we're gonna say this a million

Speaker:

times over the, you know, over these episodes is they, they have to, they

Speaker:

only have to be right once, right?

Speaker:

They only have to get one person right to click on the, on that, on that

Speaker:

email and, uh, and, and enter the, the, uh, the credentials and then

Speaker:

boom, they're in

Speaker:

And, and on that note, it's funny that, you know, companies, companies

Speaker:

do these phishing exercises and they're like, you know, out of a hundred

Speaker:

people, only two people clicked.

Speaker:

And that's great.

Speaker:

I'm like, no, it's still two people.

Speaker:

That's all they need.

Speaker:

They just need one, right?

Speaker:

It used to be a hundred percent, but.

Speaker:

So we're, we're, we're trying to, we're trying to cover a lot in this half hour.

Speaker:

So obviously the first thing they could do is, is to get in, right?

Speaker:

To get some kind of, uh, either, you know, you talked a little

Speaker:

bit about vulnerabilities.

Speaker:

Uh, we've covered some of the vulnerabilities that happen, uh, and

Speaker:

then also, but I think would, would you agree that the most common way

Speaker:

is, is essentially stolen credentials?

Speaker:

Is that the most common way that people get into

Speaker:

environments?

Speaker:

Uh, that is the most common successful path.

Speaker:

Yes.

Speaker:

Yeah.

Speaker:

Yeah, that makes sense.

Speaker:

Okay.

Speaker:

And then obviously there, there are things like vulnerabilities

Speaker:

that they can, they can exploit.

Speaker:

Those are just, they're more work, I think.

Speaker:

Right.

Speaker:

Um, and, and many of those vulnerabilities require.

Speaker:

I, I think this is hand in hand, right?

Speaker:

So many of the vulnerabilities require that you're already

Speaker:

in the environment, right?

Speaker:

So the, if, if you have a vulnerability on your internal email server,

Speaker:

but that internal email server is accessible via the internet,

Speaker:

then you, you've gotta be inside.

Speaker:

Um, does that

Speaker:

sound

Speaker:

Well, I am just gonna go back to my favorite word it, uh, or phrase.

Speaker:

It depends.

Speaker:

And so, so the, the initial part of this, whether it's identifying

Speaker:

a vulnerability on your perimeter.

Speaker:

Uh, buying, uh, uh, credentials or phishing, almost all of that is automated

Speaker:

because bad guys are lazy and they've, they've figured out the, you know,

Speaker:

the secret way of, of doing a job.

Speaker:

So that first phase is almost all automated, and a lot of times the bad

Speaker:

guy doesn't know that they compromise somebody until it phones home.

Speaker:

And we'll get to that in a minute, but.

Speaker:

Things like, um, you know, there were, there was a recent, uh,

Speaker:

zero day with Fortinet firewalls.

Speaker:

There's a, there's uh, there was a zero day with, um, load balancers.

Speaker:

There was a zero day with some cloud services.

Speaker:

All of those things, I mean, bad guys are, are keeping an eye on, on, on that stuff.

Speaker:

Uh, and, and, and jumping on the opportunity to configure.

Speaker:

You know, scripted attacks to take advantage of those things.

Speaker:

And so it's, it's when those vulnerabilities get exploited and

Speaker:

they get alerted like, Hey, this, that your sub your, your script or your

Speaker:

attack was successful, that's when they start applying actual effort.

Speaker:

Um, so.

Speaker:

Right.

Speaker:

Yep.

Speaker:

sense.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

So let's talk about, so once they're in, right, so then what are we,

Speaker:

what are they gonna do at that

Speaker:

point?

Speaker:

So the next part is understanding what they, what they caught, right?

Speaker:

So, you know, you, you got something on the, on your line and you're

Speaker:

like, this is gonna be a huge fish.

Speaker:

And, you know, it turns out to, to be, you know, a little, little

Speaker:

sunfish, uh uh, or a minnow.

Speaker:

But, and I, and I say minnow because in some cases what you

Speaker:

have is really just bait or a stepping stone for the next thing.

Speaker:

But yeah, reconnaissance and understanding what, uh, what you've, what you've

Speaker:

gained access to is the next step, because maybe it's something they

Speaker:

don't wanna spend any more time on.

Speaker:

Um, you know, it's, it's grandma's knitting shop.

Speaker:

Uh, you know what, what, what's a value there?

Speaker:

Uh, versus Oh yeah, I don't have time to mess with that.

Speaker:

I'd rather spend, you know, the 10 hours that, that I've, that I've got to.

Speaker:

Look at the next thing that that just told me got compromised.

Speaker:

So I'm gonna go see what that is.

Speaker:

Um, and so it's a little bit about, uh, you know, you just

Speaker:

have to be less valuable or, um, more protected than your neighbor.

Speaker:

Um,

Speaker:

Yeah.

Speaker:

so

Speaker:

It is that thing about not

Speaker:

outrunning the

Speaker:

yep, you just have to faster than the other guy.

Speaker:

Just have to run the other guy.

Speaker:

And Mike are the people who do this sort of second level analysis, is that

Speaker:

the same person who did the initial access broker and got in initially?

Speaker:

Or is this sort of, they got in and now they just hand things over?

Speaker:

Because I've heard that there are like multiple Prasannas sometimes involved in a

Speaker:

ransomware

Speaker:

sure.

Speaker:

Yeah, there's, there's different threat actors, uh, initial access brokers.

Speaker:

That's just their job.

Speaker:

Uh, so they're either collecting or, or buying and reselling credentials.

Speaker:

'cause sometimes, you know, maybe they'll go buy, you know, a million

Speaker:

credentials and then they'll validate them and then sell them as validated

Speaker:

credentials, which can bring more money.

Speaker:

Versus just saying, I've got a lot of, you know, credentials and selling them.

Speaker:

'cause I don't know if they're valid or not.

Speaker:

So, initial access brokers, that's a job that's, that's, that's a bad guy's career.

Speaker:

That's all they do.

Speaker:

And so.

Speaker:

Uh, sometimes there is continued interaction, so maybe I sold you

Speaker:

some credentials for this target and one or two of them work, uh,

Speaker:

but maybe some of them don't.

Speaker:

So I may come back to you and say, Hey, you know, what else do

Speaker:

you have related to this company?

Speaker:

What else can you find?

Speaker:

Go back out to your, your network and, and see if you can buy or

Speaker:

get updated credentials, however you got them the first time.

Speaker:

And, and then this, the, but the, the, the lateral movement and the recon

Speaker:

that still can be automated, right?

Speaker:

Like, uh, once they're, once something gets installed, it can sort of

Speaker:

poke

Speaker:

It often is,

Speaker:

out

Speaker:

it

Speaker:

there.

Speaker:

certainly often is, uh, the malware is designed to go

Speaker:

and look for specific things.

Speaker:

Like it'll say, you know, look for all the Microsoft Office related, you know,

Speaker:

document, spreadsheet, PowerPoint, uh, and then give me a count and a

Speaker:

file size for all of those things.

Speaker:

'cause if they're all like.

Speaker:

You know, 10 or 15 k, probably not interested in those, but if you've

Speaker:

got a, a two or three meg spreadsheet, probably interested in that.

Speaker:

Uh, and, and maybe even the file name, you know, financial forecast

Speaker:

for 2026, I probably want that.

Speaker:

Or, uh, uh, uh, cyber

Speaker:

Password

Speaker:

Absolutely.

Speaker:

Or cybersecurity, uh, insurance program details.

Speaker:

Right.

Speaker:

Uh, so I want that.

Speaker:

Well then maybe.

Speaker:

Insurance,

Speaker:

Maybe there's photos or backup files, you know, your, your Veeam backup file types,

Speaker:

um, um, your accounting system file types.

Speaker:

So it's gonna be pre-programmed to go look for this stuff, inventory it, uh, and then

Speaker:

give that back to me so I can determine the value of what I've access to.

Speaker:

But it's also gonna look for what other things does this device have access to?

Speaker:

Do I have, am I mapped to a network drive?

Speaker:

Uh, do I have credentials to a, a cloud environment?

Speaker:

You know, is, is there.

Speaker:

Um, um, I'm trying to, uh, I'm trying to remember the, the Microsoft service

Speaker:

that runs that, that maintains your, your credentials across, uh, different apps

Speaker:

you mean, uh, like inter ID

Speaker:

active

Speaker:

intra, but then there's a, there's actually a service, uh, that runs on a, a

Speaker:

Windows machine that, that manages that.

Speaker:

So it's gonna look for that too, like what services are running.

Speaker:

Right.

Speaker:

Um, so yeah, that, that, that kind of stuff is automated.

Speaker:

That's what happened to Target.

Speaker:

And there's other, there's other malware too.

Speaker:

Like, uh, back in the day when, when the target was mostly credit card

Speaker:

numbers, the malware would be scripted to identify, uh, point of sale systems.

Speaker:

And so it, it could get in through the, the HVAC system and it will

Speaker:

automatically crawl through the network until it finds and, and it interrogates

Speaker:

each device it gets access to.

Speaker:

Are you a POS?

Speaker:

No.

Speaker:

Then it'll move on and sometimes even clean up after itself.

Speaker:

Um.

Speaker:

Uh, until it finds the target scada uh, you know, what, what happened

Speaker:

to, uh, the Iran, uh, centrifuge?

Speaker:

It's very similar that malware looked for cent.

Speaker:

What, what is a centrifuge?

Speaker:

Uh, and it would only, uh, you know, uh, detonate, uh, when it, when it

Speaker:

found what it was scripted to look for.

Speaker:

And Mike, as it's doing the searches, is it hopping from device

Speaker:

to device and doing searches kind of like spreading like a worm?

Speaker:

Or is it just using that initial access point

Speaker:

No, it wants to,

Speaker:

to sort

Speaker:

it wants to spread because the other objective of malware's persistence.

Speaker:

So, uh, and, and I, and I, I've seen this in, in practice because

Speaker:

we often get asked to, uh.

Speaker:

To compromise or test the, the security of an environment.

Speaker:

One of the ways we do that is custom malware.

Speaker:

Uh, and so when, when we infect one machine, we want that machine to help

Speaker:

us infect other machines and antivirus, especially with custom malware, it usually

Speaker:

takes antivirus a week to determine that.

Speaker:

That's malware.

Speaker:

Well, then it updates the software, the, the signatures on this computer,

Speaker:

and then our malware gets scraped.

Speaker:

What's gonna do that sequentially?

Speaker:

And that gives us time then to tweak our malware and redeploy it on

Speaker:

those threads that are still open.

Speaker:

Uh, so a no, absolutely it wants to spread, um, and maintain

Speaker:

some level of persistence.

Speaker:

All right, so we, so we got in, we're spreading around, and then what's

Speaker:

So when it has that inventory or a good understanding of, of, uh, or it, it's

Speaker:

achieved whatever it was designed to do, it's saying it's gonna phone home,

Speaker:

it's gonna go, you know, Hey bad guys.

Speaker:

Here's what you've got.

Speaker:

Uh, lemme know what's next.

Speaker:

Uh, and that, that then leaves it up to the bad guy to determine, all right,

Speaker:

well, and I, I say that some, some malware is just scripted to, to detonate on

Speaker:

everything whenever it gets access to it.

Speaker:

So it'll just, it doesn't care.

Speaker:

It doesn't care if you're, if your grandma's yarn shop or a, uh, an oil

Speaker:

and gas company, the moment you get infected, it just starts encrypting stuff.

Speaker:

Uh, so there's that.

Speaker:

And so that goes back to the, it depends, but, uh.

Speaker:

In, in most sophisticated attacks, it's gonna phone home and give them an idea of

Speaker:

what they've got access to so that the bad guys could then determine, 'cause maybe

Speaker:

I don't wanna detonate the ransomware, maybe I wanna maintain some access and

Speaker:

start doing more recon and EA drop.

Speaker:

Yeah, maybe.

Speaker:

Yeah, maybe you, you don't, you don't quite have the golden

Speaker:

goose that

Speaker:

Okay.

Speaker:

for, but maybe you've got, you can do a more manual lateral movement

Speaker:

and

Speaker:

Yep.

Speaker:

right.

Speaker:

Uh, something that's controlled by a human rather than, uh,

Speaker:

than a

Speaker:

And so we would consider that more of an advanced persistence.

Speaker:

So it's not an automated persistence, it's a, it's a, it's a human driven

Speaker:

persistence where they're gonna pivot and listen and, and maybe modify.

Speaker:

But yeah,

Speaker:

the deter advanced persistent threat,

Speaker:

right, is

Speaker:

I didn't wanna call it an A PT 'cause a lot of times those are

Speaker:

nation state driven, but I like the advanced persistence part of that.

Speaker:

Uh.

Speaker:

But yeah, so it's gonna call, it's gonna phone home, and then it's gonna wait

Speaker:

to determine if, uh, bad guys wanna do anything else or, or modify the attack.

Speaker:

So when you say phone home, could you provide a little bit more details?

Speaker:

'cause it's not like it's gonna like pick up the phone or just be like, Hey, I'm

Speaker:

just gonna ping this IP or send a message.

Speaker:

Right.

Speaker:

Or an SMS.

Speaker:

Right.

Speaker:

What do you mean by

Speaker:

phone

Speaker:

So ahead of the com, uh, ahead of the campaign, bad guys will typically

Speaker:

rent, uh, servers out on the dark net, so the compromised machines, uh, uh.

Speaker:

Um, a virtual machine, they don't care if it gets blown away or compromised

Speaker:

in the future, and they'll, they'll hold that lease for a period of time,

Speaker:

usually a couple of days a week, sometimes only a few hours, and then

Speaker:

they will pre-configure the malware with the IP address or the host and

Speaker:

the host name of that, what we would consider a command and control server.

Speaker:

It's what the bad guys are commanding and controlling their attack from.

Speaker:

So they deploy the, the, the malware.

Speaker:

When it calls home, it knows to call back to that command and control.

Speaker:

Server, and that's where that information's gonna come from.

Speaker:

That's also where the, if, if it, if ransomware is part of the

Speaker:

attack, that's how they're gonna, uh, negotiate the, the keys, the

Speaker:

encryption keys, the public private keys

Speaker:

Hmm.

Speaker:

back in the day.

Speaker:

That's also why your Ransom note said you have 72 hours to reply to this.

Speaker:

Well, it's because they we're only gonna lease that server for 72 hours and at

Speaker:

the end of 72 hours when it gets blown away, we'll, so do your encryption keys.

Speaker:

So, yeah.

Speaker:

So, uh, that, that's evolved a bit today.

Speaker:

Uh, some, um, some ransomware don't do the negotiation.

Speaker:

It's just hard coded with how it's gonna encrypt.

Speaker:

Uh, and, and that's one of the ways that, um, law enforcement's helping

Speaker:

victims combat ransomware is because if, you know, if the FBI helped company

Speaker:

A and it was ransomware strain, a. Uh, and then you get infected with the

Speaker:

same ransomware strain, they may be able to use a decryption key from some

Speaker:

other victim to help you with yours.

Speaker:

Hmm.

Speaker:

so again, it, it depends, uh, it depends on how the ransomware was, was built

Speaker:

and that encryption was designed, but that's, that phone home goes

Speaker:

back to that command control server.

Speaker:

So in this episode we're, we're covering what I'm gonna call a traditional

Speaker:

ransomware attack, but gonna add what has become more traditional.

Speaker:

'cause it's not, it wasn't covered in the initial five

Speaker:

steps that we're talking about.

Speaker:

And I'm gonna talk a little bit about exfiltration, or I want you to talk a

Speaker:

little bit about exfiltration, right?

Speaker:

Because.

Speaker:

I, think, uh, what, what do you think do, do you have any stats that talk

Speaker:

about the percentage of ransomware attacks that have become double

Speaker:

extortion

Speaker:

It is in,

Speaker:

Where, where

Speaker:

they're stealing

Speaker:

it's definitely increasing, especially with those that are not just automated

Speaker:

attacks and what I mean, and, and so there's, there's, there's this

Speaker:

development of kind of two, two generic.

Speaker:

I am gonna, I'm gonna classify those two generic, uh, ransomware types of attacks.

Speaker:

There's the, the low end attacks.

Speaker:

And within those low end attacks, you, you have a variety of threat actors.

Speaker:

Some of them are just entrepreneurs, and what I mean by that is bad guys

Speaker:

are developing ransomware as a service.

Speaker:

So there's ransomware, they're, they have the email list, maybe

Speaker:

they have access or credentials.

Speaker:

But you as the entrepreneur don't have to be technical at all.

Speaker:

You just go to the dark net, you pay 'em $30,000, and they will

Speaker:

launch a ransomware campaign on your behalf and deposit money for you.

Speaker:

They'll take some off the top.

Speaker:

There's good tech support and customer service, all those things.

Speaker:

Well, so that's low.

Speaker:

That's, that's on the generic low end attack because the ransomware

Speaker:

as a service provider and you as an entrepreneur, you don't care.

Speaker:

To go and access the environment and poke around and see what else they have.

Speaker:

You just wanna, you just wanna return on your investment and you

Speaker:

wanna play the statistics, right?

Speaker:

So there's that.

Speaker:

The other kind of generic low end attack is true bad guys, but they've just

Speaker:

simply automated the ransomware and they don't, they have zero empathy for you.

Speaker:

I mean, they could, they could, uh, ransomware in a completely encrypt

Speaker:

a kids' hospital for all they care.

Speaker:

They just want to automate.

Speaker:

They have,

Speaker:

have now in, in some, in most of those cases, they, they did feel

Speaker:

bad and they, they unencrypted it.

Speaker:

Uh, and I think mostly because other bad guys threatened them.

Speaker:

It's kind of like, you know, the, the child predators going to prison

Speaker:

and the other prisoners, uh, taking out anyway, so those threat actors

Speaker:

don't really care what they have.

Speaker:

They're just, again, playing the numbers that.

Speaker:

Out of a hundred people, they encrypt.

Speaker:

Some subset of that is gonna pay some amount of money in ransom, and

Speaker:

that's how they make their money.

Speaker:

Uh, and so they're kind of the bottom feeders as far as ransomware goes.

Speaker:

Well, then you get into the other group, and that's the more

Speaker:

sophisticated ransomware, uh, gangs.

Speaker:

Uh, and those are the ones that really care about, uh,

Speaker:

what they're getting access to.

Speaker:

And they realize that most of, uh, victims today are using backups or.

Speaker:

They don't have the money to pay any amount of ransom, and they're

Speaker:

just gonna go with, you know, accept what they've lost and, you

Speaker:

know, go buy another computer.

Speaker:

So these guys realize that, uh, fewer people are paying ransom,

Speaker:

and if a ransom is paid, that actually increases the risk to them.

Speaker:

'cause now they're on the FBI list.

Speaker:

Uh, you know, Interpols looking for them or, or whatever the case may be.

Speaker:

And, and bad guys are lazy, but they're also risk averse.

Speaker:

That's why they're doing all this stuff over the internet.

Speaker:

So what they are doing is, is increasing, um, their tactics at exfiltrating

Speaker:

your data so that if you don't pay the ransom, they can use those pictures or

Speaker:

those files or that data as a second attempt at getting you to pay something.

Speaker:

Um, in the event that you weren't gonna pay the ransom.

Speaker:

Right, and so Prasanna.

Speaker:

And sort of Mike, that last category that you talked about, um, there a

Speaker:

certain type of victim that they target, like large organizations or select

Speaker:

types of people, like celebrities, or is it kind of more the spray and pray

Speaker:

and then figure it out by looking at

Speaker:

each?

Speaker:

So, um.

Speaker:

The, the double extortion really only starts, well backing

Speaker:

up to answer your question.

Speaker:

It's still a variety of attack, uh, strategies.

Speaker:

So, so there's the spray and pray, and then there's the

Speaker:

recon and then the call home.

Speaker:

And then they go, Hey, this company is worth double

Speaker:

extorting, and they will do it.

Speaker:

So any company that's of value to a threat actor in that second

Speaker:

category, that more advanced category.

Speaker:

Any victim that's worth continuing their attack, they will, they

Speaker:

will exfiltrate data from.

Speaker:

So that could be a, a credit union, it could be a school.

Speaker:

Um, in general terms, back to your question about what type of targets,

Speaker:

if they are gonna target somebody specific, they will likely target

Speaker:

somebody that's regulated like a health, healthcare, or financial institution

Speaker:

or a, uh, a school district or, um,

Speaker:

Where they've got real

Speaker:

penalties If data like

Speaker:

personal data

Speaker:

Yep.

Speaker:

And so maybe the school or the hospital doesn't want to pay the ransom.

Speaker:

Alright, so now they're getting double extorted and they still don't wanna pay.

Speaker:

Well, now threat actors are getting pretty good at figuring out who they report to.

Speaker:

So they'll, they'll reach out to their board or the regulator like the health

Speaker:

and human ser, uh, services auditor or.

Speaker:

The state, uh, or their insurance carrier and say, Hey, your, your

Speaker:

client's not wanting to pay.

Speaker:

Um, but this could be bad for them.

Speaker:

Uh, and they do have insurance and so why don't we, why don't we negotiate?

Speaker:

Uh, and so on, on the good guy side, there's actually a full-time

Speaker:

job of ransomware and negotiating.

Speaker:

Uh, and I got to sit with one of those guys once and that was pretty out.

Speaker:

So, um, so, you know, the, the title of this episode was like five, you know,

Speaker:

the, the five objectives, and I'm gonna say five objectives of every ransomware.

Speaker:

I, I'm, I'm not sure every ransomware does exfiltration, but we'll, we'll

Speaker:

add that as sort of a 5.5, right?

Speaker:

Like you said, it's like an advanced, uh, way to.

Speaker:

To, to do that, but let's say that, and they are gonna do, if they're gonna

Speaker:

do exfiltration, they're gonna do that before they do the next step, which

Speaker:

is the big payload, which is what?

Speaker:

Oh, the encryption.

Speaker:

Yep.

Speaker:

Yeah.

Speaker:

I mean, this is, this is, you know what I'm gonna call

Speaker:

old school ransomware, right?

Speaker:

Um, and this is obviously, that is the whole point of a ransomware

Speaker:

attack, or at least the initial whole point of a ransomware

Speaker:

attack is this is how they hold.

Speaker:

'cause they're not literally stealing your data, They're gonna encrypt the data,

Speaker:

uh, so that you, it's like it was stolen.

Speaker:

It's like they took it away from you and they're holding a gun to its

Speaker:

head.

Speaker:

Yep.

Speaker:

And along those lines too, uh, not to get too far ahead when, when your, your

Speaker:

date is encrypted and you're talking to bad guys, which I don't recommend, you

Speaker:

should have good backups, so you don't have ever have to talk to bad guys.

Speaker:

Yeah,

Speaker:

no

Speaker:

Uh, but, but when you do and the bad guys are like, pay us money,

Speaker:

and you'll, you know, we will, we'll help you decco your data.

Speaker:

Uh, the first thing you need to do is, is similar to a, a real life,

Speaker:

uh, ransom is you want proof of life.

Speaker:

So you will send them examples of all these different types of files you have

Speaker:

from all the different devices you have so that they can prove that they can

Speaker:

decrypt those, um, before you pay them.

Speaker:

Yeah.

Speaker:

I was just gonna ask that question.

Speaker:

I was like, why wouldn't they just encrypt your data and.

Speaker:

Without ever knowing a key and have people pay the ransomware, like

Speaker:

there's no

Speaker:

Mm-hmm.

Speaker:

that they're gonna be

Speaker:

honest.

Speaker:

Yep.

Speaker:

And you know that they're bad guys, so they don't have to be, but they are also

Speaker:

in a business, so they, they want to be, uh, so that, especially when you're

Speaker:

working with an insurance company, if they, if they know that you're a,

Speaker:

a threat actor, that doesn't care.

Speaker:

Um, then they're not gonna negotiate with you, but if you do

Speaker:

Yeah, because.

Speaker:

People that do this on a regular basis, like yourself, like you

Speaker:

get to know certain groups, right?

Speaker:

You get to know certain threat actors in how they behave.

Speaker:

And are, are there, are there groups where they've established this as

Speaker:

a, as a, practice where they're, where they just don't care and, and

Speaker:

so, you

Speaker:

Yep,

Speaker:

you might

Speaker:

behave differently

Speaker:

are.

Speaker:

Uh, so a lot of the, um.

Speaker:

Eastern European, uh, middle Eastern and Northern African, uh, uh, threat

Speaker:

actors, they just, they don't care.

Speaker:

They're just playing the numbers and they don't.

Speaker:

That's region of

Speaker:

the

Speaker:

It is, it is.

Speaker:

And, and, and going back to those two buckets, the, the low end

Speaker:

bucket with the entrepreneurs, almost all of those are in the us.

Speaker:

Hmm.

Speaker:

Interesting.

Speaker:

They caught one, uh, they caught

Speaker:

America.

Speaker:

years ago in Florida and.

Speaker:

And this goes back to, you know, there's, there's a, you know, you need

Speaker:

to watch enough bad guy video movies to know how to behave as a bad guy.

Speaker:

And this guy didn't.

Speaker:

So as soon as he started making money, he bought a big house and flashy cars.

Speaker:

And that's,

Speaker:

Um.

Speaker:

that's, what tipped him off.

Speaker:

So, yeah.

Speaker:

Mike, so those three regions that you previously mentioned, you have

Speaker:

any stats around what percentage of ransomware attacks come from

Speaker:

those areas?

Speaker:

I don't, but it's, uh, it wouldn't be hard to find.

Speaker:

In fact, the UN does an annual report on cyber.

Speaker:

Um, and that's probably a good place to loop.

Speaker:

Okay,

Speaker:

Interesting.

Speaker:

link it in the podcast

Speaker:

Yeah.

Speaker:

and and of course the final step of the five steps, uh, not including

Speaker:

the fifth and a half step, uh, is delivering the ransomware note.

Speaker:

And how, how does this, is this still the, the old school of like,

Speaker:

it just shows up on a screen?

Speaker:

Uh, not, not usually.

Speaker:

Um, back in the day, it would, it would come up as a banner or they would

Speaker:

change the background of your desktop so that that's, you know, it's on every

Speaker:

screen that you've got, uh, today.

Speaker:

Um, 'cause that, that seemed, that, that, that is viewed as kind of, um, elementary,

Speaker:

uh, by, by more sophisticated hackers.

Speaker:

That's kind of a newbie thing.

Speaker:

Like, look what I did.

Speaker:

Uh, so most ransomware today will put a text file in every folder

Speaker:

that it encrypted something in.

Speaker:

So there'll be a text file on your desktop, there'll be a text file

Speaker:

in my documents, there'll be a text file everywhere, uh, and that it's

Speaker:

the same text file, but that is, and it'll say, you know, ransomware

Speaker:

note dot, you know, whatever.

Speaker:

Um, and in that,

Speaker:

Read me.

Speaker:

Read me on

Speaker:

a

Speaker:

Yep.

Speaker:

Mike, I had a question.

Speaker:

So you said that it'll go encrypt data, but of course it can't encrypt operating

Speaker:

system files, otherwise the system

Speaker:

would

Speaker:

And they don't want the system to crash.

Speaker:

They want you to be able to open it up and see the ransom note

Speaker:

yeah,

Speaker:

and see your encrypted data.

Speaker:

so.

Speaker:

then does it ignore certain extension types and certain directories?

Speaker:

So potentially, could I put all my personal documents in the window sub

Speaker:

folder be safe, or are they smarter

Speaker:

than that?

Speaker:

Some of them are pretty smart and they don't even care what the file's called

Speaker:

because they will look at the, uh.

Speaker:

The file header to determine what, so you could call your, you could

Speaker:

call your spreadsheet, um, a DLL file, you know, you could rename it.

Speaker:

I'm gonna trick them, right?

Speaker:

Uh, so it could be, you know, passwords, dll, and put it in your Windows directory.

Speaker:

The ransomware is gonna scan those files, not based on their file name

Speaker:

and extension, but file header flags.

Speaker:

So the file header flag is what the operating windows, particularly

Speaker:

whenever you click on a file.

Speaker:

It doesn't always care what the extension is, as long as the file header, uh, flag

Speaker:

tells the operating system what, what application to use to open that file.

Speaker:

And if it still says, I need to open this in a spreadsheet, then

Speaker:

mal the malware will find it.

Speaker:

But to your back to your point, yeah.

Speaker:

It, it, it, it, uh, it excludes, uh, system operatings operating system files.

Speaker:

because it, like you said, it wants it the system to be alive so you

Speaker:

can find those files and realize

Speaker:

your system's

Speaker:

of the, one of the, one of the quick, uh, ways to respond to ransomware

Speaker:

several years ago was that, uh, there was a particular ransomware.

Speaker:

So one of the things that, that I asked if when someone calls and says, I think

Speaker:

I've ransomware, I like, can you tell me anything about what it might be?

Speaker:

So tell me what the ransomware note says.

Speaker:

Tell me what the extension is.

Speaker:

And there is a ransomware type that does not look in your trash can.

Speaker:

So I'm like, delete everything you care about, highlight it, hit delete,

Speaker:

and as long as it's in your trash can, it's safe for for ransomware.

Speaker:

Interesting.

Speaker:

Interesting.

Speaker:

so, uh, one question I forgot to ask.

Speaker:

During the encryption phase, when I think about encryption, uh, like I

Speaker:

think that that seems like it would be a very resource intensive process.

Speaker:

That

Speaker:

Yep.

Speaker:

a while, but what I'm hearing repeatedly is that they, they're actually able

Speaker:

to encrypt data pretty quickly.

Speaker:

Is that.

Speaker:

Is that

Speaker:

It, it is, um, but not without notice.

Speaker:

So if, if you're paying any attention at all to your computer while you're

Speaker:

using it, you know the mouse hesitates, you're typing, but nothing is, you

Speaker:

know, you've typed the word but it hasn't shown up on the screen yet.

Speaker:

Um, your email.

Speaker:

It isn't coming in.

Speaker:

Your network is slow.

Speaker:

Um, things like that are good, are good indications that

Speaker:

something else is going on.

Speaker:

Um, so even though they've gotten better as far as the encryption

Speaker:

a algorithms, it's still math.

Speaker:

And math takes a lot of processing and, and memory.

Speaker:

Uh, and so if you're paying attention at all, uh, you should be able to determine

Speaker:

that something weird's happening.

Speaker:

Um, and that's, uh, any, any relatively recent, uh.

Speaker:

And a virus and a malware, uh, solution that you can put on your computer will,

Speaker:

will help you figure that out too.

Speaker:

So you

Speaker:

Interesting.

Speaker:

wanna have all your files on deathly slow, spinning media as far away from possible

Speaker:

with a network throttle put on it.

Speaker:

I, I don't think that's a, I don't think that's a valid recommendation there.

Speaker:

Prasanna.

Speaker:

Um, all right, well, we wanted this to be a, a quick, you know,

Speaker:

overview of the five steps, right?

Speaker:

Let's just review them.

Speaker:

We want, the ransomware wants to get installed, undetected wants to move

Speaker:

laterally around, do some recon, figure out what, what it's dealing with.

Speaker:

It's gonna phone home, let the bad guys know what's going on.

Speaker:

Encrypt everything.

Speaker:

Somewhere between those last two steps, they will probably be looking, possibly

Speaker:

be looking at some exfiltration.

Speaker:

And then once it's done, the encryption, it's gonna deliver the

Speaker:

ransomware note and then everything happens from that point on.

Speaker:

Um, so, uh, we got a lot to cover and uh, I just want to thank you for, um,

Speaker:

on the

Speaker:

Hey, anytime.

Speaker:

And I think some, just some add-on, uh, thoughts for, uh, future discussion is,

Speaker:

you know, when, when a bad guy ex fills your data and you, you decide not to

Speaker:

pay for them not to release your data.

Speaker:

They, they've got things like wallet, they've got a wall of shame, uh, so that

Speaker:

everybody knows you were compromised.

Speaker:

They're then willing to sell.

Speaker:

They become an access broker, right?

Speaker:

So now they're selling access to your environment, to somebody else.

Speaker:

And so there's some, there's some pretty solid statistics that if

Speaker:

you get hit once you're gonna hit, you're gonna get hit again.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

These are the depressing things.

Speaker:

Ah, thanks Mike.

Speaker:

Thanks Mike.

Speaker:

Prasanna.

Speaker:

No, this is good.

Speaker:

I'm excited for the a hundred episodes.

Speaker:

Yeah.

Speaker:

It's only gonna take us two years.

Speaker:

All right.

Speaker:

Uh, that is a wrap.

Speaker:

I.