how to hack a telescope | ransomware sucks

แชร์
ฝัง
  • เผยแพร่เมื่อ 6 พ.ค. 2023
  • It would be cool if people would stop scamming other people.
    I don't think anyone actually saw the movie I'm referencing with 'GENIUS HACKER MIT' It's called blackhat with Chris Hemsworth and I have not seen it either. I just think it's funny that the public perception of hackers who scam is 'genius' rather than 'jerk'.
    Alma footage:
    • ALMA trailer
    John Oliver episode:
    • Ransomware: Last Week ...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 847

  • @arsenelupin123
    @arsenelupin123 ปีที่แล้ว +496

    To be fair to Jerry, we all have hare brained moments once in a while. I could imagine doing something like that over 7am coffee and immediately face-palming myself.

    • @acollierastro
      @acollierastro  ปีที่แล้ว +158

      100% I was also thinking about that scam where your “boss” emails and asks for visa gift cards. If I had a very scary boss I could see myself falling for that scam out of fear of being fired.

    • @ChemEDan
      @ChemEDan ปีที่แล้ว +86

      @@acollierastro Scammer reading YT comments: We got a live one 👀

    • @leodeloatch9856
      @leodeloatch9856 ปีที่แล้ว +27

      My boss is making me host the wedding of a Nigerian Prince...If all is successful, we stand to make $100,000,000! We just have to come up with $50,000 in bitcoin first.

    • @MikeM-py2hq
      @MikeM-py2hq ปีที่แล้ว +24

      One of the issues is that standard emails in academia also encourage you to click on links or open pdf files. So yet another email about some conference invitation wouldn't stand out. I probably would be scammed as well.

    • @LucyTheLizardWizard
      @LucyTheLizardWizard ปีที่แล้ว +42

      My biggest piece of security advice is to never assume you're immune to these attacks, that you know it all or that only "stupid" people fall for them. Everyone is vulnerable to attack and lowering your guard because you believe you aren't only makes you more likely to fall for one.

  • @FunkmasterRick
    @FunkmasterRick ปีที่แล้ว +506

    In a ransomware attack, nobody's really stealing the data, they're just inconveniencing the victim then demanding extortion. Some people are lazy enough to pay to undo the inconvenience, which is a low-hit rate but also low-effort business. And sometimes the attacker gets lucky and scrambles the data for something really important at a really inconvenient time, like a hospital with digitized patient orders where people might die in the time it takes to undo the damage by hand. Those are pretty much the only times where people get paid for this.

    • @vasiliigulevich9202
      @vasiliigulevich9202 ปีที่แล้ว +8

      nobody -> almost nobody nowadays

    • @dmke
      @dmke ปีที่แล้ว +87

      Also of note: ransom attacks are (in the overwhelmingly majority of time) not targeted; this is just a numbers game. Scammers buy millions of email addresses in bulk and mass-send their junk mail to it (or delegate this job to another party). Their cost is often already covered when a few victims paid the ransom, i.e. they turn a profit with a turnover rate below 0.00001%...
      If the attack is tailored to a target, ransom is not the goal, but penetrating the target's network and exfiltrating as much data as possible. See the current, 2-months-and-ongoing "hack" of Western Digital.

    • @NitroLemons
      @NitroLemons ปีที่แล้ว +15

      Yeah I was about to go to the comments and type this exact thing but glad to see someone already did it. On paper hacking a massive research telescope and withholding the data is actually not that dumb of a plan cause there's a chance that the organization does ultimately decide that paying the ransom's worth it. Even if the chance is low it's not necessarily a silly thing to try doing.

    • @genejas
      @genejas ปีที่แล้ว +3

      @@dmke some malware is even less targeted (and less effort), if they're written as a worm that self propagates. Part of why Wanacrypt0r was such a big deal is that it spread pretty effectively and fast

    • @varietynic17
      @varietynic17 ปีที่แล้ว +14

      This is inaccurate - a large percentage of ransomware attacks involve both encryption of data and then transferring data pre-encryption to an external server. The extortion is then for both the decryption of data and for the attacker to not post this data online, either as part of a sale or for free.

  • @chad3814
    @chad3814 ปีที่แล้ว +38

    "I get that some people make a living scamming people…landlords."

  • @gusthebus2713
    @gusthebus2713 ปีที่แล้ว +806

    Your string theory video got recommended to me a week ago and I’ve been watching all your videos since. Your content is top notch and I hope your channel gets the audience it deserves!

    • @rainvm
      @rainvm ปีที่แล้ว +9

      Me too! Been loving them!

    • @hck65
      @hck65 ปีที่แล้ว +26

      Me too. Algorithm has been sending me random weird right wing shit too though. So like thanks algorithm for the phd science blog, no thanks on the right wing stuff.

    • @JimmyFisher
      @JimmyFisher ปีที่แล้ว +1

      same

    • @Peapolop
      @Peapolop ปีที่แล้ว +1

      Saaaame

    • @captain-spud
      @captain-spud ปีที่แล้ว +1

      Same and we love it

  • @MrHatoi
    @MrHatoi ปีที่แล้ว +283

    A couple things worth mentioning:
    Ransomware payouts from big organizations tend to be massive, so even if a tiny percent of victims actually pay the ransom, that doesn't necessarily make it unprofitable. According to a quick Google search the average ransomware payout is almost a quarter million dollars; that's enough that you only really need one, maybe two payouts in an entire _year_ for it to be worthwhile, and the cost of hitting a lot of targets isn't really that high.
    WannaCry is also an interesting thing to mention, since that one is now known to have been created by a North Korean state-sponsored group. Even if the money they get helps them, in that case it's obvious that a major goal is just to be a pain in order to inconvenience other countries like the US. A lot of more prolific groups these days are either suspected or known to be state-sponsored, which is definitely something else to consider; maybe being a pain in the ass for random people _is_ really their main intent, as long as those people are from the wrong country.

    • @gigitrix
      @gigitrix ปีที่แล้ว +7

      That's part of why the number of attacks is decreasing too, there's a recognition amongst the perpetrators that they have to 1) target some entity with money so that it's worth the fuss, 2) ensure you are doing sufficient damage (not just encrypting Dave's PowerPoints, they need to go for critical systems and their backups) and 3) rather than threaten data destruction they are moving more towards extortion and leaking stuff publicly

    • @madcow5833
      @madcow5833 ปีที่แล้ว +6

      @@gigitrix Do you have a reputable source showing that ransomware attacks are decreasing?

    • @toatrika2443
      @toatrika2443 ปีที่แล้ว +5

      @@madcow5833 21:42

    • @madcow5833
      @madcow5833 ปีที่แล้ว +8

      @@toatrika2443 Missed that, thanks. Statista also reports a decrease in attacks. I am surprised because I have heard inofficial numbers of the opposite. Everyday I learn something. Thanks again!

    • @vsiegel
      @vsiegel ปีที่แล้ว

      I do not think the North Koreans doing it to mess with the Americans or so. The literally do criminal things to earn western money. It is not specific to ransomware.
      Russians may do it for political reasons, like they run troll factories. But I think ransomware is done by private individuals, not the FSB.

  • @ShiddyProgramming
    @ShiddyProgramming ปีที่แล้ว +125

    Security Engineer here, keeping some systems up for 99.99% of the time (not an exaggeration) is often in the service level agreements for large business to business companies. Randomware is not generally targeted when it’s pushed through things like phishing emails, so some groups will automate every step banking that a company or an individual does not have backups. Fault tolerance is quite hard when the systems get sufficiently complex which is why meemaw can get her photos back and have you reinstall her machine but a giant corporation might just have to suck it up and pay a ransom.
    It’s why we only started seeing ransomware after something like bitcoin was ubiquitous; before there was just not an easy way to get paid as a bad guy without getting caught.

    • @ShiddyProgramming
      @ShiddyProgramming ปีที่แล้ว +23

      Oh and I didn’t mention, the idea of selling ransomed data is far further down the list of ways to get money than you might think. The scam is really just banking on people not having backups, yes there are cases where that’s useful, but most of the buyers will already have a better strategy to get the data themselves if it’s truly important, think nation state levels of funding and investment.

    • @quintrankid8045
      @quintrankid8045 ปีที่แล้ว +6

      @@ShiddyProgramming Yes, but lots of people really think data isn't real and that they don't have to worry about it. I wonder if certain kinds of large organizations who have people who are experts in a field but have trouble communicating with IT are more vulnerable to this sort of thing.

  • @TanyaLairdCivil
    @TanyaLairdCivil ปีที่แล้ว +79

    Think back to when you were working on your PhD dissertation. Imagine a few days before you were planning to submit your dissertation, you got hit with a malware attack. Your dissertation and most of your data were encrypted. And the malware got most of your backups as well. The only backup you have is a month old offline backup on a flash drive. There's nothing they've locked up that you can't replace in time. But your dissertation is due in two days. You could turn in your dissertation late, or you could pay the $100 ransom, be done with it, and get your dissertation in on time. Which would you do?
    This is the type of person these ransomware attacks are targeting. They're looking for people who happen to have extremely time-critical data they can lock up. Or think of a company that is operating a big industrial facility like a big factory or oil refinery. If critical systems get locked up, that facility being down might cause the company millions of dollars for each day they're shut down. If your facility being down is costing your company $1000/minute, and the scammers only want $5000 to unlock it, you will pay that ransom. It's literally the most profitable option available to you.
    Ransomware economics are a lot like those of conventional spam. The vast majority of the people that will be infected either can't pay (lack funds or can't figure out how to buy bitcoin) or have no need to pay (all data is easily replaceable and not time critical.) But for every hundred individuals or organizations they infect, one of them will be unlucky enough to have extremely time-critical improperly backed up data encrypted (like the hypothetical grad student) or a large expensive operation made inoperable (like the large industrial operation.) And even for those unlucky few, the scammers don't ask for obscene amounts. They ask for a few hundred to a few thousand. Their goal isn't to ask the highest price they can; their goal is to make paying the ransom the cheapest or most time-efficient option available to you.
    Yes, the vast majority of people or organizations won't be those unlucky few. Maybe only 1 in 100 actually get infected; and only 1 in 100 have enough time-critical data for paying the ransom to be worth it. And so perhaps the scammers only have a 1 in 10,000 success rate. But again, that's just like spam. Very few people actually fall for spam scams, but if you can send millions of spam messages for a a few pennies, the costs become worthwhile. Maybe only 1 in 10,000 times will the ransomware scammers succeed, but if they can successfully target millions of people and institutions, it becomes profitable. And they can do that; they're not personally writing individual emails to target individual people. It's all highly automated. One person can send messages to millions of people and institutions. You might target 1 million people and only succeed with a hundred of them (1 in 10,000). But if you manage to get $300 on average from each of those people, that's still a $30,000 profit. That's a very fine annual wage in many countries (and near median for most developed countries.)
    You have to dig and process cubic meters of earth to get a single fleck of gold, yet people have been profitably mining gold since the dawn of civilization. A single raindrop has almost no gravitational potential energy in it; but if you can build a dam and capture cubic kilometers of raindrops, you can use their energy to power a nation.

    • @MayaPasricha
      @MayaPasricha ปีที่แล้ว +9

      As someone involved in the cybersecurity field, this is a wonderful explanation - especially with the gold mining analogy! I'm going to steal this for when I need to explain ransomware / scams to someone :)

    • @NateEngle
      @NateEngle ปีที่แล้ว +8

      I had a PhD student come in my office one time and ask whether the only copy of their dissertation would be ok if they left it in their car parked at the airport. You're studying for an advanced degree and you can't afford a 2nd floppy disk?

    • @richardarriaga6271
      @richardarriaga6271 หลายเดือนก่อน +1

      ​@@NateEngleGrad students are poor

    • @NateEngle
      @NateEngle หลายเดือนก่อน

      @@richardarriaga6271 I left AT&T to come back to Bloomington to go to grad school but then had the amazing good luck to get hired to do support for the Psych department instead. It was a 40% pay cut from what I was earning at the labs but it was the smartest thing I ever did.

  • @QuantumSeanyGlass
    @QuantumSeanyGlass ปีที่แล้ว +93

    so, I think you've got a misconception about what actually occurs in a ransomware attack, because in fact it's reasonably likely that the attackers never saw the data they were ransoming, and also never targeted the telescope specifically. Ransomware, at it's core, uses cryptography. The malware goes through every file on all of the systems it gets access to, and instead of deleting it, or attempting to send it all back over a small network connection to the attacker, it uses a cryptographic algorithm to scramble it reversibly with a key, and then deletes it's copy of the key, leaving only the attacker with knowledge of how to unscramble all of that data. So, if there was any data not backed up, or if the backups also got encrypted, this leaves the victim with two options: either pay the attacker, or accept that the data is lost forever. And there's many things this data could be. One is, like you mentioned, potentially observations of things that happened in the past, but this is actually probably not what was being targeted. Instead, they were probably hoping to hit proprietary software necessary to run a business, potentially a very profitable business, where every day of downtime caused by not having access to important software represents massive amounts of money. And that's the other thing: these attacks are not targeted. Mostly, the phishing emails that actually get people to install the ransomware (although it's worth noting that there are other ways to get ransomware onto a system) are sent by computers infected by a different kind of malware on mass to any email address they have on their list. The ransomware is probably designed to be able to exploit all the most common types of computers, and even if it wasn't, because it's so easy to make attacks like this it doesn't really matter whether or not it actually works every time. In the case of ALMA, they just happened to get a telescope.

    • @bmitchell922
      @bmitchell922 4 หลายเดือนก่อน +1

      Thank you for this. Was waiting for somebody to properly explain. It's not about the objective value data. It's about the subjective value, and the associated cost of down time it potentially represents to not have access to it. Also, once they are aware of what they have, the calculus may also simply become the ransom versus the threat of a public data leak, which can cause embarrassment either through reputational damage or the reveal of the data itself... again, banking on SUBJECTIVE data value

  • @keldencowan
    @keldencowan ปีที่แล้ว +46

    I used to work at a cellphone store selling phones, plans, and doing small repair. The shear amount of meemaws who came in because they were ransomed into sending iTunes gift cards to people was staggering. Never underestimate how shitty people will be for meager amounts of money.
    Edit: and it's not about their pictures. In many cases seniors depend on a single iPad to pay their bills and other things that are difficult or impossible for them to now do in an analog manor. It's often the sole authenticator in 2FA, so often they lose access to every account they've ever had, permanently. And more and more medical devices like insulin pumps are starting require a paired Apple device to operate. Even without stolen credit cards or identity theft, it can seem like an existential threat to many seniors. It takes a lot of money and technical skill to replace bricked devices and accounts.

  • @delusionnnnn
    @delusionnnnn ปีที่แล้ว +11

    The point of most ransomware isn't how valuable your data is to sell to someone else, it's whether you will pay the thieves to get it back. Like a ransom kidnapping - there isn't a lively black market for your kid (Law & Order and conspiracy theories aside), but you're likely to be the most highly motivated customer to get your kid back. So the two questions are always: "is the encryption of the ransomware attack secure enough to foil recovery", to which the answer is usually "yes", and "is your data plus the risk of embarrassment (which may have a financial cost, too) worth more to you than the cost of either paying the thieves to unlock it, or regenerating it (if possible). I admit, I can't imagine public astronomy is a terribly lucrative target, but businesses often are even if their data is not really sellable to a third party - not having it may put them out of business. Just my read. Paying is often an extra risk, since you've put a target on yourself as an organization that has paid in the past, and thief always has the option of leaving critical files infected as time bombs to go off later on with no additional phishing required.

  • @krampusz
    @krampusz ปีที่แล้ว +52

    Let me give an example of a theoretically successful ransomware: I worked at a vehicle r&d company. We worked on high profile development jobs with weeks worth of simulation data which were extremely a) time sensitive b) very secret. If, through my computer a ransomware simply blocked data on our server, our project is delayed. "Why is it delayed?" - asks the customer. We'd reply "oh we are lame" or "oh we got hacked". We just lost the customer either way. We are talking about millions of dollars here. Data is nothing, but it is an aswer to a question: can we manufacture 10000 of this engine next month? If we give no answer in time, we are screwed.

  • @rentristandelacruz
    @rentristandelacruz ปีที่แล้ว +9

    When you mentioned 1:10 in a note that dust is very interesting in astronomy, it reminded me of Brian May (guitarist of Queen) finally finishing his astrophysics PhD in 2008 with the thesis titled "A Survey of Radial Velocities in the Zodiacal Dust Cloud".

  • @crtchicanery9605
    @crtchicanery9605 ปีที่แล้ว +5

    I work as a software developer. A few years ago, a team other than mine got an email that basically said "we hacked your webcams and have compromising footage of you. Pay us and it won't get out. Here's a btc wallet address." This spread around the whole office bc it was obviously an empty threat and very funny. But also, like, btc transactions are public, you just look up the wallet address, so I checked it. The scammer was raking in thousands of dollars. They didn't even do anything, they just sent an email. Insane.

    • @richardarriaga6271
      @richardarriaga6271 หลายเดือนก่อน

      Steve-O is immune because he posted his nudes on Twitter

  • @Wolf_Avatar
    @Wolf_Avatar ปีที่แล้ว +101

    "We'll just train our people not to click links in emails, Jerry!" Love it.
    Like many others, I found your channel recently and I've added it to my group of science education channels.
    ALSO, you mention in a couple of videos that you have a Patreon, and I'm not sure if I just can't find it, or if I fell for the joke.

    • @acollierastro
      @acollierastro  ปีที่แล้ว +32

      Maybe one day!

    • @Don.Challenger
      @Don.Challenger ปีที่แล้ว +2

      @@acollierastro one fine day

    • @yonatanbeer3475
      @yonatanbeer3475 ปีที่แล้ว +5

      @@acollierastro I would definitely throw a few dollars at you a month, these videos are great.

  • @voomastelka4346
    @voomastelka4346 ปีที่แล้ว +24

    I'm an IT-professional, have a mandatory security training every year and it still takes a couple of seconds for me to recognize a scam AFTER I have clicked on dodgy link. The truth is, that everyone can fall for a scam. Including TH-camrs, so watch out.

    • @fibbooo1123
      @fibbooo1123 ปีที่แล้ว +2

      +. The people most vulnerable to a scam are those who click the most links, just because they have more exposure

    • @ayoCC
      @ayoCC ปีที่แล้ว +1

      We need a browser that just creates a sandbox or virtual machine via right click or so.
      And a Mail program that automatically saves programs in a sandbox folder, that runs the attachment in a sandbox virtual machine.

    • @williambranch4283
      @williambranch4283 ปีที่แล้ว +1

      Throttle all traffic bidirectionally by traffic type. No un authorized access, no non-business activity.

    • @emberthecatgirl8796
      @emberthecatgirl8796 9 หลายเดือนก่อน

      This sounds so much like a threat >.

  • @fibbooo1123
    @fibbooo1123 ปีที่แล้ว +23

    The statement about who falls for a scan I think is somewhat more complicated, because more technical users use computers so much more. Everyone can fall for a scam, they’re called “accidents”, not “on purposes”, and thinking that you’re too technical to fall for a scam is the first step in falling for a scam

    • @chalkchalkson5639
      @chalkchalkson5639 ปีที่แล้ว +10

      spearfishing can also be done super effectively if you're willing to put effort in. Got an email "from my prof" the other day which was asking for me to proof read the newest revision of "our paper". If the scammers had gotten the language my prof writes to me in right, I might have opened the attachment and I'm a security nerd.

    • @user-zv8li7eu1w
      @user-zv8li7eu1w ปีที่แล้ว +6

      @@chalkchalkson5639 Why weren't you checking your mail inside a VM inside a non admin account inside a PC that has a complete physical backup and a cloud backup !? Just kidding hahahah
      I'm getting worried about this stuff, Is ublock + noscript + windows defender + CoreIsolation>MemoryIntegrity ON + ransomware protection ON + MalwarebytesFree + non-admin-acc daily browsing? I'd say I'm very prone to just clicking and downloading unsafe things (Go figure most of my problems would be solved if I didn't but its kind of like gambling, where a possible reward could be at the other side) but I think I don't have something right now beyond like, an adware or like, a cripto miner.
      I'm thinking of testing everything inside windows sandbox or an HyperV VM but that sounds sooooooo work-heavy to do for like, each file I download.

    • @user-zv8li7eu1w
      @user-zv8li7eu1w ปีที่แล้ว +2

      I said "like" too many times, sorry.

  • @charper9
    @charper9 ปีที่แล้ว +32

    The hackers likely were not targeting the telescope - they just have a list of thousands (maybe millions) of e-mail addresses that they send these phishing e-mails to and then if a person clicks on the link it will encrypt all the data it can get access to (which if the computer is on a network without tight security controls may be a lot) and then demain a payment to get the data unencrypted. Given that it would typically cost a whole bunch of money to lose all the data for an organization - payment can be the cheaper option.

  • @robertvarner9519
    @robertvarner9519 ปีที่แล้ว +65

    Angela! I got so excited because I thought YOU hacked the telescope. I was a little let down but your story telling ability made up for it. You're the best!

    • @thomasw4422
      @thomasw4422 ปีที่แล้ว +3

      There's a video idea for her

  • @methmeth
    @methmeth ปีที่แล้ว +49

    I think the thing that matters to companies for whether they pay the ransomware or not is less dependent on how important that data/systems are and more about how quickly they need that data/systems up and running. Because the company can eventually get their data/systems back, but probably not quickly. So it needs to cost them enough money to where they would save money to pay and use their systems right away, compared to waiting the month or 2 to get that data/system back. That's what happened to Colonial Pipeline, I think.

    • @mehblahwhatever
      @mehblahwhatever ปีที่แล้ว +7

      The thing to remember there is that there's no guarantee that it's actually "ransom" and not just a request for money without a fix.

    • @vcostello712
      @vcostello712 ปีที่แล้ว +4

      It also works better on targets who have not properly backed up their most important stuff. Any competent institution should have critical data backed up on a hard drive that's not plugged into anything, sure. But people are dumb dumbs. Jerry did click that email after all. Hell, I found out a governmental agency I had to make an account with was storing user passwords as plaintext because I clicked the "forgot password" link and they straight up emailed my password back to me. Not only is that a hideously unsafe way to store passwords, I would bet those same dumb dumbs weren't backing things up, and if the spreadsheet of everyone's passwords got locked then everyone would be permanently locked out of that service.

    • @crystalgemstv4609
      @crystalgemstv4609 ปีที่แล้ว

      @@vcostello712 The best way to do things is also the most expensive and resource intensive way to do things, and the reality is that most people don’t care that much about cybersecurity. Nobody really thinks they’re going to be hacked, unless you’re a big government agency with a lot of secrets. The City of Atlanta got ransomeware in 2018 and they didn’t pay the ransom. Apparently they had a LOT of vulnerabilities that the IT team knew about, but didn’t patch. In 2022, the city proposed to cut the IT budget even more! Local governments aren’t exactly rich, but at the same time, just one attack cost them hundreds of millions of dollars in lost productivity and repair fees, and they also lost a lot of important, irreplaceable data. You’d think they’d realize that they can’t skimp out on proper security, but they probably don’t think it’s going to happen again.

    • @thorwaldjohanson2526
      @thorwaldjohanson2526 ปีที่แล้ว +7

      There are ransomeare groups that do indeed unlock it after they have been paid. It is in their best interest to do so, otherwise nobody would pay. Oh and they don't necessarily have your data. It is essentially a guy coming up to your warehouse, putting a giant padlock on the door and demanding money to unlock it again.

  • @SapientPearwood
    @SapientPearwood ปีที่แล้ว +34

    I feel like I fall into multiple parts of your plot. I run Fortran physics simulations on supercomputers for my job, but I also don't think I'd know how to get something from a phone to a projector, and I definitely don't know how to bitcoin (though that last one is mostly intentional)... Admittedly I do know how to google, and all tech support is just googling "how to *" and skimming the first 6 stack exchange links... But still, conference room projectors are black magic as far as I'm concerned.

    • @AdrianBoyko
      @AdrianBoyko ปีที่แล้ว +2

      Forget Google, boomer. It’s ChatGPT now.

  • @jhohiii
    @jhohiii ปีที่แล้ว +11

    Laughed harder than recent Last Week Tonight episodes (which usually make me want to cry after laughing). You're feeding all the endorphin rushes - intelligent content, science history, and "it's fine..." Brilliant! Keep it up!

  • @Rinxinx
    @Rinxinx ปีที่แล้ว +20

    They claim hardly anyone pays the ransoms, but they often do. They just keep it on the down low for a couple of reasons. Instead of embarrassingly announcing they paid the random, they'll say they defeated the hackers through sheer determination, plus the FBI wants to discourage hackers by making it seem like they never succeed. And it's true that if Meemaw's photo of you when you were 3 years old was stolen, you yourself are still safe. But memories have value. Sometime's that data can't be recreated. And even in cases where it could, it takes time... and time is money.

  • @joaovictorcarvalho6339
    @joaovictorcarvalho6339 ปีที่แล้ว +9

    i’ve been binge watching your videos this week and i’m low key so inspired by you. really good work!!

  • @saturdaysequalsyouth
    @saturdaysequalsyouth ปีที่แล้ว +5

    Dust is so interesting I've drapped my apartment in it.

  • @andreideev1545
    @andreideev1545 ปีที่แล้ว +36

    Hackers encrypt your data and sell it back to you. That's the point. There are a lot of hospitals, schools, public services etc that don't have budgets for proper IT services. They get hacked and pay ransom. Hospitals are especially good targets, if they don't pay their patient may suffer/die.

    • @danimalfarm
      @danimalfarm ปีที่แล้ว

      Or they irreversibly junk your data but take your ransom money on the pretense they can fix it.

    • @cainabel2553
      @cainabel2553 ปีที่แล้ว

      There is no budget for people to not do insane stuff. You don't drink from the flood drain, you don't download and install random stuff from unknown origin because an email or ad on a Web page begged you to.
      It's called common sense and being aware.

    • @redpepper74
      @redpepper74 ปีที่แล้ว +10

      @@cainabel2553 The entire cybersecurity industry would like to formally disagree with your statement.

    • @cainabel2553
      @cainabel2553 ปีที่แล้ว

      @@redpepper74 So you admit I'm correct?

    • @snowwsquire
      @snowwsquire ปีที่แล้ว +4

      @@cainabel2553 While social engineer will always be a weak point, you can organize systems so that one person getting socially engineer is isolated and harm-minimized

  • @labeardod
    @labeardod ปีที่แล้ว +6

    The customer service aspect of ransomware always got me. There's gotta be 100s other scams you could run where you don't also need to have a dedicated customer service line where you teach meemaw all about bitcoin / monero so you can get that little sliver of crypto in your wallet.

  • @TheGoodMorty
    @TheGoodMorty ปีที่แล้ว +17

    I was shown your String Theory Lied to us and then i binged your whole channel in a week lol

  • @robbren8679
    @robbren8679 ปีที่แล้ว +3

    RE: Backups - Adversaries will always go after the backups, to delete them or modify them. The number of orgs that backup data correctly and securely (and test restoring data) are more rare than they should be.

    • @ohiocore
      @ohiocore ปีที่แล้ว +1

      Almost nobody validates their backup restoration. It's not just "ok, the mag tape still has last month's files on it", but having a process at different levels for business continuity during restoration.

  • @malfaro3l
    @malfaro3l ปีที่แล้ว +4

    It's because phishing scams are not directed. They are spammed out to email lists pretty randomly.

  • @AkbarAli-bs4eq
    @AkbarAli-bs4eq ปีที่แล้ว +17

    Good luck and best wishes! Keep doing what you do so eloquently! I love watching your well deserved growth trajectory.

  • @notnotkavi
    @notnotkavi ปีที่แล้ว +33

    As someone who has taken a class on computer security at MIT I felt very attacked by your transitions 😅😅
    But yeah fair point on this (we didn't cover ransomware in the class at all really, which ig tells you how much the professionals take this seriously)

    • @nikolaisafronov3452
      @nikolaisafronov3452 ปีที่แล้ว +2

      Digital security should be a class subject in school by now...

  • @robbren8679
    @robbren8679 ปีที่แล้ว +10

    Sometimes these hacks can have motivations other than financial... "hacktivists" may just want to disrupt the target for various reasons. It can be as simple as bragging rights "just cuz" up to state-sponsored attacks. Most of the time, it is a financial motivation, but not always.

  • @G1itcher
    @G1itcher ปีที่แล้ว +2

    It's worth mentioning that many organisations, although they have tech savvy people on board, may not have backups or ways to spin up systems again if they're wiped out.
    Ive been lucky enough to work as a software development consultant for the last 8 years, and honestly it is genuinely shocking how exposed companies can be under the guise of ALWAYS MOVE FORWARD! No time to stop and shore up security, test backups, pay tech debt, etc.
    I'd say 70% of the companies I worked for would have no choice but to pay ransomware, as it would be that or let the house of cards collapse, with no guarantee that theres enough money available to build it up again.

  • @Sam_on_YouTube
    @Sam_on_YouTube ปีที่แล้ว +16

    Hey, your first new video since the algorithm showed me your videos and I bunge watched your whole channel and subscribed.
    Good title. I showed my 11 year olds the movie Hackers for the first time today. It is surprisingly accurate to the technology of the day, except for the visuals. Still holds up.

    • @pluto9000
      @pluto9000 ปีที่แล้ว +1

      bunge 😅

  • @bladerunner2912
    @bladerunner2912 ปีที่แล้ว +11

    RLM and you are the only channel who genuinely makes me crack out loud.
    Yes, Landlords are scammers. It's the same even here in the subcontinent.
    Man. Just don't stop making videos even if you post it after 3 to 4 months just don't stop and I am eagerly looking forward to your Halloween video this year.

    • @skhotzim_bacon
      @skhotzim_bacon 2 หลายเดือนก่อน

      Subcontinent? Wouldn't it have been easier to type India? Subcontinent seems very vague and pretentious.

  • @_loss_
    @_loss_ ปีที่แล้ว +39

    Sometimes it's better not to announce that you've been hacked. It gives validation to the hackers.

    • @ultravioletiris6241
      @ultravioletiris6241 ปีที่แล้ว +8

      True but that contributes to the unethical atmosphere of companies waiting until its way past too late to notify their clients of data breaches.

    • @BlisaBLisa
      @BlisaBLisa ปีที่แล้ว +7

      id rather a company/organization be transparent and risk possibly making a bad person feel good. its also just harder to keep these kinds of scams going once they gain enough attention, so its probably better to announce it.

    • @jennifierburnett2901
      @jennifierburnett2901 ปีที่แล้ว +3

      In the case of ransomware the hacker's validation isn't remotely important. If it's just a pure destructive virus that wipes someone's hard drive then sure, it's probably a prestige thing, but in all other cases the hack will have some other purpose that's far more important than someone's ego. If anything broadcasting the details of how a hack happened is more likely to hinder future attempts to compromise other systems now that more people are aware of it (assuming you're competent and have addressed the method by which the virus got into the system and aren't just telling other people how to hack you again).

    • @anonymes2884
      @anonymes2884 ปีที่แล้ว +2

      There's that but also that plenty of businesses operate on public perception - banks for instance will obviously be reluctant to tell the world they're insecure. And in places like the US a company could even open itself up to lawsuits by admitting they were hacked.
      Total transparency is a very laudable idea but it'll never happen in reality.

    • @kwisatzsawyer
      @kwisatzsawyer ปีที่แล้ว

      Except for those "pesky" data breach notification laws... /s

  • @TheEveryd
    @TheEveryd ปีที่แล้ว +4

    Love your videos! My daughter is starting college as a freshman Chem major this fall. She’s determined to continue through to a PhD. I just wanted to say your First Generation Grad Student video answered a lot of questions for both of us.
    I got my BS going to night school and partly online. There are so many questions about traditional college I couldn’t answer initially, but we are figuring it out. Your video gave us some great info about grad school that I never could have answered in a million years. Thank you!

  • @boredstudent9468
    @boredstudent9468 ปีที่แล้ว +17

    There are two main kids of those attacks, "normal" phishing is just thrown at the wall to see what sticks, because the chances aren't that bad to hit something important like business records or to just overwhelm people with shock and stress. Also often the "customer support" on how to get crypto is pretty good.
    Normally such operations don't target organisations like that, as I said they just throw it at the wall.
    Oh and the reason they are all from Russia is the legal protection, Russia only persecutes hacking of Russias and does not expedite to Western countries

  • @abrilfool
    @abrilfool ปีที่แล้ว +2

    TH-cam recommended me your mass video a few weeks ago and now I can't get enough of your content! Keep up the great work!

  • @hellraserfleshlight
    @hellraserfleshlight ปีที่แล้ว +1

    Ransomware in the commercial space has always fascinated me because the solution is so simple and something that *should* be the basis of all IT operations. Like... Even if you have a business and you have even a single computer, you should have a backup.
    The problem is, having worked at every level of IT, NOBODY WANTS TO DO IT. Like, small businesses think it's too expensive to even buy an external hard drive that they plug in and back everything up to once a day. Big companies will often cobble together half-ass solutions to placate the grossly overburdened actual IT people, but often won't even allow them to properly test disaster recovery, so when they actually need it, it doesn't work.
    It's just wild... It's the most basic thing in IT - have backups, and make sure they work, and yet, I would bet it's the single biggest potential point of failure in the IT world. That's why these scams still exist, the odds of landing on someone who can't or won't do the most basic stuff are just too good.

  • @coffeeisdelicious
    @coffeeisdelicious ปีที่แล้ว +3

    "I'm running this channel on tech, and data and science, and this is the second time buttplugs have come up." Never before have I thumbs uped a video so fast

  • @vahaha136
    @vahaha136 ปีที่แล้ว +11

    oh shit wasn't expecting a new vid so soon after discovering and binging this channel :o

    • @Sam_on_YouTube
      @Sam_on_YouTube ปีที่แล้ว +1

      Me too. The algorithm apparently decided to favor her. I appreciate the find.

  • @patrickarmshaw
    @patrickarmshaw 11 หลายเดือนก่อน +1

    Ok I’m on my like 15th video of yours and you are just an absolute natural at this. Love the science, obvs, but also your manner of speech, sense of timing and whole persona. May you absolutely prosper as much as you want to at TH-cam and literally no more than that much.

  • @systekmusic
    @systekmusic ปีที่แล้ว +6

    Binge watched nearly all your videos today after watching the String Theory vid. What a nice surprise to see a new one pop up at the end of the day.
    Keep up the good work!

  • @chalkchalkson5639
    @chalkchalkson5639 ปีที่แล้ว +2

    Ransomeware works because a surprising amount of especially small-medium sized companies have/had really shitty IT practices. Like the IT people have setup an NFS share that's remotely backed up and everything, but Jerry just saves all the important documents to the desktop of his computer. Restoring from backup can also cost more in disruption than the ransom. And finally, many groups reportedly offer secrecy about the breach if the ransom is payed, which can be attractive for a company that relies on having a reputation for being secure. Example: friend of mine works at a biotech company that suffered a ransomware attack, lots of data would have been lost because the employees didn't follow guidelines and they try to keep it under the radar.

  • @cyberninjazero5659
    @cyberninjazero5659 ปีที่แล้ว +15

    To answer your question Ransomware attacks work best when they disrupt vital operations. When the U.S pipeline hack happened it was payed off because those systems NEEDED to be online
    Side Note: The Bitcoin thing is a meme even amongst Crypto currency that's not considered the most private and in fact the FBI tracked down the infrastructure hack

    • @varietynic17
      @varietynic17 ปีที่แล้ว +2

      Yep, Bitcoin can be difficult to track when it's moved and mixed properly, but it's far from untrackable - all transaction receipts are public lol

    • @rickypoindexter9505
      @rickypoindexter9505 ปีที่แล้ว

      @@varietynic17 yeah but the transactions are tracked via their wallet not their personal info. Unless they mess up and mix the two.

    • @varietynic17
      @varietynic17 ปีที่แล้ว +2

      @@rickypoindexter9505 Yep going from bitcoin transaction activity to anything in the real-world is difficult, but when you have groups/individuals using bitcoin so frequently, it would make it easier to establish patterns

  • @ultravioletiris6241
    @ultravioletiris6241 ปีที่แล้ว +10

    In general companies and organizations currently have a huge issue with scaling cybersecurity programs and staffing them properly. Hopefully events such as this help push organizations to invest in their security more. As it is there hundreds of unfilled cybersecurity jobs. People need to take this stuff more seriously… as you mentioned I’m surprised this wasn’t a bigger news story.

    • @SlugSage
      @SlugSage ปีที่แล้ว +1

      Nah bro, she's just going to throw her computer away and get a new one. Also thumb drives.

    • @ultravioletiris6241
      @ultravioletiris6241 ปีที่แล้ว

      @@SlugSage ….wat

    • @bmitchell922
      @bmitchell922 4 หลายเดือนก่อน

      ​@@SlugSage thumb drives are one of the biggest security risks out there. The moment you plug one in you think is safe but can't actually verify you might be done for - Google rubber duckies

  • @LiveWire937
    @LiveWire937 ปีที่แล้ว +3

    glad I wasn't the only one who saw the computer room at Jerry Day Care as an alien cyber security worst case scenario worthy of its own episode.

  • @firstlast5304
    @firstlast5304 ปีที่แล้ว +3

    "someone got a phishing email, clicked--"
    "Oh oh"
    "Downloaded it"
    "Ok"
    "Werent suppose to"
    Its like poetry, it rhymes.

  • @damunataliffato9128
    @damunataliffato9128 11 หลายเดือนก่อน +1

    I have to say your science content is one of the most original and thought provoking there is, please never stop doing these videos!

  • @andrewphilos
    @andrewphilos ปีที่แล้ว +8

    Genius
    Hacker
    MIT
    Loved it! Great video! :D

  • @Nico_Sno
    @Nico_Sno ปีที่แล้ว +1

    The lead up and delivery of “You’ve scammed memaw, she can’t see her grandchildren anymore” was honestly one of the funniest things I’ve ever heard

  • @brktspcxlmmrkspcbrk
    @brktspcxlmmrkspcbrk ปีที่แล้ว +1

    I can listen you for hours on the topics I'd never thought be interesting to me. I started with the string theory video and now I'm like - OK the next one will bore me, TF I care about adjuncts at academia, and then I watch the whole thing, enjoy it and learn new stuff. You must be an absolutely amazing at teaching.

  • @d3xo
    @d3xo ปีที่แล้ว +2

    Just found your channel as a fellow astrophysicist (graduate school) and I love your content. Keep doing what you're doing, this is some of the best content on youtube!

  • @Etropalker
    @Etropalker ปีที่แล้ว

    So glad your string theory vid got recommended to me, your content is amazing

  • @florianbruehl
    @florianbruehl ปีที่แล้ว +2

    I love this channel and your work. You're a serious breath of fresh air in TH-cam science communication. Thank you so much!

  • @yevengyklaus7066
    @yevengyklaus7066 ปีที่แล้ว +1

    "How often do ransomware scams work?" Very often. So much so that when it happens to the US GOV, their guidelines is to pay.

  • @SaintBrick
    @SaintBrick ปีที่แล้ว +1

    There was a time in the 2010's where fortune 500 companies were buying bitcoin (and skimping on their insurance) so that in the event that they got ransomwared they could pay the ransom as quickly as possible.
    If you're a big company and you loose access to even 25% of your IT infrastructure that's a lot. Even if you have all the data, and it's just a matter of setting up the 25% computers again that's a ton of work.
    More work than your in house IT team can do quickly. God forbid you lose critical data or infrastructure in the attack... In these cases paying the ransom starts to see like an option.
    Like you mention though, ransomware is a volume game - Almost all cybercrime and fraud are. Unlike a phone scam though ransomware can be highly automated. All the instructions are in the ransomware.
    Also the Blackhat reference was amazing.

  • @Alex_Off-Beat
    @Alex_Off-Beat ปีที่แล้ว +8

    I absolutely love this channel! She's like Jenny Nicholson but astrophysicist! Or like Swell Entertainment except it's more like Infinite Expansion of the Universe Entertainment lol!

  • @marklowry4431
    @marklowry4431 ปีที่แล้ว +1

    This channel is so refreshing. Thanks for the videos :)

  • @LeonoraTindall
    @LeonoraTindall ปีที่แล้ว +2

    I feel blessed to see this video tonight. I was really craving some snarky physics adjacent content :)

  • @BrianFedirko
    @BrianFedirko 8 หลายเดือนก่อน +2

    This type of hack can be a feather in the cap of a loser/immature hacker; trying to get kudos to a more master hacker or "the in crowd of hackers". ☮

  • @feudist
    @feudist ปีที่แล้ว +7

    I think you're underestimating the depths of viciousness that malignant trolls descend to for its own sake.
    Which is kinda sweet.

    • @quintrankid8045
      @quintrankid8045 ปีที่แล้ว

      Yes. The sorts of people who do this are often malicious for the sake of being malicious. It's almost as if they view their victims as not being fully human. Maybe they have to see things that way in order to be able to sleep at night.
      What's that old saying? If you want to solve the crime you have to think like the perpetrator and not the victim.

  • @KaneryU
    @KaneryU ปีที่แล้ว +2

    Yet another new fan after yt pushed your videos, Love them! ❤

  • @spencerthomas4087
    @spencerthomas4087 ปีที่แล้ว +2

    Pretty sure one of the groups in my dept. got hit with a ransomware attack while I was a grad student. It was definitely something that could have easily been fixed if they had backed up. I don't think they actually paid - I don't think they even could legally use lab funds to pay a ransom because federal grants (another obvious problem with ransomware).
    Feels like the feeling of power that a loser gets from kicking over someone's sandcastle is the real objective. The very rare low-effort payout might just be a bonus

  • @JohnPatchesMicallef
    @JohnPatchesMicallef ปีที่แล้ว +4

    I was half expecting you to say that all thousand papers were written by Avi Loeb

  • @deathlife2414
    @deathlife2414 ปีที่แล้ว +2

    The naming part I understand. Naming variables and files becomes hard as you continue writing scripts and programs

  • @thossi09
    @thossi09 ปีที่แล้ว

    I don't know how this channel wound up on my suggested list, but I'm glad it did!

  • @yoweedmofo19897
    @yoweedmofo19897 ปีที่แล้ว +1

    "It's so lame I 'WannaCry'" 😂 solid reference

  • @Lupine49
    @Lupine49 ปีที่แล้ว +5

    The thing with ransomware is this: it costs almost nothing for the ransomer to send out, so you don't need to have a high hit rate to make a lot of money. Also, a lot of them are in countries that have a MUCH lower standard of living than the US, so a few hundred bucks per successful ransomware is a good payout.

    • @scottwatrous
      @scottwatrous ปีที่แล้ว +1

      Yeah and also what sounds badass and cool and ominous to an internet hackerman from Belarus and what sounds genius, hacker, MIT to someone from some university research group are very different.

  • @Rotaretilbo
    @Rotaretilbo 10 หลายเดือนก่อน +1

    Others have covered most of what I wanted to say, but one thing I want to point out is that there's a bit of self-selection skewing the data, a bit. If a company gets hit by a ransomware attack, and opts not to pay the ransom, it usually becomes public knowledge, either because the company needs to explain why their service is down, or the hacker claims responsibility. But when a company gets hit by a ransomware attack, and then pays the ransom, most of the time the public never hears about it. While I'd expect that it is still more likely than not that a victim doesn't pay the ransom, I think it's important to remember that it's probably more common for the victim to pay than the available data would suggest.

    • @bmitchell922
      @bmitchell922 4 หลายเดือนก่อน

      $1.1 billion in revenue through ransomware, 2023... so you are correct

  • @scottgreen132
    @scottgreen132 ปีที่แล้ว

    This was first in my list of recommended videos. The algorithm gods are blessing you, I feel like you're about to be famous. You deserve it.

  • @andreigrigorev3499
    @andreigrigorev3499 ปีที่แล้ว +1

    Business interruptions can be very expensive. Recovering from it might take a while getting it even more expensive. Some might just pay to recover quickly, especially when ransom is orders of magnitude smaller.

  • @jonathancohen2351
    @jonathancohen2351 ปีที่แล้ว +3

    Was the ALMA hack targeted at ALMA specifically? The hacker could have just bought a database of email addresses that included Jerry's and blasted out a bunch of emails with a hacked file that the hacker built using a tool the hacker bought from a malware website. Then when Jerry opened the file it took over whatever network he was on. As long as the hackers can send out enough emails to keep the lights on they will keep doing it.
    Looks like a lot of the people who know how do all that had to high tail it out of Russia recently and are still a little nervous about starting up again from their new digs because they are worried about being sent back to their homeland.

  • @williamjoshualucas6503
    @williamjoshualucas6503 ปีที่แล้ว

    Angela's "it's fine" should become my meditation mantra.

  • @piratecheese13
    @piratecheese13 ปีที่แล้ว +1

    you have this low key "world is burning, i don't care, give me coffee" energy that im 100% here for

  • @PoeInTheDitch
    @PoeInTheDitch 10 หลายเดือนก่อน

    "They're attacking your buttplugs" were not words that I was expecting to hear, today.

  • @Taykorjg
    @Taykorjg 6 หลายเดือนก่อน

    I like to think you say buttplugs because you're actually a really good comedian with great timing. It's always unexpected and very funny

  • @kushchakraborty8013
    @kushchakraborty8013 ปีที่แล้ว

    Hi! Love your work. I was just watching the latest episode of Star Talk hosted by Neil and the guest was michio Kaku, the show was about Quantum supremacy and it took him 9 min and 24 seconds to jump to string theory lol. I just saw your string theory video and was wondering if you had any thoughts on that.
    Also the the group of science adjacent fans you talked about seemed to have much more passion than sense, it seems baffling to me how a person who claims to be be science adjacent can be so distant to how the scientific method actually works.

  • @Xsiondu
    @Xsiondu ปีที่แล้ว

    Your data set presentation is the best tableau theme i have ever seen. I'm gonna update my presentation on TPS reports.

  • @EricaCalman
    @EricaCalman ปีที่แล้ว +3

    So most likely they were just launching probing attacks against a number of organizations in a massively parallel way hoping that a small fraction of their successful hacks will actually pay the ransom. Possibility two is just that an0nymous just wants to troll because one persons cringe is another persons roflcopter.

  • @mbarrio
    @mbarrio 6 ชั่วโมงที่ผ่านมา

    I know this is an old topic but there are two ways to "target" these attacks. One is completely random, somebody is gonna pay. Or completely targeted, you spent enough "time" to actually extortion somebody.
    Edit: My point is, there is *always* motivation to harden your security. You are an individual with *nothing* to loose (maybe somebody in your family does), or you are part of an organization that does.

  • @MrBurnlan
    @MrBurnlan 11 หลายเดือนก่อน +1

    "Some people make a living scamming, like the landlords"
    This channel is officially "based" like the kids would say. 10/10

  • @icantseethis
    @icantseethis 11 หลายเดือนก่อน +1

    Needs more GENIUS HACKER MIT

  • @najawin8348
    @najawin8348 ปีที่แล้ว +3

    10:18 Hey, hey, you're gonna upset the quantum information people.

  • @kephir4eg
    @kephir4eg ปีที่แล้ว

    We all hate TH-cam algorithm and for a good reason. But sometimes it throws a real gem, such as this channel. Just as I got really tired of all these polished almost TV-quality shows by "independent" teams of ten people with minute-long promotion rolls within the video.
    It's nice to see there are still really independent creators who can build educational content with interesting narrative while being passionate, honest and moderately emotional. And it does not include a VPN ad as a bonus.
    Going to binge-watch the channel today.

  • @jsalsman
    @jsalsman ปีที่แล้ว +1

    The hoodie thumbnail, spectacular!

  • @kuda_71
    @kuda_71 9 หลายเดือนก่อน +1

    love the videos. always interresting and informative. a look in the mind of an intelligent person and a scientist. i'm an IT dude with no education worth mentioning which makes it even more interresting. I bet you'll find out how ransomware works. Funny thing is what jerry did can happen to anyone: the mail is fabricated to look familiar and before you know it you clicked shit and you're like 'oh shit, hope that wasnt a hack'. Anyway, keep it up. edit: and funny

  • @arijeetnath9236
    @arijeetnath9236 ปีที่แล้ว

    Love the genius, hacket, MIT slides in between!

  • @RickeyBowers
    @RickeyBowers ปีที่แล้ว

    The primary problem is how the cost to spam computers aggregates to zero. It's like cheap products that break - they sell enough until the word gets out to pay for the cost of production, and then profits trickle in from the ignorance that remains.
    Love the videos BTW - don't stop (or let it change you - that's difficult) - you're awesome.

  • @deksam86
    @deksam86 2 หลายเดือนก่อน

    Completely loved the fact that you linked John Oliver.

  • @BenGroebe
    @BenGroebe ปีที่แล้ว +1

    "Or like landords" killed me

  • @THELITTLERIVERNERD
    @THELITTLERIVERNERD ปีที่แล้ว +2

    The answer is pretty simple. People pay the ransom because shutting down operations is expensive and private data can be valuable.

    • @THELITTLERIVERNERD
      @THELITTLERIVERNERD ปีที่แล้ว

      A lot of these scams are run by pretty serious multinational organized crime orgs and payed ransoms are often very large.

  • @joinedupjon
    @joinedupjon ปีที่แล้ว +1

    I use terminal all the time but I've never run a powerpoint on a phone through a projector - unsure how worried I should be.

  • @scum-scum
    @scum-scum ปีที่แล้ว +2

    Anyone who does regular backups in secure locations is obviously safe. Ransomware works in the instances where that isn't the case. If their backups weren't properly gapped, and the worm spread to them and encrypted them, too, they'd probably pay the ransom, because it would be cheaper than the cost of collecting the lost data again, or going on without archival data which can't be reproduced. You can look into instances where universities have paid ransoms to get their data decrypted, too.
    It's basically the price you pay for bad IT security. There are now ransomware conglomerates with decent custimer service, too. They'll work with you on payment plans, etc. It's a business to them. When they get in, they evaluate what they can ask for, and they'll typically shoot for just under what they think the data is worth, given the image of the company.

    • @bmitchell922
      @bmitchell922 4 หลายเดือนก่อน +1

      Mostly agree, but they aren't safe if exposure of the data itself would incur damage to the organization. Even with backups, the ransom still poses a real threat if not paid in these circumstances

    • @scum-scum
      @scum-scum 4 หลายเดือนก่อน

      Oo, that's true. I wasn't thinking about that side of the fallout.

  • @chesschicken1698
    @chesschicken1698 ปีที่แล้ว

    Love your lectures professor 😊

  • @vsiegel
    @vsiegel ปีที่แล้ว +2

    Being lame may be intentional. In the Nigerian prince scam, it is definitely intentional: Scammers from other regions than Nigeria pretend they are from Nigeria. The point is to sort out everybody who can recognise a scam. Because the manual part starts later, and takes time. You want sort out people who would understand it is a scam before they pay.

  • @lafanfarlo4872
    @lafanfarlo4872 ปีที่แล้ว +2

    6:42 "and now you have ALMA data" is a nice pun lol
    Also, two things: 1) The data may not be real, but the feelings some people have for them are. Falling for a scam really is a feeling thing, the goal of the scammer is to force you into irrational decisions.
    2) Most, if not all, businesses have IT policies that dictate exactly what they will do if a ransomware invades their systems. It's not about things "making sense or not", it's just the policy. As a general rule of thumb, systems are instantly shut down, accesses are blocked and the ransom is never paid.

  • @HaithamA
    @HaithamA ปีที่แล้ว

    love how jerry keeps changing

  • @G1itcher
    @G1itcher ปีที่แล้ว

    "really upset at Jerry" missed opportunity to have a picture of Tom 😂