meta_pixel
Tapesearch Logo
Log in
Malicious Life

Hell to Pay

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 21 August 2017

⏱️ 37 minutes

🧾️ Download transcript

Summary

A global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but with the escape of the man himself. Security experts who operate within the gray areas of morality develop botnets that destroy personal devices infected with malicious botnets in what they call “the chemotherapy of […] Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to malicious life. In the previous episode, we discussed the roots of the ransomware phenomena,

0:16.2

malicious software that prevents the user from accessing the files on their computer,

0:20.6

and demands ransom in order to release those files.

0:23.0

We also discuss the two big challenges cyber criminals face,

0:27.0

devising effective encryption that is hard to crack

0:30.0

and figuring out a monetization strategy that keeps the criminal anonymous and doesn't allow the victim to cancel the payment or get a refund.

0:40.0

In September 2013 a new ransomware was discovered named Cryptolocker.

0:48.0

Cryptolocker would seek out a specific type of files for for example, Excel and Word files, pictures and videos,

0:55.8

encrypt them and then pop up a threatening message on the computer's screen.

1:00.6

Pay $300 or all of your files will be deleted forever.

1:06.0

A timer at the corner of the screen would start counting down 72 hours.

1:11.0

Now, information security experts had already encountered ransomware in the years prior to

1:17.4

crypto locker so the threat it presented to the users wasn't new.

1:22.4

What was new was one of the payment options that the

1:25.8

ransomware offered its victims, Bitcoin. Bitcoin, first created in 2009 is a virtual cryptographic currency.

1:34.8

That means it is a currency that exists only in the virtual world

1:39.1

and is based on encryption algorithms.

1:41.9

Bitcoin has a few fascinating characteristics that differentiate it from traditional

1:47.2

currencies such as the dollar and the euro which are also usable online, but the characteristic most relevant to us is that

1:55.5

Bitcoin, among all other recognizable currencies, is the closest thing to cash.

2:01.5

You'll see now, Chief Visionary Officer at Cyberism explains.

2:07.0

The concept of privacy and the concept of anonymity in the internet is, I think, a very fundamental thing for all of people you know from the old school

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.