4.8 • 1K Ratings
🗓️ 11 December 2023
⏱️ 35 minutes
🧾️ Download transcript
When investigators discovered in 1996 that US military networks were being extensively hacked, they didn't realize they were witnessing the birth of what would become Russia's formidable Turla APT espionage group. We uncover the 20-year metamorphosis of this original group of hackers into one of the most sophisticated and dangerous state-sponsored threats that's still active today.
Click on a timestamp to play from that location
0:00.0 | Hi, I'm Ryan Levy. |
0:01.0 | Welcome to Cyber reasons's malicious life. Archaeologists don't have it easy when trying to piece together a reliable picture of the past |
0:40.3 | from tiny fragments of pottery and the occasional inscription. |
0:45.0 | One would assume that future archaeologists would probably have an easier task when it comes to our present lives. |
0:52.0 | After all, we're leaving behind an enormous... task when it comes to our present lives. |
0:52.6 | After all, we're leaving behind an enormous trail of digital information, |
0:57.1 | detailing everything we do on a minute by minute basis, |
1:00.7 | including pictures, videos, texts, and more. |
1:04.7 | It seems that if anything, they'll probably have the opposite problem, trying to make sense |
1:10.2 | of this deluge of information. |
1:14.0 | The reality, however, is quite different. |
1:17.5 | While inscriptions written on stone and clay might survive for thousands of years, digital information is far more ephemeral. |
1:25.8 | See these, for example, may become unreadable in as little as 15 to 20 years. |
1:32.2 | And even if storage media manages to survive the ages, reading its |
1:36.4 | content often requires reconstructing a suitable hardware and software |
1:40.9 | environment, especially if the recovered information is a piece of software. |
1:46.2 | Some scholars believe that our present might be just as inscrutable to future historians |
1:52.1 | as our past is to us. |
1:55.0 | And when it comes to cyber security, future archaeologists who might wish to reconstruct our present |
2:02.0 | might face an even bigger challenge because on top of all the |
2:05.8 | difficulties I listed cyber security has one more problematic characteristic to |
2:11.1 | consider secrecy. Criminals naturally wish to avoid detection |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.