4.4 • 2.2K Ratings
🗓️ 9 September 2024
⏱️ 17 minutes
🧾️ Download transcript
When a team of video game developers notice that their files have been moved, they find themselves in a race against time to save the company from ransomware. Adam Marrè, CISO at Arctic Wolf, explains how this cyberattack traced back to a single phishing email and unpacks the ramifications for gaming companies. Then David Adrian from Chrome lays out how leaders can use unphishable authentication methods to protect their teams.
This episode is sponsored by Chrome Enterprise.
See omnystudio.com/listener for privacy information.
Click on a timestamp to play from that location
0:00.0 | Really it started relatively innocently you have an engineer who's looking at the |
0:06.6 | server and looking at files on the server. This is a story about a cyber |
0:10.0 | attack on a video game studio as a software engineer was hard at work on the company's |
0:14.4 | next big game, he saw one of his files had been moved by an imposter in their network. |
0:19.2 | So he immediately reaches out to the head of IT, the main IT guy, and says, |
0:23.5 | who is this? |
0:24.2 | Who owns this account? |
0:25.6 | The main IT guy was the super admin, |
0:27.8 | so he knew right away that something was wrong, |
0:30.6 | and this wasn't a normal account. So actually what he did just shut down all the accounts, |
0:35.0 | killed all sessions, locked everybody out, |
0:38.0 | required a password change, |
0:40.0 | while he could dig into this because he immediately was pretty freaked out about what was happening. |
0:45.0 | What they realized was someone had come in and made a number of accounts as super admin and had been poking around and looking at everything and even |
0:55.9 | exfiltrating information. They had no idea how long this had been going on, |
0:59.6 | how much data had been extracted, or what else was lurking in their network. |
1:04.0 | They started digging into it and they found locker software, so ransomware software that would encrypt |
1:09.6 | and it was on the server and it was ready to be deployed, but it hadn't been deployed. |
1:14.0 | Catching the ransomware didn't mean the company was safe. |
1:17.0 | They still had to investigate all of their files and their accounts, searching for any other signs of attack. |
1:23.0 | And worst of all, they had to stop working on the new game. |
1:27.0 | Those minutes count and those days count. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Bloomberg, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Bloomberg and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.