meta_pixel
Tapesearch Logo
Log in
KERA's Think

What's a ransomware negotiator?

KERA's Think

KERA

Society & Culture, 071003, Kera, Think, Krysboyd

4.8861 Ratings

🗓️ 19 August 2024

⏱️ 47 minutes

🧾️ Download transcript

Summary

If your company’s data is hacked, there’s a person to have on speed dial — a ransomware negotiator. Journalist Amanda Chicago Lewis joins host Krys Boyd to discuss this brand-new profession that is both an art and a science, how they negotiate with hackers and how to avoid falling victim to your own data being breached. Her article “Secrets of a ransomware negotiator” was published in The Economist.

Transcript

Click on a timestamp to play from that location

0:00.0

It can start with something as simple as a low-level employee falling for a fishing scam,

0:15.3

you know, like an email poisoned with a link inside or an invoice for some transaction they

0:20.3

never initiated. From there,

0:22.6

having acquired just a tiny bit of login information, there's sometimes a kind of incubation period

0:28.1

when hackers use it to break all the way into an organization's private files. And then the bad

0:34.6

guys go in for the kill. They send an email bragging about all the private

0:38.4

stuff they've gained access to and threaten to use it to wreak havoc on a firm's reputation

0:43.4

or ability to do business unless that company pays up many thousands or even millions of dollars.

0:50.9

From KERA in Dallas, this is think. I'm Chris Boyd. They're called ransomware attacks, and they really are among modern organizations' worst nightmares.

1:01.3

Law enforcement may not be able to help, given how hard it is to even track down where the hackers are located.

1:07.2

So some companies hire professional fixers to deal with the criminals, hoping to recover stolen data without losing millions to extortion.

1:15.0

It's a brand new kind of job, and as my guest will tell us, pretty much every aspect of this work is sensitive and surprising.

1:22.9

Amanda Chicago-Lewis is a journalist whose article Secrets of a Ransomware Negotiator was published by

1:28.5

The Economist. Amanda, welcome to think. Thanks for having me, Chris. So to show how these attacks

1:34.9

and counterattacks work, you traced a digital break-in to the files of this one company from the

1:40.9

moment of the breach until the resolution. But to get access to that story, you had to

1:45.0

promise to keep the identity of the company secret. Why are the targets of these attacks

1:50.8

sometimes reluctant to even contact law enforcement? Well, part of the point of the attack is to shame

1:59.1

the company. You know, they steal the data and they're

2:02.3

holding the data hostage. But if the company has backups, then what the gangs are threatening

2:10.0

is really just the reputation of being bad with security. And so everything is really

2:16.5

shrouded in secrecy because most companies don't

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from KERA, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of KERA and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.