Hackers Demand Ransom in Major Cyber Attack

Posted on May 16, 2017 By

HOW DANGEROUS IT IS WHEN HOW DANGEROUS IT IS WHEN HOW DANGEROUS IT IS WHEN INTELLIGENCE AGENCIES USE THESE INTELLIGENCE AGENCIES USE THESE INTELLIGENCE AGENCIES USE THESE TOOLS AND THEY GET IN THE WRONG TOOLS AND THEY GET IN THE WRONG TOOLS AND THEY GET IN THE WRONG HANDS. HANDS. HANDS. >> THANK YOU SO MUCH FOR >> THANK YOU SO MUCH FOR >> THANK YOU SO MUCH FOR BRINGING US THE LATEST THERE. BRINGING US THE LATEST THERE.

BRINGING US THE LATEST THERE. >>> JOINING US NOW DAVID >>> JOINING US NOW DAVID >>> JOINING US NOW DAVID KENNEDY, FORMERLY WITH THE NSA. KENNEDY, FORMERLY WITH THE NSA. KENNEDY, FORMERLY WITH THE NSA. GOOD MORNING. GOOD MORNING. GOOD MORNING. >> THANKS FOR HAVING ME ON. >> THANKS FOR HAVING ME ON.

>> THANKS FOR HAVING ME ON. >> SO FIRST AND FOREMOST, TO ALL >> SO FIRST AND FOREMOST, TO ALL >> SO FIRST AND FOREMOST, TO ALL OF THE PEOPLE WHO ARE SITTING IN OF THE PEOPLE WHO ARE SITTING IN OF THE PEOPLE WHO ARE SITTING IN FRONT OF THEIR COMPUTERS RIGHT FRONT OF THEIR COMPUTERS RIGHT FRONT OF THEIR COMPUTERS RIGHT NOW AT HOME SIPPING THEIR NOW AT HOME SIPPING THEIR NOW AT HOME SIPPING THEIR COFFEE, SHOULD THEY BE WORRIED COFFEE, SHOULD THEY BE WORRIED COFFEE, SHOULD THEY BE WORRIED AND HOW MUCH DOES THIS AFFECT AND HOW MUCH DOES THIS AFFECT AND HOW MUCH DOES THIS AFFECT THEM? THEM? THEM? >> WELL ACTUALLY AS OF LATE LAST >> WELL ACTUALLY AS OF LATE LAST >> WELL ACTUALLY AS OF LATE LAST NIGHT A SECURITY RESEARCHER ON NIGHT A SECURITY RESEARCHER ON NIGHT A SECURITY RESEARCHER ON TWITTER WAS TAKING A LOOK AT THE TWITTER WAS TAKING A LOOK AT THE TWITTER WAS TAKING A LOOK AT THE SOFTWARE ITSELF AND FOUND IT WAS SOFTWARE ITSELF AND FOUND IT WAS SOFTWARE ITSELF AND FOUND IT WAS TRYING TO COMMUNICATE OUT TO A TRYING TO COMMUNICATE OUT TO A TRYING TO COMMUNICATE OUT TO A WEBSITE AND FOUND THAT THE WEBSITE AND FOUND THAT THE WEBSITE AND FOUND THAT THE WEBSITE WASN’T REGISTERED. WEBSITE WASN’T REGISTERED.

WEBSITE WASN’T REGISTERED. HE REGISTERED IT AND HE REGISTERED IT AND HE REGISTERED IT AND ACCIDENTALLY FOUND A KILL SWITCH ACCIDENTALLY FOUND A KILL SWITCH ACCIDENTALLY FOUND A KILL SWITCH INSIDE OF THE SOFTWARE ITSELF INSIDE OF THE SOFTWARE ITSELF INSIDE OF THE SOFTWARE ITSELF WHICH ACTUALLY RENDERS THE WHICH ACTUALLY RENDERS THE WHICH ACTUALLY RENDERS THE SOFTWARE AS OF TODAY NOW SOFTWARE AS OF TODAY NOW SOFTWARE AS OF TODAY NOW USELESS. USELESS. USELESS.

SO THE SOFTWARE HAS STOPPED SO THE SOFTWARE HAS STOPPED SO THE SOFTWARE HAS STOPPED SPREADING ACROSS THE WORLD. SPREADING ACROSS THE WORLD. SPREADING ACROSS THE WORLD. HE ACTUALLY PROBABLY SAVED LIVES HE ACTUALLY PROBABLY SAVED LIVES HE ACTUALLY PROBABLY SAVED LIVES BY ACCIDENTS BY REGISTERING THIS BY ACCIDENTS BY REGISTERING THIS BY ACCIDENTS BY REGISTERING THIS ONE WEBSITE NAME IN HIS NAME AND ONE WEBSITE NAME IN HIS NAME AND ONE WEBSITE NAME IN HIS NAME AND IT’S REALLY INTERESTING TO SEE IT’S REALLY INTERESTING TO SEE IT’S REALLY INTERESTING TO SEE HOW THIS IS GOING. HOW THIS IS GOING.

HOW THIS IS GOING. THE PROBLEM WITH THIS SPECIFIC THE PROBLEM WITH THIS SPECIFIC THE PROBLEM WITH THIS SPECIFIC ONE WITH JWANNA CRY IT’S EASY T ONE WITH JWANNA CRY IT’S EASY T ONE WITH JWANNA CRY IT’S EASY T PUT ANY TIME OF RAN SOUTHERN PUT ANY TIME OF RAN SOUTHERN PUT ANY TIME OF RAN SOUTHERN PLAINS WARE PAYLOAD INTO THIS PLAINS WARE PAYLOAD INTO THIS PLAINS WARE PAYLOAD INTO THIS DEVICE AND HAVE IT SENT OUT. DEVICE AND HAVE IT SENT OUT.

DEVICE AND HAVE IT SENT OUT. WE’RE SEEING CHATTER ON THE DARK WE’RE SEEING CHATTER ON THE DARK WE’RE SEEING CHATTER ON THE DARK WEB AND RANSOM WARE AUTHORS WEB AND RANSOM WARE AUTHORS WEB AND RANSOM WARE AUTHORS INCORPORATING THIS TECHNIQUE. INCORPORATING THIS TECHNIQUE.

INCORPORATING THIS TECHNIQUE. WE’RE NOT OUT OF THE WATER AND WE’RE NOT OUT OF THE WATER AND WE’RE NOT OUT OF THE WATER AND WE’LL SEE A LOT MORE NEXT WEEK. WE’LL SEE A LOT MORE NEXT WEEK. WE’LL SEE A LOT MORE NEXT WEEK. >> LET ME ASK ENTHUSIAST I’M A >> LET ME ASK ENTHUSIAST I’M A >> LET ME ASK ENTHUSIAST I’M A NOVICE IN THIS ARENA. NOVICE IN THIS ARENA. NOVICE IN THIS ARENA.

$300 TO $600 HOLDING THESE FILES $300 TO $600 HOLDING THESE FILES $300 TO $600 HOLDING THESE FILES RANSOM. RANSOM. RANSOM. ONE WOULD IMAGINE NOT KNOWING ONE WOULD IMAGINE NOT KNOWING ONE WOULD IMAGINE NOT KNOWING THE ARENA THAT IF I’M PAYING YOU THE ARENA THAT IF I’M PAYING YOU THE ARENA THAT IF I’M PAYING YOU $300 TO $600 THAT MONEY HAS TO $300 TO $600 THAT MONEY HAS TO $300 TO $600 THAT MONEY HAS TO GO SOMEWHERE AND THAT ACCOUNT GO SOMEWHERE AND THAT ACCOUNT GO SOMEWHERE AND THAT ACCOUNT COULD BE TRACEABLE AND LEAD TO COULD BE TRACEABLE AND LEAD TO COULD BE TRACEABLE AND LEAD TO YOU THE PERSON WHO IS YOU THE PERSON WHO IS YOU THE PERSON WHO IS RESPONSIBLE. RESPONSIBLE.

RESPONSIBLE. NO? NO? NO? >> WELL, THE PROBLEM IS THAT WE >> WELL, THE PROBLEM IS THAT WE >> WELL, THE PROBLEM IS THAT WE MOVED TO AN ONLINE CURRENCY BIT MOVED TO AN ONLINE CURRENCY BIT MOVED TO AN ONLINE CURRENCY BIT COINS. COINS. COINS. ALL HACKERS, ONLINE CURRENCY IS ALL HACKERS, ONLINE CURRENCY IS ALL HACKERS, ONLINE CURRENCY IS WHAT PEOPLE USE TO MAINTAIN WHAT PEOPLE USE TO MAINTAIN WHAT PEOPLE USE TO MAINTAIN ANONYMITY, NOT TO BEING TRACKED ANONYMITY, NOT TO BEING TRACKED ANONYMITY, NOT TO BEING TRACKED HEAVILY. HEAVILY.

HEAVILY. THE WHOLE ONLINE CURRENCY IS THE WHOLE ONLINE CURRENCY IS THE WHOLE ONLINE CURRENCY IS DESIGNED TO BE ANONYMOUS. DESIGNED TO BE ANONYMOUS. DESIGNED TO BE ANONYMOUS. YOU’RE PAYING NOT DIRECTLY INTO YOU’RE PAYING NOT DIRECTLY INTO YOU’RE PAYING NOT DIRECTLY INTO SOMEBODY’S BANK OR DOING A WIRE SOMEBODY’S BANK OR DOING A WIRE SOMEBODY’S BANK OR DOING A WIRE TRANSFER YOU’RE PAYING INTO THIS TRANSFER YOU’RE PAYING INTO THIS TRANSFER YOU’RE PAYING INTO THIS ONLINE CURRENCY AREA AND THAT’S ONLINE CURRENCY AREA AND THAT’S ONLINE CURRENCY AREA AND THAT’S EXTREMELY DIFFICULT FOR LAW EXTREMELY DIFFICULT FOR LAW EXTREMELY DIFFICULT FOR LAW ENFORCEMENT TO GO BACK AND ENFORCEMENT TO GO BACK AND ENFORCEMENT TO GO BACK AND TRACK. TRACK.

TRACK. THEY USED TO BE ABLE TO TRACK THEY USED TO BE ABLE TO TRACK THEY USED TO BE ABLE TO TRACK THROUGH MONEY LAUNDERING TO FIND THROUGH MONEY LAUNDERING TO FIND THROUGH MONEY LAUNDERING TO FIND THESE INDIVIDUALS BUT THESE INDIVIDUALS BUT THESE INDIVIDUALS BUT UNFORTUNATELY IT’S VERY UNFORTUNATELY IT’S VERY UNFORTUNATELY IT’S VERY DIFFICULT TO TRACK THESE FOLKS DIFFICULT TO TRACK THESE FOLKS DIFFICULT TO TRACK THESE FOLKS THROUGH BIT COIN AND THAT’S THROUGH BIT COIN AND THAT’S THROUGH BIT COIN AND THAT’S WHERE THIS WHOLE RANSOM WARE HAS WHERE THIS WHOLE RANSOM WARE HAS WHERE THIS WHOLE RANSOM WARE HAS BOOMED BECAUSE IT’S DIFFICULT TO BOOMED BECAUSE IT’S DIFFICULT TO BOOMED BECAUSE IT’S DIFFICULT TO FIND THEM. FIND THEM.

FIND THEM. >> SO WE JUST HEARD FROM DIANA >> SO WE JUST HEARD FROM DIANA >> SO WE JUST HEARD FROM DIANA ABOUT EUROPE HOLD TWEETING OUT ABOUT EUROPE HOLD TWEETING OUT ABOUT EUROPE HOLD TWEETING OUT THIS REQUIRES AN INTERNATIONAL THIS REQUIRES AN INTERNATIONAL THIS REQUIRES AN INTERNATIONAL INVESTIGATION. INVESTIGATION. INVESTIGATION. DO YOU ANTICIPATE THERE WILL BE DO YOU ANTICIPATE THERE WILL BE DO YOU ANTICIPATE THERE WILL BE ONE? ONE? ONE? AND WILL IT BE ABLE TO FIND A AND WILL IT BE ABLE TO FIND A AND WILL IT BE ABLE TO FIND A WAY TO STOP THINGS LIKE THIS WAY TO STOP THINGS LIKE THIS WAY TO STOP THINGS LIKE THIS FROM HAPPENING? FROM HAPPENING? FROM HAPPENING? >> WELL, THE PROBLEM IS THE >> WELL, THE PROBLEM IS THE >> WELL, THE PROBLEM IS THE CHANCES OF GUESTING HIT, GETTING CHANCES OF GUESTING HIT, GETTING CHANCES OF GUESTING HIT, GETTING IDENTIFIED AS A HACKER IS IDENTIFIED AS A HACKER IS IDENTIFIED AS A HACKER IS SUBSTANTIALLY LOW. SUBSTANTIALLY LOW.

SUBSTANTIALLY LOW. SOMETHING AS HIGH AS THIS ONE, SOMETHING AS HIGH AS THIS ONE, SOMETHING AS HIGH AS THIS ONE, WITH AS MUCH DAMAGE AS IT HAS WITH AS MUCH DAMAGE AS IT HAS WITH AS MUCH DAMAGE AS IT HAS DONE, THERE PROBABLY WILL BE DONE, THERE PROBABLY WILL BE DONE, THERE PROBABLY WILL BE SUBSTANTIAL INVESTIGATION GOING SUBSTANTIAL INVESTIGATION GOING SUBSTANTIAL INVESTIGATION GOING ON TO FIND THESE HACKERS. ON TO FIND THESE HACKERS. ON TO FIND THESE HACKERS. THEY HAVE BEFORE IN THE PAST THEY HAVE BEFORE IN THE PAST THEY HAVE BEFORE IN THE PAST FOUND THESE. FOUND THESE.

FOUND THESE. WHAT I WOULD SAY IS THE WAY THIS WHAT I WOULD SAY IS THE WAY THIS WHAT I WOULD SAY IS THE WAY THIS WAS DELIVERED, ALL THE CODE IS WAS DELIVERED, ALL THE CODE IS WAS DELIVERED, ALL THE CODE IS NOW OUT THERE ON HOW TO NOW OUT THERE ON HOW TO NOW OUT THERE ON HOW TO REPLICATE, THERE WILL BE A LOT REPLICATE, THERE WILL BE A LOT REPLICATE, THERE WILL BE A LOT KOCHY CATS AND FOLKS IN THE KOCHY CATS AND FOLKS IN THE KOCHY CATS AND FOLKS IN THE HACKING COMMUNITIES TRYING TO HACKING COMMUNITIES TRYING TO HACKING COMMUNITIES TRYING TO REPLICATE THIS AND GET THIS OUT REPLICATE THIS AND GET THIS OUT REPLICATE THIS AND GET THIS OUT THERE QUICKLY TO MAKE MONEY. THERE QUICKLY TO MAKE MONEY.

THERE QUICKLY TO MAKE MONEY. MAYBE TAUTHOR OF THIS MAY GET MAYBE TAUTHOR OF THIS MAY GET MAYBE TAUTHOR OF THIS MAY GET DISCOVERED. DISCOVERED. DISCOVERED. IT WILL TAKE A LOT OF IT WILL TAKE A LOT OF IT WILL TAKE A LOT OF COLL.

As found on Youtube

Computer Hack     , , , ,