Quote:
Originally Posted by cheerfulgreek
(Post 2508010)
I’m going to look for that documentary. I’d like to really see that.
|
There may be few documentaries about how they caught the silk road guy. I don't recall if it was something I saw on Netflix or YouTube, probably YouTube. When they finally closed in on him it was in a library, he was surrounded by maybe a half a dozen undercover people. There was suspicion that he had setup a way to immediately lockdown his computer with a key combo or something similar, so they couldn't just approach & arrest him as they needed the evidence on his laptop. They ended having 2 agents posing as a couple sitting nearby, the lady slapped the guy and it got the silk road guy's attention long enough for the other agents to step in a secure his computer / prevent him from hitting the key to lock it down.
There's also an interesting interview by one of the agents involved here:
https://www.youtube.com/watch?v=4KiO8GRgwDk I haven't watched that entire interview but there are clips floating around. Some parts I did watch included where he talked about only the hackers who make mistakes get caught and/or something about catching the low hanging fruit, but the others have not been caught. Something like that.
There's another hacker story where the guy was caught & in jail, working on his own case. Discovered that the gov used some device to masquerade as a cell phone tower, they drove around something like a 2 square mile area collecting call data from a huge number of people. I think it may have been 100,000+ or so. I may be a little off on these facts as it's been a while since I learned about this stuff. That hacker I believe got off because the gov did that mass data collection, trying to find the hacker, without a warrant or something like that. The hacker or maybe his lawyer just happened to stumble upon the name of the device out of thousands of pages of documents.
Quote:
Originally Posted by cheerfulgreek
(Post 2508010)
I meant if they continue to do it the same way they’re doing it now. So, honor their ransoms by fixing what they screwed up, after they get ransom money. What I’m saying is why not keep doing what they’re doing repeatedly, keep honoring the ransom, then do it again. It seems like they just get the ransom and stop. Why not keep doing it since it’s very difficult to get caught.
|
Oh, they do keep doing it, just to other people / other companies, etc. I imagine that there may have even been victims who were hacked like that repeatedly, by different hacker groups.
Quote:
Originally Posted by AGDee
(Post 2508018)
They continue upping the ante. In the last briefing I attended with someone from the NSA, they were talking about how it has changed. Originally, ransomware just encrypted all the data and then they had you pay to get the decryption key. But people started doing better backups and could just restore their systems so they stopped doing it that way.
Then they began extortion scams- so they'd say to pay the ransom to get your data back AND to prevent them from exposing the data they had on the dark web.
|
That's really interesting and makes sense. I often wondered how the ransomware groups would strike back if people/companies/governments ever figured out how to secure their ability to recover when they are hit instead of paying the ransom. So now if they can recover or not they are extorted that way.
Quote:
Originally Posted by cheerfulgreek
(Post 2508021)
So, then this happens all the time? Seems like it. That would make me so mad. They seem like they have an easy job and an easy way of stealing money, literally without getting caught. I wonder why they haven’t gone after any banks, unless they have and it just didn’t reach the news.
|
I recall learning about some major hacks where the hacker group spent months working on it. No idea how many people may have been involved in each hack or how much total time is put into it, but they do often walk away with millions. My guess is that many of these cases may also involve insiders as well. If a hacker group is going to get millions I imagine they might bribe insiders with huge payments for help gaining some kind of access & pulling off the hacks. Some of those "accidental" clicks on phishing links may not be so accidental.
Quote:
Originally Posted by AGDee
(Post 2508026)
They go after the banks in different ways. Distributed Denial of Service attacks were rampant in 2019 and 2020, trying to disrupt online banking. A banking security officer was saying that the chief information security offers from the banks/financial industry have a call every morning to discuss attacks they are seeing. They collaborate really well and warn each other so they can better defend it. It's constant though. Job security for people in cyber security- no shortage of work for us, truly.
|
Way back in the day, approx 2005ish, there was a Wired Magazine article about the larger botnets at the time. They were being used I think against online casinos & banks. The victims were just paying up because the ransome was less money than what the online casinos were losing each day while being offline. I couldn't find that specific article but if anyone is interested just Google "site:wired.com ddos botnet" and a bunch of related articles will be in the search results.