Unveiling the Ransomware Ecosystem with Tammy Harper
In this compelling episode, Jim is joined by Tammy Harper from Flair.io to re-air one of their most popular and insightful episodes. Dive into the intricate world of ransomware as Tammy, a seasoned threat intelligence researcher, provides an in-depth introduction to the ransomware ecosystem. Explore the basics and nuances of ransomware, from its origins to its modern-day complexities. Tammy discusses not only the operational structures and notable ransomware groups like Conti, LockBit, and Scattered Spider, but also the impact and evolution of ransomware as a service. She also elaborates on ransomware negotiation tactics and how initial access brokers operate. This episode is packed with invaluable information for anyone looking to understand the cybercrime underground economy. Don’t forget to leave your questions in the comments, and they might be addressed in future episodes!
00:00 Introduction and Episode Re-Run Announcement
00:29 Guest Introduction: Tammy Harper from Flair io
00:41 Exploring the Dark Web and Ransomware
02:21 Tammy Harper’s Background and Expertise
03:40 Understanding the Ransomware Ecosystem
04:02 Ransomware Business Models and Initial Access Brokers
07:08 Double and Triple Extortion Tactics
11:23 History of Ransomware: From AIDS Trojan to WannaCry
13:02 The Rise of Ransomware as a Service (RaaS)
19:41 Conti: The Ransomware Giant
26:17 Conti’s Tools of the Trade: EMOTET, ICEDID, and TrickBot
32:05 The Conti Leaks and Their Impact
34:04 LockBit and the Ransomware Cartel
37:07 National Hazard Agency: A Subgroup of LockBit
38:17 Release of Volume Two and Its Impact
39:08 Details of the Training Manual
40:52 Ransomware Negotiations
41:28 Ransom Chat Project
42:27 Conti vs. LockBit Negotiation Tactics
43:30 Professionalism in Ransomware Operations
47:07 Ransomware Chat Simulation
48:03 Ransom Look Project
49:11 Current Ransomware Landscape
50:32 Infiltration and Research Methods
51:47 Profiles of Emerging Ransomware Groups
01:05:21 Initial Access Market
01:10:26 Future of Ransomware and Law Enforcement Efforts
01:13:14 Conclusion and Final Thoughts
Read the original article: