Speaker:
00:00:10
...
Rinat: Hi everyone.
2
:
00:00:11
Welcome to Tech Talk, a podcast where
Amit and I talk about all things tech.
3
:
00:00:17
We don't just talk about tech.
4
:
00:00:18
We talk about how the tech impacts
our lives and the society overall.
5
:
00:00:24
Today we want to talk about ransomware.
6
:
00:00:27
We've talked about deep fakes before,
today would be a complimentary
7
:
00:00:32
episode to talk about ransomware
and how it affects everyone.
8
:
00:00:36
And how we should be careful and vigilant
to protect ourselves on the internet.
9
:
00:00:44
Looking forward to learn as
well as talk about ransomware.
10
:
00:00:48
Please start us off
with what is ransomware.
11
:
00:00:51
Amit: Hey, . Thanks.
12
:
00:00:52
Thanks a lot for the
introduction . Ransomware I felt
13
:
00:00:54
was quite an important topic.
14
:
00:00:56
We have read about it in the news.
15
:
00:00:58
We heard about NHS under a ransomware
attack because they were using, old
16
:
00:01:02
Windows XP machines and they had a attack.
17
:
00:01:05
I don't know what happened.
18
:
00:01:07
Did they actually pay the money or not.
19
:
00:01:09
But essentially that's what triggered
this idea that we have talked about
20
:
00:01:14
a lot of things, but there are some
tech or there are some things which
21
:
00:01:18
have a very dangerous consequence
and ransomware is one of them.
22
:
00:01:22
And in essence, ransomware comes
from the word ransom and ransomware
23
:
00:01:28
essentially means that you need to pay
money, in lieu of the information on
24
:
00:01:32
your machine, it could be a laptop,
it could be a computer, it could be a
25
:
00:01:38
mobile device, it could be anything.
26
:
00:01:40
And essentially what happens in ransomware
attack is your phone or your laptop or
27
:
00:01:46
your computer gets locked and you're
not able to access any of your files.
28
:
00:01:50
And in order for you to get
access, you have to pay a ransom.
29
:
00:01:54
Instead of something happening in
the real world, it still happens
30
:
00:01:57
in the real world, but it is got to
do with the data on your machine.
31
:
00:02:01
Rinat: That is actually really interesting
and thank you for that example as well.
32
:
00:02:05
There are many ways of being scammed and
threatened and bullied on the Internet.
33
:
00:02:10
And all the things that we've
been facing in the last century,
34
:
00:02:13
physically in the real world now
has found its digital version on
35
:
00:02:18
the internet and it is inevitable.
36
:
00:02:20
There will always be people who would try
to take advantage of new technologies
37
:
00:02:26
. so in this scenario, the data that you
own, or that is important to for you to
38
:
00:02:31
have access to, you get locked out of it.
39
:
00:02:34
So it gets kidnapped away.
40
:
00:02:36
And the only way you can regain access
to that data or platform is by paying the
41
:
00:02:45
malicious person who locked you out of it.
42
:
00:02:47
I didn't actually even know about
the incident at NHS, but this
43
:
00:02:52
reminds me of, for those of you who
has seen Grey's Anatomy, there was
44
:
00:02:57
an episode where this exact thing
happens that the whole computing
45
:
00:03:01
systems in that hospital all the.
46
:
00:03:04
Doctors and hospital personnel gets
locked out of, and then they demand a
47
:
00:03:09
huge sum of money to get that released.
48
:
00:03:13
it's very interesting and it is
happening in real world as well
49
:
00:03:16
as we are seeing it in the media.
50
:
00:03:18
Amit: Yeah, the interesting part of
ransomware is that it's not there are
51
:
00:03:22
attackers who are trying to target you
specifically but there are there are so
52
:
00:03:26
many people connected to the internet.
53
:
00:03:28
So there is not a group of people
who are sitting there and looking
54
:
00:03:32
at, Oh, this person is vulnerable.
55
:
00:03:34
Let's target them.
56
:
00:03:35
No.
57
:
00:03:36
They send out a piece of software
and they package it in a way that
58
:
00:03:40
you can accidentally download it
or install it on your machine.
59
:
00:03:44
Now the ways to do that
is by a phishing email.
60
:
00:03:48
A phishing email is an attack where
you're trying to impersonate someone.
61
:
00:03:51
So say, Rinat sends me an email, and
it's actually not from Rinat, it's
62
:
00:03:56
from someone else, but they make it
look like it's coming from Rinat.
63
:
00:04:00
Or you can say Google.
64
:
00:04:01
So you get the Google logo, you
type all the words that are normally
65
:
00:04:07
are there in a Google email.
66
:
00:04:09
And then you say, Oh, you have forgotten
your password or your something is
67
:
00:04:14
expiring and you have to pay some
money to get access or download
68
:
00:04:18
this file or click on this link.
69
:
00:04:20
Et cetera, et cetera.
70
:
00:04:22
So this is a phishing email and when
you do something like click a link in
71
:
00:04:26
the email or download an attachment on
that email or go to a website where if
72
:
00:04:32
you go and you enter some information.
73
:
00:04:35
Your information gets leaked
and that's how the ransomware
74
:
00:04:39
gets installed on your machine.
75
:
00:04:41
Now, there are different things.
76
:
00:04:42
We are talking about ransomware.
77
:
00:04:44
We are not talking about viruses.
78
:
00:04:45
We are not talking about other
malicious files because these can
79
:
00:04:49
damage the data, but , it will
not prevent you from accessing it.
80
:
00:04:53
Ransomware prevents everything.
81
:
00:04:55
You, you can't use your keyboard.
82
:
00:04:58
You can't use your mouse.
83
:
00:04:59
You can see that there is a screen a
banner that appears on your computer.
84
:
00:05:04
And then it says in order for you
to view the data, pay this much
85
:
00:05:08
money, normally in cryptocurrency.
86
:
00:05:10
So you pay in Bitcoin because
then the transaction is anonymous.
87
:
00:05:13
So you can't actually figure
out who the money has gone to.
88
:
00:05:17
You just know to this wallet, you have
to transfer the Bitcoin, but that wallet
89
:
00:05:22
could be of a person, a company, a group.
90
:
00:05:25
We don't know.
91
:
00:05:25
And that's how you go for the attack.
92
:
00:05:28
So you have a phishing email.
93
:
00:05:29
The second way is an exploit.
94
:
00:05:31
It's always recommended that we
update our software regularly.
95
:
00:05:34
Now, why?
96
:
00:05:35
Because sometimes there is a
vulnerability in the software
97
:
00:05:38
that gets patched with an update.
98
:
00:05:40
Patching means you fix the problem.
99
:
00:05:41
The problem in your operating system or
the software that you're trying to use.
100
:
00:05:46
In case anyone tries to take advantage
of that vulnerability in the non
101
:
00:05:52
upgraded version of the software
or the operating system, then
102
:
00:05:55
that means you can get exploited.
103
:
00:05:57
So the same thing happened with NHS.
104
:
00:05:59
Windows 10 was out.
105
:
00:06:00
They were still using Windows XP.
106
:
00:06:03
Microsoft has dropped support
for Windows XP a long time back.
107
:
00:06:07
They don't release any security
patches, so if there is a vulnerability
108
:
00:06:12
in XP, someone can exploit that
vulnerability and get access to all
109
:
00:06:16
the information on the computer.
110
:
00:06:18
Now, that was exploited to get
access and lock all the files.
111
:
00:06:24
I don't know if they paid the money,
but this is a type of extortion.
112
:
00:06:29
So you have to be very careful of what
you're trying to click, where you're
113
:
00:06:33
going on the web on the internet.
114
:
00:06:36
And what are you clicking?
115
:
00:06:38
Are you downloading a safe file?
116
:
00:06:40
Because anything can happen.
117
:
00:06:41
It can download a virus on your machine
or it can lock your machine completely.
118
:
00:06:48
Rinat: I hadn't actually thought about
all the different types of malicious
119
:
00:06:52
emails or malicious approaches that
you could, we are facing it all every
120
:
00:06:56
day, but I didn't really think about
the categorization the way you just put
121
:
00:07:00
it . Some of them are trying to harm
your data or corrupt it but ransomware
122
:
00:07:06
is different in a way that it will keep
the data, but it will lock you out of it.
123
:
00:07:10
So you can't use anything.
124
:
00:07:13
And I imagine that even if you reset
your computer or turn it on and
125
:
00:07:17
off, none of these will help at all.
126
:
00:07:19
Just to be clear about
the severity of this kind
127
:
00:07:24
of attack.
128
:
00:07:25
So in our past episodes, we've
talked about various ways, how you
129
:
00:07:30
should be careful on the internet.
130
:
00:07:32
We've talked about deep fake, we talked
about scamming and phishing earlier
131
:
00:07:37
as well on, on dedicated episodes.
132
:
00:07:39
So let's just put ransomware in its place
among all of these different things.
133
:
00:07:45
Ransomware is a piece of
software, which you don't want
134
:
00:07:50
it in your Computing IT systems.
135
:
00:07:53
Just like virus, you don't want a
virus to be , in your IT system.
136
:
00:07:59
And the way ransomware would try and
get access to your IT system is similar.
137
:
00:08:06
A lot of the times it is social
engineering, trying to find a
138
:
00:08:10
way that you unintentionally
have it downloaded or installed.
139
:
00:08:15
It's very rare that they can actually,
hack into a secure system unless you
140
:
00:08:21
provided a way for them to do that.
141
:
00:08:24
So this is why it's so important to be
aware of all the different ways they are
142
:
00:08:29
trying to get access to your IT system.
143
:
00:08:32
And now once they get access, there
are , different kind of things that
144
:
00:08:37
this malicious group would want to do.
145
:
00:08:39
One is to trick you to send money
over to them, which is a scam and
146
:
00:08:45
phishing as we talked about earlier.
147
:
00:08:48
Maybe say that, there was a
unauthorized purchase with your
148
:
00:08:52
PayPal account and you've got to send
money to this account and whatever.
149
:
00:08:55
So that's scamming and
phishing, et cetera.
150
:
00:08:58
And then there are ways like viruses,
which will actually harm or corrupt
151
:
00:09:04
your data or your IT system, which
is another thing that they will
152
:
00:09:09
threat you in terms of ransomware.
153
:
00:09:11
But yeah, we have access and we will
delete it or, completely destroy
154
:
00:09:16
your data if you don't pay up.
155
:
00:09:19
So that's all of these things
are one way or another related.
156
:
00:09:23
The way ransomware would try
and get access to you to your I.
157
:
00:09:26
T.
158
:
00:09:27
System is the same as,
phishing or scam or whatever.
159
:
00:09:30
How a virus gets access.
160
:
00:09:32
So that's the part we need to
be really careful and vigilant.
161
:
00:09:38
And in order to protect yourself,
your assets and your data, which
162
:
00:09:43
are all very valuable nowadays.
163
:
00:09:45
even if you are a non techie
person, you should have this kind
164
:
00:09:49
of understanding just so you can
protect your assets and property.
165
:
00:09:53
And, data is a valuable property nowadays
anyway as well as your actual physical
166
:
00:10:00
asset like bank account and money and
all the other finance and everything.
167
:
00:10:04
Everything is online now.
168
:
00:10:05
So it's very important even for non
techie folks out there, especially
169
:
00:10:10
a majority of our listeners to be
Aware of all the things that can
170
:
00:10:17
happen and how to protect yourself
171
:
00:10:19
from it,
172
:
00:10:20
Amit: When we talk about ransomware we
think, okay, why am I getting targeted?
173
:
00:10:25
But as I mentioned earlier,
you are not getting targeted.
174
:
00:10:28
You just got scammed or you clicked
on some link or you downloaded
175
:
00:10:32
an attachment or you went to
a website that was malicious.
176
:
00:10:36
And the moment you went, you
opened something and it downloaded
177
:
00:10:40
something on your computer.
178
:
00:10:41
So that's how it happens.
179
:
00:10:42
So you're not targeted.
180
:
00:10:43
You just fell a victim.
181
:
00:10:44
Let's look at what actually
happens in a ransomware thing.
182
:
00:10:48
So something gets delivered
onto your machine.
183
:
00:10:50
And So you download it, you
install, it, gets installed
184
:
00:10:54
automatically, et cetera, et cetera.
185
:
00:10:55
So something gets installed
on your machine.
186
:
00:10:59
Once it gets installed, it
starts doing various things.
187
:
00:11:02
So how does the ransomware lock you out?
188
:
00:11:04
One way is it encrypts all the files
on your machine, and encryption
189
:
00:11:09
means that you're putting it an
in an envelope and you're locking
190
:
00:11:13
it with a code or with a key.
191
:
00:11:15
And if you don't have the key,
you cannot open the envelope.
192
:
00:11:19
And that is in a sense, encryption.
193
:
00:11:22
And it basically means
your files are there.
194
:
00:11:24
You can see it, but you can't open it.
195
:
00:11:26
So that's one way in, in which ransomware,
blocks you access to your files.
196
:
00:11:31
The other way is putting a lock screen.
197
:
00:11:33
It locks you out of the system.
198
:
00:11:35
So whenever you start a machine, it
asks you for your username and password.
199
:
00:11:40
Same thing with your smart devices.
200
:
00:11:42
So it asks for a
fingerprint or a pin code.
201
:
00:11:45
That locks you out.
202
:
00:11:46
So you even cannot get in.
203
:
00:11:49
So forget about seeing the file.
204
:
00:11:51
You can't even get in to see the file.
205
:
00:11:54
Okay, so that's one way.
206
:
00:11:56
The other way is, it
doesn't allow you to boot.
207
:
00:12:00
So when you switch on the power button, It
doesn't load the operating system because
208
:
00:12:04
that's the first thing that happens.
209
:
00:12:05
The BIOS starts and it looks at the
master boot record and it looks where
210
:
00:12:10
the operating system is installed.
211
:
00:12:11
We've spoken about BIOS as well.
212
:
00:12:13
So it does all the check and then it tries
to load or start the operating system.
213
:
00:12:18
And in some ransomwares,
it prevents this as well.
214
:
00:12:21
So you can't even now start your machine.
215
:
00:12:24
You can switch it on, but nothing
will load and it'll just show
216
:
00:12:27
a screen pay this much money.
217
:
00:12:29
Okay.
218
:
00:12:29
Now there are different
techniques as well.
219
:
00:12:32
So in, in one technique, you pay the
money and you get a key like a code.
220
:
00:12:37
And you type in the code and
then it unlocks everything.
221
:
00:12:41
It decrypts all the files.
222
:
00:12:42
It unlocks your system.
223
:
00:12:44
It lets you start your operating system.
224
:
00:12:47
So that's one way.
225
:
00:12:48
The other way is it will prevent
access by showing you a countdown.
226
:
00:12:52
So it's 10 days.
227
:
00:12:53
If you don't pay the money in 10
days time, all the data on your
228
:
00:12:56
computer will be lost forever.
229
:
00:12:59
So these are different
types of ransomware attacks.
230
:
00:13:02
And we have to be very cautious and
aware that this can happen to us.
231
:
00:13:06
Okay.
232
:
00:13:07
Normally the things that we read in
the media are about big companies.
233
:
00:13:12
So a lot of big companies, they get
ransomware attacks and then they
234
:
00:13:17
have to pay money because they have
confidential information which they
235
:
00:13:20
don't want to leak because the other
part of ransomware is that they will
236
:
00:13:24
encrypt your file, they'll download
all the file to their machine and then
237
:
00:13:28
they will say, we will expose all your
secrets if you don't pay us the money.
238
:
00:13:33
So this is a kind of extortion and
this is what a ransomware is all about.
239
:
00:13:38
It's trying to extort money from you.
240
:
00:13:40
It could be 0.
241
:
00:13:42
015 Bitcoin BTC.
242
:
00:13:44
That's it.
243
:
00:13:44
But it's enough to it's enough for a
lot of people because they have millions
244
:
00:13:49
of computers running these ransomwares.
245
:
00:13:52
So yeah
246
:
00:13:53
Rinat: They could be , doing
this to so many people.
247
:
00:13:56
So even a small amount although not small
amount for the victim, 1, 000 or pounds,
248
:
00:14:02
and if they found a hundred victims,
that's a hundred thousand dollars or
249
:
00:14:07
pounds, whatever it's quite a huge sum.
250
:
00:14:10
And.
251
:
00:14:11
Again this is what really boggles
me that, to, if you agree to pay
252
:
00:14:15
the ransom, there is no guarantee
253
:
00:14:18
ever that they will give you
the decryption key, or they will
254
:
00:14:24
not delete your files anyway.
255
:
00:14:26
Or even, a likely scenario is that
they've just managed to block you out.
256
:
00:14:32
They haven't even got the
257
:
00:14:35
power to give you access
258
:
00:14:37
back.
259
:
00:14:38
They just need to
convince you to send money.
260
:
00:14:40
And after that, they don't have
any care in the world to whether
261
:
00:14:44
or not you get access to that
data, however important it is.
262
:
00:14:48
The people who can lock out
hospitals or NHS out of patient data.
263
:
00:14:54
And there might be critical patients
who might need that information, a
264
:
00:14:58
surgeon might need to operate in minutes.
265
:
00:15:01
And if they're okay to do that, then they
don't care about, whether the doctors
266
:
00:15:06
get those information ever, . We're
not professional, disaster advisors.
267
:
00:15:11
So , none of those are
advice in a professional way.
268
:
00:15:14
But what I would do is that it's never
worth uh, paying the ransom, because
269
:
00:15:20
first of all, there is no guarantee you'll
get whatever it was taken from you data,
270
:
00:15:25
whether it's locked out of your computer,
whether it's the hardware, if it's an
271
:
00:15:29
expensive gaming laptop or whatever you're
worried about, whether you're going to
272
:
00:15:34
get that back, or whether you're going
to get the data back, or whether or not
273
:
00:15:38
they're going to expose your secrets.
274
:
00:15:40
There is no guarantee of any of that going
your way, especially once you've paid,
275
:
00:15:44
they don't have a lot of information on
you, but they do know this for sure that
276
:
00:15:48
you are the kind of person who will pay.
277
:
00:15:51
So you're like the prime target
to extort you even further because
278
:
00:15:57
you've already taken their bait.
279
:
00:15:59
So I would never actually pay the ransom
because there is absolutely nothing
280
:
00:16:03
that to be gained from this scenario.
281
:
00:16:06
And actually this is from
personal experience as well.
282
:
00:16:10
When I was a, teenager, when the
internet was first about, I've
283
:
00:16:14
had accounts open with very easy
passwords all numbers, et cetera.
284
:
00:16:20
And that somehow did get leaked.
285
:
00:16:21
And have I been pwned, has
those passwords and I can see.
286
:
00:16:25
And then once I received these
Emails after every few months, I've
287
:
00:16:29
been receiving these emails, which
actually have my, that password.
288
:
00:16:33
It's all digits, like very easy, I
didn't use that in 15, 20 years now,
289
:
00:16:38
but I did have that as one of my very
first password when I was teenager
290
:
00:16:43
and internet was new back then.
291
:
00:16:45
So I see that password in the subject
line, all exposed and that kind of does,
292
:
00:16:51
make you skip your heartbeat a little bit.
293
:
00:16:54
And then in the message email message
body, it says that, , we have all
294
:
00:16:59
of your secrets and apparently we
have some of your videos , , because
295
:
00:17:03
I know that, no such thing exists.
296
:
00:17:06
That's why I could be confident because
at the time when I got those emails,
297
:
00:17:10
I was still a teenager even then.
298
:
00:17:12
So I would have been quite
scared if I, because I know that
299
:
00:17:17
no such thing exists anyway.
300
:
00:17:19
So it wasn't possible.
301
:
00:17:20
It didn't really apply to me.
302
:
00:17:23
And even nowadays, and sometimes
I get like transfer this amount of
303
:
00:17:27
Bitcoin to this address, and then
we won't share your secret videos
304
:
00:17:32
or whatever to be honest, even if I
did have any secret videos, share it
305
:
00:17:36
all you want, I don't really care.
306
:
00:17:38
But again this is really, I can see why.
307
:
00:17:42
Anyone, any regular person would be
really scared and they would do anything.
308
:
00:17:49
They could have like really secret
things that they don't want to
309
:
00:17:54
be exposed in any way, and they
actually don't have anything.
310
:
00:17:58
These emails that I've received.
311
:
00:18:00
Then I know that there is nothing.
312
:
00:18:01
So these emails are a lot of the times
they just have that old password which
313
:
00:18:05
has been leaked years ago and they're
just hanging on to that to make you
314
:
00:18:11
believe that there is something and
they're taking a chance and they're
315
:
00:18:14
sending these emails to a million
people and Out of those million people,
316
:
00:18:18
that password is actually correct.
317
:
00:18:19
So if you see your old password
and exposed in an email subject
318
:
00:18:24
line and then say something like
that, you are bound to be scared.
319
:
00:18:29
So this is why I would advise not
ever to give anything because they
320
:
00:18:33
don't probably have anything anyway.
321
:
00:18:35
And even if they do, there is no guarantee
that they won't share it anyway, right?
322
:
00:18:39
They're they are malicious people.
323
:
00:18:41
So they'll probably enjoy doing that
regardless and then the third thing
324
:
00:18:45
what I would say Which is an actual
preventative measure, for an individual
325
:
00:18:49
for a company They have obviously,
cybersecurity advisors, etc but for,
326
:
00:18:53
on a personal level, what I would say,
and this is something I do as well,
327
:
00:18:57
your data is important and valuable.
328
:
00:19:00
It could be like you
have a invention idea.
329
:
00:19:04
You want to patent it and
you've written it all down.
330
:
00:19:07
You've done the drawings and everything.
331
:
00:19:09
And that is in your computer.
332
:
00:19:11
And it is obviously a secret.
333
:
00:19:12
You don't want the world to know about it.
334
:
00:19:15
And there could be many other secret or
valuable assets stored in your computer.
335
:
00:19:21
And what I do is on a periodic
basis is have an offline backup.
336
:
00:19:27
It's not a cloud backup,
not an online backup.
337
:
00:19:31
It's not even attached to
electricity in any way.
338
:
00:19:35
So definitely do this . Set yourself
up every quarter of a year or every
339
:
00:19:39
six months or even yearly if you can't
be bothered with it too frequently.
340
:
00:19:44
But I would say every quarter
or six months is a good time.
341
:
00:19:49
You basically take all of your data
by a really big storage external
342
:
00:19:54
drive, take all of your data, copy
everything and have that external drive
343
:
00:20:00
disconnected from power and separate.
344
:
00:20:03
obviously they can say, still
be extortionate by, saying
345
:
00:20:07
that we'll share your data.
346
:
00:20:08
That's one way that
will still remain open.
347
:
00:20:11
But the other way is that, okay, you're
locked out and you can never get access
348
:
00:20:14
to your data or your, precious memories,
maybe your loved one has passed away and
349
:
00:20:20
you have their photos and videos , and
you can never have access to those.
350
:
00:20:24
So you will never be in that situation.
351
:
00:20:25
If you regularly back
your, all of your data out.
352
:
00:20:28
And I've spent a significant amount
of time in my life, sorting out all my
353
:
00:20:34
data from past, like from the beginning
of digital age and before that, which
354
:
00:20:39
I've scanned . And it is worth it.
355
:
00:20:41
I would still say that I still have that
peace of mind that everything I have.
356
:
00:20:45
From photos, videos, everything is
organized, documents and everything
357
:
00:20:49
is organized and easily backupable.
358
:
00:20:52
I've done that and I would
recommend anyone to do that.
359
:
00:20:54
So that's one area of, holding you
hostage is completely eliminated.
360
:
00:21:00
But then again, obviously you
still have that secret being shared
361
:
00:21:04
problem, which, if you have any idea,
please share with the rest of us.
362
:
00:21:10
Amit: Yeah.
363
:
00:21:10
So you've touched a good points and
I didn't know about your personal
364
:
00:21:14
experience, but , yes we did interview
Troy Hunt, who's the founder, who's the
365
:
00:21:18
creator of have I been pwned website.
366
:
00:21:20
And I, even my data has been
leaked and I have seen some of my
367
:
00:21:24
passwords online published as well.
368
:
00:21:27
The passwords are not
connected to you directly.
369
:
00:21:29
The passwords are just leaked.
370
:
00:21:30
It's like a password file, which has
a lot of passwords and you can maybe
371
:
00:21:34
connect to it because it's your password.
372
:
00:21:37
But if it's a very simple password Amit123
there could be millions of people with.
373
:
00:21:42
And they would have typed one, two, three.
374
:
00:21:44
So it's not related to you.
375
:
00:21:45
It could be millions of people.
376
:
00:21:47
And as you mentioned that the email,
the phishing emails or scam emails
377
:
00:21:51
are sent out to millions of people.
378
:
00:21:52
And even if one person clicks
that's money for them, right?
379
:
00:21:56
And with so much advancements, now it's
very easy to fool people because there
380
:
00:22:00
is so much technology around us and we
don't know how the technology works.
381
:
00:22:04
And That is one of the biggest
reason we are doing this podcast.
382
:
00:22:07
We want to educate people because there
are so many things about technology
383
:
00:22:11
that people don't understand.
384
:
00:22:12
You mentioned about backups.
385
:
00:22:14
You always need to have three backups.
386
:
00:22:16
One is local backup, one is a
cloud backup, and one is offline
387
:
00:22:19
backup, which is not local.
388
:
00:22:21
So local backup is anything on your
machine that you That you can access
389
:
00:22:24
easily cloud backup is anything on the
cloud and offline backup is an offline
390
:
00:22:28
backup, which is not connected, which is
air gapped, which is, which means there is
391
:
00:22:33
no internet connectivity and it is not in
your location because if your house burns
392
:
00:22:38
down tomorrow or if there is a burglary,
you lose that data because a lot of times
393
:
00:22:42
people steal the electronic equipments.
394
:
00:22:46
So if that is exposed somewhere,
or if it's not in a locker, then
395
:
00:22:49
of course you lose that data.
396
:
00:22:50
Of course, you need to
have a password manager.
397
:
00:22:53
So I have a password manager.
398
:
00:22:54
It's offline password manager.
399
:
00:22:56
But I store it on the cloud.
400
:
00:22:57
So whatever is getting stored is
actually password protected.
401
:
00:23:00
So even if it's on a Google
server, it is encrypted.
402
:
00:23:04
So it's not stored on the Google
server as a clear text file.
403
:
00:23:08
It's not like someone will click the
file and they will be able to read it.
404
:
00:23:11
No, you need a master password.
405
:
00:23:13
So that's how I secure myself.
406
:
00:23:16
You touched some of the
important techniques like, okay,
407
:
00:23:19
be aware, be this, be that.
408
:
00:23:21
And as individuals people
are getting more aware about
409
:
00:23:24
technology but it's the enterprise.
410
:
00:23:26
The challenges are that even with a
robust IT system and antivirus and many
411
:
00:23:31
other ransomware or virus mitigation
strategies, people still get fooled.
412
:
00:23:35
And as you mentioned previously,
that people are the last
413
:
00:23:38
defense against security and
if they fall, everything falls.
414
:
00:23:42
So that's why Most of the attacks
are focused on people rather than
415
:
00:23:46
on the actual software because it's
easy to fool people than software.
416
:
00:23:51
And one of the ways we can prevent all
these things is by educating ourselves by
417
:
00:23:57
making sure that we are clicking the right
link by verifying the source of the email,
418
:
00:24:03
by looking at whether the website is
HTTP secure or not et cetera, et cetera.
419
:
00:24:08
So there are various ways you,
which with, which you can stay safe.
420
:
00:24:12
Now, coming back to ransomware,
there is a very interesting concept
421
:
00:24:16
about, Why does ransomware goes
undetected by the antivirus?
422
:
00:24:21
Nowadays, if you have Windows
10 or Windows 11, it gets
423
:
00:24:24
updated very frequently.
424
:
00:24:25
Most of the browsers like Google Chrome,
Firefox, they get updated very frequently.
425
:
00:24:29
You get an alert asking you
to upgrade your machine.
426
:
00:24:34
A windows also gives you an alert
asking you to restart your machine
427
:
00:24:38
and get the update installed.
428
:
00:24:40
If you have not done it in a
while it automatically restarts
429
:
00:24:42
after five or six days.
430
:
00:24:44
So there are different strategies with
the companies are taking because there
431
:
00:24:47
are people who don't take these measures.
432
:
00:24:50
Now even after all these things,
ransomware uh, goes undetected and
433
:
00:24:55
what are the different techniques?
434
:
00:24:56
So one of the simple techniques
is that whenever you Create
435
:
00:25:00
a file on your computer.
436
:
00:25:02
It's written on the hard disk.
437
:
00:25:03
But there is RAM, which is random access
memory and it gets cleared all the time.
438
:
00:25:09
So what if the ransomware
stays on the memory.
439
:
00:25:13
It's never actually
written on the hard disk.
440
:
00:25:15
So an antivirus that is scanning
the drive C drive or a D drive,
441
:
00:25:20
it'll never detect the ransomware.
442
:
00:25:22
So it downloads, starts installing
stuff, locks your system down.
443
:
00:25:26
The memory what happens is the computer
takes the file from your hard disk.
444
:
00:25:31
It loads it into memory and runs it.
445
:
00:25:33
The RAM is quite fast, so if something
is loaded on the memory, then it
446
:
00:25:38
means that it can go undetected.
447
:
00:25:40
I'm not sure about the latest anti
virus techniques, where are they
448
:
00:25:43
scanning memory, but I'm guessing
that some of them are scanning.
449
:
00:25:47
So this is just one of the techniques.
450
:
00:25:48
The other technique is you go
fileless you don't have any files.
451
:
00:25:52
You try to be in a way that
there are no files created That's
452
:
00:25:57
how you evade the Antivirus.
453
:
00:26:00
The other way is that you Once you get
installed on one machine and then you try
454
:
00:26:05
to go get installed on another machine,
you don't have the same signature.
455
:
00:26:09
Rinat: Sorry.
456
:
00:26:10
Amit: you have the file list,
which is stored in the memory.
457
:
00:26:13
And then you have a code that changes
from one machine to another machine.
458
:
00:26:19
So suppose the antivirus detects
ransomware, malicious content.
459
:
00:26:23
And it stores it in its database and
then it tells now because it's in
460
:
00:26:28
its database, it updates everywhere,
every copy of it, wherever it is
461
:
00:26:32
installed, that this is the signature.
462
:
00:26:34
But the problem is that
ransomware changes.
463
:
00:26:37
So every time it changes
itself, it modifies itself.
464
:
00:26:41
So it goes undetected.
465
:
00:26:42
So that's called polymorphism.
466
:
00:26:44
And we have seen it in a lot of
movies, in lot of hacker movies where
467
:
00:26:47
they try to detect or stop the the
ransomware or some malicious content
468
:
00:26:52
from triggering a nuclear attack.
469
:
00:26:54
Because it's polymorphic code
because it's changing constantly.
470
:
00:26:57
The other is that it uses very difficult
or very sophisticated encryption
471
:
00:27:02
techniques, which even the antivirus
can't detect because it's not up to date.
472
:
00:27:07
So there are these things,
then the signature.
473
:
00:27:10
it manipulates the signature.
474
:
00:27:12
So suppose you are a good
software and you have a signature.
475
:
00:27:16
Now antivirus looks for
signatures of those files.
476
:
00:27:20
If it has a good signature, of course
it'll say, okay, it's a safe file.
477
:
00:27:24
What if you can get the good
signature on your ransomware
478
:
00:27:27
file or a malicious content?
479
:
00:27:28
So you can fake a signature and then
480
:
00:27:31
Rinat: Foraging.
481
:
00:27:31
Yeah.
482
:
00:27:32
Amit: so that way you can
evade the antivirus, the
483
:
00:27:34
antivirus say, Oh, this is fine.
484
:
00:27:35
I don't have to worry about it.
485
:
00:27:37
Other is obfuscation.
486
:
00:27:39
you look like a normal file,
but you're actually not.
487
:
00:27:44
So the moment you click on the
directory, it's actually an executable.
488
:
00:27:48
And this has happened
with a lot of viruses.
489
:
00:27:50
They look like a directory,
but they're actually a file.
490
:
00:27:54
So you think it's a folder, you double
click and you'll see some files, but
491
:
00:27:57
no, you've already started the antivirus
and the ransomware has attacked.
492
:
00:28:02
so these are some of the techniques
in which ransomware evades the anti
493
:
00:28:06
virus or anti ransomware softwares.
494
:
00:28:08
So now there are product categories
which are sold as anti ransomware
495
:
00:28:13
or anti malware things like that.
496
:
00:28:15
So yeah, so these are different techniques
in which The ransomware evades antivirus.
497
:
00:28:22
Rinat: Wow.
498
:
00:28:23
I've learned a lot, be a lot of
these things you just mentioned.
499
:
00:28:26
I didn't even know at all.
500
:
00:28:27
And some of those I understand like
polymorphism or some of the other
501
:
00:28:32
techniques, but one of the things
that really boggled my mind was going
502
:
00:28:36
file less to be able to do anything,
you need to, put something in the
503
:
00:28:40
computer and if you're file less, how
504
:
00:28:42
would you do that?
505
:
00:28:44
don't
506
:
00:28:44
Amit: is the thing.
507
:
00:28:45
The file is stored on your
computer on a hard disk, but it's
508
:
00:28:48
not executed from the hard disk.
509
:
00:28:49
It's executed from the memory.
510
:
00:28:51
And when it's written into the
memory, it can also be erased.
511
:
00:28:54
Memories are flashable.
512
:
00:28:56
So it means you can write on
it multiple times and you can
513
:
00:28:59
write multiple information.
514
:
00:29:01
So something that's loaded in the
memory doesn't stay in the memory.
515
:
00:29:04
So when you shut down your computer
and when you switch it on, you have
516
:
00:29:06
to open the apps all over again.
517
:
00:29:08
Windows has become better.
518
:
00:29:10
So it,
519
:
00:29:11
keeps the state.
520
:
00:29:12
And it shuts down.
521
:
00:29:13
So it keeps the state of the memory
and the apps are still there.
522
:
00:29:16
So now instead, so think like this,
instead of writing it to the hard disk,
523
:
00:29:20
what if you download a file, it doesn't
get downloaded onto your hard disk.
524
:
00:29:25
It gets downloaded onto your memory.
525
:
00:29:26
It's written there.
526
:
00:29:28
But it's not stored anywhere.
527
:
00:29:29
So that's how it's fileless.
528
:
00:29:31
So it's written on the memory.
529
:
00:29:33
It's not stored on the hard disk.
530
:
00:29:35
So it means the moment you turn it
off, the information is gone, right?
531
:
00:29:40
But if you don't turn it off and
your computer is on for a long period
532
:
00:29:44
of time and accidentally you do
something that triggers it, then it
533
:
00:29:50
gets installed and you are blocked.
534
:
00:29:53
And that's the evasion technique.
535
:
00:29:55
So antivirus can't detect it.
536
:
00:29:57
But a lot of new antivirus
537
:
00:29:58
Rinat: Yeah.
538
:
00:29:59
Amit: they are doing in
memory profiling as well now
539
:
00:30:02
Rinat: Okay.
540
:
00:30:03
So many innovative ways.
541
:
00:30:05
I do wonder if these guys put their
brilliance onto something good, a lot
542
:
00:30:12
of good things probably would have
happened, to come up with all of these,
543
:
00:30:16
new innovative ways to hack into someone
else's computer for malicious purposes.
544
:
00:30:21
Of course, to come up with these kind of
things and that works, that means you're
545
:
00:30:26
obviously very skilled and talented within
the IT arena and you could easily have
546
:
00:30:37
a, honest way to live a really good life.
547
:
00:30:41
And to be honest, the way obviously
as we mentioned earlier today, that,
548
:
00:30:46
yeah, if you scam a lot of people,
you end up, making a lot of money.
549
:
00:30:51
But, the amount of effort
they have to put in.
550
:
00:30:55
And, if you distribute all of your
returns, over that period of years.
551
:
00:31:00
And, actually how many people
are, taking the bait, etc.
552
:
00:31:04
It's, it feels like it's really going
to be difficult to make as much.
553
:
00:31:11
If you're that talented and skillful,
then you should probably be able
554
:
00:31:16
to make more and with less risk of
going to jail or being punished and
555
:
00:31:23
also making money ethically with
more peace of mind than doing this.
556
:
00:31:28
It's just really
557
:
00:31:30
Amit: think Rinat, you're missing the
point because we have very strict laws.
558
:
00:31:33
We know that people get imprisoned
if they kill someone or they
559
:
00:31:36
steal something from someone.
560
:
00:31:38
Yet it happens.
561
:
00:31:40
Yet it happens, right?
562
:
00:31:42
Yeah.
563
:
00:31:42
Irrespective of what, whatever
stricter laws we have, whatever police
564
:
00:31:46
we have, these things still happen.
565
:
00:31:48
People still kill people.
566
:
00:31:50
People still steal from people.
567
:
00:31:51
They get imprisoned.
568
:
00:31:53
We read about them in the news.
569
:
00:31:55
I'm pretty sure the people
who are doing this are also
570
:
00:31:57
reading about it in the news.
571
:
00:31:58
Yet they do this because sometimes
they don't have the fear.
572
:
00:32:02
Sometimes it just gives them a kick.
573
:
00:32:04
Okay, I can do this.
574
:
00:32:05
I can boast it among my peers, right?
575
:
00:32:08
Sometimes it's a state
576
:
00:32:09
Rinat: Hmm.
577
:
00:32:10
Yes.
578
:
00:32:10
Amit: sometimes you've
created a ransomware 10 years
579
:
00:32:13
ago, but it's still active.
580
:
00:32:14
It goes undetected and
it's working, but you have
581
:
00:32:18
moved on.
582
:
00:32:19
And a lot of these people, we
say that they are brilliant.
583
:
00:32:21
They are brilliant but you and
me all can also figure these out.
584
:
00:32:25
We just don't put the time and
effort to in that direction, right?
585
:
00:32:28
So some people have a constructive
direction and some people
586
:
00:32:31
have a destructive direction.
587
:
00:32:33
And sometimes what happens is they
create something destructively and
588
:
00:32:36
because they've learned so much,
they actually work for companies such
589
:
00:32:40
as an antivirus company or an anti
malware company, et cetera, because now
590
:
00:32:45
they can use their experience for by
creating these malicious software to.
591
:
00:32:50
Tell how to build your
software to detect them.
592
:
00:32:53
So this always happens.
593
:
00:32:54
Hackers become you have the
black hat hackers, the white hat
594
:
00:32:57
Rinat: ethical hacking.
595
:
00:32:58
Yes.
596
:
00:32:59
Amit: So forth.
597
:
00:32:59
Yeah.
598
:
00:33:00
Rinat: Yeah, there is a
obviously different perspectives
599
:
00:33:03
to each of these stories.
600
:
00:33:05
As we're talking about all of
these ways that ransomware or
601
:
00:33:08
viruses can attack your computer.
602
:
00:33:11
And you might think that, okay, these
are more of a a media situation.
603
:
00:33:15
We see on, a hacker movies
that , this is happening.
604
:
00:33:18
But in real life there, where would, who
would build a software as sophisticated
605
:
00:33:24
as, that can do this and that to
that question, I would say that I've
606
:
00:33:28
actually come across a software.
607
:
00:33:31
Yeah.
608
:
00:33:31
And the name of the
software is 888RAT, R A T.
609
:
00:33:35
And that's a proper hacker software.
610
:
00:33:38
And if that gets access to your
computer, the person who put it there
611
:
00:33:44
will have access to your webcam, your
microphone, everything and every file.
612
:
00:33:49
And you wouldn't even know about it.
613
:
00:33:51
You will be using your computer as is.
614
:
00:33:53
And it's aptly named RAT
at the end with 888 RAT.
615
:
00:33:58
So these kind of software, and
I only known about this one.
616
:
00:34:01
And I've known about it, but then
I can't, I don't have the courage
617
:
00:34:07
to even go to that website.
618
:
00:34:09
Cause who knows, by, I would probably
be thinking that I'm downloading
619
:
00:34:14
that software, but I'm probably
being ratted or being scammed as I
620
:
00:34:19
try to download, a lot of the times,
scammers can be scammed anyway.
621
:
00:34:23
So even to learn about it if I
wanted to really, dissect how it
622
:
00:34:29
works and everything, I would have
to create an offline machine with
623
:
00:34:34
a different wifi network than mine.
624
:
00:34:36
And then only I could probably feel
safe to do something like that.
625
:
00:34:40
And that's a lot of effort.
626
:
00:34:42
So this is what I'm saying, like to be
able to do or to want to do something, the
627
:
00:34:47
amount of effort you have to go through
628
:
00:34:49
is, is
629
:
00:34:49
Amit: in my college, I remember
the computer science students,
630
:
00:34:52
they build the software and it's
basically, um, what do you say?
631
:
00:34:56
It's basically this
server client software.
632
:
00:34:59
So basically there is a server that
communicates with the client and the
633
:
00:35:03
client gets installed on your machine
and the client knows where to send
634
:
00:35:07
the information and it's basically a
screen sharing screen sharing software.
635
:
00:35:12
So it shares everything
that's going on your screen.
636
:
00:35:14
It shares whatever you're sending from
your computer like keyboard or mouse
637
:
00:35:18
or input devices, and again, camera.
638
:
00:35:21
So anything that's getting input
it can send it and the client sends
639
:
00:35:25
it to the server and they built a
very simple software and they said,
640
:
00:35:28
okay, this is how you install it.
641
:
00:35:30
And we have this client server.
642
:
00:35:31
Concepts.
643
:
00:35:32
So zoom has a server and then multiple
clients, and then you share your screen.
644
:
00:35:37
Now imagine if everything goes
in a malicious way where you hide
645
:
00:35:40
everything, you hide the interface,
but everything is still being shared
646
:
00:35:44
without showing you the interface
that your screen is being shared.
647
:
00:35:46
Rinat: How dangerous is that!
648
:
00:35:48
So you might be thinking that, okay,
this is really difficult to achieve
649
:
00:35:52
and whatever, but it's actually,
something that we have right now.
650
:
00:35:56
As Amit, you mentioned, you probably
have zoom or some sort of other meeting,
651
:
00:36:00
remote meeting software installed already,
is this the same kind of software?
652
:
00:36:05
Without the interface.
653
:
00:36:06
So they didn't even have to spend time
on programming how it should look like.
654
:
00:36:10
They just said, okay, it
shouldn't even look like anything.
655
:
00:36:13
They can just do the background stuff.
656
:
00:36:14
So it's actually very
much doable and exists.
657
:
00:36:18
So definitely something to be aware of.
658
:
00:36:22
But also at the same time, I feel like
we talk a lot about to be cautious from
659
:
00:36:27
this and cautious from that, which might
put people off technology altogether.
660
:
00:36:32
We don't want to do that.
661
:
00:36:33
Definitely embrace the
advancement of technology.
662
:
00:36:37
Just do it carefully and have
a bit more attention to detail.
663
:
00:36:41
The more advanced things are going
the more, vigilant you should be in
664
:
00:36:46
anything, like even before the age of
computing, as you said, someone may
665
:
00:36:53
forge the digital signature that, say
Microsoft digital signature, you can
666
:
00:36:57
pretend to be Microsoft by doing that.
667
:
00:37:00
That was happening before with cheques.
668
:
00:37:03
People would forge a
669
:
00:37:04
check with someone else's signature
and take out money from bank.
670
:
00:37:07
So all of this, and
how would you check it?
671
:
00:37:10
You need it to be vigilant to
make sure that this is your
672
:
00:37:13
signature so it's the same thing.
673
:
00:37:15
You be vigilant in your digital world.
674
:
00:37:19
Amit: One of the things you mentioned
is that we don't want to off put
675
:
00:37:21
people from technology by saying
that you have to be cautious.
676
:
00:37:24
It's like using a knife in the kitchen.
677
:
00:37:25
People don't stop using a
knife in the kitchen to cut a
678
:
00:37:28
bread or to cut a vegetable.
679
:
00:37:29
We know it's sharp.
680
:
00:37:30
It can cut your fingers, yet we use it.
681
:
00:37:32
We're just careful.
682
:
00:37:33
So it's technology, something similar.
683
:
00:37:36
So our technology is useful, but you
have to be careful because you don't know
684
:
00:37:40
how it's being you how it can hurt you.
685
:
00:37:43
Yeah.
686
:
00:37:43
Yeah.
687
:
00:37:44
Rinat: Absolutely.
688
:
00:37:44
That's a good analogy.
689
:
00:37:45
Yeah, it's been actually quite
an eye-opening conversation.
690
:
00:37:48
Amit, I've really enjoyed that and
hopefully our audience found it
691
:
00:37:53
useful too, and will have positive
behavioral changes as we navigate
692
:
00:37:59
around the internet, thank you
everyone for listening and hopefully
693
:
00:38:03
we'll see you guys again whenever
we come back with our next episode.
694
:
00:38:07
Amit: Thanks guys.