how to hack a telescope | ransomware sucks

  Рет қаралды 72,906

Angela Collier

Angela Collier

Жыл бұрын

It would be cool if people would stop scamming other people.
I don't think anyone actually saw the movie I'm referencing with 'GENIUS HACKER MIT' It's called blackhat with Chris Hemsworth and I have not seen it either. I just think it's funny that the public perception of hackers who scam is 'genius' rather than 'jerk'.
Alma footage:
• ALMA trailer
John Oliver episode:
• Ransomware: Last Week ...

Пікірлер: 860
@arsenelupin123
@arsenelupin123 Жыл бұрын
To be fair to Jerry, we all have hare brained moments once in a while. I could imagine doing something like that over 7am coffee and immediately face-palming myself.
@acollierastro
@acollierastro Жыл бұрын
100% I was also thinking about that scam where your “boss” emails and asks for visa gift cards. If I had a very scary boss I could see myself falling for that scam out of fear of being fired.
@ChemEDan
@ChemEDan Жыл бұрын
@@acollierastro Scammer reading YT comments: We got a live one 👀
@leodeloatch9856
@leodeloatch9856 Жыл бұрын
My boss is making me host the wedding of a Nigerian Prince...If all is successful, we stand to make $100,000,000! We just have to come up with $50,000 in bitcoin first.
@MikeM-py2hq
@MikeM-py2hq Жыл бұрын
One of the issues is that standard emails in academia also encourage you to click on links or open pdf files. So yet another email about some conference invitation wouldn't stand out. I probably would be scammed as well.
@LucyTheLizardWizard
@LucyTheLizardWizard Жыл бұрын
My biggest piece of security advice is to never assume you're immune to these attacks, that you know it all or that only "stupid" people fall for them. Everyone is vulnerable to attack and lowering your guard because you believe you aren't only makes you more likely to fall for one.
@chad3814
@chad3814 Жыл бұрын
"I get that some people make a living scamming people…landlords."
@FunkmasterRick
@FunkmasterRick Жыл бұрын
In a ransomware attack, nobody's really stealing the data, they're just inconveniencing the victim then demanding extortion. Some people are lazy enough to pay to undo the inconvenience, which is a low-hit rate but also low-effort business. And sometimes the attacker gets lucky and scrambles the data for something really important at a really inconvenient time, like a hospital with digitized patient orders where people might die in the time it takes to undo the damage by hand. Those are pretty much the only times where people get paid for this.
@vasiliigulevich9202
@vasiliigulevich9202 Жыл бұрын
nobody -> almost nobody nowadays
@dmke
@dmke Жыл бұрын
Also of note: ransom attacks are (in the overwhelmingly majority of time) not targeted; this is just a numbers game. Scammers buy millions of email addresses in bulk and mass-send their junk mail to it (or delegate this job to another party). Their cost is often already covered when a few victims paid the ransom, i.e. they turn a profit with a turnover rate below 0.00001%... If the attack is tailored to a target, ransom is not the goal, but penetrating the target's network and exfiltrating as much data as possible. See the current, 2-months-and-ongoing "hack" of Western Digital.
@NitroLemons
@NitroLemons Жыл бұрын
Yeah I was about to go to the comments and type this exact thing but glad to see someone already did it. On paper hacking a massive research telescope and withholding the data is actually not that dumb of a plan cause there's a chance that the organization does ultimately decide that paying the ransom's worth it. Even if the chance is low it's not necessarily a silly thing to try doing.
@genejas
@genejas Жыл бұрын
@@dmke some malware is even less targeted (and less effort), if they're written as a worm that self propagates. Part of why Wanacrypt0r was such a big deal is that it spread pretty effectively and fast
@varietynic17
@varietynic17 Жыл бұрын
This is inaccurate - a large percentage of ransomware attacks involve both encryption of data and then transferring data pre-encryption to an external server. The extortion is then for both the decryption of data and for the attacker to not post this data online, either as part of a sale or for free.
@gusthebus2713
@gusthebus2713 Жыл бұрын
Your string theory video got recommended to me a week ago and I’ve been watching all your videos since. Your content is top notch and I hope your channel gets the audience it deserves!
@rainvm
@rainvm Жыл бұрын
Me too! Been loving them!
@hck65
@hck65 Жыл бұрын
Me too. Algorithm has been sending me random weird right wing shit too though. So like thanks algorithm for the phd science blog, no thanks on the right wing stuff.
@JimmyFisher
@JimmyFisher Жыл бұрын
same
@Peapolop
@Peapolop Жыл бұрын
Saaaame
@captain-spud
@captain-spud Жыл бұрын
Same and we love it
@MrHatoi
@MrHatoi Жыл бұрын
A couple things worth mentioning: Ransomware payouts from big organizations tend to be massive, so even if a tiny percent of victims actually pay the ransom, that doesn't necessarily make it unprofitable. According to a quick Google search the average ransomware payout is almost a quarter million dollars; that's enough that you only really need one, maybe two payouts in an entire _year_ for it to be worthwhile, and the cost of hitting a lot of targets isn't really that high. WannaCry is also an interesting thing to mention, since that one is now known to have been created by a North Korean state-sponsored group. Even if the money they get helps them, in that case it's obvious that a major goal is just to be a pain in order to inconvenience other countries like the US. A lot of more prolific groups these days are either suspected or known to be state-sponsored, which is definitely something else to consider; maybe being a pain in the ass for random people _is_ really their main intent, as long as those people are from the wrong country.
@gigitrix
@gigitrix Жыл бұрын
That's part of why the number of attacks is decreasing too, there's a recognition amongst the perpetrators that they have to 1) target some entity with money so that it's worth the fuss, 2) ensure you are doing sufficient damage (not just encrypting Dave's PowerPoints, they need to go for critical systems and their backups) and 3) rather than threaten data destruction they are moving more towards extortion and leaking stuff publicly
@madcow5833
@madcow5833 Жыл бұрын
@@gigitrix Do you have a reputable source showing that ransomware attacks are decreasing?
@toatrika2443
@toatrika2443 Жыл бұрын
@@madcow5833 21:42
@madcow5833
@madcow5833 Жыл бұрын
@@toatrika2443 Missed that, thanks. Statista also reports a decrease in attacks. I am surprised because I have heard inofficial numbers of the opposite. Everyday I learn something. Thanks again!
@vsiegel
@vsiegel Жыл бұрын
I do not think the North Koreans doing it to mess with the Americans or so. The literally do criminal things to earn western money. It is not specific to ransomware. Russians may do it for political reasons, like they run troll factories. But I think ransomware is done by private individuals, not the FSB.
@ShiddyProgramming
@ShiddyProgramming Жыл бұрын
Security Engineer here, keeping some systems up for 99.99% of the time (not an exaggeration) is often in the service level agreements for large business to business companies. Randomware is not generally targeted when it’s pushed through things like phishing emails, so some groups will automate every step banking that a company or an individual does not have backups. Fault tolerance is quite hard when the systems get sufficiently complex which is why meemaw can get her photos back and have you reinstall her machine but a giant corporation might just have to suck it up and pay a ransom. It’s why we only started seeing ransomware after something like bitcoin was ubiquitous; before there was just not an easy way to get paid as a bad guy without getting caught.
@ShiddyProgramming
@ShiddyProgramming Жыл бұрын
Oh and I didn’t mention, the idea of selling ransomed data is far further down the list of ways to get money than you might think. The scam is really just banking on people not having backups, yes there are cases where that’s useful, but most of the buyers will already have a better strategy to get the data themselves if it’s truly important, think nation state levels of funding and investment.
@quintrankid8045
@quintrankid8045 Жыл бұрын
@@ShiddyProgramming Yes, but lots of people really think data isn't real and that they don't have to worry about it. I wonder if certain kinds of large organizations who have people who are experts in a field but have trouble communicating with IT are more vulnerable to this sort of thing.
@TanyaLairdCivil
@TanyaLairdCivil Жыл бұрын
Think back to when you were working on your PhD dissertation. Imagine a few days before you were planning to submit your dissertation, you got hit with a malware attack. Your dissertation and most of your data were encrypted. And the malware got most of your backups as well. The only backup you have is a month old offline backup on a flash drive. There's nothing they've locked up that you can't replace in time. But your dissertation is due in two days. You could turn in your dissertation late, or you could pay the $100 ransom, be done with it, and get your dissertation in on time. Which would you do? This is the type of person these ransomware attacks are targeting. They're looking for people who happen to have extremely time-critical data they can lock up. Or think of a company that is operating a big industrial facility like a big factory or oil refinery. If critical systems get locked up, that facility being down might cause the company millions of dollars for each day they're shut down. If your facility being down is costing your company $1000/minute, and the scammers only want $5000 to unlock it, you will pay that ransom. It's literally the most profitable option available to you. Ransomware economics are a lot like those of conventional spam. The vast majority of the people that will be infected either can't pay (lack funds or can't figure out how to buy bitcoin) or have no need to pay (all data is easily replaceable and not time critical.) But for every hundred individuals or organizations they infect, one of them will be unlucky enough to have extremely time-critical improperly backed up data encrypted (like the hypothetical grad student) or a large expensive operation made inoperable (like the large industrial operation.) And even for those unlucky few, the scammers don't ask for obscene amounts. They ask for a few hundred to a few thousand. Their goal isn't to ask the highest price they can; their goal is to make paying the ransom the cheapest or most time-efficient option available to you. Yes, the vast majority of people or organizations won't be those unlucky few. Maybe only 1 in 100 actually get infected; and only 1 in 100 have enough time-critical data for paying the ransom to be worth it. And so perhaps the scammers only have a 1 in 10,000 success rate. But again, that's just like spam. Very few people actually fall for spam scams, but if you can send millions of spam messages for a a few pennies, the costs become worthwhile. Maybe only 1 in 10,000 times will the ransomware scammers succeed, but if they can successfully target millions of people and institutions, it becomes profitable. And they can do that; they're not personally writing individual emails to target individual people. It's all highly automated. One person can send messages to millions of people and institutions. You might target 1 million people and only succeed with a hundred of them (1 in 10,000). But if you manage to get $300 on average from each of those people, that's still a $30,000 profit. That's a very fine annual wage in many countries (and near median for most developed countries.) You have to dig and process cubic meters of earth to get a single fleck of gold, yet people have been profitably mining gold since the dawn of civilization. A single raindrop has almost no gravitational potential energy in it; but if you can build a dam and capture cubic kilometers of raindrops, you can use their energy to power a nation.
@MayaPasricha
@MayaPasricha Жыл бұрын
As someone involved in the cybersecurity field, this is a wonderful explanation - especially with the gold mining analogy! I'm going to steal this for when I need to explain ransomware / scams to someone :)
@NateEngle
@NateEngle Жыл бұрын
I had a PhD student come in my office one time and ask whether the only copy of their dissertation would be ok if they left it in their car parked at the airport. You're studying for an advanced degree and you can't afford a 2nd floppy disk?
@richardarriaga6271
@richardarriaga6271 2 ай бұрын
​@@NateEngleGrad students are poor
@NateEngle
@NateEngle 2 ай бұрын
@@richardarriaga6271 I left AT&T to come back to Bloomington to go to grad school but then had the amazing good luck to get hired to do support for the Psych department instead. It was a 40% pay cut from what I was earning at the labs but it was the smartest thing I ever did.
@crtchicanery9605
@crtchicanery9605 Жыл бұрын
I work as a software developer. A few years ago, a team other than mine got an email that basically said "we hacked your webcams and have compromising footage of you. Pay us and it won't get out. Here's a btc wallet address." This spread around the whole office bc it was obviously an empty threat and very funny. But also, like, btc transactions are public, you just look up the wallet address, so I checked it. The scammer was raking in thousands of dollars. They didn't even do anything, they just sent an email. Insane.
@richardarriaga6271
@richardarriaga6271 2 ай бұрын
Steve-O is immune because he posted his nudes on Twitter
@keldencowan
@keldencowan Жыл бұрын
I used to work at a cellphone store selling phones, plans, and doing small repair. The shear amount of meemaws who came in because they were ransomed into sending iTunes gift cards to people was staggering. Never underestimate how shitty people will be for meager amounts of money. Edit: and it's not about their pictures. In many cases seniors depend on a single iPad to pay their bills and other things that are difficult or impossible for them to now do in an analog manor. It's often the sole authenticator in 2FA, so often they lose access to every account they've ever had, permanently. And more and more medical devices like insulin pumps are starting require a paired Apple device to operate. Even without stolen credit cards or identity theft, it can seem like an existential threat to many seniors. It takes a lot of money and technical skill to replace bricked devices and accounts.
@stephanieparker1250
@stephanieparker1250 Жыл бұрын
Aww memaw 😰
@delusionnnnn
@delusionnnnn Жыл бұрын
The point of most ransomware isn't how valuable your data is to sell to someone else, it's whether you will pay the thieves to get it back. Like a ransom kidnapping - there isn't a lively black market for your kid (Law & Order and conspiracy theories aside), but you're likely to be the most highly motivated customer to get your kid back. So the two questions are always: "is the encryption of the ransomware attack secure enough to foil recovery", to which the answer is usually "yes", and "is your data plus the risk of embarrassment (which may have a financial cost, too) worth more to you than the cost of either paying the thieves to unlock it, or regenerating it (if possible). I admit, I can't imagine public astronomy is a terribly lucrative target, but businesses often are even if their data is not really sellable to a third party - not having it may put them out of business. Just my read. Paying is often an extra risk, since you've put a target on yourself as an organization that has paid in the past, and thief always has the option of leaving critical files infected as time bombs to go off later on with no additional phishing required.
@rentristandelacruz
@rentristandelacruz Жыл бұрын
When you mentioned 1:10 in a note that dust is very interesting in astronomy, it reminded me of Brian May (guitarist of Queen) finally finishing his astrophysics PhD in 2008 with the thesis titled "A Survey of Radial Velocities in the Zodiacal Dust Cloud".
@Wolf_Avatar
@Wolf_Avatar Жыл бұрын
"We'll just train our people not to click links in emails, Jerry!" Love it. Like many others, I found your channel recently and I've added it to my group of science education channels. ALSO, you mention in a couple of videos that you have a Patreon, and I'm not sure if I just can't find it, or if I fell for the joke.
@acollierastro
@acollierastro Жыл бұрын
Maybe one day!
@Don.Challenger
@Don.Challenger Жыл бұрын
@@acollierastro one fine day
@yonatanbeer3475
@yonatanbeer3475 Жыл бұрын
@@acollierastro I would definitely throw a few dollars at you a month, these videos are great.
@robertvarner9519
@robertvarner9519 Жыл бұрын
Angela! I got so excited because I thought YOU hacked the telescope. I was a little let down but your story telling ability made up for it. You're the best!
@thomasw4422
@thomasw4422 Жыл бұрын
There's a video idea for her
@krampusz
@krampusz Жыл бұрын
Let me give an example of a theoretically successful ransomware: I worked at a vehicle r&d company. We worked on high profile development jobs with weeks worth of simulation data which were extremely a) time sensitive b) very secret. If, through my computer a ransomware simply blocked data on our server, our project is delayed. "Why is it delayed?" - asks the customer. We'd reply "oh we are lame" or "oh we got hacked". We just lost the customer either way. We are talking about millions of dollars here. Data is nothing, but it is an aswer to a question: can we manufacture 10000 of this engine next month? If we give no answer in time, we are screwed.
@methmeth
@methmeth Жыл бұрын
I think the thing that matters to companies for whether they pay the ransomware or not is less dependent on how important that data/systems are and more about how quickly they need that data/systems up and running. Because the company can eventually get their data/systems back, but probably not quickly. So it needs to cost them enough money to where they would save money to pay and use their systems right away, compared to waiting the month or 2 to get that data/system back. That's what happened to Colonial Pipeline, I think.
@mehblahwhatever
@mehblahwhatever Жыл бұрын
The thing to remember there is that there's no guarantee that it's actually "ransom" and not just a request for money without a fix.
@vcostello712
@vcostello712 Жыл бұрын
It also works better on targets who have not properly backed up their most important stuff. Any competent institution should have critical data backed up on a hard drive that's not plugged into anything, sure. But people are dumb dumbs. Jerry did click that email after all. Hell, I found out a governmental agency I had to make an account with was storing user passwords as plaintext because I clicked the "forgot password" link and they straight up emailed my password back to me. Not only is that a hideously unsafe way to store passwords, I would bet those same dumb dumbs weren't backing things up, and if the spreadsheet of everyone's passwords got locked then everyone would be permanently locked out of that service.
@crystalgemstv4609
@crystalgemstv4609 Жыл бұрын
@@vcostello712 The best way to do things is also the most expensive and resource intensive way to do things, and the reality is that most people don’t care that much about cybersecurity. Nobody really thinks they’re going to be hacked, unless you’re a big government agency with a lot of secrets. The City of Atlanta got ransomeware in 2018 and they didn’t pay the ransom. Apparently they had a LOT of vulnerabilities that the IT team knew about, but didn’t patch. In 2022, the city proposed to cut the IT budget even more! Local governments aren’t exactly rich, but at the same time, just one attack cost them hundreds of millions of dollars in lost productivity and repair fees, and they also lost a lot of important, irreplaceable data. You’d think they’d realize that they can’t skimp out on proper security, but they probably don’t think it’s going to happen again.
@thorwaldjohanson2526
@thorwaldjohanson2526 Жыл бұрын
There are ransomeare groups that do indeed unlock it after they have been paid. It is in their best interest to do so, otherwise nobody would pay. Oh and they don't necessarily have your data. It is essentially a guy coming up to your warehouse, putting a giant padlock on the door and demanding money to unlock it again.
@charper9
@charper9 Жыл бұрын
The hackers likely were not targeting the telescope - they just have a list of thousands (maybe millions) of e-mail addresses that they send these phishing e-mails to and then if a person clicks on the link it will encrypt all the data it can get access to (which if the computer is on a network without tight security controls may be a lot) and then demain a payment to get the data unencrypted. Given that it would typically cost a whole bunch of money to lose all the data for an organization - payment can be the cheaper option.
@QuantumSeanyGlass
@QuantumSeanyGlass Жыл бұрын
so, I think you've got a misconception about what actually occurs in a ransomware attack, because in fact it's reasonably likely that the attackers never saw the data they were ransoming, and also never targeted the telescope specifically. Ransomware, at it's core, uses cryptography. The malware goes through every file on all of the systems it gets access to, and instead of deleting it, or attempting to send it all back over a small network connection to the attacker, it uses a cryptographic algorithm to scramble it reversibly with a key, and then deletes it's copy of the key, leaving only the attacker with knowledge of how to unscramble all of that data. So, if there was any data not backed up, or if the backups also got encrypted, this leaves the victim with two options: either pay the attacker, or accept that the data is lost forever. And there's many things this data could be. One is, like you mentioned, potentially observations of things that happened in the past, but this is actually probably not what was being targeted. Instead, they were probably hoping to hit proprietary software necessary to run a business, potentially a very profitable business, where every day of downtime caused by not having access to important software represents massive amounts of money. And that's the other thing: these attacks are not targeted. Mostly, the phishing emails that actually get people to install the ransomware (although it's worth noting that there are other ways to get ransomware onto a system) are sent by computers infected by a different kind of malware on mass to any email address they have on their list. The ransomware is probably designed to be able to exploit all the most common types of computers, and even if it wasn't, because it's so easy to make attacks like this it doesn't really matter whether or not it actually works every time. In the case of ALMA, they just happened to get a telescope.
@bmitchell922
@bmitchell922 5 ай бұрын
Thank you for this. Was waiting for somebody to properly explain. It's not about the objective value data. It's about the subjective value, and the associated cost of down time it potentially represents to not have access to it. Also, once they are aware of what they have, the calculus may also simply become the ransom versus the threat of a public data leak, which can cause embarrassment either through reputational damage or the reveal of the data itself... again, banking on SUBJECTIVE data value
@jhohiii
@jhohiii Жыл бұрын
Laughed harder than recent Last Week Tonight episodes (which usually make me want to cry after laughing). You're feeding all the endorphin rushes - intelligent content, science history, and "it's fine..." Brilliant! Keep it up!
@joaovictorcarvalho6339
@joaovictorcarvalho6339 Жыл бұрын
i’ve been binge watching your videos this week and i’m low key so inspired by you. really good work!!
@AkbarAli-bs4eq
@AkbarAli-bs4eq Жыл бұрын
Good luck and best wishes! Keep doing what you do so eloquently! I love watching your well deserved growth trajectory.
@voomastelka4346
@voomastelka4346 Жыл бұрын
I'm an IT-professional, have a mandatory security training every year and it still takes a couple of seconds for me to recognize a scam AFTER I have clicked on dodgy link. The truth is, that everyone can fall for a scam. Including KZfaqrs, so watch out.
@fibbooo1123
@fibbooo1123 Жыл бұрын
+. The people most vulnerable to a scam are those who click the most links, just because they have more exposure
@ayoCC
@ayoCC Жыл бұрын
We need a browser that just creates a sandbox or virtual machine via right click or so. And a Mail program that automatically saves programs in a sandbox folder, that runs the attachment in a sandbox virtual machine.
@williambranch4283
@williambranch4283 Жыл бұрын
Throttle all traffic bidirectionally by traffic type. No un authorized access, no non-business activity.
@emberthecatgirl8796
@emberthecatgirl8796 10 ай бұрын
This sounds so much like a threat >.
@saturdaysequalsyouth
@saturdaysequalsyouth Жыл бұрын
Dust is so interesting I've drapped my apartment in it.
@fibbooo1123
@fibbooo1123 Жыл бұрын
The statement about who falls for a scan I think is somewhat more complicated, because more technical users use computers so much more. Everyone can fall for a scam, they’re called “accidents”, not “on purposes”, and thinking that you’re too technical to fall for a scam is the first step in falling for a scam
@chalkchalkson5639
@chalkchalkson5639 Жыл бұрын
spearfishing can also be done super effectively if you're willing to put effort in. Got an email "from my prof" the other day which was asking for me to proof read the newest revision of "our paper". If the scammers had gotten the language my prof writes to me in right, I might have opened the attachment and I'm a security nerd.
@user-zv8li7eu1w
@user-zv8li7eu1w Жыл бұрын
@@chalkchalkson5639 Why weren't you checking your mail inside a VM inside a non admin account inside a PC that has a complete physical backup and a cloud backup !? Just kidding hahahah I'm getting worried about this stuff, Is ublock + noscript + windows defender + CoreIsolation>MemoryIntegrity ON + ransomware protection ON + MalwarebytesFree + non-admin-acc daily browsing? I'd say I'm very prone to just clicking and downloading unsafe things (Go figure most of my problems would be solved if I didn't but its kind of like gambling, where a possible reward could be at the other side) but I think I don't have something right now beyond like, an adware or like, a cripto miner. I'm thinking of testing everything inside windows sandbox or an HyperV VM but that sounds sooooooo work-heavy to do for like, each file I download.
@user-zv8li7eu1w
@user-zv8li7eu1w Жыл бұрын
I said "like" too many times, sorry.
@SapientPearwood
@SapientPearwood Жыл бұрын
I feel like I fall into multiple parts of your plot. I run Fortran physics simulations on supercomputers for my job, but I also don't think I'd know how to get something from a phone to a projector, and I definitely don't know how to bitcoin (though that last one is mostly intentional)... Admittedly I do know how to google, and all tech support is just googling "how to *" and skimming the first 6 stack exchange links... But still, conference room projectors are black magic as far as I'm concerned.
@AdrianBoyko
@AdrianBoyko Жыл бұрын
Forget Google, boomer. It’s ChatGPT now.
@Sam_on_YouTube
@Sam_on_YouTube Жыл бұрын
Hey, your first new video since the algorithm showed me your videos and I bunge watched your whole channel and subscribed. Good title. I showed my 11 year olds the movie Hackers for the first time today. It is surprisingly accurate to the technology of the day, except for the visuals. Still holds up.
@pluto9000
@pluto9000 Жыл бұрын
bunge 😅
@TheEveryd
@TheEveryd Жыл бұрын
Love your videos! My daughter is starting college as a freshman Chem major this fall. She’s determined to continue through to a PhD. I just wanted to say your First Generation Grad Student video answered a lot of questions for both of us. I got my BS going to night school and partly online. There are so many questions about traditional college I couldn’t answer initially, but we are figuring it out. Your video gave us some great info about grad school that I never could have answered in a million years. Thank you!
@abrilfool
@abrilfool Жыл бұрын
KZfaq recommended me your mass video a few weeks ago and now I can't get enough of your content! Keep up the great work!
@Rinxinx
@Rinxinx Жыл бұрын
They claim hardly anyone pays the ransoms, but they often do. They just keep it on the down low for a couple of reasons. Instead of embarrassingly announcing they paid the random, they'll say they defeated the hackers through sheer determination, plus the FBI wants to discourage hackers by making it seem like they never succeed. And it's true that if Meemaw's photo of you when you were 3 years old was stolen, you yourself are still safe. But memories have value. Sometime's that data can't be recreated. And even in cases where it could, it takes time... and time is money.
@systekmusic
@systekmusic Жыл бұрын
Binge watched nearly all your videos today after watching the String Theory vid. What a nice surprise to see a new one pop up at the end of the day. Keep up the good work!
@andreideev1545
@andreideev1545 Жыл бұрын
Hackers encrypt your data and sell it back to you. That's the point. There are a lot of hospitals, schools, public services etc that don't have budgets for proper IT services. They get hacked and pay ransom. Hospitals are especially good targets, if they don't pay their patient may suffer/die.
@danimalfarm
@danimalfarm Жыл бұрын
Or they irreversibly junk your data but take your ransom money on the pretense they can fix it.
@cainabel2553
@cainabel2553 Жыл бұрын
There is no budget for people to not do insane stuff. You don't drink from the flood drain, you don't download and install random stuff from unknown origin because an email or ad on a Web page begged you to. It's called common sense and being aware.
@redpepper74
@redpepper74 Жыл бұрын
@@cainabel2553 The entire cybersecurity industry would like to formally disagree with your statement.
@cainabel2553
@cainabel2553 Жыл бұрын
@@redpepper74 So you admit I'm correct?
@snowwsquire
@snowwsquire Жыл бұрын
@@cainabel2553 While social engineer will always be a weak point, you can organize systems so that one person getting socially engineer is isolated and harm-minimized
@notnotkavi
@notnotkavi Жыл бұрын
As someone who has taken a class on computer security at MIT I felt very attacked by your transitions 😅😅 But yeah fair point on this (we didn't cover ransomware in the class at all really, which ig tells you how much the professionals take this seriously)
@nikolaisafronov3452
@nikolaisafronov3452 Жыл бұрын
Digital security should be a class subject in school by now...
@TheGoodMorty
@TheGoodMorty Жыл бұрын
I was shown your String Theory Lied to us and then i binged your whole channel in a week lol
@pluto9000
@pluto9000 Жыл бұрын
same
@nocakewalk
@nocakewalk Жыл бұрын
same
@mzg147
@mzg147 Жыл бұрын
same
@patrickarmshaw
@patrickarmshaw Жыл бұрын
Ok I’m on my like 15th video of yours and you are just an absolute natural at this. Love the science, obvs, but also your manner of speech, sense of timing and whole persona. May you absolutely prosper as much as you want to at KZfaq and literally no more than that much.
@coffeeisdelicious
@coffeeisdelicious Жыл бұрын
"I'm running this channel on tech, and data and science, and this is the second time buttplugs have come up." Never before have I thumbs uped a video so fast
@labeardod
@labeardod Жыл бұрын
The customer service aspect of ransomware always got me. There's gotta be 100s other scams you could run where you don't also need to have a dedicated customer service line where you teach meemaw all about bitcoin / monero so you can get that little sliver of crypto in your wallet.
@damunataliffato9128
@damunataliffato9128 Жыл бұрын
I have to say your science content is one of the most original and thought provoking there is, please never stop doing these videos!
@robbren8679
@robbren8679 Жыл бұрын
RE: Backups - Adversaries will always go after the backups, to delete them or modify them. The number of orgs that backup data correctly and securely (and test restoring data) are more rare than they should be.
@ohiocore
@ohiocore Жыл бұрын
Almost nobody validates their backup restoration. It's not just "ok, the mag tape still has last month's files on it", but having a process at different levels for business continuity during restoration.
@robbren8679
@robbren8679 Жыл бұрын
Sometimes these hacks can have motivations other than financial... "hacktivists" may just want to disrupt the target for various reasons. It can be as simple as bragging rights "just cuz" up to state-sponsored attacks. Most of the time, it is a financial motivation, but not always.
@brktspcxlmmrkspcbrk
@brktspcxlmmrkspcbrk Жыл бұрын
I can listen you for hours on the topics I'd never thought be interesting to me. I started with the string theory video and now I'm like - OK the next one will bore me, TF I care about adjuncts at academia, and then I watch the whole thing, enjoy it and learn new stuff. You must be an absolutely amazing at teaching.
@vahaha136
@vahaha136 Жыл бұрын
oh shit wasn't expecting a new vid so soon after discovering and binging this channel :o
@Sam_on_YouTube
@Sam_on_YouTube Жыл бұрын
Me too. The algorithm apparently decided to favor her. I appreciate the find.
@d3xo
@d3xo Жыл бұрын
Just found your channel as a fellow astrophysicist (graduate school) and I love your content. Keep doing what you're doing, this is some of the best content on youtube!
@G1itcher
@G1itcher Жыл бұрын
It's worth mentioning that many organisations, although they have tech savvy people on board, may not have backups or ways to spin up systems again if they're wiped out. Ive been lucky enough to work as a software development consultant for the last 8 years, and honestly it is genuinely shocking how exposed companies can be under the guise of ALWAYS MOVE FORWARD! No time to stop and shore up security, test backups, pay tech debt, etc. I'd say 70% of the companies I worked for would have no choice but to pay ransomware, as it would be that or let the house of cards collapse, with no guarantee that theres enough money available to build it up again.
@florianbruehl
@florianbruehl Жыл бұрын
I love this channel and your work. You're a serious breath of fresh air in KZfaq science communication. Thank you so much!
@marklowry4431
@marklowry4431 Жыл бұрын
This channel is so refreshing. Thanks for the videos :)
@KaneryU
@KaneryU Жыл бұрын
Yet another new fan after yt pushed your videos, Love them! ❤
@bladerunner2912
@bladerunner2912 Жыл бұрын
RLM and you are the only channel who genuinely makes me crack out loud. Yes, Landlords are scammers. It's the same even here in the subcontinent. Man. Just don't stop making videos even if you post it after 3 to 4 months just don't stop and I am eagerly looking forward to your Halloween video this year.
@skhotzim_bacon
@skhotzim_bacon 4 ай бұрын
Subcontinent? Wouldn't it have been easier to type India? Subcontinent seems very vague and pretentious.
@Etropalker
@Etropalker Жыл бұрын
So glad your string theory vid got recommended to me, your content is amazing
@malfaro3l
@malfaro3l Жыл бұрын
It's because phishing scams are not directed. They are spammed out to email lists pretty randomly.
@boredstudent9468
@boredstudent9468 Жыл бұрын
There are two main kids of those attacks, "normal" phishing is just thrown at the wall to see what sticks, because the chances aren't that bad to hit something important like business records or to just overwhelm people with shock and stress. Also often the "customer support" on how to get crypto is pretty good. Normally such operations don't target organisations like that, as I said they just throw it at the wall. Oh and the reason they are all from Russia is the legal protection, Russia only persecutes hacking of Russias and does not expedite to Western countries
@LeonoraTindall
@LeonoraTindall Жыл бұрын
I feel blessed to see this video tonight. I was really craving some snarky physics adjacent content :)
@ultravioletiris6241
@ultravioletiris6241 Жыл бұрын
In general companies and organizations currently have a huge issue with scaling cybersecurity programs and staffing them properly. Hopefully events such as this help push organizations to invest in their security more. As it is there hundreds of unfilled cybersecurity jobs. People need to take this stuff more seriously… as you mentioned I’m surprised this wasn’t a bigger news story.
@SlugSage
@SlugSage Жыл бұрын
Nah bro, she's just going to throw her computer away and get a new one. Also thumb drives.
@ultravioletiris6241
@ultravioletiris6241 Жыл бұрын
@@SlugSage ….wat
@bmitchell922
@bmitchell922 5 ай бұрын
​@@SlugSage thumb drives are one of the biggest security risks out there. The moment you plug one in you think is safe but can't actually verify you might be done for - Google rubber duckies
@williamjoshualucas6503
@williamjoshualucas6503 Жыл бұрын
Angela's "it's fine" should become my meditation mantra.
@thossi09
@thossi09 Жыл бұрын
I don't know how this channel wound up on my suggested list, but I'm glad it did!
@Alex_Off-Beat
@Alex_Off-Beat Жыл бұрын
I absolutely love this channel! She's like Jenny Nicholson but astrophysicist! Or like Swell Entertainment except it's more like Infinite Expansion of the Universe Entertainment lol!
@chalkchalkson5639
@chalkchalkson5639 Жыл бұрын
Ransomeware works because a surprising amount of especially small-medium sized companies have/had really shitty IT practices. Like the IT people have setup an NFS share that's remotely backed up and everything, but Jerry just saves all the important documents to the desktop of his computer. Restoring from backup can also cost more in disruption than the ransom. And finally, many groups reportedly offer secrecy about the breach if the ransom is payed, which can be attractive for a company that relies on having a reputation for being secure. Example: friend of mine works at a biotech company that suffered a ransomware attack, lots of data would have been lost because the employees didn't follow guidelines and they try to keep it under the radar.
@kephir4eg
@kephir4eg Жыл бұрын
We all hate KZfaq algorithm and for a good reason. But sometimes it throws a real gem, such as this channel. Just as I got really tired of all these polished almost TV-quality shows by "independent" teams of ten people with minute-long promotion rolls within the video. It's nice to see there are still really independent creators who can build educational content with interesting narrative while being passionate, honest and moderately emotional. And it does not include a VPN ad as a bonus. Going to binge-watch the channel today.
@hellraserfleshlight
@hellraserfleshlight Жыл бұрын
Ransomware in the commercial space has always fascinated me because the solution is so simple and something that *should* be the basis of all IT operations. Like... Even if you have a business and you have even a single computer, you should have a backup. The problem is, having worked at every level of IT, NOBODY WANTS TO DO IT. Like, small businesses think it's too expensive to even buy an external hard drive that they plug in and back everything up to once a day. Big companies will often cobble together half-ass solutions to placate the grossly overburdened actual IT people, but often won't even allow them to properly test disaster recovery, so when they actually need it, it doesn't work. It's just wild... It's the most basic thing in IT - have backups, and make sure they work, and yet, I would bet it's the single biggest potential point of failure in the IT world. That's why these scams still exist, the odds of landing on someone who can't or won't do the most basic stuff are just too good.
@RickeyBowers
@RickeyBowers Жыл бұрын
The primary problem is how the cost to spam computers aggregates to zero. It's like cheap products that break - they sell enough until the word gets out to pay for the cost of production, and then profits trickle in from the ignorance that remains. Love the videos BTW - don't stop (or let it change you - that's difficult) - you're awesome.
@firstlast5304
@firstlast5304 Жыл бұрын
"someone got a phishing email, clicked--" "Oh oh" "Downloaded it" "Ok" "Werent suppose to" Its like poetry, it rhymes.
@Taykorjg
@Taykorjg 8 ай бұрын
I like to think you say buttplugs because you're actually a really good comedian with great timing. It's always unexpected and very funny
@scottgreen132
@scottgreen132 Жыл бұрын
This was first in my list of recommended videos. The algorithm gods are blessing you, I feel like you're about to be famous. You deserve it.
@andrewphilos
@andrewphilos Жыл бұрын
Genius Hacker MIT Loved it! Great video! :D
@Xsiondu
@Xsiondu Жыл бұрын
Your data set presentation is the best tableau theme i have ever seen. I'm gonna update my presentation on TPS reports.
@sleethmitchell
@sleethmitchell 7 ай бұрын
excellent! also the john oliver one! and it's nice to be included in your bell curve thingie, even if i'm at the wrong end.
@LiveWire937
@LiveWire937 Жыл бұрын
glad I wasn't the only one who saw the computer room at Jerry Day Care as an alien cyber security worst case scenario worthy of its own episode.
@cyberninjazero5659
@cyberninjazero5659 Жыл бұрын
To answer your question Ransomware attacks work best when they disrupt vital operations. When the U.S pipeline hack happened it was payed off because those systems NEEDED to be online Side Note: The Bitcoin thing is a meme even amongst Crypto currency that's not considered the most private and in fact the FBI tracked down the infrastructure hack
@varietynic17
@varietynic17 Жыл бұрын
Yep, Bitcoin can be difficult to track when it's moved and mixed properly, but it's far from untrackable - all transaction receipts are public lol
@rickypoindexter9505
@rickypoindexter9505 Жыл бұрын
@@varietynic17 yeah but the transactions are tracked via their wallet not their personal info. Unless they mess up and mix the two.
@varietynic17
@varietynic17 Жыл бұрын
@@rickypoindexter9505 Yep going from bitcoin transaction activity to anything in the real-world is difficult, but when you have groups/individuals using bitcoin so frequently, it would make it easier to establish patterns
@Darticus42
@Darticus42 Жыл бұрын
You made a lot of great points in this video. Great work, keep it up!
@NickC84
@NickC84 Жыл бұрын
I just wanted to one up the dude who gave you $9.99. I also love the Meemaw lore, I was waiting for "and now Meemaw is out for vengeance". Awesome videos, keep it up!
@BrianFedirko
@BrianFedirko 9 ай бұрын
This type of hack can be a feather in the cap of a loser/immature hacker; trying to get kudos to a more master hacker or "the in crowd of hackers". ☮
@rlhugh
@rlhugh Жыл бұрын
God, I cant get any work done today. Just keep watching your videos. Saw the thumbnail for this one. was like "Oh god, now I'm going to watch this one too" :P
@jacobp8294
@jacobp8294 2 ай бұрын
I am a cybersecurity student and I had not heard of this breach. Thank you for sharing! often these events are not widely reported as the relevant organization is somewhat embarrassed by their security being compromised. Although the information is needed to prevent further attacks of a similar nature.
@chesschicken1698
@chesschicken1698 Жыл бұрын
Love your lectures professor 😊
@SaintBrick
@SaintBrick Жыл бұрын
There was a time in the 2010's where fortune 500 companies were buying bitcoin (and skimping on their insurance) so that in the event that they got ransomwared they could pay the ransom as quickly as possible. If you're a big company and you loose access to even 25% of your IT infrastructure that's a lot. Even if you have all the data, and it's just a matter of setting up the 25% computers again that's a ton of work. More work than your in house IT team can do quickly. God forbid you lose critical data or infrastructure in the attack... In these cases paying the ransom starts to see like an option. Like you mention though, ransomware is a volume game - Almost all cybercrime and fraud are. Unlike a phone scam though ransomware can be highly automated. All the instructions are in the ransomware. Also the Blackhat reference was amazing.
@kuda_71
@kuda_71 11 ай бұрын
love the videos. always interresting and informative. a look in the mind of an intelligent person and a scientist. i'm an IT dude with no education worth mentioning which makes it even more interresting. I bet you'll find out how ransomware works. Funny thing is what jerry did can happen to anyone: the mail is fabricated to look familiar and before you know it you clicked shit and you're like 'oh shit, hope that wasnt a hack'. Anyway, keep it up. edit: and funny
@_loss_
@_loss_ Жыл бұрын
Sometimes it's better not to announce that you've been hacked. It gives validation to the hackers.
@ultravioletiris6241
@ultravioletiris6241 Жыл бұрын
True but that contributes to the unethical atmosphere of companies waiting until its way past too late to notify their clients of data breaches.
@BlisaBLisa
@BlisaBLisa Жыл бұрын
id rather a company/organization be transparent and risk possibly making a bad person feel good. its also just harder to keep these kinds of scams going once they gain enough attention, so its probably better to announce it.
@jennifierburnett2901
@jennifierburnett2901 Жыл бұрын
In the case of ransomware the hacker's validation isn't remotely important. If it's just a pure destructive virus that wipes someone's hard drive then sure, it's probably a prestige thing, but in all other cases the hack will have some other purpose that's far more important than someone's ego. If anything broadcasting the details of how a hack happened is more likely to hinder future attempts to compromise other systems now that more people are aware of it (assuming you're competent and have addressed the method by which the virus got into the system and aren't just telling other people how to hack you again).
@anonymes2884
@anonymes2884 Жыл бұрын
There's that but also that plenty of businesses operate on public perception - banks for instance will obviously be reluctant to tell the world they're insecure. And in places like the US a company could even open itself up to lawsuits by admitting they were hacked. Total transparency is a very laudable idea but it'll never happen in reality.
@kwisatzsawyer
@kwisatzsawyer Жыл бұрын
Except for those "pesky" data breach notification laws... /s
@rakino4418
@rakino4418 Жыл бұрын
Wow I'm early. Looking forward to the video!
@piratecheese13
@piratecheese13 Жыл бұрын
you have this low key "world is burning, i don't care, give me coffee" energy that im 100% here for
@andreigrigorev3499
@andreigrigorev3499 Жыл бұрын
Business interruptions can be very expensive. Recovering from it might take a while getting it even more expensive. Some might just pay to recover quickly, especially when ransom is orders of magnitude smaller.
@jsalsman
@jsalsman Жыл бұрын
The hoodie thumbnail, spectacular!
@arijeetnath9236
@arijeetnath9236 Жыл бұрын
Love the genius, hacket, MIT slides in between!
@Rotaretilbo
@Rotaretilbo Жыл бұрын
Others have covered most of what I wanted to say, but one thing I want to point out is that there's a bit of self-selection skewing the data, a bit. If a company gets hit by a ransomware attack, and opts not to pay the ransom, it usually becomes public knowledge, either because the company needs to explain why their service is down, or the hacker claims responsibility. But when a company gets hit by a ransomware attack, and then pays the ransom, most of the time the public never hears about it. While I'd expect that it is still more likely than not that a victim doesn't pay the ransom, I think it's important to remember that it's probably more common for the victim to pay than the available data would suggest.
@bmitchell922
@bmitchell922 5 ай бұрын
$1.1 billion in revenue through ransomware, 2023... so you are correct
@nono6167
@nono6167 Ай бұрын
The delivery of 'or like landlords' was perfect.
@Nico_Sno
@Nico_Sno Жыл бұрын
The lead up and delivery of “You’ve scammed memaw, she can’t see her grandchildren anymore” was honestly one of the funniest things I’ve ever heard
@yoweedmofo19897
@yoweedmofo19897 Жыл бұрын
"It's so lame I 'WannaCry'" 😂 solid reference
@yevengyklaus7066
@yevengyklaus7066 Жыл бұрын
"How often do ransomware scams work?" Very often. So much so that when it happens to the US GOV, their guidelines is to pay.
@royrieder2113
@royrieder2113 Жыл бұрын
Loving your stuff!
@spencerthomas4087
@spencerthomas4087 Жыл бұрын
Pretty sure one of the groups in my dept. got hit with a ransomware attack while I was a grad student. It was definitely something that could have easily been fixed if they had backed up. I don't think they actually paid - I don't think they even could legally use lab funds to pay a ransom because federal grants (another obvious problem with ransomware). Feels like the feeling of power that a loser gets from kicking over someone's sandcastle is the real objective. The very rare low-effort payout might just be a bonus
@deksam86
@deksam86 3 ай бұрын
Completely loved the fact that you linked John Oliver.
@icantseethis
@icantseethis Жыл бұрын
Needs more GENIUS HACKER MIT
@lafanfarlo4872
@lafanfarlo4872 Жыл бұрын
6:42 "and now you have ALMA data" is a nice pun lol Also, two things: 1) The data may not be real, but the feelings some people have for them are. Falling for a scam really is a feeling thing, the goal of the scammer is to force you into irrational decisions. 2) Most, if not all, businesses have IT policies that dictate exactly what they will do if a ransomware invades their systems. It's not about things "making sense or not", it's just the policy. As a general rule of thumb, systems are instantly shut down, accesses are blocked and the ransom is never paid.
@JohnPatchesMicallef
@JohnPatchesMicallef Жыл бұрын
I was half expecting you to say that all thousand papers were written by Avi Loeb
@robertvarner9519
@robertvarner9519 Жыл бұрын
LOL!!
@mzg147
@mzg147 Жыл бұрын
If the hacker could also get to the backups... the ransomware can make sense 😂 Love you channel bye!
@najawin8348
@najawin8348 Жыл бұрын
10:18 Hey, hey, you're gonna upset the quantum information people.
@acollierastro
@acollierastro Жыл бұрын
Got ‘em
@elijahschow6672
@elijahschow6672 Жыл бұрын
“increasing technical skill…anyone who has used a terminal” I…totally forgot that’s not a thing that normal, sane people do. Thanks, you single handedly cured my imposter syndrome :’)
@deathlife2414
@deathlife2414 Жыл бұрын
The naming part I understand. Naming variables and files becomes hard as you continue writing scripts and programs
@EricaCalman
@EricaCalman Жыл бұрын
So most likely they were just launching probing attacks against a number of organizations in a massively parallel way hoping that a small fraction of their successful hacks will actually pay the ransom. Possibility two is just that an0nymous just wants to troll because one persons cringe is another persons roflcopter.
@Arithryka
@Arithryka Жыл бұрын
The way you have like a mantra that you repeat at the beginning of every chapter is very Chuck Palahniuk 😄 Genius! Hacker! MIT!
@oxylepy2
@oxylepy2 Жыл бұрын
Hey, off topic, but thoughts on Europa Clipper?
@BenGroebe
@BenGroebe Жыл бұрын
"Or like landords" killed me
@joinedupjon
@joinedupjon Жыл бұрын
I use terminal all the time but I've never run a powerpoint on a phone through a projector - unsure how worried I should be.
a physicist responds: physics has done very little for like 70 years
33:29
Wanna cry virus in action.
0:54
5 Minutes Review
Рет қаралды 304 М.
Happy 4th of July 😂
00:12
Alyssa's Ways
Рет қаралды 68 МЛН
Beautiful gymnastics 😍☺️
00:15
Lexa_Merin
Рет қаралды 15 МЛН
Playing hide and seek with my dog 🐶
00:25
Zach King
Рет қаралды 33 МЛН
how to cheat at chess
30:06
Angela Collier
Рет қаралды 103 М.
your personal statement sucks
31:47
Angela Collier
Рет қаралды 115 М.
how to name a telescope: why james webb?
33:53
Angela Collier
Рет қаралды 85 М.
How Paris Pulled Off One Of The Cheapest Olympics
12:25
CNBC
Рет қаралды 370 М.
humanoid robots belong in the trash
1:04:19
Angela Collier
Рет қаралды 169 М.
internet people lie about fluoride
50:03
Angela Collier
Рет қаралды 163 М.
AI does not exist but it will ruin everything anyway
1:03:18
Angela Collier
Рет қаралды 400 М.
alkaline water ...with lemon
1:00:25
Angela Collier
Рет қаралды 254 М.
Harder Drive: Hard drives we didn't want or need
36:47
suckerpinch
Рет қаралды 1,6 МЛН
Опасность фирменной зарядки Apple
0:57
SuperCrastan
Рет қаралды 3,8 МЛН
Лазер против камеры смартфона
1:01
NEWTONLABS
Рет қаралды 660 М.
Looks very comfortable. #leddisplay #ledscreen #ledwall #eagerled
0:19
LED Screen Factory-EagerLED
Рет қаралды 2 МЛН