A (46:09)
With Zscaler. Zero trust AI you can safely adopt generative AI and private AI to boost productivity across the business. Our zero trust architecture plus AI helps you reduce the risks of AI related data loss and protects against AI attacks to guarantee greater productivity and compliance. Learn more@Zscaler.com Security that's Zscaler.com Security all right, we are back from the break and it's time for what? A conversation about ransomware. You know, in the world of cybersecurity, frankly, trust is everything. We talk about trust, trust, but verify, zero trust. And whenever it comes to the people who are attempting to make sure that your applications are working the way that they're supposed to, your services are working the way that they're supposed to, these people that you hire, trust is in particular, absolutely important. Which makes this week's shocking indictment all the more brazen because federal prosecutors have charged two ransomware negotiation specialists. Yeah, the people who are supposed to be helping stop this from happening with running their own cyber extortion scheme, essentially playing both arsonist and firefighter in the high stakes world of digital hostage situations. The accused include Kevin Tyler Martin, who worked for the Chicago based Digital Mint, and Ryan Clifford Goldberg from Signia Cybersecurity Services. Really fascinating that these people have sort of three name names, right? Who allegedly conducted five ransomware attacks between May 2023 and April 2025. Successfully, not failed, successfully extort, allegedly, of course, extorting $1.2 million from a Florida medical company while attempting to squeeze millions more from other victims. So here's the conspiracy. According to the Chicago Sun Times, the scheme, honestly, in reading about this, I can hear music playing and there are people with hoodies and roll out keyboards. It's a little bit of a cybersecurity thriller that's gone wrong because according to an FBI affidavit that was filed in September, Martin and Goldberg along, which again, those are just. That sounds like a firm. Anyway, Martin and Goldberg, along with an unindicted coconspirator also employed at Digital Mint, began deploying malicious software to lock down victim servers and demand ransoms. And I remind you, these are the people who are trying to. Who are supposed to be helping people avoid ransomware attacks or overcome ransomware attacks. Their target list and included a Florida medical company where they allegedly successfully extorted $1.2 million after demanding 10 million. A Maryland pharmaceutical company that was targeted but unsuccessful in getting it. Maybe they had one of our sponsors as a, as a protector, in that case, a California doctor's office where they allegedly demanded $5 million a California engineering firm where they were seeking a $1 million ransom, and a Virginia based drone manufacturer where they attempted to extort $300,000. It's fascinating. I would love to sort of talk to them and figure out how they determined what the, what the ransom was. If it was based on how much the company made or if it was based on not being, you know, having multiple failures, so just lowering and lowering and lowering the amount. Or if the AI told them what they should suggest as the possible ransom for the, you know, getting access back to the data. The FBI agent noted that while the medical company attack was apparently the only successful attack, the $1.2 million payment was routed through a mixing service and then through multiple cryptocurrency wallets, of course, in an attempt to launder the cash. Yeah, there's not just a, you know, a pet store or a dentist's office or, I don't know, a restaurant involved in money laundering anymore. It's all just digital now. How boring. Anyway, so it was, it was all working according to plan, but it began to collapse in April of 2025 because the FBI raided the home of the unindicted coconspirates conspirator. It's unclear, you know, who exactly this unindicted co conspirator is, but Goldberg's subsequent behavior then painted a picture of mounting paranoia because in May 2024. So again before the FBI raid about a year later, he searched online for the co conspirators name along with DOJ and asked, this is just. And asked, why would somebody who was accused and admitted to an FBI agent be let go but later indicted? Hmm. When FBI agents interviewed Goldberg in June, he initially denied involvement, but eventually admitted to the scheme, telling agents he engaged in the ransomware attacks to get out of debt and feared he was, quote, going to federal prison for the rest of his life. Ten days after that interview, Goldberg and his wife fled to Paris on a one way flight. It's just, it's, this is, this is such, it's such an obvious story. In a way, the people who are best at being able to stop ransomware attacks and understand how to combat ransomware attacks would be the ones who are then going to be very good at causing them. But at the same time, you're just going, oh my goodness, who, who can we trust here? What can we do? We'll talk in a minute about the corporate response, like the response from these companies that employed these alleged bad actors. But I do want to take a quick break to tell you about Our final sponsor on today's episode of Tech News Weekly, and that is Zapier. Love Zapier, Love what you can do with Zapier. I use Zapier all the time to complete tasks on my behalf that I don't want to do myself. And so there are often times where, say I'll get an email, and the information in that email, I know it needs to go into a Google spreadsheet, and instead of regularly going and checking the email and then moving that information over, why not have it happen automatically? But while I'm pretty good at this stuff, there are some places where I fall short, and that is where Zapier comes in with its AI assistant to help me out. So when I'm creating a zap, as they're called, which is this sort of automated process of some saying, look at this spreadsheet, or look at this email, find this specific kind of data, and then put this in this spreadsheet in this specific place, I can go, okay, I know how to do this part, but I'm stuck on creating this part. What specific term should I use to find the data that I'm looking for that AI can help me out? I mean, it feels like everyone is talking about AI these days. I mean, we talk about it on the show a lot. If there's one thing that you've learned learned, it's that talking about a new technology isn't the same as actually then implementing it. Right? You can, you can get excited about it or not get excited about it, talk about how it lets you down or how it works as you need to, but when it comes time, like at a company to put it all together, figure it out, that's the difficult process. Well, Zapier is where tech innovators break that cycle of just talking about and actually put it to work. If you don't know about Zapier quickly, it's how you bring the power of AI to your work in this way. With Zapier's AI Orchestration platform, you can actually add AI to any workflow. Connect top AI models like Chat, GPT and Claude to the tools your team already uses so you can add AI exactly where you need it. It could be AI powered workflows, an autonomous agent, a customer chatbot, or something else. Anything that you can orchestrate, you can orchestrate it with Zapier. Zapier, it's for everyone, Everyone. Tech expert or tech professional or tech power user or not. No IT bottlenecks, no complexity, no AI hype. You just get those results Teams have already automated over 300 million AI tasks using Zapier. Ready to join them? Get started for free by visiting zapier.comtnw that's Z A P I E R.comtnw and we thank Zapier for sponsoring this week's episode episode of Tech News Weekly. All right, back from the break, we're talking about an obvious and disappointing story from the Chicago Sun Times about an FBI investigation regarding a firm that helps combat ransomware attacks where some employees allegedly conducted ransomware attacks of their own own. After kind of figuring this out right then, you got to know what the companies thought about their employees doing so. Digital Mint and Signia have, of course, distanced themselves from the former employees. And Digital Mint issued multiple statements saying the alleged crimes took place outside of Digital Mint's infrastructure and systems. So Digital Mint says our stuff wasn't used at this at all. The suspects did not access or compromise client data as part of the charged conduct. The company fired both employees, of course, and is cooperating with the investigation and are, in fact, a cooperating witness in the investigation and not an investigative target. Digital Mint President Mark Granz stated here it is, quote, trust is earned every day. As soon as we are able, we begin communicating the facts to affected stakeholders. This level of transparency is a key part of the culture that has driven Digital Mint's success. So what are we looking at going forward? Well, Martin and Goldberg were indicted on October 2nd on three federal charges. Conspiracy to interfere with interstate commerce by extortion, interference with interstate commerce, and intentional damage to a protected computer. Goldberg has been taken into custody and ordered held. Or, excuse me, and ordered held pending trial. And then Martin was actually freed on a $400,000 bond. Wonder where they got the money for that bond. Both face potentially lengthy prison sentences if convicted, because cybercrime ain't no joke when it comes to federal prosecution. Well, this, of course, then leads to concerns in the cybersecurity industry, given, again, the trust factor there. Insider knowledge can be weaponized. We've seen that before with some security companies using some of the information that they have to hand it over to to sell it to the highest bidder and have that information used and weaponized. And given how they know how these ransomware negotiations work on the one side, then you can take it and flip to the other. We do it all the time where we take bad actors and we try to turn them into good guys. Right. And then, of course, what happens whenever you need this in your most vulnerable moment? Can you turn to these folks and say, I need your help? Or are you having to go, okay, well, we can't. We can't rely on people outside. There's an issue here. And of course, it's a huge economy, frankly, the ransomware economy. Negotiations, attackers, victims, all have to kind of do this dance. But the dance is happening in this shadowy place where in some places it's illegal to. In some places. And in some cases, it's illegal to pay the ransom. In some cases, it's discouraged. In some cases, there's insurance, but in some cases there's not. It's all very much this gray area. And then you got to ask about kind of like, what's the vetting process for the people that these companies are hiring and bringing in? It raises questions about how they choose their employees and what systems they have access to and when. And are you just looking for the best that you can get? And does that mean that you are getting a person who would be more likely to do something like this? But there's something that I think is not being considered here, which is, and I'm not, to be clear, I am not at all condoning behavior, but there is a part of me that says this person was talking about being in debt, right? And needing to make money to get out of debt. These people who are doing negotiations in a good way for millions and millions of dollars working for these companies, I'm like, are they being paid enough that they had to turn to this bad way of doing things? Goodness gracious. Like, that's sad to me that you are responsible for what can very easily become hundreds of thousands of dollars of profit for a company that is hired to deal with ransomware, and your job is to kind of negotiate this process, and yet you're still living with debt. And that's just a question that I have. Obviously, we don't know what's going on here. There could be millions of dollars of debt for the wrong reasons. But it is certainly something that I always ask, what drove this person to make that choice, as opposed to. To continuing to live in the light, as it were. This ransomware epidemic continues to plague organizations worldwide, Attacks becoming increasingly sophisticated and costly as AI continues to aid in the process. You've got those professionals who are tasked with trying to solve the problem, actually being the problem. Well, that leads to even more confusion, concern, and an overall kind of bleak landscape of cybersecurity, folks. That is, I guess, the unhelpful note. We're going to end things. On this week's episode of Tech News Weekly, I'll be back next week with more, but until then, it is time for me to say goodbye to all of you and thank you so much for tuning in. Of course you can head to Twitter TV tnw. That's where you go to subscribe to the show show audio video formats and head to Club Twit Twit TV Club Twit to check out the work we do in the club. When you become a member of Club Twit, you'll gain access to ad free content. All of our shows ad free. You get your personal custom feed which is super exciting. You also gain access to our club feeds. Yeah. So that includes our behind the scenes, before the show. After the show. You also gain access to our feed that has our news coverage. So that's live event coverage that we do, live commentary from Leo Laporte, yours truly and others on the network and a special feed for our club content like the book club from Stacy Higginbotham. You also get my crafting corner. We are in the process of of completing a Dungeons and Dragons adventure. We will be back very soon. I believe that is November 17th. We will cross my fingers, knock on wood. Wrap up our adventure at 2pm Pacific time where we're making our way through a spooky cornfield. So you'll be able to check that out as well. And that's the only way to do that is to be part of the the club. So head to Twitter TV Club Twit to check it out. If you'd like to follow me online, I'm ichasargent on many a social media network. Or you can head to Chihuahua Coffee, that's C H I H U A H U a Coffee where I've got links to the places I'm most active online. And be sure to check out my other shows on the network, including iOS today. Hands on Apple, Hands on tech. I think that's all of them. Yeah. So check those out as well. Bye Bye.