Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K.
B (0:12)
And now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested US citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026 semester and for this scholarship by February 28th. Learn more at CS JHU. Edu MSSI hello everyone and welcome to the Cyberwires Research Saturday. I'm DAV and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
A (1:43)
There was just something strange going on. We kind of felt like the larger families were not as prevalent anymore. It was like it was getting scattered and looking at it. We kind of pieced the little puzzle pieces together and we saw like, hey, there's something happening in the underground.
B (2:07)
That's John Focker, head of Threat Intelligence at Trellix. The research we're discussing today is titled Gang Breaking Trust Among Cybercriminals.
A (2:23)
We Strongly believe and we can see it. And we have a couple where cyber crew Mongols are starting to distrust each other, which I am actually, I say that almost with a smirk, with a smile because yeah, it's, it's, it's, it's interesting to see because it's the longest time there were always strong alliances. And when cybercriminals, I say this quite often, when they trust each other, that's when innovation happens. That's when they built these strong empires. That's when they, they attack at large and they can scale up. And especially if you look at ransomware, to do that from A to C, like the whole kill chain from not only building software, but distributing it, distributing it and then like doing the engagement with the victim, negotiating, then getting the funds, laundering the funds.
B (3:13)
That's.
A (3:13)
There's so many steps involved that you can, it's almost impossible to do everything yourself so that you're always confined to team up with people. You're always in a partnership. And these partnerships take trust. So when the, when there's. Now the trust goes out the door. Yeah, those partnerships are much harder to establish. So that's, that's something that we're seeing and we, we really wanted to highlight this as, like, very often you see blogs about the new ransomware on the block and all that stuff. And we, we jumble. Actually, myself, we wanted to zoom out and see like, okay, but can we describe what we're seeing? Can we find reasons why and why it's happening? So that, that was kind of triggered us to, to write this blog.
![No honor among thieves. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F69ccc7d0-a5f3-11f0-9c6f-774ee2ca4804%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)