Transcript
Thales Representative (0:02)
You're listening to the Cyberwire Network powered by N2K. At Thales, they secure what matters most the most Trusted companies and organizations utilize Thales cybersecurity products to protect critical applications, sensitive data and identities anywhere at scale. Through their innovative services and integrated platforms, Thales provides customers a greater visibility of risks, the ability to defend against cyber threats, close compliance gaps, and deliver trusted digital experiences for billions of consumers every day. That's Talas T H A L E S learn more@cpl.talasgroup.com.
Rick Howard (1:03)
The word is pseudo ransomware. Spelled pseudo as in something disguised as something else, and ransomware as in a type of malware designed to encrypt data for financial gain. Malware in the guise of ransomware that destroys data rather than encrypts. Example sentence the goal of pseudo ransomware, also referred to as wiperware, is to cripple the victim's systems rather than offer the opportunity to decrypt them. Origin and context Typical ransomware crews, cybercriminals encrypt their victims data and demand a ransom payment in exchange for the decryption key. But there isn't a lot of incentive on the criminal end to put much care and attention into the recovery part of the exchange. A study by Provendata in 2020 found that in April of that year, criminals that received payment delivered the decryption keys 89% of the time. Out of those cases, though, 31% of the victims required a lot of help and time to completely recover. Although the cyber criminals didn't use pseudo ransomware, for all intents and purposes, the impact was the same. The criminals didn't destroy the data per se, they just made it unusable for a long time. They didn't care how much chaos they injected into the victims systems, they got their money. In contrast, some nation state actors, to deflect attribution, use pseudo ransomware to deceive their victims and investigators into thinking that they are cyber criminals. In reality, they use it as a smokescreen to cover other more nefarious actions to either bring in more revenue to fund their operations or to hobble their enemies in a continuous, low level cyber conflict kind of way. According to the US Department of Justice, North Korean hackers used pseudo ransomware to cover their tracks as they went after Taiwan's Far Eastern International bank in 2017 to compromise the SWIFT system, the massive financial rotary that connects banks, financial institutions and governments worldwide. From Sandworm, Andy Greenberg's Cybersecurity Canon hall of Fame book about the Russian cyber attacks In Ukraine from 2014 to 2017, the Russian GRU, or Main Intelligence Directorate, modified the ransomware called Petya, originally created by the North Koreans, into a pseudo ransomware, eventually named Notpetya. The impact was that they compromised some 300 companies within seconds of delivery. And and a Ukrainian ISP estimated that at least 30 of those companies were totally burned to the ground. Big companies were also brought to their knees, like Merck, with over $870 million in recovery costs. FedEx, TNT, 400 million, Saint Gobain and Maersk, with over 300 million in recovery costs. The White House lowball estimate of the total damage was just over 10 billion. That's billion with a B. Nerd reference. In the 2008 movie the Dark Knight, directed by Christopher Nolan, Bruce Wayne, played by Christian Bale, has a discussion with his butler Alfred, played by Michael Caine, about the nature of some chaotic men who are not motivated by the traditional things that typical criminals desire. Like running a business. Even if it's criminal. Some men just want to tear the system down. Or don't care that they tear the system down, as long as they get what they want.
![Pseudoransomware (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F2588f1ca-c966-11f0-b900-9737e0743c1c%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)