Loading summary
Cyberwire Network Host
You're listening to the Cyberwire Network, powered by N2K.
Sponsor Representative
And now a word from our sponsor, the center for Cyber Health and Hazard Strategies, also known as chhs. Looking for a graduate degree that will give you an edge on your professional career? Earn a Master of Science in Law at University of Maryland, Carey School of Law. This part time, two year online graduate degree program is designed for experienced professionals to understand laws and policies that impact your industry. Learn from CHHS faculty who are experts in their field. No GRE required. Learn how you can master the law without a JD at Law, Umarland, Eduardo.
Rick Howard
The word is ransomware. Spelled ransom as in a payment demanded for the release of something valuable and wear as in a type of software. Definition Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption. Key. Example sentence the company was forced to choose between paying the ransomware attackers or rebuilding the systems from scratch. Origin and claim Context One of the first known ransomware incidents occurred in 1989, when evolutionary biologist Dr. Joseph Popp sent 20,000 floppy disks to members of the World Health Organization's AIDS conference. When the receiver inserted the floppy disk, the payload encrypted the names of files on the user's hard drive and asked the victim to send $189 to a PC Cyborg corporation in order to receive a repair tool. Popp was arrested in the UK but deemed mentally unfit to stand trial. His motivation is still unclear, though he claimed the profits would go to AIDS research. According to CrowdStrike, the advent of cryptocurrencies in the early 2010s paved the way for the proliferation and professionalization of ransomware attacks. Cryptocurrency allowed attackers to receive victims payments with a certain degree of anonymity. Early strains of ransomware were typically indiscriminate, infecting individual home systems in exchange for a small ransom of a few hundred dollars. Over the years, however, threat actors shifted targets from the home Internet user to the more lucrative corporate Networks. According to Unit 42 Palo Alto Network's Threat Intelligence team, as of June 2022, the average ransomware payment was just under $1 million. As the new corporate model evolved, ransomware criminals found at least four ways to generate revenue from their victims. 1 payment to unencrypted data 2 payment to not make the stolen data public 3 payment to not sell the stolen data to competitors, slightly different than a public release and finally, after receiving payments on the first three, selling the Stolen data anyway, to whomever wants it. Nerd reference. At the conclusion of season one of my favorite TV show about cyber security ever, Mr. Robot F Society. The hacktivist group that the two main characters belong to. Elliot, played by Rami Malek, and Darlene, Elliot's sister, played by Karlie Chaikin, penetrates the e commerce systems at E Corp, AKA Evil Corp, and prevents access to all their customers. Payment information Fsociety displays a splash screen on every Evil Corps employee's monitor saying, you, files are encrypted to get the key. To decrypt files, you have to pay $5.9 million. If payment is not made, we'll brick the entire system. Signed F. And then it shows a countdown timer with less than 24 hours remaining. In this scene, Evil Corps CTO played by Brian Stokes Mitchell, the CEO played by Michael Christopher, and the chief legal officer, played by Sandrin Holt, discuss their options.
General Counsel
I was on the phone with the FBI all night. We can't confirm the sender, but the email we received is authentic. More than likely the same hackers from the ransomware.
Chief Technology Officer
Unbelievable. What are the demands again?
General Counsel
$5.9 million. $5.9 million to be delivered to Battery Park City, 9pm tonight. No police. If we want to pay the ransom, the FBI will not sanction it.
Chief Technology Officer
We cannot negotiate with these people. Our techs are looking into it. We'll find a way to decrypt it and get the system.
General Counsel
How long?
Chief Technology Officer
Five days, tops.
General Counsel
Five days for our banking system to be down? That's a lot of money down the drain. I don't even want to mention the optics. We can't afford this hack right now. And frankly, I think we can find 5.9 million in between our couch cushions. It's nothing. My opinion as general counsel is to pay it.
Rick Howard
Word Notes is written by Tim Nodar, executive produced by Peter Kilpe and edited by John Petrick and me, Rick Howard. The mixed sound, design and original music have all been crafted by the ridiculously talented Elliot Peltzman. Thanks for listening.
Cyberwire Network Host
Some follow the noise. Bloomberg follows the money. Because behind every headline is a bottom line, whether it's the funds fueling AI or crypto's trillion dollar swings. There's a money side to every story. And when you see the money side, you understand what others miss. Get the money side of the story. Subscribe now@bloomberg.com.
Host: N2K Networks
Air Date: April 21, 2026
Episode Theme:
A concise and insightful exploration of "ransomware"—its meaning, history, evolution, and cultural impact—focusing on how social engineering and deception are core to this cybercrime tactic.
This episode of Hacking Humans: Word Notes unpacks the term "ransomware," examining its definition, early appearances, economic impact, and evolution, especially in the context of corporate attacks. Through historical context, expert insights, and pop culture references, the episode elucidates ransomware's role in the broader cybercrime ecosystem.
[01:01] Rick Howard
"Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key."
— Rick Howard [01:01]
[02:00] Rick Howard
[02:50] Rick Howard
[03:40] Rick Howard
“As the new corporate model evolved, ransomware criminals found at least four ways to generate revenue... And finally, after receiving payments on the first three, selling the stolen data anyway, to whomever wants it.”
— Rick Howard [04:25]
[04:45] Rick Howard
General Counsel: “We can't confirm the sender, but the email we received is authentic. More than likely the same hackers from the ransomware.” [05:11]
Chief Technology Officer: “Unbelievable. What are the demands again?” [05:24]
General Counsel: “$5.9 million. $5.9 million to be delivered to Battery Park City, 9pm tonight. No police. … The FBI will not sanction it.” [05:30]
Chief Technology Officer: “We cannot negotiate with these people. Our techs are looking into it.” [05:45]
General Counsel: “Five days for our banking system to be down? … I think we can find 5.9 million in between our couch cushions. … My opinion as general counsel is to pay it.” [05:59]
Rick Howard:
"Early strains of ransomware were typically indiscriminate, infecting individual home systems..." [03:15]
General Counsel (Mr. Robot scene):
"We can’t afford this hack right now. And frankly, I think we can find 5.9 million in between our couch cushions. It’s nothing. My opinion as general counsel is to pay it." [05:59]
| Time | Segment | Key Topics / Quotes | |----------|----------------------------------------------|------------------------------------------------------------------------------| | 01:01 | Definition | "Malware that disables a system ..." | | 02:00 | History, Dr. Popp example | Early social engineering, ransom demand via floppy disks | | 03:15 | Cryptocurrency enables modern ransomware | Transition from home to corporate targets | | 03:40 | Ransomware economics (Unit 42 data) | Multiple payment schemes, higher stakes | | 04:45 | Pop culture (Mr. Robot) | "You, files are encrypted ... pay $5.9 million ..." [04:55] | | 05:11-06:25 | Executive dilemma at Evil Corp | “My opinion as general counsel is to pay it.” [05:59] |
This episode distills the complexity of ransomware into an understandable and engaging narrative—connecting historical precedent, modern tactics, financial impact, and cultural perception. Rick Howard’s use of real-world stats and memorable TV references illustrates not only how ransomware works but why it continues to be an evolving threat for individuals and organizations alike.